Sean Nagelski, Kristina Klima, and Kelly Sipko
Internet Security Establish rules and measure to use against attacks over the Internet Privacy Settings Firewalls
Schools Pros: Cons: Kids stay focused Safety Learn how to use academic search engines Can’t research Reduces teaching options Less options for resources
Businesses Pros: Cons: Helps prevent fraud/hacking Increase costumer satisfaction Stay focused Affordability Too much security
Privacy Settings Settings that allow the administrator to control the collection, use, and distribution of personal data Facebook Twitter Tumblr YouTube Facebook/Twitter Activity
Real Life Stories YouTube Video
Viruses According to Microsoft.com, viruses are “small software programs...that interfere with computer operation” Harm data, spread to others through , destroy hard drive Contracted through s, downloads, CDs, etc can be instantaneous or dormant
Viruses Some types: Worm: replicates self through attachments File infectors: attached to files; when program loads, so does virus Macro viruses: attack Word; inserts unwanted words/phrases Spyware: pop-up windows that literally spy on your computer by sending out private info
Viruses The best way to guard against viruses is to know the origin of every program and everything you download
Firewalls “Hardware or software that slows the invasion of a computer system by blocking viruses and hackers” (Gil) Monitors traffic and blocks certain ports while only allowing specified program and services Routers: limit traffic from certain IP addresses
Antivirus Most protect against more than just viruses, such as any “malicious software” Security Suites Need to be updated because viruses and other malicious software are constantly updated