Society & Computers PowerPoint

Slides:



Advertisements
Similar presentations
Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
How to protect yourself, your computer, and others on the internet
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Implications and Security Issues of the Internet By Neelesh Patel.
Protecting Yourself Against Identity Theft TSCPA Member Name, CPA Firm/Company Name.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
What you don’t know CAN hurt you!
Using internet and cell phones safely
Security, Privacy, and Ethics Online Computer Crimes.
Sarah Showalter Summer Utilizing the school computers, network, and storage space is a privilege! Each year all users are expected to review.
Opening a bank account.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Internet safety By Lydia Snowden.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
Bank On It FDIC Money Smart for Young Adults Building: Knowledge, Security, Confidence.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Course ILT Computers and society Unit objectives Identify the main uses of computers in daily life, and identify the benefits of using Describe.
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
IT Security for Users By Matthew Moody.
Staying Safe Online Keep your Information Secure.
Section 6 Theory Software Copyright, Viruses and Hacking.
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
OBJECTIVE 3 ELECTRONIC COMMUNICATIONS. USES OF COMPUTING Pros Made tasks such as clerical work and computing easier and faster Buying, banking, and paying.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Agenda Last class: Internet Literacy Lab Today: Internet Safety.
Ms. Park.  Q&A: What are some Internet safety tips you already know?
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
By: Elizabeth Scruggs Digital Citizenship Project.
Project 1a Evaluation Section. Using ICT Advantages and Disadvantages of using ICT.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
Grades 4-6 Be SAFE Online! Ceres Unified School District.
INTERNET SAFETY FOR KIDS
Protecting Your Identity Anders Olson Computers III September 18, 2008.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Internet Safety Internet Safety LPM
By: Asfa Khan and Huda Mukhtar
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Cybersecurity Test Review Introduction to Digital Technology.
CHAPTER 18 TECHNOLOGY ADVANCEMENTS IN THE WORKPLACE.
1.7.2.G1 © Family Economics & Financial Education – Revised May 2005 – Financial Institutions Unit – Electronic Banking Funded by a grant from Take Charge.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Protecting Yourself Against Identity Theft A Financial Literacy Presentation by.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Computer Security Keeping you and your computer safe in the digital world.
Have a Safe Shopping Online Experience. Did You Shop Online Today?  Anything you need today is available online. Whether it’s groceries, jewellery, clothes,
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
How to build a good reputation online
Topic 6: Issues Press F5 to view!
Scams, Identity Theft, and Viruses Kelly & Caitlin
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Protecting Your Information Assets
How safe are you and your information when you are on the internet?
Presentation transcript:

Society & Computers PowerPoint

ALMOST EVERYONE! Who uses computers? Even if someone does not own a single electronic device, they are using technology indirectly in some other way. For example, when they go grocery shopping the clerk is using a computer when they check out. When they go to a bank to deposit or withdraw money, the tellers are using a computer. When they pay their utility bills, the utility company is recording their payment on a computer. When they use a product, odds are the business has used a computer to create, produce, or ship the product. COMPUTERS ARE EVERYWHERE AND PEOPLE USE THEM INDIRECTLY ALL THE TIME WITHOUT REALIZING IT!

What are computers used for? The list of things computers are used for is too exhaustive to list. But here are a few uses.

When are computers used? 24 hours a day 7 days a week Non-Stop

Where can you find computers being used? PRACTICALLY EVERYWHERE INCLUDING: Science Labs Medical Research Facilities Schools Banks Public Safety Facilities, including police and fire stations Sports Arenas Government Agencies New York Stock Exchange Airlines Military Facilities Grocery Stores Insurance Companies Book Publishing Companies Space Exploration Homes (for personal use)

Why are computers used so much? Computers are used so much because they are fast, accurate, and convenient. They make tasks easier to complete.

What are the risks of computer use? There are many risks involved in using a computer. A few of the risks include: Loss of data Viruses/Malware Hacking Identity Theft Accessing Inappropriate Content Loss of Privacy Health Issues including repetitive motion injuries, eye strain, lack of activity

How can the risks be minimized? A computer user can do some things to help prevent some of the risks of using a computer. The following list includes suggestions to help minimize the risks. To prevent loss of data, make sure to back up computer files regularly. Files can be backed up on the cloud, on an external hard drive, on a flash drive, etc. Ideally, the backed-up files should be stored in another location in case of fire, flood, etc. To prevent viruses/malware, make sure to use virus protection software and keep the software up-to-date. You can adjust the settings to automatically update the definitions and scan regularly so you don’t have to remember to do it. New viruses and malware are released daily so updating the definitions and scanning regularly is important. This will keep your machine safer. Also, make sure to only download material from trusted web sites and never open any email or attachment from someone you do not know.

How can the risks be minimized? (cont.) To prevent hackers from accessing your machine, make sure to use a firewall. A firewall provides a barrier from information going from one network to another. Firewalls make it harder for someone to access the data on your machine unless they have permission. To prevent identity theft, make sure to not post personal information online. If you are going to post personal information, like to make online purchase, make sure you do so on a site that is secure and encrypts the data. You can tell if a site is secure by looking for the lock at the top of the screen.

How can the risks be minimized? (cont.) To prevent accessing inappropriate content, use parental controls and filters. Also, if you come across anything inappropriate, close the Internet and tell an adult. To prevent loss of privacy, make sure you are careful about what you post online. Once you post anything online, anyone has access to it. Pictures can be saved and reposted, emails can be forwarded, and anyone can post a picture or video clip of you online without your knowledge. Be smart and be careful! Some of your personal data like medical records, credit card information, etc. are stored on company computers around the world. Make sure you purchase items through trusted companies that have a good record of protecting data and who will provide help if your data is compromised.

How can the risks be minimized? (cont.) To prevent health issues make sure to set up an ergonomic workspace. Look at the picture below for tips. Also, remember to always have good lighting in your workspace. http://purechiroforyou.com/2014/06/02/ergonomics/

A few other tips When you use the Internet, many sites put cookies on your machine. Cookies are files that are placed on your machine that store information about where you have been and your preferences. Web sites use these cookies to provide ads and improve your experience the next time you visit that site. You can disable cookies or delete cookies if you want. Cookies put your privacy at risk but most sites will not run if cookies are disabled. Make sure to regularly update programs. Most software companies fix problems with their software and release updates. The updates will help your software run better and will keep your machine more up-to-date and protected. Your operating system software on your computer will also need updated occasionally. Operating systems can have flaws as well, some of which provide a security risk. The updates address security issues and functionality issues. You can choose to set up your device to update automatically. This will help keep your machine protected.

Computers are great, just be smart about how you use them!