KEEPING YOUR COMPUTER SAFE Anna by Kristan Simonton Internet Safety.

Slides:



Advertisements
Similar presentations
KEEPING YOUR COMPUTER SAFE Internet Safety for Seniors Project NetWise.
Advertisements

Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
How to protect yourself, your computer, and others on the internet
Developed by Technology Services 1:1 Laptop Initiative
Protecting children online  How can you protect your child online?  Are you aware of the dangers?  Do you know what you can put in place to protect.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
The Internet.
March 20, 2015 Kettle Moraine Insurance Professionals.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
E-Safety Quiz Keeping safe online! A guide for parents & children.
Computer Basics. Computers & Peripherals Safety on the Web Security Software Firewall Antivirus Software Norton Antivirus McAffee Antivirus Security.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
How To Protect Your Privacy and Avoid Identity Theft Online.
Security Advice Georgie Pepper Campsmount Acadamy.
Protecting Our Personal Space Security in a Virtual World.
How It Applies In A Virtual World
What Every Parent Needs to Know! Internet Safety Information for Parents Purpose: Provide practical information parents can use at home Present safety.
Protecting Our Personal Space Security in a Virtual World by David Hines - Information Security Officer
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Security for Seniors SeniorNet Help Desk
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Have Fun, Be Safe Strategies for Internet and Social Media Safety.
By: Daniel Krueger ITC 525: Computers for Educators Summer II 2010 Click Here to Begin.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Staying Safe Online Keep your Information Secure.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Be More…Tech Savvy A Workshop for Elementary Students about Internet Safety.
Identity Theft Since 2005, there has been a dramatic increase in the occurrence of identity theft among students online.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Internet Safety Mr. Richard Orr Technology Teacher Murphy Jr. High School.
Internet Safety Internet Safety LPM
Internet Services Web browsing Chat/Messaging Newsgroups Social networking Shopping Information –Text –Pictures –Movies –Music And more! 3.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Cyber Safety Jamie Salazar.
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN Protecting Yourself and Your Family Online.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Security Issues & Ethics in Education By Maud Mushayamunda.
Digital & Internet Safety. Understanding your personal data Defining “Big Data” Protecting your data, computer & devices Avoiding identity theft.
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Internet Safety.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Managing Windows Security
An Introduction to Phishing and Viruses
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
STOP. THINK. CONNECT. Online Safety Quiz.
Internet safety By DAGAS YACMAS team.
HOW DO I KEEP MY COMPUTER SAFE?
What is Phishing? Pronounced “Fishing”
Presentation transcript:

KEEPING YOUR COMPUTER SAFE Anna by Kristan Simonton Internet Safety

Overview Computer Protection Identity Theft Child Safety Rules of Thumb

Computer Protection Key Terms:  Firewall –Blocks outside access to a computer  Antivirus – Prevents most destructive programs (viruses) from accessing a computer  Cookies – Stores and transmits information to parent websites  Passwords – Allows access to online accounts

Computer Protection Online:  Connected to the Internet  Disconnect when not in use Firewall:  Limits the information sent to and from your computer  Barrier from the internet  Examples of firewall programs:  Zonealarm  Comodo  Norton Internet Your Computer

Computer Protection Antivirus:  Prevents viruses from effecting your computer  Can only prevent what it recognizes  Important to keep software updated  Examples of antivirus programs:  McAfee  Norton  AVG Anti-virus Your Computer

Computer Protection Cookies  Allow companies to store information on your machine  Collect information on your use  Sell information gathered to 3 rd parties  Create profiles based on information gathered  Set computer to accept different level of cookies I’ve been to this site!

Computer Protection Keep Your Password Safe!  Passwords are keys to personal information  Increase password security include…  Capital letters, lowercase letters, symbols, and numbers  Use abbreviations not whole words Example: s 0 uth*ern ILL-in 0 is  Change your password frequently These precautions will not protect your computer 100%

Identity Theft Key Terms:  – Messages sent via the internet  Websites – Locations on the internet

Identity Theft Scamming: Tricking or deceiving a person or group of people to obtain information Phishing  A common avenue for virtual scam artist.  False can appear obvious or subtle. Phishing Website  Another common venue for virtual scam artist.  Attempt to gather personal information

Scam Clear Example

Scam Subtle Example

Southern Illinois Bank

Sent messages are uncontrollable Do not open s from addresses you do not recognize Treat online situations the same way you would personal situations

Identity Theft: Websites Check out the legitimacy of a website  Key icons and web addresses  Well-known site  Check for misspellings Do not give out personal information  Set information to private if possible If you are unsure just remember to… Stop! Look! Call!

Child Safety Internet is accessible from almost any location Kids need your help navigating the internet to avoid its risk Start a dialog and explore the internet with them

Child Safety Key Terms:  Blocking – Prevents individuals from accessing non age appropriate material  Monitoring – Records a child’s activities while online

Child Safety Blocking  Prevents children from accessing inappropriate material  Customized to fit household needs  Password protected  Examples of blocking programs:  Net Nanny  Safe Eyes  CYBERsitter  OpenDNS Click Here for Violent Movies

Child Safety: How to Block Sites

Child Safety: Monitoring Monitoring  See the sites your kids are visiting  Know who your kids are talking to  Know where your kids are going online  Examples of monitoring programs:  Webwatcher  Spector Pro  Spy Agent  Guardian Monitor

Tracking Teresa NetSmartz.org

Rules of Thumb Treat your computer like your home! Never give out personal information! Talk to your kids about internet safety! If it sounds too good to be true it usually is!

Remember: The Benefits Out Weigh The Risks Read the local news in the Southern Purchase Miners season tickets See what is going on at SIUCFind a physicianLearn how to protect your computer with NetSmartzFind a job through Illinois workNetGet online tutoring with Verizon’s Thinkfinity siteCheck out the services available at Union County HospitalLearn about the City of AnnaFind the score of the local game