Internet has advanced a lot throughout the years. It has changed the way people communicate, work, find knowledge and much more. Work has became easier.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
The Internet = A World of Opportunities Look whats at your fingertips A way to communicate with friends, family, colleagues Access to information and.
How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Developed by Technology Services 1:1 Laptop Initiative
Let’s Talk About Cyber Security
Primary Threats to Computer Security
Security at Home The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
The Internet.
Society The internet has shaped the way the world has advanced in society. Since the beginning of time, humans have developed.
Internet Safety & Awareness Dan Tomlinson 02/23/2013.
Breaking Trust On The Internet
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
The Internet = A World of Opportunities
Steve Riley Sr. Security Strategist Microsoft Trustworthy Computing Group SEC303.
E-Safety Quiz Keeping safe online! A guide for parents & children.
INTERNET SAFETY FOR STUDENTS
How It Applies In A Virtual World
Threats to I.T Internet security By Cameron Mundy.
Internet safety By Lydia Snowden.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Digital Citizenship Project
By Daniel Carroll and Jarred Givens. The internet has helped further many fields and forms of technology, including: Internet Advancements Cell Phones.
Have Fun, Be Safe Strategies for Internet and Social Media Safety.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
DIGITAL CITIZENSHIP DIGITAL CITIZENSHIP By: Erica Lewis ED 505.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, + colleagues.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
 Facebook  Twitter  MySpace  Windows LiveSpace.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Digital Citizenship Project By Allen Naylor Ed 505.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Thursday 19 th November What is Fronter? How do we use it at West Pennard? Every child from Y2-6 has their own web space in Fronter. They can customise.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Safety and Security issues of using ICT Alys brooks.
Digital Citizenship By Lori Gray.
What is Spam? d min.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Internet safety By Suman Nazir
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
INTRODUCTION & QUESTIONS.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
5 different ways to get tricked on the internet. 1. Viruses A virus is a computer malware program that copies it’s files to the computer. This may allow.
Issues for Computer Users, Electronic Devices, Computer and Safety.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Digital Citizenship Project Justin Lann. Netiquette Netiquette on Social Media Sites – A set of social conventions that facilitate interactions over networks.
Safety.
Protect Your Computer Against Harmful Attacks!
Internet Safety Vocabulary
HOW DO I KEEP MY COMPUTER SAFE?
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Internet has advanced a lot throughout the years. It has changed the way people communicate, work, find knowledge and much more. Work has became easier for business people by using the internet. They can communicate with more than one person and increase sales by communicating over seas. Therefore increasing the profit and making their business more money. People can , use social networking such as Facebook, and Twitter, IM, and Skype. Education has advanced because students can use the internet to look up information and read data they didn’t know using search engines such as Google, and Wikipedia

Online safety is very important. There is a lot of situations that can happen just by putting to much personal information online. Your identity could get stolen, or your house can get robbed, and much more. Online security involves having software on your computer that stops virus and other harmful programs from hurting your computer.

COMPUTERS: Viruses are very easy to catch, being on unfamiliar sites and even clicking on random pop ups can put viruses on your computer. Catching certain viruses can crash your hard drive and even erase your data. FAMILY: Your family can be in serious danger if the wrong person comes across to much information. For example: Putting that you are going out to eat Dad without your sister because she is grounded as your status and having your address on Facebook shows that she is alone and gives directions right to where she is at. PERSONAL INFORMATION: Having to much of your personal information on social networking sites and even falling for scams popping up asking for personal information is a good way for your identity to get taken. This problem can also affect your family.

VIRUS: Software programs designed to invade your computer, and copy, damage or delete data. TROJAN: Viruses pretending to protect your computer while destroying your data. SPYWARE: software installed via the internet on a computer without the user's knowledge and used to send information about the user to another computer WORM: are malicious software applications designed to spread via computer networks.

Cyberbullying is the use of the Internet and related technologies to harm other people, in a deliberate, repeated, and hostile manner. As it has become more common in society, particularly among young people, legislation and awareness campaigns have arisen to combat it. There is a lot of risk to take when it comes to cyber bullying. Impulsive Behaviors Social Insecurity Isolation Depression Suicide

File sharing abuse- unauthorized sharing of music, video and other files, maybe illegal, and download malicious software.

The term sexual predator is used pejoratively to describe a person seen as obtaining or trying to obtain sexual contact with another person in a metaphorically "predatory" manner. Analogous to how a predator hunts down its prey, so the sexual predator is thought to "hunt" for his or her sex partners. People who commit sex crimes, such as rape or child sexual abuse, are commonly referred to as sexual predators, particularly in tabloid media or as a power phrase by politicians.

Children can be introduced to images they shouldn’t know until a certain age in life. They may become very interested into knowing what the images are which can change their behavior and actions.

Physical Risks Psychological Risks Risks due to Invasion of Privacy & Breach of Confidentiality

Risk of identity theft Debt Warrants Court Dates Jail Time

Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. The information may be used to commit various forms of fraud and identity theft, ranging from compromising a single existing bank account to setting up multiple new ones

Hoax is a message warning the recipient of a non-existent computer virus threat. The message is usually a chain that tells the recipient to forward it to everyone they know. Most hoaxes are sensational in nature and easily identified by the fact that they indicate that the virus will do nearly impossible things, like blow up the recipient's computer and set it on fire, or less sensationally, delete everything on the user's computer.

Spam is the use of electronic messaging to send unsolicited bulk messages indiscriminately. A person who creates electronic spam is called a spammer. The objective may be identity theft, or advance fee fraud. Some spam attempts to capitalize on human greed whilst other attempts to use the victims' inexperience with computer technology to trick them (Also know as phishing)

Steps to take in order to protect your computer: Turn on internet firewall Use Microsoft Update to keep windows up-to-date automatically Install and maintain Microsoft windows defender Install and maintain antivirus software Steps to take in order to protect your family: Talk to your kids about what they do online Set clear rules for Internet use Keep personal information private Use family safety settings in Microsoft software Steps to take in order to protect your personal information: Practice Internet behavior that lowers your risk Manage your personal information carefully Use anti- phishing and anti- spam technology built into Windows vista, Windows XP, SP2, Windows Outlook, Windows Live Internet firewall helps create a protective barrier

It is very important to monitor your child's use of the internet. The internet is a very dangerous place for small children. They can come across predators, put your family in danger by sharing to much personal information and even coming across disturbing content.

Click on the arrow beside “home” in the right corner, go to privacy settings. I changed my Facebook from being viewed to pubic to being viewed by my friends.

Click on “how you connect”. I changed my timeline being looked up only by my friends I changed that my friends and friends of friends can message me I changed that only my friends can post on my timeline I changed that my friends of friends can see what is posted on my timeline.

I changed that I have to review what people tag me in before it is put on my timeline. I changed that my friends of friends can see what my friend tag on my timeline.