How to Stay Safe Online Rollie Edwards.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Internet Safety & Awareness Dan Tomlinson 02/23/2013.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Threats to I.T Internet security By Cameron Mundy.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Protecting Yourself Online (Information Assurance)
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
IT Security for Users By Matthew Moody.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Information Systems Services How to Protect Yourself On-Line – Keeping Safe At Home Neil Jowsey, IT Security Team 25 th September 2013.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
PROTECTION ON THE INTERNET NADIA SNOW VIRUS Is a file made to do harm or criminal activity there are many types: -worms -Trojan horse -Spyware How they.
Computer Security By Rachel Gaines. Computers are used for work, play, and everything in between. So here’s how to keep it fun and protected.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Grades 4-6 Be SAFE Online! Ceres Unified School District.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
What is Spam? d min.
Computer Skills and Applications Computer Security.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Introduction to Desktop Security Protecting your computer and your data.
Internet safety By Suman Nazir
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Computer Security Keeping you and your computer safe in the digital world.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
Internet Safety.
INTERNET SAFETY FOR EVERYONE
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Rules of Netiquette Online Security Internet threats Protecting reputations online Copyright Contextualized online search and research skills.
Computer Security.
Hotspot Shield Protect Your Online Identity
Unit 4 IT Security.
Lesson 3 Safe Computing.
Protect Your Computer Against Harmful Attacks!
Staying Austin College
STOP. THINK. CONNECT. Online Safety Quiz.
Information Security Awareness 101
Risk of the Internet At Home
Internet Safety for Everyone
Staying safe on the internet
HOW DO I KEEP MY COMPUTER SAFE?
Internet Safety for Everyone
Computer Security.
ICT Communications Lesson 3: Internet Life and Privacy
Internet Safety for Everyone
Internet Safety for Everyone
Lesson 2- Protecting Yourself Online
Internet Safety for Everyone
Internet Safety for Everyone
Introduction-Cyber Safety
Presentation transcript:

How to Stay Safe Online Rollie Edwards

Overview Protecting Personal Information Preventing Pop-Up Advertisements Email Security Password Strength and Protection Smart Device Safety

Enabling Google’s Built in Adblock Google has a built in feature that will help filter out unwanted ads. Enable it in the top right hand corner of Google Chrome

Your Personal Information

Tips to Staying Safe Online Use Secure Software 1 Be Wise About wifi 2 Read Privacy Policies 3 Create Strong and Unique Passwords 4

Spam Emails and Malicious Emails Beware of “too good to be true” Look for spelling and grammatical errors Trust your intuition Report questionable emails and email addresses as spam Never respond to unsolicited emails

BUT BE ON THE LOOKOUT FOR TRAPS!!! Unsubscribing Don’t be Afraid to Unsubscribe Usually at the Bottom Exit Questions are OKAY BUT BE ON THE LOOKOUT FOR TRAPS!!!

Types of Threats Online Phishing: Mass Emails intended to gain personal information Spear Phishing: Targeted emails disguised as someone you know. Water-Holing: Websites portrayed as legitimate businesses. Trojan: “Legitimate Software” that is actually malware.

Viruses and Malware Ensure that Pop-Up blocker is installed on Google Chrome Control the SD, USB, and other devices access to your laptop, desktop or Smartphone/ Tablet Do not open questionable attachments or file downloads.

Pop-Up Advertisements Winner of a free prize! 100th or 1000th visitor of the site Free promotional coupon with email address Link you to harmful sites Try to steal your personal information

Password Strength and Protection Do not use familiar passwords Don’t use the first password that comes to mind Store your passwords in a safe place: online or on paper Shoulder Surfing and logging out of public interfaces

Safety While Using Smart Devices Location Tracking is OKAY! Updated Operating Systems Stranger Danger Privacy Settings

In Conclusion Use strong creative passwords Secure Network and Secure Web Address Trust your intuition or Reach Out For Help Report scams to the National Consumer Protection Bureau https://www.ftc.gov/about-ftc/bureaus- offices/bureau-consumer-protection