Staying Safe Online Keep your Information Secure.

Slides:



Advertisements
Similar presentations
Grass Valley Learning Center Surf the Net Safely Roger Thornburn.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access and attacks delivered.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
SECURITY CHECK Protecting Your System and Yourself Source:
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
UT Wing Civil Air Patrol. Objective Identify network and cyber vulnerabilities and mitigations Social Media/Metadata/Exfil data MITM Attacks Malware Social.
Using internet and cell phones safely
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Staying Safe, Having Fun, And Cruising The ‘Net Daniel Owens IT Security Professional.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Instant Messaging Security Flaws By: Shadow404 Southern Poly University.
Security Advice Georgie Pepper Campsmount Acadamy.
Threats to I.T Internet security By Cameron Mundy.
Safe Surfing Tips Internet Safety Tips for Teens By: LaQuacious Garrett.
Online Safety 2.02 Remember the rules of online safety.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Security for Seniors SeniorNet Help Desk
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Unit 19 INTERNET SECURITY
Learning In A Techno World How Safe is Your Cyberspace?
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Agenda Last class: Internet Literacy Lab Today: Internet Safety.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Safer Online Shopping and Practices Presenter: Brian Moats Students Active In Leadership.
Personal Online Safety Information Security Systems Community Outreach Program McKinley Middle School April 23, 2013.
By: Gloria Watkins.  Use antivirus software and keep it up-to-date. You should check for new definition updates daily. Most antivirus software can.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Online Safety 2.02 Remember the rules of online safety.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Internet safety By Suman Nazir
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Cybersecurity Test Review Introduction to Digital Technology.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
3.02 Rememberl the rules of online safety. Slide 1 AGENDA – OCTOBER 10, 2011 Lesson 3.2 – Online Safety (Read the Lesson) CW #14a – Vocabulary Matrix CW.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
Computer Security Keeping you and your computer safe in the digital world.
Internet Safety.
What they are and how to protect against them
Unit 4 IT Security.
ICT Communications Lesson 3: Internet Life and Privacy
Internet Safety – Social Media
Presentation transcript:

Staying Safe Online Keep your Information Secure

Overview How does information work on the Internet? How is your information at risk? Browsing Practices and Security –unsafe websites Practices and Security –viruses –hacking –spam filter Personal Information Security Practices –privacy settings Password Security

Information on the Internet Information is transferred through computers in the form of packets (bundles of data) We use IP addresses to move files around. Every computer has an IP address Packets can potentially be intercepted, and attacks can be launched from this information.

How Is Your Information at Risk? When online, the information sent by your computer is not always secure or protected. It may be accessible by hackers who are looking for weak computers. This is why it is necessary to make your computer as secure as possible. Information on your computer can be accessed in multiple ways – here are some of the most common. –Malware –Viruses –Trojan –Spyware –Adware –KeyLoggers

Information Risk Malware: Malicious Software. Any software that damages or disables systems. Can be passed between systems (USB keys). Viruses: Common form of malware. Damage the computer system, can be spread (USB keys, s, etc.). Can be used to install Spyware which leads to compromised information. Trojans: Give an outside user access to your computer. User can access information about your system, and gather personal information (credit cards, bank accounts, etc.). Trojans try to be invisible.

Information Risk cont. Spyware: Type of malware that is more of a secret agent, quietly sending all of your browsing and computing habits back to a server so attackers can gather data about you. Adware: Software that creates endless popups on a system. Can take over internet browsing. Clicking on ads (i.e. for free anti-virus software) can lead to this being downloaded to your system. Keyloggers: Usually get a system via an attachment from an unknown sender, or through a Trojan. Keep track of every key typed on a computer. Can send password information to the attacker, leaving your system vulnerable.

Protecting Against Attacks Good Anti-Virus Software. Leading (Norton, Microsoft Security Essentials, Avast, McAfee and AVG). Will monitor your system and block potential attacks. Spam Filter on s. Set spam filter in account(s) so all s from people you do not know are filtered out. DO NOT open attachments from people you don’t know. Beware s that pretend to be someone you know. It is easy to change sender name to your best friend’s name. It might not be them. Always check the actual address. Do not click on pop-up ads. Do not download anything if you do not know what it is. Do not keep sensitive information on your computer (i.e. credit card or bank acct logins, acct numbers, list of passwords).

Protecting Against Attacks cont. Check cookie settings. Set to at least medium, if not high or block all. Cookie: small piece of data sent from a website and stored in a user's web browser while a user is browsing a website. When the user goes to the same website in the future, data stored in the cookie is retrieved by the website to notify the site of the user's previous activity. Tracking cookies and third-party tracking cookies are used to compile long-term records of browsing histories. Cookies can store passwords and forms you filled in, credit cards numbers or your address.

McAfee Anti-Virus Setup

Privacy Settings & Online Stalking If privacy settings are not set, your info is available to anyone. Ex: You post an update saying you and your family are going to California for the week. Without privacy settings, anyone can see the post. With a basic phone book or the internet, they can find your address, and can then burglarize your home while you are gone. Additionally, online stalkers can use this information to find out where you live, go to school, eat out, and shop. Set privacy so only friends can see your profile. Group friends into categories; give them their own settings for what info they can see. All social media sites have privacy settings. Under no circumstances should your profile be open to everyone. Be wary of friends you accept. Do you know them in real life? Are they a “friend of a friend”? Know who is looking at your info.

Privacy Settings cont.

Password Security Activity: Pretend you have just set up your account for online banking, and you are being asked to create a password. Create a password and write it down on a piece of paper. Make sure that it is something you would be able to remember. How many people used a piece of personal information in the password? A name of a friend, family member, or pet? Who used a personal sequence of numbers like an address, phone number, zip code, or graduation or birth year? How many people’s passwords were less than 8 characters?

Password Security cont. What is a bad password? Jake (phone number) password Jake (Boyfriend/girlfriend name) What is a good password? 80!2runn1ng7%! (for Jake Callaghan) How quickly can your password be cracked? Examples: yourfirstname = almost instantly Firstinitiallastname = about a second Firstinitiallastname+last 2 digits of a year = 11 minutes Phonenumber = about 2 seconds 80!2runn1ng7%! = 6 million years = 2 billion years

Password Security cont. How many people use the same password for more than one account? What if someone hacks one of your passwords? What information would be compromised? How long should your password be, and what should it contain? Current minimum password length is recommended to be characters including numbers and special characters. How often should you change a password? Every 6 months, if not more frequently. To get an idea of what safe passwords look like, go to:

Summary Anti-Virus Software Privacy Settings Spam Filters Careful Browsing Secure Passwords

Questions Questions? Thank you!