Internet safety By Lydia Snowden.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Primary Threats to Computer Security
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
The Internet.
SECURITY CHECK Protecting Your System and Yourself Source:
The Internet = A World of Opportunities
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Security Advice Georgie Pepper Campsmount Acadamy.
Security Issues: Phishing, Pharming, and Spam
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Alisha Horsfield INTERNET SAFETY. firewall Firewall- a system made to stop unauthorised access to or from a private network Firewalls also protects your.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
 We all know we need to stay safe while using the Internet, but we may not know just how to do that. In the past, Internet safety was mostly about.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
IT security By Tilly Gerlack.
Viruses By amrisa hussain Internet safety. viruses Viruses- a virus is a file or a piece of code which is capable of copying itself and typically has.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Internet Safety By Adam T Introduction  This PowerPoint will show give you advice on how to stay safe on the internet.  You will be told how to stay.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
Malware & Phishing By: mackenzie olson. Internet fraudsters send out spam, pop-ups, appealing websites, and desirable downloads.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
safety Bailey mullan. dangers ing has become on of the main sources for communicating. When using it is more likely for someone.
Safety and Security issues of using ICT Alys brooks.
What is Spam? d min.
Computer Skills and Applications Computer Security.
Internet safety By Suman Nazir
Cyber Safety Jamie Salazar.
By: Austin Kellogg. What’s the difference Phishing Scam where frauds send pop-up messages to lure personal information.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
W elcome to our Presentation. Presentation Topic Virus.
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Any criminal action perpetrated primarily through the use of a computer.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Windows Tutorial 5 Protecting Your Computer
3.6 Fundamentals of cyber security
Unit 4 IT Security.
Protect Your Computer Against Harmful Attacks!
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Unit 4 IT Security Kerris Davies.
Presentation transcript:

Internet safety By Lydia Snowden

Intro internet safety Staying safe on the internet. It involves protecting Your computer: Viruses Spyware Phishing Spam and you: from harassment threats identity theft. Internet safety is staying safe on the internet. It is protecting your computer from viruses and you from harassment threats and identity theft. We all know we need to stay safe while using the Internet. In the past, Internet safety was mostly about protecting your computer from viruses. But today, the Internet's vast reach, constantly changing technologies, and growing social nature have made users more vulnerable to identity theft, privacy violations.

Protecting your Computer

Protection from Viruses Potential issue What they are Internet safety rule Viruses A computer viruses is a small software programs that are designed to spread from one computer to another This interfere with computer operation. To stop getting viruses you can: Install an aunty virus software Don’t open up attachments you are not expecting Keep computer updated Viruses: A computer viruses is a small software programs that are designed to spread from one computer to another and to interfere with computer operation. A virus is a simple program designed to cause harm to your computer. A virus spreads by duplicating and attaching itself to other files. The extent of the damage depends on the virus. There are tens of thousands of viruses. Some virus damage is terrible, putting the computer system out of action by erasing files or corrupting data. To reduce the risk of getting a virus: Keep your operating system up to date Use anti virus software Not opening an email attachment unless you are expecting it and know the cause (many email servers scan emails with anti-virus software on the user's behalf). Not allowing other users to use their own memory stick on your system.

Spyware Spyware Potential issue What they are Internet safety rule Spyware is a program that secretly records what you do on your computer. They can be used for some appropriate purposes, but the majority of spyware is malicious. Its aim is usually to capture passwords, banking credentials and credit card details - and send them over the internet to fraudsters. Ways to prevent spyware are: Installing a firewall, this provides a defence against hackers. Update your software, make sure you have up to date security updates. Adjust your Internet Explorer web browser's security settings to control how much-or how little-information you want to accept from a website. Spyware: is a program that secretly records what you do on your computer. They can be used for some perfectly valid purposes, but the majority of spyware is used usually to capture passwords, banking credentials and credit card details - and send them over the internet to fraudsters. a lot of spyware nowadays is designed to steal confidential information - user names and passwords for banking sites, email accounts, social networking sites and online games. You may never know if you have spyware on your computer as it tends to work quietly. They're often distributed as 'shareware' or 'freeware' with minimal license restrictions in order to trap as many people as possible. How to protect yourself: Don’t acidentally install spyware Many shareware download sites now test programs submitted to them and offer guarantees that their archives are free of spyware. Download anti spyware tool. Many of these are of high quality, and some are freeware themselves. These tools regularly download updates to stay abreast of newly- emerging spyware. Some of them can run in the background all the time, without really slowing down your computer, and they generally do a very good job.

Phishing Phishing Potential issue What it is Internet safety rule Phising is a type of online identity theft. It uses email and fraudulent websites that are designed to steal your personal data or information such as credit card numbers, passwords, account data, or other information. How to protect yourself from phishing: Don’t reply to email about your information if you don’t know what it is Make sure you familiarise yourself with a website's privacy policy. Phishing: is a type of online identity theft. It uses email and fraudulent websites that are designed to steal your personal data or information such as credit card numbers, passwords, account data, or other information. It is a term used to describe a malicious individual or group of individuals scamming users by sending e-mails or creating web pages that are designed to collect an individual's online bank, credit card, or other login information. Because these e-mails and web pages look like legitimate companies users trust them and enter their personal information. How to protect yourself Don’t reply to an email you might be warey about Never email personal or financial information, even if you are close with the recipient. these e-mails and web pages look like appropriate companies users trust them and then they enter their personal information.

Spam Spam Potential issue What it is Internet safety rule Some spam is annoying but harmless. However, some spam is part of an identity theft scam or other kind of fraud. Identity theft spam is often called a phishing scam. How to protect your computer from spam: Use email software with built-in spam filtering Keep your filters current Be careful about sharing your email or instant message address Spam: Some spam is annoying but harmless. However, some spam is part of an identity theft scam or other kind of fraud. Identity theft spam is often called a phishing scam. spam is most often considered to be electronic junk mail or junk newsgroup postings. Some people define spam even more generally as any unsolicited email. Real spam is generally email advertising for some product sent to a mailing list or newsgroup. How to protect yourself from spam: Use email software with built-in spam filtering: this is an intelligent spam-filtering solution that is integrated across all Microsoft email platforms, including: Keep your filters current: Spam is a cat-and-mouse game with spammers working relentlessly to outwit the filters. Do your part by keeping your junk email filter up to date. Be careful about sharing your email or instant message address: Only share your primary email address with people you know Create an email name that's tough to crack Disguise your email address when you post it to a message board, newsgroup, chat room, or other public web page-for example, SairajUdin AT example DOT com. This way, a person can interpret your address, but the automated programs that spammers use often cannot.

Pop up blockers Pop up blockers Potential issue What it is Internet safety rule Pop up blockers Most advertising on the internet use pop up to display their message in a way that is hard not to miss. Pop up blockers lets you prevent most pop ups from appearing over web pages when your browsing the internet. How to use pop up blocking: Access the pop up blocker settings to turn of pop ups on your computer Pop up blockers: Many advertisers on the Internet use pop-up windows to display their message in a way that is hard to miss. Internet Explorer Pop-up Blocker lets you prevent most pop-up windows from appearing over Web pages when you are browsing the Internet. Pop-up windows, or pop-ups, are windows that appear automatically without your permission. They vary in size but usually don't cover the whole screen. Your computer will allow you to control both pop-ups through the Content panel in the Options window. Pop-up blocking is turned on by default, so you don't have to worry about enabling it to prevent pop-ups from appearing in Firefox. How to use pop up blocking: Access the pop up blocker settings to turn of pop ups on your computer

Firewalls Firewall Potential issue What it is Firewall is a system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both.  Firewalls are typically found in broadband routers  firewalls should be considered an important part of your system and network set-up a firewall is a system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets.  typically found in broadband routers,  should be considered an important part of your system and network set-up  Most hardware firewalls will have a minimum of four network ports to connect other computers, but for larger networks, business networking firewall solutions are available.

Software Software Potential issue What it is Software is a collection of instructions that enable the user to interact with a computers Without software, computers would be useless. For example, without your Internet browser software you would be unable to surf the Internet.  Software can be purchased at a local retail computer store or online, usually in a box that contains all the disks  Software can also be downloaded to a computer over the Internet. Once downloaded, setup files are run to start the installation of the program on your computer. Software is a collection of instructions that enable the user to interact with a computers Without software, computers would be useless. For example, without your Internet browser software you would be unable to surf the Internet.  Software can be purchased at a local retail computer store or online, usually in a box that contains all the disks  Software can also be downloaded to a computer over the Internet. Once downloaded, setup files are run to start the installation of the program on your computer.

Anti-virus Software Anti-virus software Potential issue What it is Antivirus software is a computer program that detects, prevents, and takes action to remove malicious software programs, such as viruses and worms. You can help protect your computer against viruses by using antivirus software. You can prevent viruses by updating your antivirus software regularly.  Antivirus software is a computer program that detects, prevents, and takes action to remove malicious software programs, such as viruses and worms. You can help protect your computer against viruses by using an antivirus software. Anti virus or anti-virus software  (often abbreviated as AV), sometimes known as anti-malware software, is computer software used to prevent, detect and remove malicious software. Antivirus software was originally developed to detect and remove computer viruses, hence the name.

Do people feel safe on Internet?

Additional Information You can find out more about IT Security by watching this Open University video clip: https://www.futurelearn.com/courses/introduction-to-cyber-security Additional Information