How To Preserve Online Privacy. 6 Major Ways To Protect Privacy  1.) Learn to Clear Browsing History  2.) Familiarize Yourself with Privacy Settings.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Are you Safe at Work? A look into Safety at the Workplace and Internet Security Presented by Sheila Gee.
Fraud Protection. Agenda Start time: ____ Break time: ____ (10 minutes) End time: ____ Please set phones to silent ring and answer outside of the room.
Security at Home The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
The Internet.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
What is identity theft, and how can you protect yourself from it?
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Protecting Our Personal Space Security in a Virtual World.
Securing Your Home Computer Presenter: Donnie Green Date: February 11, 2009 National Aeronautics and Space Administration
Issues Raised by ICT.
Protecting Our Personal Space Security in a Virtual World by David Hines - Information Security Officer
Security Issues: Phishing, Pharming, and Spam
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Matthew Hardaway CSCI101 Thursday 3:30pm.  Fishing (Encyclopedia Britannica): ◦ Sport of catching fish—freshwater or saltwater— typically with rod, line,
Have Fun, Be Safe Strategies for Internet and Social Media Safety.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
Scams & Schemes Common Sense Media.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Protecting Students on the School Computer Network Enfield High School.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Identity Theft Since 2005, there has been a dramatic increase in the occurrence of identity theft among students online.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
Etiquette. Spam  spam, also known as junk or unsolicited bulk (UBE), is a subset of electronic spam involving nearly identical.
BY JESSICA SCHOLEY p1. Id Fraud Is When Someone Pretends To Be Someone Else Using There Address, Birthday And Other Information. People Also Use Id Fraud.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Internet safety By Suman Nazir
Cyber Safety Jamie Salazar.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
Cybersecurity Test Review Introduction to Digital Technology.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Any criminal action perpetrated primarily through the use of a computer.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Mrs. Esman Computer Special
Fraud Protection.
Fraud protection.
Learn how to protect yourself against common attacks
Lesson 3 Safe Computing.
Internet and security.
Lesson 2- Protecting Yourself Online
What is it? Why do I keep getting from Barracuda? SPAM.
HOW DO I KEEP MY COMPUTER SAFE?
Internet Safety – Social Media
Lesson 2- Protecting Yourself Online
Privacy, Security, and Ethics
Presentation transcript:

How To Preserve Online Privacy

6 Major Ways To Protect Privacy  1.) Learn to Clear Browsing History  2.) Familiarize Yourself with Privacy Settings for Applications  3.) Recognize and Avoid Spam  4.) Create Primary Address And Protect It  5.) Be Cautious About Revealing Personal Information  6.) Avoid “Reward for Information” Websites.

Learn To Clear Browsing History  Deleting cookies is easy to do.  Internet Explorer: Tools  Delete History and Cookies  Firefox: Tools  Clear Private Data  Safari go to Preferences  Security  Show Cookies  Remove All.

Familiarize Yourself with Privacy Settings for Applications  Applications may disclose private and sensitive information.  This information may be used for marketing purposes or identity theft and fraud.  Most of this can be avoided by:  Only installing applications and software from a trusted source/developer  Configuring Privacy Settings for each application  Limiting the amount of information you provide, or setting up an alternate online identity used for trivial tasks.

Recognize And Avoid Spam s  spam, aka junk or unsolicited bulk , is a subset of spam that involves nearly identical messages sent to numerous recipients by s.  Cyber criminals use spam to deliver deceptive phishing s.  Many spam s contain URLs to a website or websites or pretend to be from a trusted company.  eBay,  Credit Card Companies  Pharmacies

Create Primary Address And Protect It  Create address that it not related to work or an ISP  Protecting this primary address:  Install comprehensive PC Security Package  Be cautious when opening attachments  Keep an eye out for phishing scams  Do not reply to spam  Create strong passwords  Never enter information into a pop-up advertisement

Be Cautious About Revealing Personal Information  Social, Business, or Romantic Networking Websites  Marketing Agencies  Sweepstakes  Personality/ IQ Quizes

Avoid “Reward for Information” Websites.  Limit amount of personal information given to websites:  Never leak information to For-Profit Organizations  Be skeptical  Evaluate your settings