SlideShare uma empresa Scribd logo
1 de 22
Protecting yourself on the
         Internet

Take charge of your computer
Objectives

• Learn the terms involved in Internet safety
• Discuss the types of security & how to be
  protected online
• Discover how to tell if your computer is
  infected, and then what to do
• Discuss safe online browsing, social
  networking and email
Terminology
•   Spam: Unsolicited mail
•   Virus: Self replicating software
•   Malware: Malicious software
•   Spyware: Collects your personal info
•   Phishing: Looks like the real website
•   Pharming: Sends you to a bad site

                      Go to next screen for more…
Terminology (continued)
• Browser hijacking: Replaces your homepage
• Hoax: Email with erroneous information
• Mousetrapping: Keeps you locked into a
  window
• Trojan horse: Software that appears to be OK
Good security for your computer
• Anti-virus software is KEY
  • Scans files & computer for patterns which may
    signal infection
  • Can be set up for automatic , daily scanning
  • Should run a manual scan if you think you have
    a virus
  • May clean automatically, may quarantine
  • To install new one, must uninstall old one
  • Good free one: Microsoft Security Essentials
                                             More…
Good security for your computer
• Anti Malware and Spyware (Often can be taken care of with same
   program. Check the program)
• Firewall: (blocks connections between your computers and other
   computers.. Keep it turned on)
• If infected, run a one time virus scanner like Microsoft
  Security Scanner
• Keep important software up to date including: Operating
  system, Adobe flash, Adobe reader, Java, Apple, Microsoft
  Office, etc.
• Install Web of Trust on browsers
Important security for your
     computer: Passwords!
                                            No:
                                            • Personal
                                              information on
                                              password
                                            • Predictable patterns
                                              (123,789)
                                            Yes:
                                            • If you write them
                                              down, keep in a safe
                                              place
                                            • Try a password
                                              generator


http://www.ghacks.net/2012/04/07/how-secure-is-your-password/
How do I get a virus?
• Download an infected file (or open email
  attachment)
  •   .exe: most dangerous, program file
  •   .zip: compressed file, can contain a virus
  •   .scr: free screen saver, can contain virus
  •   .doc: a Microsoft word file, can be infected
  •   Can have other extensions so CAREFUL!
  •   Can be spread with a thumb drive
• Visit bad website
• Clicking on a bad link
Signs my computer may have a
            virus
Note: Only guidelines: Other things may
cause these computer behaviors
• Computer running slowly
• Unexpected messages or programs that start
  automatically
• Modem or hard drive seem to be working
  all the time
Signs that my computer may
          have Spyware
• New toolbars, links or favorites on your
  web browser
• Home page, mouse pointer or search
  program changes
• You type an address into the web browser
  but end up at an unrelated site
• Pop-up ads, even without the Internet
• Computer may be running slowly
What to do if you think you are
            infected
• Download and run a one time scanner such as
  Microsoft Safety Scanner
  http://www.microsoft.com/security/scanner/en-
  us/default.aspx
• Or use other online virus scanners such as:
  Symantec Security Check, McAfee
  FreeScan, Kaspersky lab, & Bitdefender. (They
  might not cure your computer, but at least can tell
  you if you are infected.)
Email security
• Don’t forward hoax emails…(try
  snopes.com or factcheck.org)
• Don’t open attachments unless you are
  certain of their source (just reading email is
  OK)
• Don’t be too sure even if they are from a
  friend!
• Don’t click on links in the body of the email
               Continue for Email Red Flags…
Email Red Flags
• Images blocked: Don’t open unless you are
  sure!
• Urgent letters needing your personal
  information or money
• Statements from your bank to click here
• A claim that seems far fetched
• Anything from an online pharmacy, Western
  Union and PayPal. Go directly to the site
  instead.
• A note from a friend that seem strange
Safe social networking…DO
•   Caution when clicking on links
•   Limit personal information on sites
•   Create multiple aliases for some
•   Don’t believe it is really from Uncle Joe
•   Type network address directly
•   Be careful of your “friends”
•   Understand Privacy terms on the site

          Next: Safe social networking…Don’t
Safe social networking…DON’T
•   Use personal information for passwords
•   Install programs from the social networks
•   Click on links on the page
•   Allow social network to scan your contacts
•   Respond to “flames”
•   Say anything you may regret later
Safe Online Browsing
• Set own homepage (Options, settings)
• Use InPrivate browsing for sensitive use
• Don’t use public Wi Fi for personal data
• Double check web addresses if it seems
  different…Best to type it in directly
• HTTPS always when privacy is important

               More on Safe online browsing
Safe Online Browsing (cont.)
• Install Web of Trust on all browsers
• If money is involved:
   •   HTTPS
   •   Credit card or PayPal is best
   •   Beware if money is required up front
   •   Research to make sure company is legitimate
   •   Do not respond to unsolicited emails
• Use caution even if it looks authentic (Fake
  campaigns for Windows security updates,
  Facebook apps, 9/11 scams, Anti-Virus)
• Download only from reputable sources!
FACTS AND FIGURES
Internet Scams with the most
                     complaints:




http://mashable.com/2012/06/17/internet-scams-infographic/internet-scam-hotspots-972/
Other Internet Scams




http://mashable.com/2012/06/17/internet-scams-infographic/
Newest scams from BBB (click
    on link to read article)
• Scammers Taunt Twitter Users With Fake Facebook
  Video
• Fake Attorney Website Sparks FBI Investigation
• Email with "Visual Voicemail" Have Scam Attached
• Company Claims to Be Local, Scam Alert Issued
• Free Turns to Fee
• Media alert - Fire Victim Warning

Check the BBB site for updates:
http://www.bbb.org/us/scams
DON’T FALL FOR A
 SCAM: BE SAFE
    ONLINE!

Mais conteúdo relacionado

Mais procurados

Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2NetLockSmith
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
Parts of m.s word
Parts of m.s wordParts of m.s word
Parts of m.s wordJohn Lloyd
 
Office productivity tools
Office productivity toolsOffice productivity tools
Office productivity toolsUllees Selim
 
Antivirus And Malware Protection
Antivirus And Malware ProtectionAntivirus And Malware Protection
Antivirus And Malware Protectionreasonsecurity
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virusLeonor Costa
 
Computer viruses and prevention techniques
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniquesPrasad Athukorala
 
Installing Windows-10
Installing Windows-10Installing Windows-10
Installing Windows-10YvannAdolfo
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsNetLockSmith
 
Introduction to computer Powerpoint Presentation
Introduction to computer Powerpoint PresentationIntroduction to computer Powerpoint Presentation
Introduction to computer Powerpoint PresentationJibin Sr. Plamoottukada
 
What is Application Software?
What is Application Software?What is Application Software?
What is Application Software?DaisyJeffenYRios
 
Powerpoint 2013 tutorial
Powerpoint 2013 tutorial Powerpoint 2013 tutorial
Powerpoint 2013 tutorial 18goodm
 

Mais procurados (20)

Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Parts of m.s word
Parts of m.s wordParts of m.s word
Parts of m.s word
 
Office productivity tools
Office productivity toolsOffice productivity tools
Office productivity tools
 
Antivirus And Malware Protection
Antivirus And Malware ProtectionAntivirus And Malware Protection
Antivirus And Malware Protection
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
Computer viruses and prevention techniques
Computer viruses and prevention techniquesComputer viruses and prevention techniques
Computer viruses and prevention techniques
 
Computer virus
Computer virusComputer virus
Computer virus
 
virus
virusvirus
virus
 
Installing Windows-10
Installing Windows-10Installing Windows-10
Installing Windows-10
 
Virus part2
Virus part2Virus part2
Virus part2
 
Ransomware
RansomwareRansomware
Ransomware
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness Infographics
 
Gmail introduction
Gmail introductionGmail introduction
Gmail introduction
 
Introduction to computer Powerpoint Presentation
Introduction to computer Powerpoint PresentationIntroduction to computer Powerpoint Presentation
Introduction to computer Powerpoint Presentation
 
What is Application Software?
What is Application Software?What is Application Software?
What is Application Software?
 
Mail merge
Mail mergeMail merge
Mail merge
 
Microsoft Outlook.pptx
Microsoft Outlook.pptxMicrosoft Outlook.pptx
Microsoft Outlook.pptx
 
Powerpoint 2013 tutorial
Powerpoint 2013 tutorial Powerpoint 2013 tutorial
Powerpoint 2013 tutorial
 
Mail merge
Mail mergeMail merge
Mail merge
 

Semelhante a Protect yourself online with Internet safety tips

Online Self Defense
Online Self DefenseOnline Self Defense
Online Self DefenseBarry Caplin
 
Computer / Internet Security
Computer / Internet SecurityComputer / Internet Security
Computer / Internet SecurityDavid Cirella
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital AgeMarian Merritt
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayanehaz
 
The most dangerous places on the web
The most dangerous places on the webThe most dangerous places on the web
The most dangerous places on the webJoel May
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptxCharithraaAR
 
Viruses & security threats
Viruses & security threatsViruses & security threats
Viruses & security threatswardjo
 
Online reputation
Online reputationOnline reputation
Online reputationesl2m
 
Internet Security
Internet SecurityInternet Security
Internet Securitymjelson
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security PracticeBrian Pichman
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProRonald Soh
 
Overview of information security
Overview of information securityOverview of information security
Overview of information securityAskao Ahmed Saad
 
Cyber security
Cyber security Cyber security
Cyber security ZwebaButt
 
Cybersecurity-Keeping-Your-Computers-Devices-Safe.pptx
Cybersecurity-Keeping-Your-Computers-Devices-Safe.pptxCybersecurity-Keeping-Your-Computers-Devices-Safe.pptx
Cybersecurity-Keeping-Your-Computers-Devices-Safe.pptxPrinceYdvz
 
Securtiy Issues 17.05.2020.pptx
Securtiy Issues 17.05.2020.pptxSecurtiy Issues 17.05.2020.pptx
Securtiy Issues 17.05.2020.pptxvatsalrbhatt13
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcareNicholas Davis
 

Semelhante a Protect yourself online with Internet safety tips (20)

Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
 
Computer / Internet Security WHPL
Computer / Internet Security WHPLComputer / Internet Security WHPL
Computer / Internet Security WHPL
 
Computer / Internet Security
Computer / Internet SecurityComputer / Internet Security
Computer / Internet Security
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
The most dangerous places on the web
The most dangerous places on the webThe most dangerous places on the web
The most dangerous places on the web
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Viruses & security threats
Viruses & security threatsViruses & security threats
Viruses & security threats
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
 
Overview of information security
Overview of information securityOverview of information security
Overview of information security
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cybersecurity-Keeping-Your-Computers-Devices-Safe.pptx
Cybersecurity-Keeping-Your-Computers-Devices-Safe.pptxCybersecurity-Keeping-Your-Computers-Devices-Safe.pptx
Cybersecurity-Keeping-Your-Computers-Devices-Safe.pptx
 
Securtiy Issues 17.05.2020.pptx
Securtiy Issues 17.05.2020.pptxSecurtiy Issues 17.05.2020.pptx
Securtiy Issues 17.05.2020.pptx
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcare
 

Mais de San Diego Continuing Education

Mais de San Diego Continuing Education (20)

Presentation net neutrality updated December 2017
Presentation net neutrality updated December 2017Presentation net neutrality updated December 2017
Presentation net neutrality updated December 2017
 
No one cares about your damn emails
No one cares about your damn emailsNo one cares about your damn emails
No one cares about your damn emails
 
What happened on October 21
What happened on October 21What happened on October 21
What happened on October 21
 
An introduction to diabetes
An introduction to diabetesAn introduction to diabetes
An introduction to diabetes
 
An end to net neutrality
An end to net neutralityAn end to net neutrality
An end to net neutrality
 
Burning fat
Burning fatBurning fat
Burning fat
 
Security gap in Internet Explorer
Security gap in Internet ExplorerSecurity gap in Internet Explorer
Security gap in Internet Explorer
 
Osteoarthritis
OsteoarthritisOsteoarthritis
Osteoarthritis
 
Healthy communication presentation
Healthy communication presentationHealthy communication presentation
Healthy communication presentation
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
Review of brain plasticity
Review of brain plasticityReview of brain plasticity
Review of brain plasticity
 
Depression
DepressionDepression
Depression
 
5 technologies that have changed our lives
5 technologies that have changed our lives5 technologies that have changed our lives
5 technologies that have changed our lives
 
Communications presentation
Communications presentationCommunications presentation
Communications presentation
 
Depression & anxiety
Depression & anxietyDepression & anxiety
Depression & anxiety
 
Finding reliable health information online
Finding reliable health information onlineFinding reliable health information online
Finding reliable health information online
 
Windows 7: The Basics
Windows 7:  The BasicsWindows 7:  The Basics
Windows 7: The Basics
 
Week 4 internet overview
Week 4 internet overviewWeek 4 internet overview
Week 4 internet overview
 
Finding a purpose
Finding a purposeFinding a purpose
Finding a purpose
 
Social networks
Social networks Social networks
Social networks
 

Último

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 

Último (20)

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 

Protect yourself online with Internet safety tips

  • 1. Protecting yourself on the Internet Take charge of your computer
  • 2. Objectives • Learn the terms involved in Internet safety • Discuss the types of security & how to be protected online • Discover how to tell if your computer is infected, and then what to do • Discuss safe online browsing, social networking and email
  • 3. Terminology • Spam: Unsolicited mail • Virus: Self replicating software • Malware: Malicious software • Spyware: Collects your personal info • Phishing: Looks like the real website • Pharming: Sends you to a bad site Go to next screen for more…
  • 4. Terminology (continued) • Browser hijacking: Replaces your homepage • Hoax: Email with erroneous information • Mousetrapping: Keeps you locked into a window • Trojan horse: Software that appears to be OK
  • 5. Good security for your computer • Anti-virus software is KEY • Scans files & computer for patterns which may signal infection • Can be set up for automatic , daily scanning • Should run a manual scan if you think you have a virus • May clean automatically, may quarantine • To install new one, must uninstall old one • Good free one: Microsoft Security Essentials More…
  • 6. Good security for your computer • Anti Malware and Spyware (Often can be taken care of with same program. Check the program) • Firewall: (blocks connections between your computers and other computers.. Keep it turned on) • If infected, run a one time virus scanner like Microsoft Security Scanner • Keep important software up to date including: Operating system, Adobe flash, Adobe reader, Java, Apple, Microsoft Office, etc. • Install Web of Trust on browsers
  • 7. Important security for your computer: Passwords! No: • Personal information on password • Predictable patterns (123,789) Yes: • If you write them down, keep in a safe place • Try a password generator http://www.ghacks.net/2012/04/07/how-secure-is-your-password/
  • 8. How do I get a virus? • Download an infected file (or open email attachment) • .exe: most dangerous, program file • .zip: compressed file, can contain a virus • .scr: free screen saver, can contain virus • .doc: a Microsoft word file, can be infected • Can have other extensions so CAREFUL! • Can be spread with a thumb drive • Visit bad website • Clicking on a bad link
  • 9. Signs my computer may have a virus Note: Only guidelines: Other things may cause these computer behaviors • Computer running slowly • Unexpected messages or programs that start automatically • Modem or hard drive seem to be working all the time
  • 10. Signs that my computer may have Spyware • New toolbars, links or favorites on your web browser • Home page, mouse pointer or search program changes • You type an address into the web browser but end up at an unrelated site • Pop-up ads, even without the Internet • Computer may be running slowly
  • 11. What to do if you think you are infected • Download and run a one time scanner such as Microsoft Safety Scanner http://www.microsoft.com/security/scanner/en- us/default.aspx • Or use other online virus scanners such as: Symantec Security Check, McAfee FreeScan, Kaspersky lab, & Bitdefender. (They might not cure your computer, but at least can tell you if you are infected.)
  • 12. Email security • Don’t forward hoax emails…(try snopes.com or factcheck.org) • Don’t open attachments unless you are certain of their source (just reading email is OK) • Don’t be too sure even if they are from a friend! • Don’t click on links in the body of the email Continue for Email Red Flags…
  • 13. Email Red Flags • Images blocked: Don’t open unless you are sure! • Urgent letters needing your personal information or money • Statements from your bank to click here • A claim that seems far fetched • Anything from an online pharmacy, Western Union and PayPal. Go directly to the site instead. • A note from a friend that seem strange
  • 14. Safe social networking…DO • Caution when clicking on links • Limit personal information on sites • Create multiple aliases for some • Don’t believe it is really from Uncle Joe • Type network address directly • Be careful of your “friends” • Understand Privacy terms on the site Next: Safe social networking…Don’t
  • 15. Safe social networking…DON’T • Use personal information for passwords • Install programs from the social networks • Click on links on the page • Allow social network to scan your contacts • Respond to “flames” • Say anything you may regret later
  • 16. Safe Online Browsing • Set own homepage (Options, settings) • Use InPrivate browsing for sensitive use • Don’t use public Wi Fi for personal data • Double check web addresses if it seems different…Best to type it in directly • HTTPS always when privacy is important More on Safe online browsing
  • 17. Safe Online Browsing (cont.) • Install Web of Trust on all browsers • If money is involved: • HTTPS • Credit card or PayPal is best • Beware if money is required up front • Research to make sure company is legitimate • Do not respond to unsolicited emails • Use caution even if it looks authentic (Fake campaigns for Windows security updates, Facebook apps, 9/11 scams, Anti-Virus) • Download only from reputable sources!
  • 19. Internet Scams with the most complaints: http://mashable.com/2012/06/17/internet-scams-infographic/internet-scam-hotspots-972/
  • 21. Newest scams from BBB (click on link to read article) • Scammers Taunt Twitter Users With Fake Facebook Video • Fake Attorney Website Sparks FBI Investigation • Email with "Visual Voicemail" Have Scam Attached • Company Claims to Be Local, Scam Alert Issued • Free Turns to Fee • Media alert - Fire Victim Warning Check the BBB site for updates: http://www.bbb.org/us/scams
  • 22. DON’T FALL FOR A SCAM: BE SAFE ONLINE!