Computer Basics. Computers & Peripherals Safety on the Web Security Software Firewall Antivirus Software Norton Antivirus McAffee Antivirus Security.

Slides:



Advertisements
Similar presentations
Online Privacy A Module of the CYC Course – Personal Security
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
How to protect yourself, your computer, and others on the internet
Developed by Technology Services 1:1 Laptop Initiative
Primary Threats to Computer Security
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
SECURITY CHECK Protecting Your System and Yourself Source:
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
1 Identity Theft and Phishing: What You Need to Know.
Protect Yourself Against Phishing. The good news: The number of US adult victims of identity fraud decreased from 9.3 million in 2005, to 8.4 million.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN OLDER AMERICANS PRESENTATION.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Security Issues: Phishing, Pharming, and Spam
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Protecting Yourself Online (Information Assurance)
1 Kids on the Web. Child’s play? September, 2008.
Have Fun, Be Safe Strategies for Internet and Social Media Safety.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Stay Safe & Secure Online. Outline Passwords Everyday Security Security Physical Security Protecting Personal Information.
IT security By Tilly Gerlack.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Ms. Park.  Q&A: What are some Internet safety tips you already know?
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Information Security Sharon Welna Information Security Officer.
CCT355H5 F Presentation: Phishing November Jennifer Li.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
Digital Citizen Project Xiomara Hernandez. Topics Defined Netiquette on Social Media Sites Copyright and Fair Use Plagiarism Safety on the Internet Safety.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
HOW TO PREVENT IDENTITY THEFT ONLINE TIPS 1.WATCH OUT FOR PHISHING WEBSITES.
Internet 1) John R. Levine, Margaret Levine Young, The Internet for Dummies. Wiley Publishing, 12 th Edition, 2010.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
By: Austin Kellogg. What’s the difference Phishing Scam where frauds send pop-up messages to lure personal information.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Onguardonline.gov By Austin Kellogg. Main ideas  Protect your personal information  Know who your dealing with  Use security software that updates.
Computer virus (W). A virus is a piece of software or programming that can be extremely harmful to computer. It damages your computer by taking over your.
What is the Internet?. The Internet is millions of computers all over the world connected together so they can exchange information.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN Protecting Yourself and Your Family Online.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Managing Money Workshop The National Autistic Society AGM
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
GUIDE TO INTERNET SAFETY A VISUAL WALKTHROUGH TO SAFE INTERNET BROWSING.
Computer Security Keeping you and your computer safe in the digital world.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Top Tips for Online Safety Speaker Name Speaker Organization.
Internet Safety.
Done by… Hanoof Al-Khaldi Information Assurance
Internet Identity, Safety, & Security
Protect Your Computer Against Harmful Attacks!
HOW DO I KEEP MY COMPUTER SAFE?
Rules To Help You Navigate the Internet Safely
Protecting Your Credit Identity
Presentation transcript:

Computer Basics

Computers & Peripherals

Safety on the Web Security Software Firewall Antivirus Software Norton Antivirus McAffee Antivirus Security Tango Automatic Updates Secure Passwords

Fraud Is information legitimate? Snopes.com Truth or Fiction Does a message ask you to click links in e- mail or instant messages? Does the have a photo or video to download?

Scams Phishing – obtaining financial information / stealing identity Sender is unknown Spelling & punctuation errors Asks you to submit information No business name listed Links to sites warning Requests for help Offers of free money Intriguing video or pictures To see if a check on a company being legitimate, check with the Better Business BureauBetter Business Bureau

Communicating Online Sharing personal information Every detail you share online about your life and the extended group of people you interact with is stored somewhere. Resumes Forwarding s Facebook/Social Networking Sites Photos Family details Ethnicity Hobbies/sports Don’t use your real name in s.

Great Sites for Seniors AARP Internet Public Library Tips to Prevent Identity Theft Geneology.com Better Homes and Gardens Monroe County Library System New York Public Library