SlideShare uma empresa Scribd logo
1 de 32
The Internet = A World of
Opportunities
Look what’s at your fingertips
•

•

Access to information
and entertainment

•

www.microsoft.com/protect

A way to communicate with
friends, family, colleagues

A means to learn, meet
people, and explore
Online Security Versus
Online Safety
Security: We must
secure our computers
with technology in the
same way that we secure
the doors to our homes.
Safety: We must act in
ways that help protect us
against the risks that
come with Internet use.

www.microsoft.com/protect
Primary Online Risks and Threats

To Computers
•
•
•
•

Viruses
Worms
Trojans
Spyware

To Families
•
•
•
•
•

www.microsoft.com/protect

Cyberbullies
File-sharing
abuses
Invasion
of privacy
Disturbing
content
Predators

To Personal
Information

•

Online fraud and
phishing
Hoaxes
Identity theft

•

Spam

•
•
Primary Threats to Computer Security

Viruses/Worms
Software programs
designed to invade
your computer, and
copy, damage, or
delete your data.

www.microsoft.com/protect

Trojans
Viruses that pretend to be
helpful programs while
destroying your data,
damaging your computer,
and stealing your
personal information.

Spyware
Software that tracks your
online activities or
displays endless ads.
Primary Online Risks for Children
Disturbing
Content
File-share Abuse

Cyberbullies
Both children and adults
may use the Internet to
harass or intimidate
other people.

Unauthorized sharing of
music, video, and other
files may be illegal,
and download
malicious software.

Predators
These people use the
Internet to trick children
into meeting with them
in person.

www.microsoft.com/protect

If kids explore
unsupervised, they
could stumble upon
images or information
you may not want
them exposed to.

Invasion of Privacy
If kids fill out online forms, they
may share information you
don’t want strangers to have
about them or your family.
Primary Threats to Personal
Online Safety
Phishing
E-mail sent by online
criminals to trick you
into going to fake Web
sites and revealing
personal information

Identity Theft
A crime where con
artists get your
personal information
and access your cash
and/or credit

www.microsoft.com/protect

Hoaxes
E-mail sent by online
criminals to trick you into
giving them money

Spam
Unwanted e-mail,
instant messages,
and other online
communication
Steps You Can Take

Your computer

Your family

Yourself

1. Turn on Windows
Internet firewall.
2. Use Microsoft Update
to keep Windows upto-date automatically.
3. Install and maintain
antivirus software.
4. Install and maintain
Microsoft Windows
Defender.

1. Talk with your kids
about what they
do online.
2. Set clear rules for
Internet use.
3. Keep personal
information private.
4. Use family safety
settings in
Microsoft software.

1. Practice Internet
behavior that lowers
your risk.
2. Manage your personal
information carefully.
3. Use anti-phishing and
anti-spam technology
built into Windows
Vista, Windows XP
SP2, Windows Live,
and Microsoft Outlook.

www.microsoft.com/protect
Four Steps to Help Protect

Your Computer
Turn on Windows Internet firewall
Use Microsoft Update to keep Windows
up-to-date automatically
Install and maintain antivirus software
Install and maintain antispyware software

www.microsoft.com/protect
Turn on Windows Internet Firewall

An Internet firewall
helps create a
protective barrier
between your
computer and
the Internet

www.microsoft.com/protect
Use Automatic Updates to
Keep Software Up-to-date
•

•

Install all updates
as soon as they
are available
Automatic updates
provide the best
protection

www.microsoft.com/protect
Install and Maintain Antivirus Software
•

•

Don’t let it expire

www.microsoft.com/protect

Antivirus software
helps to detect and
remove computer
viruses before they
can cause damage.
For antivirus
software to be
effective, you must
keep it up-to-date.
Install and Maintain Antispyware
Software
Use antispyware
software, like Microsoft
Windows Defender, so
unknown software cannot
track your online activity
and potentially steal your
information.

www.microsoft.com/protect
Other Ways to Help Protect
Your Computer
Back up your files regularly
Read Web site
privacy statements
Close pop-ups using red “X”
Think before you click

www.microsoft.com/protect
Back up Your Files

•

•

www.microsoft.com/protect

Save to CD/DVD, a
USB drive, or other
external source
Use a Web-based
backup service
Think Before You Click

•

Be cautious with e-mail
attachments and links

•

Only download
files from Web sites
you trust

www.microsoft.com/protect
Read Privacy Statements
Understand what you
are getting before you
agree to download or
share your personal
information

www.microsoft.com/protect
Use the Red “X” to Close Pop-ups
•

•

www.microsoft.com/protect

Always use the red “X”
in the corner of a popup screen.
Never click “yes,”
“accept,” or even
“cancel,” because it
could be a trick that
installs software on
your computer.
Take Steps to Help Protect

Your Family
Talk with your kids about what they do online
Set clear rules for Internet use
Keep personal information private
Use family safety software

www.microsoft.com/protect
Talk with Your Kids
about Online Risks
•

Talk frankly with your kids
about Internet risks, including
•
•
•

•

Online criminals
Inappropriate content
Invasion of privacy

Empower them by teaching
them how their own
behavior can reduce those
risks and help to keep them
safe when they are online

www.microsoft.com/protect

Helpful online resources
www.staysafe.org
www.getnetwise.org
www.microsoft.com/protect
Pay Attention to What
Your Kids Do Online
•
•
•
•
•

Keep the computer in a
central area
Get to know how your
kids use the Internet
Let your kids be the
teacher
Teach kids to trust
their instincts
Encourage them to
report any problems

www.microsoft.com/protect
Keep Personal Information Private
•

Teach children to check
with you before sharing
personal information online

•

Monitor your children’s
online activities

•

Teach your children to
report suspicious activity

•

Help children choose
appropriate screen names
and e-mail addresses

www.microsoft.com/protect
Set Clear Rules for Internet Use
•
•
•
•
•
•

Do not share files or
open attachments
Do not click links in e-mail
Treat others the way
you want to be treated
Stand up for yourself
Respect other
people’s property
Never go alone to meet an
Internet “friend” in person

www.microsoft.com/protect
Use Family Safety Software
•

Available in Windows
Vista , Windows Live
OneCare Family Safety,
Xbox 360
®

™

™

®

•

Helps parents manage
the content their children
view, what they do, and
who they communicate
with online

www.microsoft.com/protect
Take Steps to Help Protect

Your Personal Information
Practice Internet behavior that lowers
your risk
Manage your personal information carefully
Use technology to reduce nuisances,
and raise the alarm when appropriate

www.microsoft.com/protect
Practice Internet Behaviors that
Help Reduce Your Risk
•
•
•

www.microsoft.com/protect

Delete spam, don’t open it
Be on the lookout for
online scams
Use strong passwords
Manage Personal Information
Carefully
•

•
•

•
•
www.microsoft.com/protect

Do not share personal
information in e-mail or
instant messages
Use only secure and
trusted Web sites
Make sure you are where
you think you are: Web
sites can be faked
Avoid financial transactions
over wireless networks
When in public, stay private
Use Anti-Phishing and
Anti-Spam Technology
•

Most e-mail providers
and programs, like
Windows Live Hotmail
and Microsoft Outlook ,
filter most spam
®

®

•

Phishing Filter in
Internet Explorer 7
helps to block and warn
about suspicious sites
®

www.microsoft.com/protect
If Your Identity is Stolen
•
•
•
•

Report it
Follow up in writing
Change all passwords
Place fraud alert on credit reports
Get a copy of your credit report
and ensure your account is marked
“fraud alert” and “victim’s statement”

www.microsoft.com/protect
How Does Microsoft Help Improve
Security and Safety?

Partnership

Technology

Guidance

By partnering with
non-governmental
organizations, other
technology companies,
and governments
worldwide to help
keep people safe online.

By developing software
products and tools that
increase security and
safety, helping people
minimize their risk
online and make
informed choices.

By providing useful
guidance that helps
people understand
online risks and what
actions they can take.

www.microsoft.com/protect
For More Information
www.microsoft.com/protect
www.staysafe.org
www.getnetwise.org

www.microsoft.com/protect
© 2007 Microsoft Corporation. All rights reserved.
Microsoft, Hotmail, OneCare, Outlook, Windows, Windows Vista, Xbox, Xbox 360, Xbox LIVE, and other product names are or may be registered trademarks and/or trademarks
in the U.S. and/or other countries.
The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation.
Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft,
and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation.
MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Mais conteúdo relacionado

Mais procurados

General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber SecurityDominic Rajesh
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amosAmos Oyoo
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness TrainingDenis kisina
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet SecurityGerard Lamusse
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and PreventionPratimesh Pathak
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessInnocent Korie
 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityMohammed Adam
 
Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3DallasHaselhorst
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security RaviPrashant5
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training OpenFred Beck MBA, CPA
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and SecurityNoushad Hasan
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in SocietyRubal Sagwal
 

Mais procurados (20)

Computer security and
Computer security andComputer security and
Computer security and
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber Security
 
Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3
 
Types of malware
Types of malwareTypes of malware
Types of malware
 
Cyber security
Cyber securityCyber security
Cyber security
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 

Semelhante a Computer Security and safety

Microsoft (Projects)
Microsoft (Projects)Microsoft (Projects)
Microsoft (Projects)Vinayak Hegde
 
Online reputation
Online reputationOnline reputation
Online reputationesl2m
 
Microsoft protect ppt_ms_final
Microsoft protect ppt_ms_finalMicrosoft protect ppt_ms_final
Microsoft protect ppt_ms_final21_zaheer
 
CYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWCYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWBilly Warero
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02amiinaaa
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online Nader Alkeinay
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationSheryldeVilla2
 
Phish training final
Phish training finalPhish training final
Phish training finalJen Ruhman
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online PrivacyKazi Sarwar Hossain
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptxCharithraaAR
 

Semelhante a Computer Security and safety (20)

Microsoft (Projects)
Microsoft (Projects)Microsoft (Projects)
Microsoft (Projects)
 
Protect
ProtectProtect
Protect
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Microsoft protect ppt_ms_final
Microsoft protect ppt_ms_finalMicrosoft protect ppt_ms_final
Microsoft protect ppt_ms_final
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
CYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWCYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEW
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
 
12990739.ppt
12990739.ppt12990739.ppt
12990739.ppt
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Phish training final
Phish training finalPhish training final
Phish training final
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
Module 5: Safety
Module 5: SafetyModule 5: Safety
Module 5: Safety
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 

Mais de Sadaf Walliyani (20)

Letters and Phonics
Letters and Phonics Letters and Phonics
Letters and Phonics
 
Culture of pakistan
Culture of pakistanCulture of pakistan
Culture of pakistan
 
Culture of pakistan game
Culture of pakistan gameCulture of pakistan game
Culture of pakistan game
 
Imam ghazali philosophy of education
Imam ghazali philosophy of educationImam ghazali philosophy of education
Imam ghazali philosophy of education
 
Traffic rules
Traffic rulesTraffic rules
Traffic rules
 
I am a start right kid
I am a start right kidI am a start right kid
I am a start right kid
 
Student council
Student council Student council
Student council
 
Take care of animals
Take care of animalsTake care of animals
Take care of animals
 
Habitat ppt games
Habitat ppt games Habitat ppt games
Habitat ppt games
 
Habitat games
Habitat games Habitat games
Habitat games
 
Animal home quick match
Animal home  quick match Animal home  quick match
Animal home quick match
 
Millionaire verbs
Millionaire verbsMillionaire verbs
Millionaire verbs
 
City and village
City and village City and village
City and village
 
Professions
Professions  Professions
Professions
 
Allah created everything
Allah created everythingAllah created everything
Allah created everything
 
City and village
City and village City and village
City and village
 
Goods and services
Goods and servicesGoods and services
Goods and services
 
Interactive white board PPT
Interactive white board PPTInteractive white board PPT
Interactive white board PPT
 
Population
Population Population
Population
 
City life Village life
City life Village life City life Village life
City life Village life
 

Último

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 

Computer Security and safety

  • 1.
  • 2. The Internet = A World of Opportunities Look what’s at your fingertips • • Access to information and entertainment • www.microsoft.com/protect A way to communicate with friends, family, colleagues A means to learn, meet people, and explore
  • 3. Online Security Versus Online Safety Security: We must secure our computers with technology in the same way that we secure the doors to our homes. Safety: We must act in ways that help protect us against the risks that come with Internet use. www.microsoft.com/protect
  • 4. Primary Online Risks and Threats To Computers • • • • Viruses Worms Trojans Spyware To Families • • • • • www.microsoft.com/protect Cyberbullies File-sharing abuses Invasion of privacy Disturbing content Predators To Personal Information • Online fraud and phishing Hoaxes Identity theft • Spam • •
  • 5. Primary Threats to Computer Security Viruses/Worms Software programs designed to invade your computer, and copy, damage, or delete your data. www.microsoft.com/protect Trojans Viruses that pretend to be helpful programs while destroying your data, damaging your computer, and stealing your personal information. Spyware Software that tracks your online activities or displays endless ads.
  • 6. Primary Online Risks for Children Disturbing Content File-share Abuse Cyberbullies Both children and adults may use the Internet to harass or intimidate other people. Unauthorized sharing of music, video, and other files may be illegal, and download malicious software. Predators These people use the Internet to trick children into meeting with them in person. www.microsoft.com/protect If kids explore unsupervised, they could stumble upon images or information you may not want them exposed to. Invasion of Privacy If kids fill out online forms, they may share information you don’t want strangers to have about them or your family.
  • 7. Primary Threats to Personal Online Safety Phishing E-mail sent by online criminals to trick you into going to fake Web sites and revealing personal information Identity Theft A crime where con artists get your personal information and access your cash and/or credit www.microsoft.com/protect Hoaxes E-mail sent by online criminals to trick you into giving them money Spam Unwanted e-mail, instant messages, and other online communication
  • 8. Steps You Can Take Your computer Your family Yourself 1. Turn on Windows Internet firewall. 2. Use Microsoft Update to keep Windows upto-date automatically. 3. Install and maintain antivirus software. 4. Install and maintain Microsoft Windows Defender. 1. Talk with your kids about what they do online. 2. Set clear rules for Internet use. 3. Keep personal information private. 4. Use family safety settings in Microsoft software. 1. Practice Internet behavior that lowers your risk. 2. Manage your personal information carefully. 3. Use anti-phishing and anti-spam technology built into Windows Vista, Windows XP SP2, Windows Live, and Microsoft Outlook. www.microsoft.com/protect
  • 9. Four Steps to Help Protect Your Computer Turn on Windows Internet firewall Use Microsoft Update to keep Windows up-to-date automatically Install and maintain antivirus software Install and maintain antispyware software www.microsoft.com/protect
  • 10. Turn on Windows Internet Firewall An Internet firewall helps create a protective barrier between your computer and the Internet www.microsoft.com/protect
  • 11. Use Automatic Updates to Keep Software Up-to-date • • Install all updates as soon as they are available Automatic updates provide the best protection www.microsoft.com/protect
  • 12. Install and Maintain Antivirus Software • • Don’t let it expire www.microsoft.com/protect Antivirus software helps to detect and remove computer viruses before they can cause damage. For antivirus software to be effective, you must keep it up-to-date.
  • 13. Install and Maintain Antispyware Software Use antispyware software, like Microsoft Windows Defender, so unknown software cannot track your online activity and potentially steal your information. www.microsoft.com/protect
  • 14. Other Ways to Help Protect Your Computer Back up your files regularly Read Web site privacy statements Close pop-ups using red “X” Think before you click www.microsoft.com/protect
  • 15. Back up Your Files • • www.microsoft.com/protect Save to CD/DVD, a USB drive, or other external source Use a Web-based backup service
  • 16. Think Before You Click • Be cautious with e-mail attachments and links • Only download files from Web sites you trust www.microsoft.com/protect
  • 17. Read Privacy Statements Understand what you are getting before you agree to download or share your personal information www.microsoft.com/protect
  • 18. Use the Red “X” to Close Pop-ups • • www.microsoft.com/protect Always use the red “X” in the corner of a popup screen. Never click “yes,” “accept,” or even “cancel,” because it could be a trick that installs software on your computer.
  • 19. Take Steps to Help Protect Your Family Talk with your kids about what they do online Set clear rules for Internet use Keep personal information private Use family safety software www.microsoft.com/protect
  • 20. Talk with Your Kids about Online Risks • Talk frankly with your kids about Internet risks, including • • • • Online criminals Inappropriate content Invasion of privacy Empower them by teaching them how their own behavior can reduce those risks and help to keep them safe when they are online www.microsoft.com/protect Helpful online resources www.staysafe.org www.getnetwise.org www.microsoft.com/protect
  • 21. Pay Attention to What Your Kids Do Online • • • • • Keep the computer in a central area Get to know how your kids use the Internet Let your kids be the teacher Teach kids to trust their instincts Encourage them to report any problems www.microsoft.com/protect
  • 22. Keep Personal Information Private • Teach children to check with you before sharing personal information online • Monitor your children’s online activities • Teach your children to report suspicious activity • Help children choose appropriate screen names and e-mail addresses www.microsoft.com/protect
  • 23. Set Clear Rules for Internet Use • • • • • • Do not share files or open attachments Do not click links in e-mail Treat others the way you want to be treated Stand up for yourself Respect other people’s property Never go alone to meet an Internet “friend” in person www.microsoft.com/protect
  • 24. Use Family Safety Software • Available in Windows Vista , Windows Live OneCare Family Safety, Xbox 360 ® ™ ™ ® • Helps parents manage the content their children view, what they do, and who they communicate with online www.microsoft.com/protect
  • 25. Take Steps to Help Protect Your Personal Information Practice Internet behavior that lowers your risk Manage your personal information carefully Use technology to reduce nuisances, and raise the alarm when appropriate www.microsoft.com/protect
  • 26. Practice Internet Behaviors that Help Reduce Your Risk • • • www.microsoft.com/protect Delete spam, don’t open it Be on the lookout for online scams Use strong passwords
  • 27. Manage Personal Information Carefully • • • • • www.microsoft.com/protect Do not share personal information in e-mail or instant messages Use only secure and trusted Web sites Make sure you are where you think you are: Web sites can be faked Avoid financial transactions over wireless networks When in public, stay private
  • 28. Use Anti-Phishing and Anti-Spam Technology • Most e-mail providers and programs, like Windows Live Hotmail and Microsoft Outlook , filter most spam ® ® • Phishing Filter in Internet Explorer 7 helps to block and warn about suspicious sites ® www.microsoft.com/protect
  • 29. If Your Identity is Stolen • • • • Report it Follow up in writing Change all passwords Place fraud alert on credit reports Get a copy of your credit report and ensure your account is marked “fraud alert” and “victim’s statement” www.microsoft.com/protect
  • 30. How Does Microsoft Help Improve Security and Safety? Partnership Technology Guidance By partnering with non-governmental organizations, other technology companies, and governments worldwide to help keep people safe online. By developing software products and tools that increase security and safety, helping people minimize their risk online and make informed choices. By providing useful guidance that helps people understand online risks and what actions they can take. www.microsoft.com/protect
  • 32. © 2007 Microsoft Corporation. All rights reserved. Microsoft, Hotmail, OneCare, Outlook, Windows, Windows Vista, Xbox, Xbox 360, Xbox LIVE, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.