Are you Safe at Work? A look into Safety at the Workplace and Internet Security Presented by Sheila Gee.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Primary Threats to Computer Security
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Johnson Logistics Solutions Office of Systems and Information Technology.
Government Databases and You or How I Learned to Stop Worrying and Love Information Loss. By Patrick Fahey Mis 304.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
Security Advice Georgie Pepper Campsmount Acadamy.
Protecting Our Personal Space Security in a Virtual World.
Software. stands for electronic mail. software enables you to send an electronic message to another person anywhere in the world. The message.
Alisha horsfield.  Computer virus is something that copies itself to computer software.  Virus can delete the hosts important documents which includes.
Threats to I.T Internet security By Cameron Mundy.
Issues Raised by ICT.
Protecting Our Personal Space Security in a Virtual World by David Hines - Information Security Officer
Security Issues: Phishing, Pharming, and Spam
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Cyber crime & Security Prepared by : Rughani Zarana.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Internet Safety By Adam T Introduction  This PowerPoint will show give you advice on how to stay safe on the internet.  You will be told how to stay.
How To Preserve Online Privacy. 6 Major Ways To Protect Privacy  1.) Learn to Clear Browsing History  2.) Familiarize Yourself with Privacy Settings.
E-Rule. What is cyber crimes Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Are You a Good Digital Citizen? By Abby Buchanan Image from Microsoft Clip Art.
Cyber Security Action against cyber crime. What is cyber security?  Cyber security standards are security standards which enable organizations to practice.
Protecting Students on the School Computer Network Enfield High School.
Computer Security Hacking, Phishing, Passwords Kausalya S. And Sushil Mujumdar (CCCF) 04 - Aug - 15.
WE ARE DATA By Hazim Zaidani Do you really think that your personal data is protected ? Well… Think Again !!!
L ESSON 2 A website is a collection of different types of data, which can be anything like text, graphics, videos etc. combined together to provide.
Introduction to Student Name Student Class.
Internet safety By Kenan.  Viruses are written by malicious programmers who wish to cause problems for other computer users.  The primary source of.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Internet safety By Suman Nazir
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
Cybersecurity Test Review Introduction to Digital Technology.
Issues for Computer Users, Electronic Devices, Computer and Safety.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
(CYBERCRIME: THIEF). Web Designing encompasses many different skills and disciplines in the production and maintenance of websites. The different areas.
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Security on Peer-to-Peer Networks.
Protection of Data 31 Protection of Data 31. Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers.
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
Internet Safety.
Unit 4 IT Security.
Lesson 3 Safe Computing.
Unit 4 IT Security.
Lesson 2- Protecting Yourself Online
Lesson 2- Protecting Yourself Online
Presentation transcript:

Are you Safe at Work? A look into Safety at the Workplace and Internet Security Presented by Sheila Gee

Emergencies…what are they and what do I do? Fire Tornado Earthquake Threat

Evacuation…when and where do I go? Seriously……?? Why? Its only a drill Where do I go? Take your coat, purse, wallet Close all doors Assist the disabled

Fire….what do I do? Do you know what the procedure is? Do you know where the exits are? What is the alternate route if you cannot take the stairs? The fire is below you; what do you do? Where are the extinguishers located?

Cybercrime….what is that and what do I do? What is cybercrime? Fraud in cyber space Credit card fraud Identity Theft Hacking Children What is spam? CyberCyber crime encompasses any criminal act dealing with computers and networks (called hacking).computersnetworkshacking Additionally, cyber crime also includes traditional crimes conducted through the Internet.Internet For example; hate crimes, telemarketing and Internet fraud, identity theft, and credit card account thefts are considered to be cyber crimes when the illegal activities are committed through the use of a computer and the Internet. Spam is electronic junk mail or junk newsgroup postings. Some people define spam even more generally as any unsolicited e- mail. However, if a long-lost brother finds your address and sends you a message, this could hardly be called spam, even though it's unsolicited. Real spam is generally advertising for some product sent to a mailing list or newsgroup.e- mail addressmailing listnewsgroup In addition to wasting people's time with unwanted , spam also eats up a lot of network bandwidth.bandwidth

Protect Your Computer Anti-virus software Strong passwords Lock your PC Encrypt files

Anti-virus software What is it? Do I need it? Will it help? Brand Names Norton/Symantec McAfee Kaspersky Antivirus is a utility that searches a hard disk for viruses and removes any that are found. Most antivirus programs include an auto-update feature that enables the program to download profiles of new viruses so that it can check for the new viruses as soon as they are discovered.utilityhard diskviruses

Passwords Use strong passwords Password should have at least 8 characters Do not use user name, your name or company name Use a combination of upper and lower case letters Use numbers and symbols

Your Computer Lock your computer when you leave your desk CTRL+ALT+DELETE Windows L Use password protection on your screensaver You can specify time for PC to lock itself

Encrypt files containing confidential or business critical files Dont open questionable s Use the Junk Filter in Outlook

Extra Every October, Microsoft recognizes National Cyber Security Awareness Month (NCSAM) in the United States through our partnership with the National Cyber Security Alliance (NCSA). NCSAM was created to help increase awareness of online safety and security issues, and to help educate people about the best ways to protect their computers and other electronic devices.National Cyber Security Alliance

QUESTIONS?????