Download presentation
Presentation is loading. Please wait.
Published byAustin Ford Modified over 9 years ago
2
1 3/13/08 Michael O’Connor Nicoleta Kourouniotis Michelle LaNasa Samantha Bonar Michael O’Connor Nicoleta Kourouniotis Michelle LaNasa Samantha Bonar
3
Public Computer Use DON’T save your logon information DON’T leave the computer unattended ERASE records of sites you have visited WATCH others around you DON’T enter private information into a public computer DON’T save your logon information DON’T leave the computer unattended ERASE records of sites you have visited WATCH others around you DON’T enter private information into a public computer Save all information to a personal storing device! Image from Microsoft Clipart Online 2 3/13/08
4
Parental Controls Limits game-playing, web-browsing, computer program use, and overall activity Can be used to restrict computer use, even to different members of the family Ensures safety in chat-rooms, instant messaging, and email accounts Monitors activity with feedback for better communication between the parent and child Limits game-playing, web-browsing, computer program use, and overall activity Can be used to restrict computer use, even to different members of the family Ensures safety in chat-rooms, instant messaging, and email accounts Monitors activity with feedback for better communication between the parent and child Images from Microsoft ClipArt Online 3 3/13/08
5
Using Wireless Networks Internet Security Share files and printers Connect to the Internet Establishes computing mobility The Risks of Wireless Networks Other users can establish connection on your network if not secured This can slow down your network performance Others can view your files and spread dangerous software Your web site use can be monitored -- even your e-mail Someone else can use your network to perform illegal activities (like spam and so forth) 4 3/13/08
6
Protecting Wireless Networks Internet Security Use encryption! Encryption will scramble data 64 bit WEP 128 bit WEP WPA - PSK (Personal) WPA2 Every encryption can be broken! change passwords often and look for the SSL symbol 5 3/13/08
7
Viruses, Spam, and Phishing By the end of 2005, there were 114,000 viruses for PC (only about a dozen for Mac) Viruses are malware or software that is intentionally designed to do damage Spamming is the abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages. Phishing is an attempt to criminally and fraudulently acquire sensitive information by masquerading as a trustworthy entity in an electronic communication. By the end of 2005, there were 114,000 viruses for PC (only about a dozen for Mac) Viruses are malware or software that is intentionally designed to do damage Spamming is the abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages. Phishing is an attempt to criminally and fraudulently acquire sensitive information by masquerading as a trustworthy entity in an electronic communication. 6 3/13/08
8
Anti-Virus and Spyware Removers Internet Security Software Norton/Symantec Trendmicro McAffe Computer Associates 7 3/13/08
9
Image Protection Low Resolution Prevents theft 72 ppi Signatures Discourages thieves Watermark Personal Low Resolution Prevents theft 72 ppi Signatures Discourages thieves Watermark Personal 8 3/13/08
10
Blogging Saftey Blogging Saftey Personal Information Limit how much is available, if at all present Do not reveal location or full name Personal Opinions Do not flame Do not post work opinions Personal Media Photograph dangers Personal Information Limit how much is available, if at all present Do not reveal location or full name Personal Opinions Do not flame Do not post work opinions Personal Media Photograph dangers 9 3/13/08
11
E-mail Security Log out of your account Do not save your password Do not open an e-mail if you don’t know who sent it, especially attachments Images from Microsoft Clipart Online Log out of your account Do not save your password Do not open an e-mail if you don’t know who sent it, especially attachments Images from Microsoft Clipart Online 10 3/13/08
12
How to Send E-mails Securely Encrypting -Off-the-Shelf products -Downloadable products http://www.timberlinetechnologies.com/p roducts/encryption.html Images from Microsoft Clipart Online Encrypting -Off-the-Shelf products -Downloadable products http://www.timberlinetechnologies.com/p roducts/encryption.html Images from Microsoft Clipart Online 11 3/13/08
13
Sources http://www.problogger.net/archives/2005/02/05/ what-is-a-blog/ http://www.problogger.net/archives/2005/02/05/ what-is-a-blog/ www.blogsafety.com www.blogsafety.com http://lukadia.livejournal.com/174299.html http://lukadia.livejournal.com/174299.html http://www.etoli.net/sketchbook.html http://www.etoli.net/sketchbook.html http://www.microsoft.com/windows/products/w indowsvista/features/details/parentalcontrols.m spx http://www.microsoft.com/windows/products/w indowsvista/features/details/parentalcontrols.m spx http://www.microsoft.com/protect/yourself/mo bile/publicpc.mspx http://www.microsoft.com/protect/yourself/mo bile/publicpc.mspx http://www.timberlinetechnologies.com/produc ts/encryption.html http://www.timberlinetechnologies.com/produc ts/encryption.html http://www.tru.ca/assets/techitup/images/technology_c onference2.jpg http://www.tru.ca/assets/techitup/images/technology_c onference2.jpg http://www.problogger.net/archives/2005/02/05/ what-is-a-blog/ http://www.problogger.net/archives/2005/02/05/ what-is-a-blog/ www.blogsafety.com www.blogsafety.com http://lukadia.livejournal.com/174299.html http://lukadia.livejournal.com/174299.html http://www.etoli.net/sketchbook.html http://www.etoli.net/sketchbook.html http://www.microsoft.com/windows/products/w indowsvista/features/details/parentalcontrols.m spx http://www.microsoft.com/windows/products/w indowsvista/features/details/parentalcontrols.m spx http://www.microsoft.com/protect/yourself/mo bile/publicpc.mspx http://www.microsoft.com/protect/yourself/mo bile/publicpc.mspx http://www.timberlinetechnologies.com/produc ts/encryption.html http://www.timberlinetechnologies.com/produc ts/encryption.html http://www.tru.ca/assets/techitup/images/technology_c onference2.jpg http://www.tru.ca/assets/techitup/images/technology_c onference2.jpg 12 3/13/08
14
More Sources http://www.livepim.com/images/outlook- warning.gif http://www.livepim.com/images/outlook- warning.gif http://samanthuel.deviantart.com/art/Keyboard- Error-75890890 http://samanthuel.deviantart.com/art/Keyboard- Error-75890890 http://blueblur22.deviantart.com/art/Windows- XP-Error-001-77158570 http://blueblur22.deviantart.com/art/Windows- XP-Error-001-77158570 http://futile-resistance.deviantart.com /art/Windows-Error-Message-4-28423851 http://futile-resistance.deviantart.com /art/Windows-Error-Message-4-28423851 http://fc05.deviantart.com/fs22/f/2007/336/2/e/ Random_Deletion_Error_Message_by_TheCheesy 4.png http://fc05.deviantart.com/fs22/f/2007/336/2/e/ Random_Deletion_Error_Message_by_TheCheesy 4.png http://www.e-strategyguide.gov.au/ online_security/secure_email http://www.e-strategyguide.gov.au/ online_security/secure_email http://www.livepim.com/images/outlook- warning.gif http://www.livepim.com/images/outlook- warning.gif http://samanthuel.deviantart.com/art/Keyboard- Error-75890890 http://samanthuel.deviantart.com/art/Keyboard- Error-75890890 http://blueblur22.deviantart.com/art/Windows- XP-Error-001-77158570 http://blueblur22.deviantart.com/art/Windows- XP-Error-001-77158570 http://futile-resistance.deviantart.com /art/Windows-Error-Message-4-28423851 http://futile-resistance.deviantart.com /art/Windows-Error-Message-4-28423851 http://fc05.deviantart.com/fs22/f/2007/336/2/e/ Random_Deletion_Error_Message_by_TheCheesy 4.png http://fc05.deviantart.com/fs22/f/2007/336/2/e/ Random_Deletion_Error_Message_by_TheCheesy 4.png http://www.e-strategyguide.gov.au/ online_security/secure_email http://www.e-strategyguide.gov.au/ online_security/secure_email
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.