By Daniel Carroll and Jarred Givens. The internet has helped further many fields and forms of technology, including: Internet Advancements Cell Phones.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

The Internet = A World of Opportunities Look whats at your fingertips A way to communicate with friends, family, colleagues Access to information and.
How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Primary Threats to Computer Security
Security at Home The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues.
POSSIBLE THREATS TO DATA
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
The Internet.
Society The internet has shaped the way the world has advanced in society. Since the beginning of time, humans have developed.
Internet Safety & Awareness Dan Tomlinson 02/23/2013.
INTERNET SAFETY FOR EVERYONE A QUICK AND EASY CRASH COURSE.
INTERNET SAFETY.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Using internet and cell phones safely
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
The Internet = A World of Opportunities
Steve Riley Sr. Security Strategist Microsoft Trustworthy Computing Group SEC303.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
INTERNET SAFETY FOR STUDENTS
Threats to I.T Internet security By Cameron Mundy.
Issues Raised by ICT.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Digital Citizenship By Web Design.  It is a system to teach students and teachers the way to use technology correctly. As new technology appears we all.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Alisha Horsfield INTERNET SAFETY. firewall Firewall- a system made to stop unauthorised access to or from a private network Firewalls also protects your.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, + colleagues.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Internet has advanced a lot throughout the years. It has changed the way people communicate, work, find knowledge and much more. Work has became easier.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Year 10 ICT. What is it about?  This module sets out essential concepts and skills relating to the ability to understand main concepts underlying the.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Safety.
How to build a good reputation online
Unit 4 IT Security.
Risk of the Internet At Home
Introduction-Cyber Safety
Presentation transcript:

By Daniel Carroll and Jarred Givens

The internet has helped further many fields and forms of technology, including: Internet Advancements Cell Phones TV and TV Providers Global Communication Transportation Data Storage Affordable Computers

The internet has also made noteworthy changes to communication, education and business in many ways, including social networking sites such as Facebook, web conference sites like gotowebinar, and has helped people worldwide communicate with ease, allowing business to be conducted quickly and efficiently on a global scale. This easy mode of communication allows large amounts of information to be sent great distances with little hassle, so all of the aforementioned categories benefit from the internet. Internet Benefits

 Internet Security will help protect your computer from threats like viruses and worms, but no matter how much security your computer has, it can still get infected.  Internet Safety is what YOU do to protect your computer, yourself, and your family from online threats such as cyber bullies, disturbing content, invasion of privacy, and predators, as well as viruses, Trojans, worms, and spyware. Security Vs Safety

The internet is not full of nice, helpful people, and many of the internet’s citizens would like to ruin your life if you give them the chance, just for the laughs. The internet has many good qualities, but there are just as many risks on it; knowing how to avoid risky internet behavior is key to your online safety. Taking steps such as exercising caution in which sites you go to and which s you open are a big step towards online safety, and reduce risk significantly. Computers can be very helpful, but if used in the wrong way, they can endanger you, your personal information, and your family. One such way is if you were to give information to someone you met on the internet like your county, the school you go to, or what fast food places you’ve recently went to, since all of those can be used to find you. Internet Risks

Viruses, Trojans, worms, and spyware can all hinder your computer and ability to utilize the internet. Viruses are programs that once executed, replicate and may damage system files. They are typically.exe files. Trojans are programs that pretend to be helpful but may take your personal information, delete system files, or slow down your computer. Worms are viruses that can execute themselves, and once initially activated, they spread over a network, infecting all computers on the network. Like viruses, they replicate, and may delete important data. Spyware monitors your website views, both what site and how often, and may keep a record of the keys you press, meaning it can steal your passwords if you use them, and may display seemingly endless ads. Internet Threats

Cyber bullies are people who use the internet to attack others in varying ways, though mainly through posts on social networking sites. File sharing abuse is the illegal sharing of files with others, and sometimes files acquired in this manner have viruses or other malware. Predators try to get either enough information to find the people they talk to, or try to get you to meet them. Disturbing content is all over the internet, and if left unattended, children may stumble across something you don’t want them to see. Invasion of privacy could happen when a child fills out a survey promising some reward like a Xbox or PS 3, when they talk to someone and give a little to much information, or if they download spyware or other malware. Dangers to Children

Identity theft is when someone takes enough of your personal information to pretend they are you and can ruin your good credit by buying things with your information. Phishing is sending out fake s in an attempt to get your passwords; phishing s often act like a real , but the hyperlink contained has some differences, like micosoft.com instead of microsoft.com. Hoaxes are s that pretend you are a lucky winner of some prize, whether money or goods, and ask for your personal information so they can get the prize to you. Instead, they use the information you provided to give themselves a prize. Spam is simply unwanted and annoying ads and s that fill up your inbox. Spam is easily deleted, and can be diverted to a “junk folder”. Identity Theft, Phishing, Hoaxes, and Spam

ComputerFamilyYou Use Windows Internet Firewall Talk to your children about what they do on the internet Practice Internet safety behaviors to reduce risk Use Microsoft Update to keep Windows up-to-date Set clear rules for Internet usage Carefully manage personal information Install antivirus software and keep it up-to-date Keep personal information private Use anti-phishing and anti- spam technology built into Windows Install Windows Defender and keep it up-to-date Use family safety settings in Microsoft Don’t open s from people you don’t know and trust How to Protect Your Computer, Your Family, and Your Personal Info.

Why is it important to backup your files? It is important to backup your files incase the original files are deleted. If your hard drive was to break, for example, you would lose many important files unless you had your files backed up properly. How many backups should you have? You should have at least three backups and at least one should be stored securely off-site. Thumb drives Thumb drives should not be used to backup your files. They are unreliable, easy to break, and are designed for temporary storage only. Thumb drives are designed as a convenient method of transporting files to another location. They should not be used for storage for an extended period of time. They should not be your only method of transporting files. Backups

Why is it important to monitor your children and what they do on the internet? It is important to monitor your children to protect them. There are many threats to children on the internet. It is important to teach your children to protect themselves from these threats, which include online criminals, invasion of privacy, inappropriate content, and predators. What steps should you take to reduce online risk for your children? Talk with your kids about online risks and teach them how appropriate online behavior can protect them from these risks Keep your computer in a central location Know how your children use the internet Teach your children to use their instincts and report any problems or suspicious activity Monitoring Children

Built in security and privacy settings are very useful. They save the users a lot of trouble trying to protect themselves and their families on the internet, but only if they are utilized correctly. Facebook can be used to demonstrate how the correct usage of privacy settings will help protect you and your personal information from strangers. Built in Security and Privacy Settings

Facebook Privacy Settings