Download presentation
Presentation is loading. Please wait.
1
Internet safety By Lydia Snowden
2
Intro internet safety Staying safe on the internet.
It involves protecting Your computer: Viruses Spyware Phishing Spam and you: from harassment threats identity theft. Internet safety is staying safe on the internet. It is protecting your computer from viruses and you from harassment threats and identity theft. We all know we need to stay safe while using the Internet. In the past, Internet safety was mostly about protecting your computer from viruses. But today, the Internet's vast reach, constantly changing technologies, and growing social nature have made users more vulnerable to identity theft, privacy violations.
3
Protecting your Computer
4
Protection from Viruses
Potential issue What they are Internet safety rule Viruses A computer viruses is a small software programs that are designed to spread from one computer to another This interfere with computer operation. To stop getting viruses you can: Install an aunty virus software Don’t open up attachments you are not expecting Keep computer updated Viruses: A computer viruses is a small software programs that are designed to spread from one computer to another and to interfere with computer operation. A virus is a simple program designed to cause harm to your computer. A virus spreads by duplicating and attaching itself to other files. The extent of the damage depends on the virus. There are tens of thousands of viruses. Some virus damage is terrible, putting the computer system out of action by erasing files or corrupting data. To reduce the risk of getting a virus: Keep your operating system up to date Use anti virus software Not opening an attachment unless you are expecting it and know the cause (many servers scan s with anti-virus software on the user's behalf). Not allowing other users to use their own memory stick on your system.
5
Spyware Spyware Potential issue What they are Internet safety rule
Spyware is a program that secretly records what you do on your computer. They can be used for some appropriate purposes, but the majority of spyware is malicious. Its aim is usually to capture passwords, banking credentials and credit card details - and send them over the internet to fraudsters. Ways to prevent spyware are: Installing a firewall, this provides a defence against hackers. Update your software, make sure you have up to date security updates. Adjust your Internet Explorer web browser's security settings to control how much-or how little-information you want to accept from a website. Spyware: is a program that secretly records what you do on your computer. They can be used for some perfectly valid purposes, but the majority of spyware is used usually to capture passwords, banking credentials and credit card details - and send them over the internet to fraudsters. a lot of spyware nowadays is designed to steal confidential information - user names and passwords for banking sites, accounts, social networking sites and online games. You may never know if you have spyware on your computer as it tends to work quietly. They're often distributed as 'shareware' or 'freeware' with minimal license restrictions in order to trap as many people as possible. How to protect yourself: Don’t acidentally install spyware Many shareware download sites now test programs submitted to them and offer guarantees that their archives are free of spyware. Download anti spyware tool. Many of these are of high quality, and some are freeware themselves. These tools regularly download updates to stay abreast of newly- emerging spyware. Some of them can run in the background all the time, without really slowing down your computer, and they generally do a very good job.
6
Phishing Phishing Potential issue What it is Internet safety rule
Phising is a type of online identity theft. It uses and fraudulent websites that are designed to steal your personal data or information such as credit card numbers, passwords, account data, or other information. How to protect yourself from phishing: Don’t reply to about your information if you don’t know what it is Make sure you familiarise yourself with a website's privacy policy. Phishing: is a type of online identity theft. It uses and fraudulent websites that are designed to steal your personal data or information such as credit card numbers, passwords, account data, or other information. It is a term used to describe a malicious individual or group of individuals scamming users by sending s or creating web pages that are designed to collect an individual's online bank, credit card, or other login information. Because these s and web pages look like legitimate companies users trust them and enter their personal information. How to protect yourself Don’t reply to an you might be warey about Never personal or financial information, even if you are close with the recipient. these s and web pages look like appropriate companies users trust them and then they enter their personal information.
7
Spam Spam Potential issue What it is Internet safety rule
Some spam is annoying but harmless. However, some spam is part of an identity theft scam or other kind of fraud. Identity theft spam is often called a phishing scam. How to protect your computer from spam: Use software with built-in spam filtering Keep your filters current Be careful about sharing your or instant message address Spam: Some spam is annoying but harmless. However, some spam is part of an identity theft scam or other kind of fraud. Identity theft spam is often called a phishing scam. spam is most often considered to be electronic junk mail or junk newsgroup postings. Some people define spam even more generally as any unsolicited . Real spam is generally advertising for some product sent to a mailing list or newsgroup. How to protect yourself from spam: Use software with built-in spam filtering: this is an intelligent spam-filtering solution that is integrated across all Microsoft platforms, including: Keep your filters current: Spam is a cat-and-mouse game with spammers working relentlessly to outwit the filters. Do your part by keeping your junk filter up to date. Be careful about sharing your or instant message address: Only share your primary address with people you know Create an name that's tough to crack Disguise your address when you post it to a message board, newsgroup, chat room, or other public web page-for example, SairajUdin AT example DOT com. This way, a person can interpret your address, but the automated programs that spammers use often cannot.
8
Pop up blockers Pop up blockers Potential issue What it is
Internet safety rule Pop up blockers Most advertising on the internet use pop up to display their message in a way that is hard not to miss. Pop up blockers lets you prevent most pop ups from appearing over web pages when your browsing the internet. How to use pop up blocking: Access the pop up blocker settings to turn of pop ups on your computer Pop up blockers: Many advertisers on the Internet use pop-up windows to display their message in a way that is hard to miss. Internet Explorer Pop-up Blocker lets you prevent most pop-up windows from appearing over Web pages when you are browsing the Internet. Pop-up windows, or pop-ups, are windows that appear automatically without your permission. They vary in size but usually don't cover the whole screen. Your computer will allow you to control both pop-ups through the Content panel in the Options window. Pop-up blocking is turned on by default, so you don't have to worry about enabling it to prevent pop-ups from appearing in Firefox. How to use pop up blocking: Access the pop up blocker settings to turn of pop ups on your computer
9
Firewalls Firewall Potential issue What it is
Firewall is a system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are typically found in broadband routers firewalls should be considered an important part of your system and network set-up a firewall is a system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. typically found in broadband routers, should be considered an important part of your system and network set-up Most hardware firewalls will have a minimum of four network ports to connect other computers, but for larger networks, business networking firewall solutions are available.
10
Software Software Potential issue What it is
Software is a collection of instructions that enable the user to interact with a computers Without software, computers would be useless. For example, without your Internet browser software you would be unable to surf the Internet. Software can be purchased at a local retail computer store or online, usually in a box that contains all the disks Software can also be downloaded to a computer over the Internet. Once downloaded, setup files are run to start the installation of the program on your computer. Software is a collection of instructions that enable the user to interact with a computers Without software, computers would be useless. For example, without your Internet browser software you would be unable to surf the Internet. Software can be purchased at a local retail computer store or online, usually in a box that contains all the disks Software can also be downloaded to a computer over the Internet. Once downloaded, setup files are run to start the installation of the program on your computer.
11
Anti-virus Software Anti-virus software Potential issue What it is
Antivirus software is a computer program that detects, prevents, and takes action to remove malicious software programs, such as viruses and worms. You can help protect your computer against viruses by using antivirus software. You can prevent viruses by updating your antivirus software regularly. Antivirus software is a computer program that detects, prevents, and takes action to remove malicious software programs, such as viruses and worms. You can help protect your computer against viruses by using an antivirus software. Anti virus or anti-virus software (often abbreviated as AV), sometimes known as anti-malware software, is computer software used to prevent, detect and remove malicious software. Antivirus software was originally developed to detect and remove computer viruses, hence the name.
12
Do people feel safe on Internet?
13
Additional Information
You can find out more about IT Security by watching this Open University video clip: Additional Information
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.