COLLEGE OF COMMUNICATION AND INFORMATION FLORIDA STATE UNIVERSITY PRESENTED BY THE I.T. LEADERSHIP TEAM: EVAN MILLER JOAQUIN COSTON RICHARD KIRK SHANNON.

Slides:



Advertisements
Similar presentations
Adware and Spyware. Objectives u Define terms, scope, and motivation u Discuss impact (personal and business) u Review basic technical aspects u Provide.
Advertisements

Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Use computer and internet safely Dave Dai Computer security Malware Virus: a program that copies itself and infect a computer without permission.
INFORMATION SECURITY AWARENESS PRESENTED BY KAMRON NELSON AND ROYCE WILKERSON.
P.E.O. Salt Lake City Reciprocity Meeting Keeping Safe Using Technology April 8, 2010 Presented by Rebecca Conant (Y) P.E.O. Salt Lake City Reciprocity.
Browsing the Web Session 3. Objectives Student will knowhow to search on the internet, how to complete a form.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Deerfield High School STEM Presentation CAREERS IN SOCIAL BUSINESS.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
A First Course in Information Security
Learning In A Techno World How Safe is Your Cyberspace?
 We all know we need to stay safe while using the Internet, but we may not know just how to do that. In the past, Internet safety was mostly about.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Browsing the Web Session 3. Objectives Student will knowhow to search on the internet, how to complete a form.
Final Review 1453 Check exam schedule for date 3d03 3hrs.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Instructional Technology & Design Office or Digital Security Basics Presented by Mark Baldwin &
Everyday Cyber Security April 27 th Why Should You Care? Ensuring your privacy and security Protecting yourself and others Practicing safe internet.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Introducing the networks and the Internet By Cody Gibbs.
Careers in Information Technology Milton Ramer & Courtney Lisenbee.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
Just Say Know, Internet Safety for Educators CPD Linda Sweeting: Prince George’s County Public Schools Technology.
Online Safety 2.02 Remember the rules of online safety.
Internet safety By Suman Nazir
Return to the PC Security web page Lesson 4: Increasing Web Browser Security.
Safe Computing Practices. Outline Objective Safe Computing Defined Safe Computing Methods Summary List of References.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
Dr. Cyrus ED 217 Jacob Camacho.  A user friendly tool.  Can be accessed at campus.uogdistance.com  Easily accessible, useful in posting blogs, assignments,
Netiquette internet manners, online etiquette, and digital etiquette The social code of network communication The social and moral code of the internet.
Managing Windows Security
A Project on CYBER SECURITY
Name Job Title Library Name
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
ACROSS THE WORLD MCAFEE PROVIDING THE UPDATE PROTECTION SOLUTIONS TO THE COMPUTER USERS. AS SAME TO THE ERROR ABOVE, WAIT FOR FEW MINUTES AND THINK SOME.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
ACROSS THE WORLD MCAFEE PROVIDING THE UPDATE PROTECTION SOLUTIONS TO THE COMPUTER USERS. AS SAME TO THE ERROR ABOVE, WAIT FOR FEW MINUTES AND THINK SOME.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
ACROSS THE WORLD MCAFEE PROVIDING THE UPDATE PROTECTION SOLUTIONS TO THE COMPUTER USERS. AS SAME TO THE ERROR ABOVE, WAIT FOR FEW MINUTES AND THINK SOME.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Staying safe on the internet
Computer Security.
Bethesda Cybersecurity Club
ICT Communications Lesson 3: Internet Life and Privacy
Presentation transcript:

COLLEGE OF COMMUNICATION AND INFORMATION FLORIDA STATE UNIVERSITY PRESENTED BY THE I.T. LEADERSHIP TEAM: EVAN MILLER JOAQUIN COSTON RICHARD KIRK SHANNON B CALDWELL Information Technology Today

Do you Browse Safely? Virus Protection, Malware, Phishing, Spyware. Built in browser security (Windows defender) Update frequently Streaming media can infect your system. I’m getting spammed to death! Making online purchases:  Use Secure pages  Pay-Pal, Google Checkout, Amazon  Use Credit cards instead of checking account

What is Internet Piracy? Why shouldn’t I download that game? Intellectual property Is it the same as shoplifting? Who has heard of "The Pirate Bay?""The Pirate Bay?" P2P Sites are deadly.(kazaa,limewire) Bit Torrents. Yes, you can be arrested. po-po

Social Media Who’s on Facebook?...everyone, I know. Twitter, MySpace, Google +1, what’s the diff? Personal information Corporate solicitation Great Networking tool Employers examine closely Be Careful !!

Careers in Information Technology Big Demand, Challenging, Exciting !$$  Web Developer  Database Manager  Software Development Manager  Java Developer  Data Modeler  Software Implementation Analyst  IT Security Manager  Applications Architect  RFID Systems Engineer  Enterprise Systems Architect  Systems Analyst.

Technology Programs at FSU Majors  Information Technology  Information Communication Technology  Computer Science  Management Information Systems Minors in I.T.  4 additional classes to existing major Masters Programs  M.I.S.  Computer Science  I.T. (beginning Spring 2012)

Questions?