Computer Technology Timpview High School. E-mail Email is inexpensive and easy to use and track Spam – emails sent in bulk to many peoples email accounts;

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Primary Threats to Computer Security
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Internet Safety/Cyber Ethics
Security Advice Georgie Pepper Campsmount Acadamy.
Alisha horsfield.  Computer virus is something that copies itself to computer software.  Virus can delete the hosts important documents which includes.
Threats to I.T Internet security By Cameron Mundy.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Scams & Schemes Common Sense Media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
IT security By Tilly Gerlack.
Electronic Communication Is the process of sending and receiving messages. Text Message File Transfer Sending messages from one computer.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Computer Technology Timpview High School.  is inexpensive and easy to use and track  Spam – s sent in bulk to many people’s .
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Digital Citizenship Project By: Brandis Cook. Netiquette Netiquette, also known as “network etiquette”, is designed to facilitate communication over networks.
A guide to netiquette, copyright & fair use, plagiarism, internet and computer safety By Briana Horton.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Computer Technology Michael Viphongsay 4B. Electronic mail Internet or Intranet.
Telecommunications Communication over a long distance; Distant communication.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Digital Citizenship Project By Allen Naylor Ed 505.
Security System Ability of a system to protect information and system resources with respect to confidentiality and integrity.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
Malware & Phishing By: mackenzie olson. Internet fraudsters send out spam, pop-ups, appealing websites, and desirable downloads.
ED 505: Magen Anthony. Netiquette on Social Media site is the etiquette or guideline for posting on social media or other online sites. This helps individuals.
Digital Citizen Project Xiomara Hernandez. Topics Defined Netiquette on Social Media Sites Copyright and Fair Use Plagiarism Safety on the Internet Safety.
How to Read Outlook . Make sure the computer is on.
BASIC ETIQUETTE Use the BCC and CC appropriately. 3.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
COMPUTER RULES April 26, 2011 Pamela Johnson. Elements of Digital Citizen Copyright Plagiarism Safety on the Web Safety on Computer.
Safety and Security issues of using ICT Alys brooks.
BY JESSICA SCHOLEY p1. Id Fraud Is When Someone Pretends To Be Someone Else Using There Address, Birthday And Other Information. People Also Use Id Fraud.
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
By: Mr. Jamie Ferguson. Before we begin using our computers for internet use this semester, we will be learning the rules for the classroom. You will.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Digital Citizen Project By: Frances Murphey Technology and Education.
By :Mitchell Christie by :Mitchell Christie safety.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
Things Every Computer User Should Know… Jessica Johnsey ED 505- Technology and Education.
Electronic Mail. Gmail Accounts USERNAME Skyward PASSWORD Same password as you use to log in to your computer.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
. Electronic. is a method of exchanging digital messages. What does the E in stand for?
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Internet Safety.  Ethics-moral standards or values  Netiquette-rules for proper online behavior.
Unit 4 IT Security.
Lesson 3 Safe Computing.
Cyber Security By: Pratik Gandhi.
Protect Your Computer Against Harmful Attacks!
Computer Literacy.
What is it? Why do I keep getting from Barracuda? SPAM.
Basics HURY DEPARTMENT OF COMPUTER SCIENCE M.TEJASWINI.
Computer Security.
Unit 4 IT Security Kerris Davies.
Privacy, Security, and Ethics
Presentation transcript:

Computer Technology Timpview High School

is inexpensive and easy to use and track Spam – s sent in bulk to many peoples accounts; like junk mail Phishing – a form of Internet fraud that aims to steal valuable information such as credit cards, social security numbers, user IDs and passwords

A virus is a program intentionally designed to cause annoyance or damage to computer hardware or software Ways to protect your computer: Turn on firewall Keep anti-virus software up-to-date Be cautious about opening attachments Avoid spyware

Treat people with the same respect and integrity you would during a face-to-face encounter Do not use offensive language, avoid extreme emotion or opinions, avoid insulting or hostile comments

Blind Copy address to send to Carbon Copy Your Name Always include and make it informative 1.DO use proper grammar, punctuation, capitalization, etc. 2.DO keep it short and to the point. 3.DO NOT use all capital letters. 4.DO NOT send to people you dont know. 5.REMEMBER is NOT private!

An icon that represents an emotion; A series of typed characters that creates a facial expression. ; ) :-( :o) 8-(