 We all know we need to stay safe while using the Internet, but we may not know just how to do that. In the past, Internet safety was mostly about.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Primary Threats to Computer Security
Thank you to IT Training at Indiana University Computer Malware.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
AVG 8.5 Product Line Welcome to a safe world …. | Page 2 Contents  Components Overview  Product Line Overview  AVG 8.0 Boxes.
Threats To A Computer Network
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Use computer and internet safely Dave Dai Computer security Malware Virus: a program that copies itself and infect a computer without permission.
Utility Programs and their Functions. Antivirus Software (Virus Checker) Keep the Computer software healthy and free of virus’ that can harm the function.
Security. Physical security Protection from fire/water Protection from dust and extremes of temperature.
Quiz Review.
Viruses & Destructive Programs
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Chapter Nine Maintaining a Computer Part III: Malware.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Security for Seniors SeniorNet Help Desk
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Alisha Horsfield INTERNET SAFETY. firewall Firewall- a system made to stop unauthorised access to or from a private network Firewalls also protects your.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Viruses By amrisa hussain Internet safety. viruses Viruses- a virus is a file or a piece of code which is capable of copying itself and typically has.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
What is Spam? d min.
Computer Skills and Applications Computer Security.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Internet safety By Suman Nazir
Understand Malware LESSON Security Fundamentals.
W elcome to our Presentation. Presentation Topic Virus.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Internet Safety Topic 2 Malware Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other dangerous software exists, such.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Remove [Browser Hijackers] For more information regarding [Browser Hijackers] Please Visit:
Computer Security Keeping you and your computer safe in the digital world.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Windows Tutorial 5 Protecting Your Computer
Managing Windows Security
MALWARE Autumn Mattis.
Protect Your Computer Against Harmful Attacks!
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Presentation transcript:

 We all know we need to stay safe while using the Internet, but we may not know just how to do that. In the past, Internet safety was mostly about protecting your computer from viruses.  But today, the Internet's vast reach, constantly changing technologies, and growing social nature have made users more vulnerable to identity theft, privacy violations, and even harassment. Potential issues covered throughout the power point. VirusesComputer viruses are small software programs that spread from one computer to another SpywareSpyware is installed on a computer to collect the owner's private information SpamSpam is any kind of unwanted online communication. PhishingPhishing is when you click on the pop up links that take you to fake websites, these get your personal information. FirewallsFirewall is a network security system that controls the incoming Anti virus softwareAntivirus software was originally developed to detect and remove computer viruses. Pop up blockersPop-ups are often forms of online advertising on the World Wide Web intended to attract web traffic or capture addresses

 Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation.  A computer virus or worm is a self-replicating program that can spread by or by inserting copies of itself into other programs or documents.  Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files.  Computer viruses also spread through downloads on the Internet. They can be hidden in illicit software or other files or programs you might download.  A fast way to check for viruses is to use an online scanner, such as the Microsoft Safety Scanner. The scanner is a free online service that helps you identify and remove viruses, clean up your hard disk, and generally improve your computer's performance.

 Spyware is a type of malware that is installed on a computer without the know ledge of the owner in order to collect the owner's private information.  Spyware is often hidden from the user in order to gather information about internet interaction, keystrokes (also known as keylogging), passwords, and other valuable data.  Spyware does not necessarily spread in the same way as a virus or worm because infected systems generally do not attempt to transmit or copy the software to other computers.  Instead, spyware installs itself on a system by deceiving the user or by exploiting software vulnerabilities.  You should use an antispyware scanner and removal tool to try to remove it. You can also try to remove spyware manually..

 Spam is any kind of unwanted online communication.  The most common form of spam is unwanted . You can also get text message spam, instant message spam (sometimes known as spim), and social networking spam.  Some spam is annoying but harmless. However, some spam is part of an identity theft scam or other kind of fraud. Identity theft spam is often called a phishing scam.  Spam is unsolicited junk sent indiscriminately in bulk, often for commercial purposes  Scan your computer with your anti-virus software while it is in Safe Mode by opening the program and selecting the "Scan" option  Computers can appear to function normally when infected, it's a good idea to run this tool regularly even if your computer seems to be fine. You should also use up-to-date antivirus software, such as Microsoft Security Essentials, to help protect your computer from other malware.

 This is when users into giving up their usernames, passwords, credit card numbers and other personal information. Phishing s will often try to get you to click on links that take you to fake websites; they often pretend to be from organizations such as a bank, PayPal, Amazon or even Stanford.  Phishing is an example of social engineering techniques used to deceive users, and exploits the poor usability of current web security technologies  The risk grows even larger in social media such as Facebook, Twitter, MySpace etc. Hackers commonly use these sites to attack persons using these media sites in their workplace, homes, or public in order to take personal and security information that can affect the user and the company Turn off phishing and malware detection  Click the Chrome menu Chrome menu on the browser toolbar.  Select Settings.  Click Show advanced settings and find the "Privacy" section.  Untick the box next to "Enable phishing and malware protection

 In computing, a firewall is a network security system that controls the incoming and outgoing network traffic based on an applied rule set.  A firewall establishes a barrier between a trusted, secure internal network and another network (e.g., the Internet) that is assumed not to be secure and trusted.  Firewalls exist both as a software solution and as a hardware appliance  Many hardware-based firewalls also offer other functionality to the internal network they protected.  Firewalls can be used in a number of ways to add security to your home or business. Large corporations often have very complex firewalls in place to protect their extensive networks  The main goal of a personal firewall is to protect your personal computer and private network from malicious mischief.

 Anti-virus software, is computer software used to prevent, detect and remove malicious software.  Antivirus software was originally developed to detect and remove computer viruses  Antivirus software provides protection from other computer threats. Antivirus software can protect from, malicious Browser Helper Objects, browser hijackers, ransom ware, key loggers, backdoors, rootkits, Trojan horses, worms, malicious LSPs, diallers, fraud tools, adware and spyware.  Anti-virus programs are not always effective against new viruses, even those that use non-signature-based methods that should detect new viruses. The reason for this is that the virus designers test their new viruses on the major anti-virus applications to make sure that they are not detected before releasing them into the wild  Some new viruses, particularly ransom ware, use polymorphic code to avoid detection by virus scanners. Jerome Segura, a security analyst with Pathologic, explained

 Pop-ups are often forms of online advertising on the World Wide Web intended to attract web traffic or capture addresses.  Pop-ups are generally new web browser windows to display advertisements.  All major web browsers except Internet Explorer allowed the user to block unwanted pop-ups almost completely.  First the Mozilla browser improved on this by blocking only pop-ups generated as the page loads.  The pop-up window containing an advertisement is usually generated by JavaScript using cross-site scripting. Block or allow pop-ups  Once you've downloaded Google Toolbar on Internet Explorer, you can block or allow pop-ups:  On the right side of the Toolbar, click the wrench.  Go to the Tools tab.  To block pop-ups, tick the box next to "Pop-up blocker." To allow pop-ups, untick the box next to "Pop-up blocker."  Then you click save.