INTERNET SAFETY FOR KIDS

Slides:



Advertisements
Similar presentations
Cyber-Safety Instructors: Connie Hutchison & Christopher McCoy.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
INTERNET SAFETY FOR EVERYONE A QUICK AND EASY CRASH COURSE.
Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Security, Privacy, and Ethics Online Computer Crimes.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
INTERNET SAFETY FOR EVERYONE
Viruses & Destructive Programs
Internet Security In the 21st Century Presented by Daniel Mills.
September 2007 General Security Basics Your Responsibilities for Safe Computing.
Threats to I.T Internet security By Cameron Mundy.
Password Management Programs By SIR Phil Goff, Branch 116 Area 2 Computers and Technology April 18,
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
Protect Your Computer from Viruses and Other Threats! 1. Use antivirus software. 2. Run Windows updates. 3. Use a strong password. 4. Only install reputable.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Safe computing and Malware Presentation done by Tylor Hardwick, Alex Gilsdorf, Code Forrester, Xander Winans.
PAGE 1 Company Proprietary and Confidential Internet Safety and Security Presented January 13, 2014.
IT Security for Users By Matthew Moody.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
PC Maintenance How to keep your computer healthy.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Computer Security Preventing and Detecting Unauthorized Use of Your Computer.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
P ROTECTING D ATA Threats to your privacy and the integrity of your computer’s data come from a number of sources. Understanding how to protect yourself.
Computer Security By Rachel Gaines. Computers are used for work, play, and everything in between. So here’s how to keep it fun and protected.
Viruses Hacking Backups Computer safety... Viruses A computer virus is a piece of program code that makes copies of itself by attaching itself to another.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
For brownies this PowerPoint will help you understand computer viruses and help stop them!!!!
Computer Safety Sid Holder 8k Viruses Hacking Backing Up.
Internet Safety. Phishing, Trojans, Spyware, Trolls, and Flame Wars—oh my! If the idea of these threats lurking around online makes you nervous, then.
Computer Security By: Alex Metzler. Table of Contents Protecting Your Personal Info Know Who You’re Dealing With Use Updated Security Software Update.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Computer security By Isabelle Cooper.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Computer Security Presented By : Ebtihal Mohammed AL-Amro.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
Matthew Glenn AP2 Techno for Tanzania This presentation will cover the different utilities on a computer.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Computer Security By Duncan Hall.
Society & Computers PowerPoint
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
Software - Utilities Objectives Understand what is meant by utility software and application software Look at common utilities – Security – Disk organisation.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
A Quick and Easy Crash Course Internet Safety for Everyone.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
By Kyle Bickel.  Securing a host computer is making sure that your computer is secure when it’s connected to the internet  This be done by several protective.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
Computer Security Keeping you and your computer safe in the digital world.
1 Web Technologies Website Publishing/Going Live! Copyright © Texas Education Agency, All rights reserved.
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
2.4 Cyber-Safety.
Common Methods Used to Commit Computer Crimes
Unit 4 IT Security.
Ways to protect yourself against hackers
How to build a good reputation online
Information is at the heart of any University, and Harvard is no exception. We create it, analyze it, share it, and apply it. As you would imagine, we.
2.4 Cyber-Safety.
Part 3.
Presentation transcript:

INTERNET SAFETY FOR KIDS

PASSWORDS : FIRST STEP TO SAFETY

Hackers often use password-cracking software that can keep testing many different passwords until they find the correct one, and they can easily crack weak passwords. By creating strong passwords, you can greatly reduce the chance that your personal or financial information will be stolen.

Common Password Mistakes Many people create passwords based on their spouse's name, a hobby, or a simple pattern, since those types of passwords are easy to remember. Unfortunately, they are also very easy for hackers to guess. To create a strong password, you will need to avoid these types of common mistakes.

Tips For Creating Strong Passwords: Never use personal information such as your name, birthday, or spouse's name. Personal information is often publicly available, which makes it much easier for someone to guess your password. Use a longer password. Your password should be at least six characters long, and for extra security it should ideally be at least twelve characters (if the site allows it).

If you need to write down your passwords, keep them in a secure place If you need to write down your passwords, keep them in a secure place. It's even better if you "encrypt" your passwords or just write down hints for them that others won't be able to understand. Don't use the same password for each account. If someone does discover your password for one account, all of your other accounts will be vulnerable. Try to include numbers, symbols and both uppercase and lowercase letters (if the site allows it).

Avoid using words that can be found in the dictionary Avoid using words that can be found in the dictionary. For example, "swimming1" would be a very weak password. random passwords are the strongest. Use a password generator instead of trying to think of your own. Random passwords are harder to remember, so create a mnemonic device. For example, "H=jNp2#" can be remembered as "HARRY = jessica NOKIA paris 2 #." This may still seem random, but with a bit of practice it becomes relatively easy to memorize.

Using Password Managers Instead of writing your passwords on paper where others can easily see them, you can use a password manager to encrypt and store them online. Some password managers can also generate random passwords, making your information even more secure. Examples of password managers include LastPass, KeePass, Firefox's password manager, and Google Chrome's password manager.

PROTECTING YOUR COMPUTER FROM INTERNET THREATS

What Protection Do You Need? The best defense against internet threats is good antivirus software, or anti-malware as it is sometimes known. Antivirus software can protect you from infected email attachments, corrupt websites, internet worms, spyware and more. 

Multiple Protections The protection you obtain should include the following three components: Antivirus - specifically protects against viruses Anti-spyware - protects against malicious software that may be gathering your information without your knowledge Firewall - screens out threats that try to reach your computer over the internet

Security Suites Security Suites  Security suites are generally easier to manage and offer a wide range of protection which can be useful if you are a beginner. However, in some cases the extra functions of a suite are not as good as the stand-alone products for that function. In addition, some suites have a tendency to slow down a computer.

Stand-Alone Products  More advanced users sometimes prefer to take a pick-and-mix approach, researching and selecting the best products for each component and building their own security system.

Strategies for Using an Antivirus Software Make sure the automatic update function is turned on. Don't ignore your renewal notices. Once your subscription expires, you will stop receiving updates. There may be times when you need to disable your antivirus to allow certain programs, upgrades or downloads. Just make sure you don't forget to re-enable your program when finished.

Your antivirus should give you specific instructions for dealing with difficult problems, but if you are having trouble with an issue, contact technical support. If you are unhappy with an antivirus program, make sure you uninstall it before installing a new product.

ADDITIONAL COMPUTER SAFETY PRACTICES TO CONSIDER

Restart Your Computer Regularly Some of us leave our computers on all the time, but it is a good practice to turn it off and restart it at least once a week. This gives your computer a chance to perform regular diagnostic checks, and fix minor issues before they become a problem.

Install Software Updates When your operating system informs you of a software update, download and install it. Software updates are designed to fix security vulnerabilities and other bugs in your operating system. This will help protect your computer against some of the latest threats.

Use System Restore If you have a download that is causing problems, then try your operating system's system restore function. This feature allows you to restore your computer to a time and place before it started to have issues.

BACK UP YOUR COMPUTER

External Hard Drives You can purchase an external hard drive and copy the contents of your computer to it. The initial backup could take several hours, so you will need to select a period of time where you do not need access to your computer. Running the backup overnight usually works best. 

Online Backup Services and the Cloud You can also back up your files online—in other words, in the cloud. When you store something in the cloud, it's saved to servers on the internet, instead of on your computer. That way, you can always access your files, even if your computer is lost, damaged or stolen.

Popular online backup services that utilize this technology include Mozy, Carbonite and Box. The amount of storage space provided by these sites varies and you may have to pay a monthly or yearly fee for adequate storage.