Download presentation
Presentation is loading. Please wait.
Published byJerome Leonard Modified over 9 years ago
1
KEEPING YOUR COMPUTER SAFE Anna by Kristan Simonton Internet Safety
2
Overview Computer Protection Identity Theft Child Safety Rules of Thumb
3
Computer Protection Key Terms: Firewall –Blocks outside access to a computer Antivirus – Prevents most destructive programs (viruses) from accessing a computer Cookies – Stores and transmits information to parent websites Passwords – Allows access to online accounts
4
Computer Protection Online: Connected to the Internet Disconnect when not in use Firewall: Limits the information sent to and from your computer Barrier from the internet Examples of firewall programs: Zonealarm Comodo Norton Internet Your Computer
5
Computer Protection Antivirus: Prevents viruses from effecting your computer Can only prevent what it recognizes Important to keep software updated Examples of antivirus programs: McAfee Norton AVG Anti-virus Your Computer
6
Computer Protection Cookies Allow companies to store information on your machine Collect information on your use Sell information gathered to 3 rd parties Create profiles based on information gathered Set computer to accept different level of cookies I’ve been to this site!
7
Computer Protection Keep Your Password Safe! Passwords are keys to personal information Increase password security include… Capital letters, lowercase letters, symbols, and numbers Use abbreviations not whole words Example: s 0 uth*ern ILL-in 0 is Change your password frequently These precautions will not protect your computer 100%
8
Identity Theft Key Terms: Email – Messages sent via the internet Websites – Locations on the internet
9
Identity Theft Scamming: Tricking or deceiving a person or group of people to obtain information Phishing Email A common avenue for virtual scam artist. False email can appear obvious or subtle. Phishing Website Another common venue for virtual scam artist. Attempt to gather personal information
10
Email Scam Clear Example
11
Email Scam Subtle Example
12
Southern Illinois Bank
13
Email Sent messages are uncontrollable Do not open emails from email addresses you do not recognize Treat online situations the same way you would personal situations
14
Identity Theft: Websites Check out the legitimacy of a website Key icons and web addresses Well-known site Check for misspellings Do not give out personal information Set information to private if possible If you are unsure just remember to… Stop! Look! Call!
15
Child Safety Internet is accessible from almost any location Kids need your help navigating the internet to avoid its risk Start a dialog and explore the internet with them
16
Child Safety Key Terms: Blocking – Prevents individuals from accessing non age appropriate material Monitoring – Records a child’s activities while online
17
Child Safety Blocking Prevents children from accessing inappropriate material Customized to fit household needs Password protected Examples of blocking programs: Net Nanny Safe Eyes CYBERsitter OpenDNS Click Here for Violent Movies
18
Child Safety: How to Block Sites
19
Child Safety: Monitoring Monitoring See the sites your kids are visiting Know who your kids are talking to Know where your kids are going online Examples of monitoring programs: Webwatcher Spector Pro Spy Agent Guardian Monitor
20
Tracking Teresa NetSmartz.org
21
Rules of Thumb Treat your computer like your home! Never give out personal information! Talk to your kids about internet safety! If it sounds too good to be true it usually is!
22
Remember: The Benefits Out Weigh The Risks Read the local news in the Southern Purchase Miners season tickets See what is going on at SIUCFind a physicianLearn how to protect your computer with NetSmartzFind a job through Illinois workNetGet online tutoring with Verizon’s Thinkfinity siteCheck out the services available at Union County HospitalLearn about the City of AnnaFind the score of the local game
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.