Download presentation
Presentation is loading. Please wait.
Published byPatience Howard Modified over 9 years ago
2
Internet has advanced a lot throughout the years. It has changed the way people communicate, work, find knowledge and much more. Work has became easier for business people by using the internet. They can communicate with more than one person and increase sales by communicating over seas. Therefore increasing the profit and making their business more money. People can email, use social networking such as Facebook, and Twitter, IM, and Skype. Education has advanced because students can use the internet to look up information and read data they didn’t know using search engines such as Google, and Wikipedia
3
Online safety is very important. There is a lot of situations that can happen just by putting to much personal information online. Your identity could get stolen, or your house can get robbed, and much more. Online security involves having software on your computer that stops virus and other harmful programs from hurting your computer.
4
COMPUTERS: Viruses are very easy to catch, being on unfamiliar sites and even clicking on random pop ups can put viruses on your computer. Catching certain viruses can crash your hard drive and even erase your data. FAMILY: Your family can be in serious danger if the wrong person comes across to much information. For example: Putting that you are going out to eat Dad without your sister because she is grounded as your status and having your address on Facebook shows that she is alone and gives directions right to where she is at. PERSONAL INFORMATION: Having to much of your personal information on social networking sites and even falling for scams popping up asking for personal information is a good way for your identity to get taken. This problem can also affect your family.
5
VIRUS: Software programs designed to invade your computer, and copy, damage or delete data. TROJAN: Viruses pretending to protect your computer while destroying your data. SPYWARE: software installed via the internet on a computer without the user's knowledge and used to send information about the user to another computer WORM: are malicious software applications designed to spread via computer networks.
6
Cyberbullying is the use of the Internet and related technologies to harm other people, in a deliberate, repeated, and hostile manner. As it has become more common in society, particularly among young people, legislation and awareness campaigns have arisen to combat it. There is a lot of risk to take when it comes to cyber bullying. Impulsive Behaviors Social Insecurity Isolation Depression Suicide
7
File sharing abuse- unauthorized sharing of music, video and other files, maybe illegal, and download malicious software.
8
The term sexual predator is used pejoratively to describe a person seen as obtaining or trying to obtain sexual contact with another person in a metaphorically "predatory" manner. Analogous to how a predator hunts down its prey, so the sexual predator is thought to "hunt" for his or her sex partners. People who commit sex crimes, such as rape or child sexual abuse, are commonly referred to as sexual predators, particularly in tabloid media or as a power phrase by politicians.
9
Children can be introduced to images they shouldn’t know until a certain age in life. They may become very interested into knowing what the images are which can change their behavior and actions.
10
Physical Risks Psychological Risks Risks due to Invasion of Privacy & Breach of Confidentiality
11
Risk of identity theft Debt Warrants Court Dates Jail Time
12
Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. The information may be used to commit various forms of fraud and identity theft, ranging from compromising a single existing bank account to setting up multiple new ones
13
Hoax is a message warning the recipient of a non-existent computer virus threat. The message is usually a chain e-mail that tells the recipient to forward it to everyone they know. Most hoaxes are sensational in nature and easily identified by the fact that they indicate that the virus will do nearly impossible things, like blow up the recipient's computer and set it on fire, or less sensationally, delete everything on the user's computer.
14
Spam is the use of electronic messaging to send unsolicited bulk messages indiscriminately. A person who creates electronic spam is called a spammer. The objective may be identity theft, or advance fee fraud. Some spam attempts to capitalize on human greed whilst other attempts to use the victims' inexperience with computer technology to trick them (Also know as phishing)
15
Steps to take in order to protect your computer: Turn on internet firewall Use Microsoft Update to keep windows up-to-date automatically Install and maintain Microsoft windows defender Install and maintain antivirus software Steps to take in order to protect your family: Talk to your kids about what they do online Set clear rules for Internet use Keep personal information private Use family safety settings in Microsoft software Steps to take in order to protect your personal information: Practice Internet behavior that lowers your risk Manage your personal information carefully Use anti- phishing and anti- spam technology built into Windows vista, Windows XP, SP2, Windows Outlook, Windows Live Internet firewall helps create a protective barrier
17
It is very important to monitor your child's use of the internet. The internet is a very dangerous place for small children. They can come across predators, put your family in danger by sharing to much personal information and even coming across disturbing content.
19
Click on the arrow beside “home” in the right corner, go to privacy settings. I changed my Facebook from being viewed to pubic to being viewed by my friends.
20
Click on “how you connect”. I changed my timeline being looked up only by my friends I changed that my friends and friends of friends can message me I changed that only my friends can post on my timeline I changed that my friends of friends can see what is posted on my timeline.
21
I changed that I have to review what people tag me in before it is put on my timeline. I changed that my friends of friends can see what my friend tag on my timeline.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.