The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.

Slides:



Advertisements
Similar presentations
© 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
The Internet = A World of Opportunities Look whats at your fingertips A way to communicate with friends, family, colleagues Access to information and.
How to protect yourself, your computer, and others on the internet
© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or.
Feature: Identity Management - Login © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or.
© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or.
Predators These people use the Internet to trick children into meeting with them in person File-share Abuse Exchanging music, video, and other files with.
Primary Threats to Computer Security
Security at Home The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues.
© 2010 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Click here to start. NextPrevious Threat Trends in Australia One in five children (10 to 17 years old) receive unwanted sexual solicitations online Identity.
The Internet.
Society The internet has shaped the way the world has advanced in society. Since the beginning of time, humans have developed.
Internet Safety & Awareness Dan Tomlinson 02/23/2013.
What to do with Spyware and Adware Created by Justin Leung.
What is a Firewall Anyway?
Feature: Purchase Requisitions - Requester © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names.
MIX 09 4/15/ :14 PM © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
My promises to you… Have some Fun! Have some Fun! Learn at least one thing new! Learn at least one thing new! Make myself available to you Make myself.
The Internet = A World of Opportunities
Steve Riley Sr. Security Strategist Microsoft Trustworthy Computing Group SEC303.
Feature: Web Client Keyboard Shortcuts © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are.
Issues Raised by ICT.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Session 1.
Built by Developers for Developers…. © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names.
What is a Firewall Anyway?. What is a firewall? A firewall is a network security device positioned between two different networks, usually between an.
 Rico Mariani Architect Microsoft Corporation.
By Daniel Carroll and Jarred Givens. The internet has helped further many fields and forms of technology, including: Internet Advancements Cell Phones.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Feature: Assign an Item to Multiple Sites © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names.
WinHEC /22/2017 © 2008 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, + colleagues.
© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or.
Feature: Customer Combiner and Modifier © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are.
What is a Firewall Anyway? IT-IDT-6.4 Characterize the purposes, features & functions of network components:…firewalls..
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
© 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.

customer.
demo © 2008 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
demo Demo.
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
demo QueryForeign KeyInstance /sm:body()/x:Order/x:Delivery/y:TrackingId1Z
Internet has advanced a lot throughout the years. It has changed the way people communicate, work, find knowledge and much more. Work has became easier.
projekt202 © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are.
The CLR CoreCLRCoreCLR © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product.
© 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks.
© 2008 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or.

The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
The Internet = A World of Opportunities
What is a Firewall Anyway?
Office Mac /30/2018 © 2010 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
Title of Presentation 12/2/2018 3:48 PM
8/04/2019 9:13 PM © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
What is a Firewall Anyway?
Виктор Хаджийски Катедра “Металургия на желязото и металолеене”
Шитманов Дархан Қаражанұлы Тарих пәнінің
Title of Presentation 5/24/2019 1:26 PM
日本初公開!? Vista の新機能を実演 とっちゃん わんくま同盟 7/23/2019 9:09 AM
Presentation transcript:

The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and entertainment A means to learn, meet people, and explore

Online Security Versus Online Safety CyberSecurity: How we can protect and secure our computers with technology in the same way that we secure the doors to our homes. CyberSafety: How we should act or behave in ways that help protect us against the risks that come with Internet use.

Primary Online Risks and Threats To Families Cyberbullies File-sharing abuses Invasion of privacy Disturbing content Predators To Personal Information Online fraud and phishing Hoaxes Identity theft Spam To Computers Viruses Worms Trojans Spyware

Viruses/Worms Software programs designed to invade your computer, and copy, damage, or delete your data. Trojans Viruses that pretend to be helpful programs while destroying your data, damaging your computer, and stealing your personal information. Spyware Software that tracks your online activities or displays endless ads. Primary Threats to Computer Security

Predators These people use the Internet to trick children into meeting with them in person. File-share Abuse Unauthorized sharing of music, video, and other files may be illegal, and download malicious software. Cyberbullies Both children and adults may use the Internet to harass or intimidate other people. Invasion of Privacy If kids fill out online forms, they may share information you don’t want strangers to have about them or your family. Disturbing Content If kids explore unsupervised, they could stumble upon images or information you may not want them exposed to. Primary Online Risks for Children

Spam Unwanted , instant messages, and other online communication Phishing sent by online criminals to trick you into going to fake Web sites and revealing personal information Identity Theft A crime where con artists get your personal information and access your cash and/or credit Hoaxes sent by online criminals to trick you into giving them money Primary Threats to Personal Online Safety

Turn on Windows Internet firewall Four Steps to Help Protect Your Computer Use Microsoft Update to keep Windows up-to-date automatically Install and maintain antispyware software Install and maintain antivirus software

What is a firewall? Network security device positioned between two different networks Usually between an organization’s internal, trusted network and the Internet similar to a moat around a castle

What does a Firewall do? Ensures communications crossing from one network to the other meet an organization’s security policy. Track and control communications Decides whether to allow, reject or encrypt communications Protect sensitive portions of local area networks and individual PCs.

Why do you need a Firewall? Globalization: Organizations forge new and beneficial business relationships Balances the openness of the Internet with the need for privacy and integrity

What is Spyware? Programs used to ‘mine data’ by advertising companies Reports statistical data about you and your surfing habits Violates your privacy. Completely LEGAL

What is Adware? Programs created by advertising companies. Usually comes in the form of pop-ups Clicking on the pop- up generates revenue for the advertising company Also LEGAL

How does Spyware/Adware work? Usually hide as cookie or temporary Internet file Adware startup hides in the register keys as normal program

How to detect you computer has spyware or adware… Continuous pop-ups Persistent change in your homepage Slower computer processing, takes the computer longer to process or startup

Extreme symptoms of spyware or adware Internet browser does not start up. Parts of your computers you cannot access without freezing. Major core data is lost or changed.

What programs are there to help get rid of those programs? 1.Spybot Search and Destroy 2.Ad-aware 3.Anti Virus 4.Spysweeper

Other Ways to Help Protect Your Computer Back up your files regularly Think before you click Read Web site privacy statements Close pop-ups using red “X”

Practice Internet behavior that lowers your risk. Manage your personal information carefully. Choose appropriate screen names and addresses Take Steps to Help Protect Your Personal Information

For More Information

References Justin Leung, What to do w/ Spy ware and Adware, _adware.ppt#257,2,Table of Contents Firehouse Networks, (2009), What is a firewall? ps3.asp

© 2007 Microsoft Corporation. All rights reserved. Microsoft, Hotmail, OneCare, Outlook, Windows, Windows Vista, Xbox, Xbox 360, Xbox LIVE, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.