Stay Safe Online. Use strong passwords Using the same password for all your accounts makes it easy to remember. However, it also means a hacker needs.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

How to protect yourself, your computer, and others on the internet
Primary Threats to Computer Security
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Understanding and Building Basic Networks Chapter 4 Protecting Yourself Online.
The Internet.
What is identity theft, and how can you protect yourself from it?
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
ONLINE SAFETY Online safety Money Works: Level 1 Topic 3.
The Internet = A World of Opportunities
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
E-Safety Quiz Keeping safe online! A guide for parents & children.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
INTERNET SAFETY FOR STUDENTS
Alisha horsfield.  Computer virus is something that copies itself to computer software.  Virus can delete the hosts important documents which includes.
Threats to I.T Internet security By Cameron Mundy.
Security Issues: Phishing, Pharming, and Spam
Internet safety By Lydia Snowden.
E safety. Ads It’s always best to not click on ads when you see them, and it’s always a good idea to ignore them, but if there are too many you can always.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
10 Tips for keeping MCL safe 1. Set up your defenses. Do you have adequate firewalls and antivirus software to protect you from hackers who could steal.
Keeping Information Safe Task 4. Basic security measures Passwords Change password on regular basis Do not use names or words easily linked to yourself.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
IT Security for Users By Matthew Moody.
Reliability & Desirability of Data
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
1. Self Awareness You should only access your accounts and private informations from a safe location (only at home as necessary if at all possible) where.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
STAY SAFE!! Don’t fall for the same old tricks !!.
By Masum Ahmed UNIT ONE (TASK TWO) – RETRAINING OF CURRENT EMPLOYEES ON THE ING SYSTEM.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
By Liam Wright Manga comic group Japan SAFETY on your computer.
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
Managing Money Workshop The National Autistic Society AGM
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Computer Security Keeping you and your computer safe in the digital world.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
Internet Safety.
Unit 4 IT Security.
Unit 4 IT Security.
Protect Your Computer Against Harmful Attacks!
Cybersecurity Awareness
Information is at the heart of any University, and Harvard is no exception. We create it, analyze it, share it, and apply it. As you would imagine, we.
Computer Security.
Internet Safety – Social Media
Presentation transcript:

Stay Safe Online

Use strong passwords Using the same password for all your accounts makes it easy to remember. However, it also means a hacker needs to crack your password just once in order to gain access to everything. So, always use different passwords, and make sure they are strong. Opt for a combination of letters, numbers and common symbols – and ensure it is more than seven letters long. This doesn’t have to be gobbledegook – something like is memorable, but tough to crack. Microsoft has a dedicated site where you can test the strength of your password.

Deal properly with suspicious s The easiest way for a fraudster to get hold of your personal details is if you hand them over willingly. Phishing is a technique where a fake is sent to you that appears to be from a site you use regularly. The will contain some story about updating your details and will ask you to click on a link to do so. Don’t do it. You’ll be directed to a fake site where your details will be harvested, which opens you up to possible identity theft. If you get an that seems dodgy, ring the organisation it’s come from to double-check. Filtering spam out of your can also help reduce the number of such s you receive.

Retain a healthy air of cynicism If something seems too good to be true, it probably is. If a businessman you’ve never met s you offering several hundred thousand dollars, ask yourself why. Is it because you’ve randomly been chosen for an incredible piece of good fortune, or is it because he’s a scammer who will ask you to make several weighty payments in order to get your reward, before disappearing with all your money? These sort of s are sent out all the time. If you get one, delete it.

Use a firewall A firewall is a piece of software or hardware which renders your computer in effect invisible from hackers searching for soft targets. It can also halt some viruses (though you should also have anti-virus software). By using a quality firewall, you ensure hackers cannot easily breach your computer’s security.

Be careful when downloading When downloading software from the internet, make sure you trust the site you are downloading it from. Disreputable sites may tack a bundle of spyware on to an otherwise innocent software package. Spyware installs itself on to your system and then works in the background, clogging up resources. Some particularly malicious variants can send sensitive information from your computer back to criminals. Anti-spyware software, such as Microsoft Defender, can give you added peace of mind.

Take responsibility Don’t fall into the trap of thinking “it will never happen to me”. Internet criminals are after one target only – the easy ones. If you fail to take basic precautions, you will be targeted. Security is your responsibility.

Keep sensitive details private Take care not to give away too much information about yourself online. Social networking sites are accessible to all. Many people’s pages include details such as their full name and date of birth. Such details may enable criminals to piece together your identity.