Download presentation
Presentation is loading. Please wait.
Published byColin Cunningham Modified over 9 years ago
3
We all know we need to stay safe while using the Internet, but we may not know just how to do that. In the past, Internet safety was mostly about protecting your computer from viruses. But today, the Internet's vast reach, constantly changing technologies, and growing social nature have made users more vulnerable to identity theft, privacy violations, and even harassment. Potential issues covered throughout the power point. VirusesComputer viruses are small software programs that spread from one computer to another SpywareSpyware is installed on a computer to collect the owner's private information SpamSpam is any kind of unwanted online communication. PhishingPhishing is when you click on the pop up links that take you to fake websites, these get your personal information. FirewallsFirewall is a network security system that controls the incoming Anti virus softwareAntivirus software was originally developed to detect and remove computer viruses. Pop up blockersPop-ups are often forms of online advertising on the World Wide Web intended to attract web traffic or capture email addresses
4
Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation. A computer virus or worm is a self-replicating program that can spread by email or by inserting copies of itself into other programs or documents. Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files. Computer viruses also spread through downloads on the Internet. They can be hidden in illicit software or other files or programs you might download. A fast way to check for viruses is to use an online scanner, such as the Microsoft Safety Scanner. The scanner is a free online service that helps you identify and remove viruses, clean up your hard disk, and generally improve your computer's performance.
5
Spyware is a type of malware that is installed on a computer without the know ledge of the owner in order to collect the owner's private information. Spyware is often hidden from the user in order to gather information about internet interaction, keystrokes (also known as keylogging), passwords, and other valuable data. Spyware does not necessarily spread in the same way as a virus or worm because infected systems generally do not attempt to transmit or copy the software to other computers. Instead, spyware installs itself on a system by deceiving the user or by exploiting software vulnerabilities. You should use an antispyware scanner and removal tool to try to remove it. You can also try to remove spyware manually..
6
Spam is any kind of unwanted online communication. The most common form of spam is unwanted email. You can also get text message spam, instant message spam (sometimes known as spim), and social networking spam. Some spam is annoying but harmless. However, some spam is part of an identity theft scam or other kind of fraud. Identity theft spam is often called a phishing scam. Spam is unsolicited junk email sent indiscriminately in bulk, often for commercial purposes Scan your computer with your anti-virus software while it is in Safe Mode by opening the program and selecting the "Scan" option Computers can appear to function normally when infected, it's a good idea to run this tool regularly even if your computer seems to be fine. You should also use up-to-date antivirus software, such as Microsoft Security Essentials, to help protect your computer from other malware.
7
This is when users into giving up their usernames, passwords, credit card numbers and other personal information. Phishing emails will often try to get you to click on links that take you to fake websites; they often pretend to be from organizations such as a bank, PayPal, Amazon or even Stanford. Phishing is an example of social engineering techniques used to deceive users, and exploits the poor usability of current web security technologies The risk grows even larger in social media such as Facebook, Twitter, MySpace etc. Hackers commonly use these sites to attack persons using these media sites in their workplace, homes, or public in order to take personal and security information that can affect the user and the company Turn off phishing and malware detection Click the Chrome menu Chrome menu on the browser toolbar. Select Settings. Click Show advanced settings and find the "Privacy" section. Untick the box next to "Enable phishing and malware protection
8
In computing, a firewall is a network security system that controls the incoming and outgoing network traffic based on an applied rule set. A firewall establishes a barrier between a trusted, secure internal network and another network (e.g., the Internet) that is assumed not to be secure and trusted. Firewalls exist both as a software solution and as a hardware appliance Many hardware-based firewalls also offer other functionality to the internal network they protected. Firewalls can be used in a number of ways to add security to your home or business. Large corporations often have very complex firewalls in place to protect their extensive networks The main goal of a personal firewall is to protect your personal computer and private network from malicious mischief.
11
Anti-virus software, is computer software used to prevent, detect and remove malicious software. Antivirus software was originally developed to detect and remove computer viruses Antivirus software provides protection from other computer threats. Antivirus software can protect from, malicious Browser Helper Objects, browser hijackers, ransom ware, key loggers, backdoors, rootkits, Trojan horses, worms, malicious LSPs, diallers, fraud tools, adware and spyware. Anti-virus programs are not always effective against new viruses, even those that use non-signature-based methods that should detect new viruses. The reason for this is that the virus designers test their new viruses on the major anti-virus applications to make sure that they are not detected before releasing them into the wild Some new viruses, particularly ransom ware, use polymorphic code to avoid detection by virus scanners. Jerome Segura, a security analyst with Pathologic, explained
12
Pop-ups are often forms of online advertising on the World Wide Web intended to attract web traffic or capture email addresses. Pop-ups are generally new web browser windows to display advertisements. All major web browsers except Internet Explorer allowed the user to block unwanted pop-ups almost completely. First the Mozilla browser improved on this by blocking only pop-ups generated as the page loads. The pop-up window containing an advertisement is usually generated by JavaScript using cross-site scripting. Block or allow pop-ups Once you've downloaded Google Toolbar on Internet Explorer, you can block or allow pop-ups: On the right side of the Toolbar, click the wrench. Go to the Tools tab. To block pop-ups, tick the box next to "Pop-up blocker." To allow pop-ups, untick the box next to "Pop-up blocker." Then you click save.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.