HOW DO I KEEP MY COMPUTER SAFE?

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Primary Threats to Computer Security
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
SPYWARE  Do you know where your personal information is?
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
How It Applies In A Virtual World
Threats to I.T Internet security By Cameron Mundy.
Issues Raised by ICT.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Unit 2 - Hardware Computer Security.
Unit 19 INTERNET SECURITY
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Viruses By amrisa hussain Internet safety. viruses Viruses- a virus is a file or a piece of code which is capable of copying itself and typically has.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
PROTECTION ON THE INTERNET NADIA SNOW VIRUS Is a file made to do harm or criminal activity there are many types: -worms -Trojan horse -Spyware How they.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Internet Safety Internet Safety LPM
Computer Skills and Applications Computer Security.
Internet safety By Suman Nazir
Threats to IT security Jordan pilcher. phishing Phishing is when companies or people from other people who think they can get away with scamming you for.
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
W elcome to our Presentation. Presentation Topic Virus.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
Any criminal action perpetrated primarily through the use of a computer.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Computer Security Keeping you and your computer safe in the digital world.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Security Risks Todays Lesson Security Risks Security Precautions
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Managing Windows Security
Done by… Hanoof Al-Khaldi Information Assurance
IT Security  .
Unit 4 IT Security.
Lesson 3 Safe Computing.
COMPUTER VIRUSES Computer Technology.
Cyber Security By: Pratik Gandhi.
Information Security 101 Richard Davis, Rob Laltrello.
Protect Your Computer Against Harmful Attacks!
Lesson 2- Protecting Yourself Online
Shopping experience! Avoiding online fraud Ian Ramsey C of E School
Internet Safety Vocabulary
Internet Safety for Everyone
Computer Security.
Internet Safety and The Digital Divide
9 ways to avoid viruses and spyware
Internet Safety for Everyone
Lesson 2- Protecting Yourself Online
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Introduction-Cyber Safety
Presentation transcript:

HOW DO I KEEP MY COMPUTER SAFE?

Viruses A virus is a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data. It can delete files and also spy on you. To prevent viruses you can: Install an antivirus program. Don't open email attachments unless you're expecting them. Keep your computer updated. Use a firewall.‌ Windows Firewall (or any other firewall) can help alert you to suspicious activity if a virus or worm attempts to connect to your computer Be wary of opening trash mail – delete them as soon as you get them Think before downloading free apps Don’t open attachments from emails unless you trust the person Only use your own hardware devices to put in the computer Keeping your operating system up to date Using up to date anti virus software Only downloading files from safe websites Avoiding software from unreliable sources Clear the cache or search history to prevent viruses

Phishing Phishing is an online form of identity theft. It is a method of fraudulently obtaining personal information, such as passwords, social security numbers, and credit card details, by sending spoofed emails that look like they come from trusted sources, such as banks or legitimate companies. They can see what digits you input on your keyboard. Its an email claiming to be from a bank may actually take the user to a site which gives them a virus. This can consequently, mean the site can record information from the user and their computer automatically downloads a dangerous virus. Phishing involves sending a link via an email to a website which looks like a genuine site (e.g. a bank website) but is in fact bogus. The recipient may be tricked into following the link and entering details such as bank passwords, or personal information on the website. To prevent this you should keep your anti virus software up to date and also delete suspicious emails before opening them.

Spyware This is a program that is installed without consent. It can be installed through a virus or sometimes as part of an installation program. It works by collecting information and data from the user (such as passwords) and sending it back to another source. It can often sense what keys you press on your keyboard so can obtain information such as passwords and credit card pins through online banking. The information can also contain the websites you’ve been visiting or downloads. This information is often used for marketing purposes, but can also be used for illegal purposes such as fraud (tricking someone for personal gain or to damage them). Spyware is classified into four types: system monitors, Trojans, adware, and tracking cookies. Spyware is mostly used to track and store Internet users' movements on the Web and serving up pop-up ads to Internet users. Whenever spyware is used for malicious purposes, its presence is typically hidden from the user and can be difficult to detect. Some spyware, such as key loggers, may be installed by the owner of a shared, corporate, or public computer intentionally in order to monitor users. To prevent this you should 1.Be selective about what you download to your computer. Make sure you really need a program before downloading it. 2.Read licensing agreements (terms and conditions) 3.Watch out for anti-spyware scams. 4.Beware of clickable advertisements.

Identity Theft This takes place when someone collects personal information about you and uses that information for malicious or criminal purposes. In the past, criminals used to rummage through bins to get information, but now people can access internet social networking sites where people’s profiles contain personal information which could prove valuable to the criminals. Spyware can increase identity theft.