Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computers, Security and You

Similar presentations


Presentation on theme: "Computers, Security and You"— Presentation transcript:

1 Computers, Security and You
By -I’m the parent of 3 little girls here at Griegos, one in 2nd grade in 2 in Kindergarten. I’m also a graduate student at the University of New Mexico (go Lobos) where I’m taking an Information Security class and as part of my class I’m here to talk to you about “Computers, Security and You”. Some of you guys filled out some surveys a couple of weeks ago, those surveys were to give me some information for this presentation. -Before we get started I just want to say that if you have a question at any point, raise your hand and I will stop and answer your question.

2 Why exactly are we here? -We are here to discuss this picture that was taken 20 years ago in the same cafeteria where we are sitting today. No, not really, but what we are here to discuss is something that has changed drastically since this picture was taken. Can anyone guess what that is?....It’s computers and the Internet. When this picture was taken computers and the Internet existed but weren’t really popular until a few years later. Now many of you do things every day that we couldn’t even dream of back then. Along with doing those things there are a lot of issues that you need to be aware of so that your computer and more importantly you are safe when you’re doing them. That’s what we are talking about today.

3 E-mail and Computer Viruses
What is the Internet? What is ? What is a computer Virus? Conflicker Virus The Bad Apple -I will ask the kids to answer the questions above to define these key terms. Based on the surveys I did most of them know what these things are, but I want to make sure they all do. If they don’t get the definition exactly correct, I will give them the definition I have below. -The Internet - Global system of interconnected computer networks. - is electronic mail, it’s used to send messages from one person to another on the Internet. Like regular mail you have a mailbox where you can go to check your mail and where you can send mail. -A computer virus is a bad computer program. Like a virus when you’re sick it is contagious and can spread from computer to computer making computers along the way sick. -Go to the “The Bad Apple” comic here: -I will need readers for Mickey, Goofy, Snow White, Doc, Sneezy, Bashful, Grumpy, The Queen, I will read the narrator and the monkey.

4 What did we learn? Only open e-mails from people we know
Delete s from Strangers right away Don’t send them to friends Computer Viruses can completely break your computer

5 Social Networking Sites
What is a Social Networking Site? CNN Social Networking Sites Club Penguin Myspace Facebook -Social Network site - A website where people with common interests can communicate with each other. -Cyber criminals are targeting social networking sites. A “friend” could update their status or send you a link to another website. You click on the link and it takes you to a fake website where you enter personal information, you trust it because it came from your friend. Really, it was a criminal and now they have more personal information and maybe even your password. Now they can use your account to do the same thing to others. “Security experts said it makes sense that cybercriminals are turning to social networking sites. Personal information is abundant on sites like Facebook and MySpace. Each time users give out valuable information like birth dates or addresses, they could be providing hints about their password, security experts say.” “Early this year, Twitter experienced several phishing attacks in which a Web page that looked identical to the widely recognized light blue Twitter page was a hoax. The company warned users to double-check the URL to ensure they were visiting the correct site.” If I go to that page and login, they now have my real twitter username and password. -Examples are Club Penguin, Myspace and Facebook

6 Rules/Tips for Social Networking Sites
Only communicate with people you know “Friends” Only No personal information No face-to-face meetings Act like your parents are watching Do you really need an account? Talk with an adult -Only interact or become friends with people who you know in real life. If you haven’t had a conversation with them in real life then don’t communicate with them online. You don’t talk to Strangers when you’re not online, don’t do it online either. -Keep your page closed to only friends. Don’t make it public so that anyone can see it. -Don’t ever give out personal information online – address, phone number, name of school, name of your parents, name of a team you play for. -Don’t ever set up a face-to-face meeting online. You already see the people you need to see on a regular basis. -Pretend like your parents are with you for everything you do online. Don’t post information you wouldn’t want them to see. -Decide if you really need to have an account at all. If you never log in and never use it. Or if what you do online you can do offline, in recess, at your friends house, get rid of your account. My main use for Facebook is to keep in touch with friends who live in other states or who I don’t see often, some of the people in the picture you saw earlier actually. If you already see these people then maybe you don’t need an account. -If someone tells you something that makes you feel uncomfortable or inappropriate online tell someone, your parents, your teacher, an adult that you can trust. There are bullies online just like in real life.

7 Chat Room What is a Chat Room? Who's Afraid of Little Sweet Sheep
Online Predators Who's Afraid of Little Sweet Sheep -A Chat room is a website on the Internet where users can communicate in real time. there is delays while people have to check their mail. In chat rooms everything happens right away as long as users are logged in. It’s like a normal conversation, just online. Lots of social networking sites have Chat rooms or Chat Applications.

8 What did we learn? Only communicate with people you know
No personal information No face-to-face meetings Act like your parents are watching Talk with an adult -Chat rooms are full of cyber-strangers -Rules are the same as Social Networking sites

9 Other Threats Phishing SPAM Spyware CNN Social Networking Sites
Conflicker Virus Spyware Keyloggers -Phishing – A bad guy attempting to get sensitive information (like usernames or passwords) by pretending they are something they are not. Sending you an with a link to a website that you think is one you always go to because it looks the same and getting you to enter your username and password, now they’ll have it. What can we do to protect against it? Verify urls and only interact with people we know. -SPAM – The use of to send unwanted bulk messages. Someone sends an to lots of people, maybe to sell a product or get you to go to their website. Can have viruses and other bad software. If you have lots of SPAM becomes unusable. Be careful where you give your out, don’t open messages from people you don’t know. -Spyware – software that is used to secretly monitor a persons activity on a computer. One example is a keylogger which records everything a person types into a keyboard. Why would this be useful to a bad guy? They could get passwords and usernames this way. -Other spyware is intended to monitor what a person does on the internet. The sites they go to, the s they send to people. It can be used so companies know what SPAM to send to you, or so bad guys know what site to use in a Phishing attack aimed at you.

10 Mp3 Player/Music Download
Downloading music Mininova Always pay for the music -iTunes, Amazon, Napster, Rhapsody OK to rip music from a CD Limewire or BitTorrent (P2P) -Illegal to download music you haven’t paid for. -Limewire and Bittorrent illegal if copy music from someone -Example of college kid who was fined lots of money -Good way to get viruses, trojans, etc.

11 Surfing/Playing Games
Go to familiar sites Pop Ups Downloads Verify links Social networking rules apply -Only go to familiar sites or sites that you know what they are about. -Don’t click on pop-ups if you don’t know what they are about. -Don’t download or install anything on your computer if you don’t know what it is. Always know what you are installing, if you don’t know ask someone who knows. -If you click a link to go to a site look at the url to make sure that you are at that site. Google example. -Social Networking rules apply No personal information No face-to-face meetings Act like your parents are watching Talk with an adult

12 Passwords Good Passwords Use Different passwords Sharing passwords
8 characters, #’s, letters, special characters, uncommon information Good – 1Kitty Better – 1Kitty! Good – jelly22fish Better – Jelly22fish& Use Different passwords Sharing passwords Memorize passwords -Good Passwords -Don’t use names of loved one’s, pets, your address, birthdays. -Use Letters (upper and lowercase), numbers and special character if possible -At least 8 characters if you can -Use different passwords for different websites, accouts, chat rooms, etc. -Don’t share your passwords with anyone else except your parents -Don’t write your passwords down and leave them somewhere to be found. Memorize them.

13 Other Stuff Turn you computer off Turn Internet/Wireless router off
-When your not using your computer at home always turn it of. -If youre not using your Internet connection router, turn it off.

14 Questions????


Download ppt "Computers, Security and You"

Similar presentations


Ads by Google