SlideShare uma empresa Scribd logo
1 de 33
The Internet = A World of
Opportunities
Look what’s at your fingertips
• A way to communicate with
friends, family, colleagues
• Access to information
and entertainment
• A means to learn, meet
people, and explore
Online Security Versus
Online Safety
Security: We must
secure our computers
with technology in the
same way that we secure
the doors to our homes.
Safety: We must act in
ways that help protect us
against the risks that
come with Internet use.
Primary Online Risks and Threats
To Families
• Cyberbullies
• File-sharing
abuses
• Invasion
of privacy
• Disturbing
content
• Predators
To Personal
Information
• Online fraud and
phishing
• Hoaxes
• Identity theft
• Spam
To Computers
• Viruses
• Worms
• Trojans
• Spyware
Viruses/Worms
Software programs
designed to invade
your computer, and
copy, damage, or
delete your data.
Trojans
Viruses that pretend to be
helpful programs while
destroying your data,
damaging your computer,
and stealing your
personal information.
Spyware
Software that tracks your
online activities or
displays endless ads.
Primary Threats to Computer Security
Predators
These people use the
Internet to trick children
into meeting with them
in person.
File-share Abuse
Unauthorized sharing of
music, video, and other
files may be illegal,
and download
malicious software.
Cyberbullies
Both children and adults
may use the Internet to
harass or intimidate
other people.
Invasion of Privacy
If kids fill out online forms, they
may share information you
don’t want strangers to have
about them or your family.
Disturbing
Content
If kids explore
unsupervised, they
could stumble upon
images or information
you may not want
them exposed to.
Primary Online Risks for Children
Spam
Unwanted e-mail,
instant messages,
and other online
communication
Phishing
E-mail sent by online
criminals to trick you
into going to fake Web
sites and revealing
personal information
Identity Theft
A crime where con
artists get your
personal information
and access your cash
and/or credit
Hoaxes
E-mail sent by online
criminals to trick you into
giving them money
Primary Threats to Personal
Online Safety
Steps You Can Take
Your computer
1. Turn on Windows
Internet firewall.
2. Use Microsoft Update
to keep Windows up-
to-date automatically.
3. Install and maintain
antivirus software.
4. Install and maintain
Microsoft Windows
Defender.
Yourself
1. Practice Internet
behavior that lowers
your risk.
2. Manage your personal
information carefully.
3. Use anti-phishing and
anti-spam technology
built into Windows
Vista, Windows XP
SP2, Windows Live,
and Microsoft Outlook.
Your family
1. Talk with your kids
about what they
do online.
2. Set clear rules for
Internet use.
3. Keep personal
information private.
4. Use family safety
settings in
Microsoft software.
Turn on Windows Internet firewall
Four Steps to Help Protect
Your Computer
Use Microsoft Update to keep Windows
up-to-date automatically
Install and maintain antispyware software
Install and maintain antivirus software
Turn on Windows Internet Firewall
An Internet firewall
helps create a
protective barrier
between your
computer and
the Internet
Use Automatic Updates to
Keep Software Up-to-date
• Install all updates
as soon as they
are available
• Automatic updates
provide the best
protection
Install and Maintain Antivirus Software
• Antivirus software
helps to detect and
remove computer
viruses before they
can cause damage.
• For antivirus
software to be
effective, you must
keep it up-to-date.Don’t let it expire
Install and Maintain Antispyware
Software
Use antispyware
software, like Microsoft
Windows Defender, so
unknown software cannot
track your online activity
and potentially steal your
information.
Other Ways to Help Protect
Your Computer
Back up your files regularly
Think before you click
Read Web site
privacy statements
Close pop-ups using red “X”
Back up Your Files
• Save to CD/DVD, a
USB drive, or other
external source
• Use a Web-based
backup service
Think Before You Click
• Be cautious with e-mail
attachments and links
• Only download
files from Web sites
you trust
Read Privacy Statements
Understand what you
are getting before you
agree to download or
share your personal
information
Use the Red “X” to Close Pop-ups
• Always use the red “X”
in the corner of a pop-
up screen.
• Never click “yes,”
“accept,” or even
“cancel,” because it
could be a trick that
installs software on
your computer.
Take Steps to Help Protect
Your Family
Talk with your kids about what they do online
Keep personal information private
Set clear rules for Internet use
Use family safety software
Talk with Your Kids
about Online Risks
• Talk frankly with your kids
about Internet risks, including
• Online criminals
• Inappropriate content
• Invasion of privacy
• Empower them by teaching
them how their own
behavior can reduce those
risks and help to keep them
safe when they are online
Helpful online resources
www.staysafe.org
www.getnetwise.org
www.microsoft.com/protect
Pay Attention to What
Your Kids Do Online
• Keep the computer in a
central area
• Get to know how your
kids use the Internet
• Let your kids be the
teacher
• Teach kids to trust
their instincts
• Encourage them to
report any problems
Keep Personal Information Private
• Teach children to check
with you before sharing
personal information online
• Monitor your children’s
online activities
• Teach your children to
report suspicious activity
• Help children choose
appropriate screen names
and e-mail addresses
Set Clear Rules for Internet Use
• Do not share files or
open attachments
• Do not click links in e-mail
• Treat others the way
you want to be treated
• Stand up for yourself
• Respect other
people’s property
• Never go alone to meet an
Internet “friend” in person
Use Family Safety Software
• Available in Windows
Vista
®
, Windows Live
™
OneCare
™
Family Safety,
Xbox 360
®
• Helps parents manage
the content their children
view, what they do, and
who they communicate
with online
How to Handle Problems
• Contact police to report any
threat immediately
• Report incidents to:
CyberTipline
800-843-5678
www.cybertipline.com
Practice Internet behavior that lowers
your risk
Manage your personal information carefully
Use technology to reduce nuisances,
and raise the alarm when appropriate
Take Steps to Help Protect
Your Personal Information
Practice Internet Behaviors that
Help Reduce Your Risk
• Delete spam, don’t open it
• Be on the lookout for
online scams
• Use strong passwords
Manage Personal Information
Carefully
• Do not share personal
information in e-mail or
instant messages
• Use only secure and
trusted Web sites
• Make sure you are where
you think you are: Web
sites can be faked
• Avoid financial transactions
over wireless networks
• When in public, stay private
Use Anti-Phishing and
Anti-Spam Technology
• Most e-mail providers
and programs, like
Windows Live Hotmail
®
and Microsoft Outlook
®
,
filter most spam
• Phishing Filter in
Internet Explorer
®
7
helps to block and warn
about suspicious sites
Get a copy of your credit report
and ensure your account is marked
“fraud alert” and “victim’s statement”
If Your Identity is Stolen
• Report it
• Follow up in writing
• Change all passwords
• Place fraud alert on credit reports
How Does Microsoft Help Improve
Security and Safety?
By developing software
products and tools that
increase security and
safety, helping people
minimize their risk
online and make
informed choices.
By partnering with
non-governmental
organizations, other
technology companies,
and governments
worldwide to help
keep people safe online.
By providing useful
guidance that helps
people understand
online risks and what
actions they can take.
Partnership Technology Guidance
For More Information
www.microsoft.com/protect
www.staysafe.org
www.getnetwise.org
Internet Safety Guide for Families

Mais conteúdo relacionado

Mais procurados

Online Self Defense
Online Self DefenseOnline Self Defense
Online Self DefenseBarry Caplin
 
The Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyThe Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyJonathan Bacon
 
Online reputation
Online reputationOnline reputation
Online reputationesl2m
 
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTEEMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTEAlminaVelasco
 
Securityawareness
SecurityawarenessSecurityawareness
SecurityawarenessJayfErika
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9NehaRohtagi1
 
Keep your Kids Safe Online
Keep your Kids Safe OnlineKeep your Kids Safe Online
Keep your Kids Safe Online_chimes_
 
IT Security DOs and DONTs
IT Security DOs and DONTsIT Security DOs and DONTs
IT Security DOs and DONTsIT Tech
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteAngelito Quiambao
 
Ten Important Rules
Ten Important RulesTen Important Rules
Ten Important Rulesritz482
 
Itsa end user 2013
Itsa end user 2013Itsa end user 2013
Itsa end user 2013salleh1n
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Moumita Chatterjee
 
Breakfast Briefings - February 2018
Breakfast Briefings - February 2018Breakfast Briefings - February 2018
Breakfast Briefings - February 2018PKF Francis Clark
 

Mais procurados (20)

Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
 
The Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyThe Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and Privacy
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Online reputation
Online reputationOnline reputation
Online reputation
 
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTEEMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
 
Securityawareness
SecurityawarenessSecurityawareness
Securityawareness
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
001 ho basic computer
001 ho basic computer001 ho basic computer
001 ho basic computer
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Internet security
Internet securityInternet security
Internet security
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
 
Keep your Kids Safe Online
Keep your Kids Safe OnlineKeep your Kids Safe Online
Keep your Kids Safe Online
 
IT Security DOs and DONTs
IT Security DOs and DONTsIT Security DOs and DONTs
IT Security DOs and DONTs
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
 
Ten Important Rules
Ten Important RulesTen Important Rules
Ten Important Rules
 
Itsa end user 2013
Itsa end user 2013Itsa end user 2013
Itsa end user 2013
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri
 
Breakfast Briefings - February 2018
Breakfast Briefings - February 2018Breakfast Briefings - February 2018
Breakfast Briefings - February 2018
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 

Destaque

Microsoft (Silverlight)
Microsoft (Silverlight)Microsoft (Silverlight)
Microsoft (Silverlight)Vinayak Hegde
 
Microsoft (SQL Server)
Microsoft (SQL Server)Microsoft (SQL Server)
Microsoft (SQL Server)Vinayak Hegde
 
Microsoft (Office 2007)
Microsoft (Office 2007)Microsoft (Office 2007)
Microsoft (Office 2007)Vinayak Hegde
 
Microsoft (Strength And Weakness)
Microsoft (Strength And Weakness)Microsoft (Strength And Weakness)
Microsoft (Strength And Weakness)Vinayak Hegde
 
Microsoft (Intro To Office)
Microsoft (Intro To Office)Microsoft (Intro To Office)
Microsoft (Intro To Office)Vinayak Hegde
 
Microsoft (Virtualization 2008)
Microsoft (Virtualization 2008)Microsoft (Virtualization 2008)
Microsoft (Virtualization 2008)Vinayak Hegde
 

Destaque (7)

Microsoft (Silverlight)
Microsoft (Silverlight)Microsoft (Silverlight)
Microsoft (Silverlight)
 
Microsoft (SQL Server)
Microsoft (SQL Server)Microsoft (SQL Server)
Microsoft (SQL Server)
 
Microsoft (Office 2007)
Microsoft (Office 2007)Microsoft (Office 2007)
Microsoft (Office 2007)
 
Microsoft (Strength And Weakness)
Microsoft (Strength And Weakness)Microsoft (Strength And Weakness)
Microsoft (Strength And Weakness)
 
Smart Antennas
Smart AntennasSmart Antennas
Smart Antennas
 
Microsoft (Intro To Office)
Microsoft (Intro To Office)Microsoft (Intro To Office)
Microsoft (Intro To Office)
 
Microsoft (Virtualization 2008)
Microsoft (Virtualization 2008)Microsoft (Virtualization 2008)
Microsoft (Virtualization 2008)
 

Semelhante a Internet Safety Guide for Families

Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online Nader Alkeinay
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationSheryldeVilla2
 
Internet Security
Internet SecurityInternet Security
Internet Securitymjelson
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxHarishParthasarathy4
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Abzetdin Adamov
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital AgeMarian Merritt
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayanehaz
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]sheenau
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsusxenhalo561
 
Digital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteDigital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteGab Billones
 

Semelhante a Internet Safety Guide for Families (20)

Protect
ProtectProtect
Protect
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Module 5: Safety
Module 5: SafetyModule 5: Safety
Module 5: Safety
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
 
Digital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteDigital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online Netiquette
 

Mais de Vinayak Hegde

Microsoft (Office 2007 And Math Edit)
Microsoft (Office 2007 And Math Edit)Microsoft (Office 2007 And Math Edit)
Microsoft (Office 2007 And Math Edit)Vinayak Hegde
 
Microsoft (Intro To Office)
Microsoft (Intro To Office)Microsoft (Intro To Office)
Microsoft (Intro To Office)Vinayak Hegde
 
Antarctica Information 2009
Antarctica Information 2009Antarctica Information 2009
Antarctica Information 2009Vinayak Hegde
 
Antarctica Be Developed
Antarctica Be DevelopedAntarctica Be Developed
Antarctica Be DevelopedVinayak Hegde
 
Operation Taj Real Heroes
Operation Taj Real HeroesOperation Taj Real Heroes
Operation Taj Real HeroesVinayak Hegde
 
Karnataka Nature Snaps
Karnataka Nature SnapsKarnataka Nature Snaps
Karnataka Nature SnapsVinayak Hegde
 
China Poisoned Milk Must Know For Your Own Safety
China Poisoned Milk   Must Know For Your Own SafetyChina Poisoned Milk   Must Know For Your Own Safety
China Poisoned Milk Must Know For Your Own SafetyVinayak Hegde
 
Human Area Networking Technology
Human Area Networking TechnologyHuman Area Networking Technology
Human Area Networking TechnologyVinayak Hegde
 
The Future Of Technology
The Future Of TechnologyThe Future Of Technology
The Future Of TechnologyVinayak Hegde
 

Mais de Vinayak Hegde (20)

Microsoft (Office 2007 And Math Edit)
Microsoft (Office 2007 And Math Edit)Microsoft (Office 2007 And Math Edit)
Microsoft (Office 2007 And Math Edit)
 
Microsoft (Intro To Office)
Microsoft (Intro To Office)Microsoft (Intro To Office)
Microsoft (Intro To Office)
 
IBMSoftware
IBMSoftwareIBMSoftware
IBMSoftware
 
Antarctica Information 2009
Antarctica Information 2009Antarctica Information 2009
Antarctica Information 2009
 
Antarctica Be Developed
Antarctica Be DevelopedAntarctica Be Developed
Antarctica Be Developed
 
Operation Taj Real Heroes
Operation Taj Real HeroesOperation Taj Real Heroes
Operation Taj Real Heroes
 
Karnataka Nature Snaps
Karnataka Nature SnapsKarnataka Nature Snaps
Karnataka Nature Snaps
 
Fitness Check
Fitness CheckFitness Check
Fitness Check
 
China Poisoned Milk Must Know For Your Own Safety
China Poisoned Milk   Must Know For Your Own SafetyChina Poisoned Milk   Must Know For Your Own Safety
China Poisoned Milk Must Know For Your Own Safety
 
Bmx Tricks (Game)
Bmx Tricks (Game)Bmx Tricks (Game)
Bmx Tricks (Game)
 
Best Websites List
Best Websites ListBest Websites List
Best Websites List
 
Autobahn (Game)
Autobahn (Game)Autobahn (Game)
Autobahn (Game)
 
Threat To Hinduism
Threat To HinduismThreat To Hinduism
Threat To Hinduism
 
Never Sick Again
Never Sick AgainNever Sick Again
Never Sick Again
 
Network Programming
Network ProgrammingNetwork Programming
Network Programming
 
Python
PythonPython
Python
 
Learn Python
Learn PythonLearn Python
Learn Python
 
Human Area Networking Technology
Human Area Networking TechnologyHuman Area Networking Technology
Human Area Networking Technology
 
The Future Of Technology
The Future Of TechnologyThe Future Of Technology
The Future Of Technology
 
Teamwork
TeamworkTeamwork
Teamwork
 

Último

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 

Último (20)

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 

Internet Safety Guide for Families

  • 1.
  • 2. The Internet = A World of Opportunities Look what’s at your fingertips • A way to communicate with friends, family, colleagues • Access to information and entertainment • A means to learn, meet people, and explore
  • 3. Online Security Versus Online Safety Security: We must secure our computers with technology in the same way that we secure the doors to our homes. Safety: We must act in ways that help protect us against the risks that come with Internet use.
  • 4. Primary Online Risks and Threats To Families • Cyberbullies • File-sharing abuses • Invasion of privacy • Disturbing content • Predators To Personal Information • Online fraud and phishing • Hoaxes • Identity theft • Spam To Computers • Viruses • Worms • Trojans • Spyware
  • 5. Viruses/Worms Software programs designed to invade your computer, and copy, damage, or delete your data. Trojans Viruses that pretend to be helpful programs while destroying your data, damaging your computer, and stealing your personal information. Spyware Software that tracks your online activities or displays endless ads. Primary Threats to Computer Security
  • 6. Predators These people use the Internet to trick children into meeting with them in person. File-share Abuse Unauthorized sharing of music, video, and other files may be illegal, and download malicious software. Cyberbullies Both children and adults may use the Internet to harass or intimidate other people. Invasion of Privacy If kids fill out online forms, they may share information you don’t want strangers to have about them or your family. Disturbing Content If kids explore unsupervised, they could stumble upon images or information you may not want them exposed to. Primary Online Risks for Children
  • 7. Spam Unwanted e-mail, instant messages, and other online communication Phishing E-mail sent by online criminals to trick you into going to fake Web sites and revealing personal information Identity Theft A crime where con artists get your personal information and access your cash and/or credit Hoaxes E-mail sent by online criminals to trick you into giving them money Primary Threats to Personal Online Safety
  • 8. Steps You Can Take Your computer 1. Turn on Windows Internet firewall. 2. Use Microsoft Update to keep Windows up- to-date automatically. 3. Install and maintain antivirus software. 4. Install and maintain Microsoft Windows Defender. Yourself 1. Practice Internet behavior that lowers your risk. 2. Manage your personal information carefully. 3. Use anti-phishing and anti-spam technology built into Windows Vista, Windows XP SP2, Windows Live, and Microsoft Outlook. Your family 1. Talk with your kids about what they do online. 2. Set clear rules for Internet use. 3. Keep personal information private. 4. Use family safety settings in Microsoft software.
  • 9. Turn on Windows Internet firewall Four Steps to Help Protect Your Computer Use Microsoft Update to keep Windows up-to-date automatically Install and maintain antispyware software Install and maintain antivirus software
  • 10. Turn on Windows Internet Firewall An Internet firewall helps create a protective barrier between your computer and the Internet
  • 11. Use Automatic Updates to Keep Software Up-to-date • Install all updates as soon as they are available • Automatic updates provide the best protection
  • 12. Install and Maintain Antivirus Software • Antivirus software helps to detect and remove computer viruses before they can cause damage. • For antivirus software to be effective, you must keep it up-to-date.Don’t let it expire
  • 13. Install and Maintain Antispyware Software Use antispyware software, like Microsoft Windows Defender, so unknown software cannot track your online activity and potentially steal your information.
  • 14. Other Ways to Help Protect Your Computer Back up your files regularly Think before you click Read Web site privacy statements Close pop-ups using red “X”
  • 15. Back up Your Files • Save to CD/DVD, a USB drive, or other external source • Use a Web-based backup service
  • 16. Think Before You Click • Be cautious with e-mail attachments and links • Only download files from Web sites you trust
  • 17. Read Privacy Statements Understand what you are getting before you agree to download or share your personal information
  • 18. Use the Red “X” to Close Pop-ups • Always use the red “X” in the corner of a pop- up screen. • Never click “yes,” “accept,” or even “cancel,” because it could be a trick that installs software on your computer.
  • 19. Take Steps to Help Protect Your Family Talk with your kids about what they do online Keep personal information private Set clear rules for Internet use Use family safety software
  • 20. Talk with Your Kids about Online Risks • Talk frankly with your kids about Internet risks, including • Online criminals • Inappropriate content • Invasion of privacy • Empower them by teaching them how their own behavior can reduce those risks and help to keep them safe when they are online Helpful online resources www.staysafe.org www.getnetwise.org www.microsoft.com/protect
  • 21. Pay Attention to What Your Kids Do Online • Keep the computer in a central area • Get to know how your kids use the Internet • Let your kids be the teacher • Teach kids to trust their instincts • Encourage them to report any problems
  • 22. Keep Personal Information Private • Teach children to check with you before sharing personal information online • Monitor your children’s online activities • Teach your children to report suspicious activity • Help children choose appropriate screen names and e-mail addresses
  • 23. Set Clear Rules for Internet Use • Do not share files or open attachments • Do not click links in e-mail • Treat others the way you want to be treated • Stand up for yourself • Respect other people’s property • Never go alone to meet an Internet “friend” in person
  • 24. Use Family Safety Software • Available in Windows Vista ® , Windows Live ™ OneCare ™ Family Safety, Xbox 360 ® • Helps parents manage the content their children view, what they do, and who they communicate with online
  • 25. How to Handle Problems • Contact police to report any threat immediately • Report incidents to: CyberTipline 800-843-5678 www.cybertipline.com
  • 26. Practice Internet behavior that lowers your risk Manage your personal information carefully Use technology to reduce nuisances, and raise the alarm when appropriate Take Steps to Help Protect Your Personal Information
  • 27. Practice Internet Behaviors that Help Reduce Your Risk • Delete spam, don’t open it • Be on the lookout for online scams • Use strong passwords
  • 28. Manage Personal Information Carefully • Do not share personal information in e-mail or instant messages • Use only secure and trusted Web sites • Make sure you are where you think you are: Web sites can be faked • Avoid financial transactions over wireless networks • When in public, stay private
  • 29. Use Anti-Phishing and Anti-Spam Technology • Most e-mail providers and programs, like Windows Live Hotmail ® and Microsoft Outlook ® , filter most spam • Phishing Filter in Internet Explorer ® 7 helps to block and warn about suspicious sites
  • 30. Get a copy of your credit report and ensure your account is marked “fraud alert” and “victim’s statement” If Your Identity is Stolen • Report it • Follow up in writing • Change all passwords • Place fraud alert on credit reports
  • 31. How Does Microsoft Help Improve Security and Safety? By developing software products and tools that increase security and safety, helping people minimize their risk online and make informed choices. By partnering with non-governmental organizations, other technology companies, and governments worldwide to help keep people safe online. By providing useful guidance that helps people understand online risks and what actions they can take. Partnership Technology Guidance

Notas do Editor

  1. The Internet is a global network that connects most of the world’s personal computers. Worldwide, every day, more than a billion people visit the Internet to work, shop, search for information and entertainment, and communicate with friends and colleagues. Online it doesn’t matter where you are located, because the Internet puts a universe of information, images, and ideas at your fingertips. You can explore world-class museums, earn a college degree, manage your personal finances, and plan vacations. You can play games, download music and movies, purchase products and services, and make new friends. The Internet has changed the way we shop and introduced new ways of socializing. It makes long-distance communication affordable and research efficient. How we learn, follow the news, share experiences, and entertain ourselves increasingly depends on being connected to the Internet through our personal computers, cell phones, and other devices. And, best of all, you can do all of this from the safety and security of your own home, right? Well, that’s the problem. These benefits don’t come without risks. The online world, just like the physical world, has its share of nuisances, dangers, and untrustworthy people. We value the Internet because it provides a powerful new framework for connection, commerce, and communication, but it also brings the outside world directly into our homes. This transformation requires us to change the way we think about online security and safety. Typically, when we leave the safety of our homes and venture into the outside world, we instinctively raise our guard and become more alert to possible dangers. Once we’re back home, we lower our guard and relax. Those actions are so ingrained that we do them without thinking—but staying safe and secure online requires us to keep our guard up even when inside our homes or other places where we usually feel safe. Because the Internet transforms your computer into a doorway through which the world can enter your home, staying safe online means using the tools that can help you to control who and what comes in, and exercising your own good judgment about the people you choose to trust. Whenever you log on to the Internet, you can expose yourself to security threats and online safety risks. Those risks can be dangerous to your family, your privacy, your credit, and your computer. That’s why it is important to understand how to protect yourself when you go online.
  2. Typically, when we leave the safety of our homes and venture into the outside world, we instinctively raise our guard and become more alert to possible dangers. Once we’re back at home, we lower our guard and relax. Staying safer and more secure online means keeping your guard up whenever you’re online, just as you do in the world outside your home. Online security refers to technology and tools we can use to help protect against online threats, to help control our personal information online, and to help manage our family’s use of the Internet. What are some of the risks you need to protect against?
  3. The primary risks associated with the Internet use include viruses and other malicious software that can cripple or control your computer, compromise your privacy, and destroy valuable data. Additionally, there are people who may use the Internet to try and invade your privacy, harass you, or inappropriately contact your children. Microsoft provides you with educational content and guidance to help you protect your computer, your family, and your personal information from online security and safety risks. Leading threats to your computer’s security include: Viruses Worms Trojans Spyware Leading threats to children include: Cyberbullies File-sharing abuses Invasion of privacy Disturbing content Predators Leading threats to your personal safety include: Online fraud and phishing Hoaxes Identity theft Spam
  4. The primary online threat to your computer is malicious software such as viruses, worms, Trojans, and potentially unwanted software like spyware. Viruses Computer viruses are programs that are deliberately designed to invade your computer, to interfere with its operation, and to copy, corrupt, or delete your data. These programs are called viruses because they are designed to spread to other computers, but in most cases, they require human actions—like clicking on an e-mail attachment—to spread. Computer viruses can be hidden in what appear to be useful or entertaining programs or e-mail attachments, such as computer games, video clips, or photos. Many viruses are spread when people unwittingly send them as e-mail attachments to friends and colleagues. Worms Worms are more sophisticated viruses that automatically send themselves to other computers over a network, without any human interaction or assistance. Worms seize control of certain software programs on a computer to spread to other computers. Trojans A third type of virus, called Trojans in honor of the Trojan horse, masquerade as beneficial programs, such as a game or a spyware cleaner. Once on your computer, they can quietly destroy or steal your data. Spyware Spyware is software that tracks what you do on your computer, and either reports your actions to the software creator or to takes some action based on your activity. Spyware may bombard you with pop-up advertising related to the Web sites you visit regularly. It may collect personal information, or change the settings on your computer without your consent. Spyware can even disable your computer or enable criminals to steal your identity. Fortunately, you can take many steps to help protect your computer from malicious and potentially unwanted software.
  5. Overall, the Internet is a positive and rewarding place for kids, but the potential risks are real. By educating yourself and your family about those issues, you can team up to manage the risks and prevent problems. The Internet risks to children fall into five main categories: Cyberbullies On the Internet, as on any playground, some people play nice and some don’t. Both children and adults may use the Internet to harass or intimidate other people, which can range from name calling to physical threats. For example, kids sometimes broadcast bullying comments and embarrassing images in an instant message or blog, shaming a child in a way that’s invisible to parents or others in the community. File-sharing abuses Exchanging music, video, and other files is risky. Your kids could end up downloading inappropriate materials, computer viruses, or spyware by mistake. Some file-sharing programs even let other users access your computer any time it’s online. Exposure to disturbing content Children are curious and adventurous, and they often follow their curiosity. As they explore, they could stumble upon information or images you wouldn’t want them to see—content that is disturbing, inappropriate for children, or not in keeping with your family values. This can happen if they click an advertisement or a confusing link on a search page, or if they share files online. Child predators Child predators can use the Internet to befriend children. Their goal could be to isolate children and to persuade them to meet in person. The only information you know about people you meet online is what they tell you. Child predators use that anonymity to trick children, by pretending to be another child or someone who is trustworthy. People can also prey on teenagers’ longings for adventure or romance to build inappropriate online relationships. Invasion of privacy Some businesses use registration or contest forms to capture personal information. If children fill out forms unsupervised, they may share information about themselves or your family that you don’t want strangers to have. Or children may innocently expose personal information or photographs in blogs, on personal Web pages, or when playing games online.
  6. Many experiences that make the Internet valuable and enjoyable also require us to share information about ourselves. Sometimes a little information and sometimes a lot. It’s not always easy to tell who is asking for that information or what they intend to do with it. Sharing information can sometimes bring results you weren’t planning on and don’t want. Those unintended results may be annoying, such as unwanted e-mail. Or they could be something serious, such as an attempt to steal your identity, misuse your good credit, or take your money. Identity Theft and Online Fraud Con artists on the Internet would like nothing better than to trick you into giving them your hard-earned money, or revealing personal information that would let them steal your identity. These criminals have discovered that the Internet can help them defraud unsuspecting people, sometimes in very creative ways. Most scams aimed at online fraud and identity theft depend on you to provide personal information or send money. So by learning what to look for and what to do, you can avoid falling victim to these crimes. Phishing A particularly sneaky scam, known as phishing, begins with e-mail that appears to come from a business you trust. The forged e-mail is the “bait” and typically contains a link to a phony Web page that also looks like it is owned by the business you trust. The Web site might ask you for personal information such as your credit card number, Social Security number, or bank accounts. That’s the “hook.” If you swallow the hook, you’re sunk, because you have given an online criminal enough information to steal your identity and use it to gain access to your account, cash, or credit. Hoaxes Hoaxes are another type of scam. For example, the “Nigerian scam” is a type of advance-fee fraud that has been around for a long time. As the intended victim, you will receive e-mail from someone claiming to be a Nigerian official, business person, or the surviving spouse of a former government leader asking for help getting money out of the country. The con artists who send the e-mail will offer to transfer millions of dollars into your bank account in exchange for a small fee. If you respond to the initial offer, you may receive official looking documents or other “proofs” and typically you will be asked to provide blank letterhead, bank account numbers, and more money to cover transfer costs and attorney fees. If you continue to respond, the con artists will offer additional “evidence” to verify their claims, but emergencies will begin to come up that require more of your money and delay the transfer of the promised funds to your account. Eventually, the con artist will disappear with your money and leave you holding the bag. Another common hoax aimed at defrauding consumers is one that offers you the chance to buy tickets in an international lottery and use a “secret system” to win big. Or the e-mail may announce that you have won an international lottery—even though you never entered—and ask for your bank account number or “processing fees” so the funds can be transferred to you. Of course, there is no secret system and, in fact, many of the lotteries outlined in these e-mail scams are fake. Spam One tool that con artists and criminals use is spam—e-mail, instant messages, even electronic greeting cards—that you never asked for and don’t want. Spam can contain links to fraudulent Web sites, or advertisements for worthless products you aren’t interested in. A big part of staying safe online is paying attention, using common sense, and learning to recognize and avoid scams and online fraud.
  7. By taking four basic steps, you can help protect your computer from many malicious software attacks. Those four simple steps are: Use an Internet firewall and keep it turned on Keep your operating system up to date, preferably by using automatic update features in Windows Install and maintain antivirus software Install and maintain antispyware software, such as Windows Defender Protecting your family when they use the Internet means understanding the risks, talking openly and often with your children, providing clear guidance for healthy online behavior, and using technology where it can help to reduce your family’s exposure to online risks. There are four basic steps you to help protect your family online: Talk with your kids about what they do online. Set clear rules for Internet use. Keep personal information private. Use family safety software. Protecting your personal information on the Internet means following safe Internet practices, managing or eliminating the nuisances, and guarding against more serious concerns such as identity theft. To do this you need to: Be smart online, by practicing Internet behavior that helps to reduce your risk. Manage your personal information carefully. Use technology to reduce nuisances and raise the alarm when appropriate. Let’s take a closer look at the four steps to help protect your computer.
  8. Four Steps to Help Protect Your Computer The good news about viruses, worms, spyware, and other malicious and potentially unwanted software is that with an ounce of prevention and a little knowledge, you can reduce your risk of falling victim to them and diminish their potential impact. By taking four basic steps, you can help secure your computer from many malicious software attacks. Those steps are: Use an Internet firewall and keep it turned on Keep your operating system up to date, preferably by using automatic update features in Windows Install and maintain antivirus software Install and maintain antispyware software, such as Windows Defender Let’s take a closer look at each of these four steps.
  9. Use a Firewall You wouldn’t leave your house unlocked with all your valuables inside, so why take that chance with your computer? A firewall creates a barrier between your computer and the Internet, a kind of security checkpoint that information and software must pass through before it can enter or leave your computer. The firewall is your first line of defense in protecting your computer, because it helps to obscure your computer to online attackers and many types of malicious software. A firewall can also help to prevent the software on your computer from accepting updates or modifications from the Internet without your permission. There are three kinds of firewalls you can use: software firewall, hardware firewalls, and wireless routers. The simplest way to use an Internet firewall is to turn the software firewall built into Windows Vista or Windows XP SP2. In Windows Vista, the firewall is turned on by default.
  10. Keep Your Operating System and Software Updated One of the most important things you can do to help protect your computer is also one of the easiest. Just keep your system up to date with the latest software. Online criminals are constantly at work devising new ways to attack your computer and invade your privacy. Fortunately, software companies work even harder to counter those threats and to provide you with updated tools that you can use to protect your computer. You should regularly update your computer operating system with security updates provided by the manufacturer. The same goes for your Web browser and other important applications, including your antivirus and antispyware programs. Check the Web sites of software companies for information about updating the programs on your computer. If you use a Windows operating system from Microsoft, you can help protect your computer automatically by using the automatic updating feature available as part of Windows Vista or Windows XP SP2. You can manually update your Microsoft software by going to update.microsoft.com. When you turn on automatic updating, your computer will check for, download, and install updates on the schedule you choose. The Benefits of Automatic Security Updates As with human viruses, the best treatment for computer viruses is to avoid getting them in the first place. Every time you log on to the Internet, your security risk increases. Having up-to-date security features already installed as part of your computer system helps to ensure that you have the highest level of protection available.
  11. Install and Maintain Antivirus Software Antivirus software helps to protect your computer by scanning e-mail, applications, and data that resides on your computer. Strong antivirus programs can detect and remove thousands of specific viruses before they have a chance to damage your computer. Most antivirus software uses signatures to identify malicious software, much like the police use fingerprints to identify criminals. To ensure that your antivirus software is using the most current signatures, make sure to subscribe to an antivirus update service, and regularly install all updates from the manufacturer to keep the software current. Windows Live OneCare—an always-on, all-in-one PC care service—offers antivirus protection while also helping to keep your computer tuned up and running at top speed.
  12. Install and Maintain Antispyware Software Antispyware software, such as Windows Defender from Microsoft, can detect and help you take action against any spyware or potentially unwanted software on your computer. It can also help to keep your computer running smoothly and prevent further intrusion. As with your operating system and antivirus software, it is essential that you keep your antispyware software up-to-date. Windows Defender is included with Windows Vista, and is available as a free download for computers running Windows XP SP2.
  13. Now that you have your firewall turned on, your operating system updating automatically, and your antivirus and antispyware programs installed, what else can you do to protect your computer? Here are four additional steps that can help you protect your computer and keep it more secure: Back up your files. Think before you click. Read Web site privacy statements. Close pop-ups using red X. Let’s look at these steps in more detail.
  14. Back Up Your Files First, because no security method is guaranteed to be 100% effective, it is important to regularly back up your critical files, before you encounter a virus or other problems that may damage your computer and delete some or all of your data. Many methods exist for backing up your files—from saving them to CD or DVD, to copying them to an external device, to trusting them to a Web-based backup service. Windows Live OneCare helps backup key files as part of its computer care service. To learn how to protect your data by backing up your files, visit www.microsoft.com/protect.
  15. Think Before you Click Think twice before you click on an e-mail attachment or link. And the same advice applies to clicking on banner ads or pop-up windows on the Web. Never open an e-mail attachment from someone you don't know. For that matter, be very cautious when opening an e-mail attachment from people you DO know, unless you know exactly what the attachment contains. Criminals can imitate a friend’s e-mail address, or your friend’s computer may be infected with a virus that is automatically sending e-mails. Links in e-mail can look like they lead to a legitimate business or Web site. However, criminals can create code behind these links to send you to a fake site without your knowledge. It’s best to always type a Web address into your Web browser, rather than clicking on links in e-mail.
  16. Read Privacy Statements In addition to installing and maintaining antivirus and antispyware software, only download files or programs from Web sites you trust. Make sure you understand what you are getting before you agree to download. Read privacy statements and license agreements for all Web sites you visit regularly and programs you download.
  17. Use the Red “X” to Close Pop-ups While you are surfing the Internet, if you see a pop-up window, never click any buttons in the window to close the window. Always use the red “X” in the corner of the pop-up window. Even though the pop-up window shows buttons saying “No,” or “Cancel,” criminals can program these buttons to trigger an action you don’t expect. Clicking any button, or even clicking anywhere in the pop-up window, could cause your computer to download unwanted software. The red “X,” usually found in the upper right corner of the pop-up window, is controlled by the browser program and is a safe way to close pop-up windows. With Internet Explorer 7, you can also press ALT+F4 to manually close a pop-up window.
  18. Protecting your family when they use the Internet means understanding the dangers, talking openly and often with your children, providing clear guidance for healthy online behavior, and using technology where it can help to reduce your family’s exposure to online risks. There are four basic steps you need to take to help protect your family online: Talk with your kids about what they do online. Set clear rules for Internet use. Keep personal information private. Use family safety software. Let’s take a look at each step in more detail. OPTIONAL [For children, the Internet is both a classroom and a virtual playground—perfect for exploration and learning, and also a great place to have fun. As children get older, the Internet often becomes a place where they form social networks—sending e-mail and instant messages to friends, posting and reading blogs, creating personal Web pages, sharing music and videos, and playing games. Many of these social activities can help kids develop healthy communication skills and learn to express themselves with greater self-confidence. Unfortunately, these same activities may be the source of serious issues for children, including risks to their personal safety and privacy as well as theft and computer security. While the Internet is undeniably a great resource for children, there are some places online that are not good for kids, just as there are places in every city that are unsafe or inappropriate for children. There are also certain Internet activities that may be fine for adults but not for children, and others that are OK for some children and not for others. The person best qualified to make decisions about what is right for your children is you. Being aware of the risks your children may encounter online, and what you can do to reduce or eliminate those risks, will enable you to make informed decisions about your children’s Internet use and help you to keep your family safe online.]
  19. Talk with your kids about online risks Talk frankly with your kids about Internet risks, including inappropriate content, invasion of privacy, and inappropriate communication—whether from other kids or from adults. Teach them how their own behavior can reduce those risks and help to keep them safe when they are online. That knowledge is very empowering for kids. If you want help preparing to speak with your children or learning what to educate them about, try these helpful online resources: www.staysafe.org www.getnetwise.org www.microsoft.com/protect/
  20. Pay attention to what your kids do online Keep online devices in a central location Place all Internet-connected computers and devices that your children to use in a central location, such as the living room or family room. That includes all gaming devices. When your kids are online, you should be able to easily see and hear what they’re doing. Get to know how your kids use the Internet It is important to understand what your kids do when they are online, how they use the Internet, and what they experience. Get to know what games your kids play, and play with them to really understand things. Check out their blogs from time to time, and become familiar with the chat rooms they visit. Read their profiles on social networking sites to see how they represent themselves online and to make sure they are not revealing too much personal information. Let your kids be the teacher Ask your children to show you what they’re doing and who they’re meeting on the Internet. Encouraging your children to teach you about their world is a great way to communicate with them. Teach kids to trust their instincts and report any problems. Children often know instinctively when something isn’t quite right. Teach your kids to trust their instincts and to tell you at once if they ever feel uncomfortable, threatened, or scared by anything they encounter online. Let them know they won’t lose their computer privileges or invite other punishment by talking with you about their concerns.
  21. Keep personal information private Teach children to check with you before sharing personal information online unless you give them permission. Personal information includes facts—such as your child’s real name, age, gender, phone number, address, school, sports team, and favorite places to play—and it also includes photos and feelings. Predators look for expressions of vulnerability, such as sadness, loneliness, or anger. And they know how to use seemingly disconnected information to locate people. Monitor your children’s online activities Make sure you understand who your kids are sharing information with through instant messaging, blogging sites, and other social networks. Are they friends, friends of friends, or the general public? Teach your children to report suspicious activity Encourage your children to tell you immediately if someone starts asking personal questions or wants to arrange to meet them in person. And make sure your kids know they should never respond to e-mail asking for personal information such as Social Security, credit card or bank account numbers. Help children choose appropriate screen names and e-mail addresses Help your children choose screen names and e-mail addresses that reveal nothing personal and are not suggestive—musicfan or sportsnut instead of john13 or sexysusie.
  22. Set clear rules for Internet use As soon as your children begin to explore the Internet, you need to set clear rules about when and how they can use it, just as you did when they got their first bicycle. Explain the risks and why it is important to have family rules to avoid problems and keep the Internet fun for everyone. Consider the following guidelines to help create a safer online experience for your family: Do not share files, open attachments, or click links in e-mail You teach your kids not to accept gifts from strangers in the physical world; the same rule applies online. If children open an attachment that comes with an e-mail message, click a link in an instant message or blog, or share music or video files, they could be opening a virus, or downloading malicious software or a disturbing image. Unfortunately, even messages that appear to come from friends can be dangerous. Online criminals can masquerade as someone your child knows, or their friend’s computer could be infected with a virus that is sending e-mail without their knowledge. Treat others as you want to be treated This is a basic rule of all human relationships. Give out what you want to get back. Trying to embarrass or intimidate other people with nasty comments is both rude and wrong. Besides the issue of common courtesy, however, bullying people online can be a crime if taken too far. Stand up for yourself If someone is disrespectful or tries to bully you, ignore them and use software to block them from contacting you or playing the same game. If the situation is bad, report it to the Web site administrator or other authorities. Respect other people’s property Just because content is easy to find and enjoy on the Internet doesn’t mean it is free to be copied or reposted. Remind your kids that unauthorized copying and sharing music, games, and other copyrighted downloads is piracy. Plagiarism and hacking into computers are also illegal. Never go alone to meet an Internet “friend” in person. The people your children meet online may not be who they say they are. If your child insists on a meeting, you should go along and make sure the meeting takes place in a busy public place.
  23. Use family safety software to help manage your children’s Internet use Windows Vista, Windows Live OneCare Family Safety, and Xbox 360 all provide family safety settings to help you monitor and control your children’s Internet use. Using these settings, you can decide which Web sites, programs, video games, and DVD movies your children can use and play. You can establish limits based on content, title, recommendations from independent ratings boards, or your own preferences. Family safety software also enables you to create individual, age-appropriate settings for each family member. Learn more about available tools for families No single technology solution meets the needs of every family, so explore the many different tools that can help you keep your children safe online. For a list of popular family safety tools, see http://kids.getnetwise.org/tools/
  24. How to Handle Problems Report any threat immediately If someone harasses, threatens, or bullies your kids, or if someone attempts to lure them into face-to-face meetings for illicit purposes, report them to the proper authorities immediately. If you believe your child is in immediate danger, call 911 to get your local police involved. In the US, you can report incidents to the CyberTipline, at 800-843-5678 or www.cybertipline.com, which is hosted by the National Center for Missing & Exploited Children. If you believe the perpetrator abused a Microsoft service, contact Microsoft at abuse@microsoft.com.
  25. Protecting yourself and your personal information on the Internet means managing or eliminating online nuisances, such as spam, and guarding against more serious concerns such as identity theft. To do this you need to: Practice online behavior that reduces your risk Manage your personal information carefully Use technology to minimize nuisances and raise the alarm when appropriate The following slides cover best practices to help you lower your risks online. OPTIONAL [Many experiences that make the Internet so valuable and enjoyable also require us to share information about ourselves. Sometimes a little information and sometimes a lot. It’s not always easy to tell who is asking for that information or what they intend to do with it. Sharing information can sometimes bring results you weren’t planning on and don’t want. Those unintended results may be annoying, such as unwanted spam e-mail. Or they could be very serious, such as an attempt to steal your identity, misuse your good credit, or take your money.]
  26. Practice Internet Behaviors that Help to Reduce Your Risk: Delete Spam, Don’t Open It This one action will spare you a lot of potential trouble. Besides being annoying, spam can pose real threats to your online safety and security. Spam may contain viruses or spyware, and can be used by con artists to trick you into giving them your money or personal information. Never reply to spam, not even to ask to be removed from the mailing list. The same goes for clicking on a link in the spam e-mail. This just confirms to spammers that your e-mail address reaches a real person. Also, don’t take any actions based on spam mail. Don’t buy anything or invest in anything based on e-mail, and don’t give to money to charities in response to e-mail solicitations. Instead, contact organizations directly if you are interested in the product or charity. Be on the Lookout for Online Scams Watch out for spam scams—and ignore them. Con artists on the Internet are ready to take your money or steal your identity. To fight scams, pay attention, listen to your common sense, and watch out for these signs: Alarming messages and threats of account closures. Promises of big bucks for little or no effort. Deals that sound too good to be true. Misspellings and grammatical errors. The best defense against spam and phishing scams is your own good judgment. Any time you receive an alarming message from a company, or a threat to close your account unless you verify personal information right away, be wary. Legitimate companies don’t do business this way over the Internet. If there is a real problem with one of your accounts, you won’t be asked to reveal personal information online. E-mail that promises big money for little or no effort are most likely scams. Deals that sound too good to be true probably are, just like in the physical world. Misspellings and grammatical errors in e-mail may also indicate spam that could lead to problems if you respond. Never share sensitive personal information in an e-mail or instant message. Even if the e-mail looks like it comes from a reputable company, be wary because it could be from a scammer. Call the company or go to their Web site by typing the Web address into your browser if you want to confirm a warning mail. Use Strong Passwords You may have important personal information in a variety of electronic and Internet locations, such as online bank and auction accounts, blogs, files on your computer, online shopping sites, etc. One way to help protect your information is by using strong passwords to block access to your computer and accounts. When criminals decipher passwords, they usually use a computer program that runs many character combinations at high speed. Criminals do not usually just guess at a password. Because of this, strong passwords are at least eight characters long , and they include upper and lowercase letters, numbers, and a few symbols—such as the dollar sign, pound sign, or exclamation point. Long, complex passwords are harder to break—even for high-speed computer programs—because there are so many possible combinations. Never share your passwords, even with friends, and never send passwords over e-mail.
  27. Manage Personal Information Carefully Do not share sensitive or personal information in an e-mail or instant message. That includes filling out e-mail forms, or clicking on links in an e-mail to get to a Web page where you’re asked to provide personal information. Don’t even share sensitive information with a trusted friend over e-mail or IM, because the message may be intercepted and your personal information could be retrieved by other people. Use only secure and trusted Web sites. Be careful who you do business with online. Read the privacy statement on a Web site before you share personal information, and check for signs that the Web site protects sensitive data. Look for https (“s” for secure) in the Web address and for security icons, such as a closed padlock or unbroken key. Make sure you are where you think you are. Unfortunately, the padlock or key icons can be faked. Double-click on them to look for a match between the name in the Web address and on the security certificate. If the name differs, you may be on a faked site. Avoid wireless transactions. If you have a wireless laptop computer, avoid making financial transactions over an unsecured wireless network, such as those offered by many cafes and coffee shops. A thief with a wireless connection might be able to pick up some of your information, even if he is in another room or building. When in public, stay private. Never use public computers, such as those in libraries or Internet cafes, for online purchases or banking. Stick to e-mail or general Web surfing on those computers. You don't want people looking over your shoulder-either literally or electronically. And since you can't know what software has been installed on a public computer, why take the risk?
  28. Use Anti-Phishing and Anti-Spam Technology Internet service providers, e-mail programs, and Web browsers get better all the time. They block billions of spam e-mails daily. For example, spam filters in Microsoft Outlook, Windows Live Hotmail, and Windows Live Messenger provide strong defenses against unwanted junk e-mail, instant messages, and images. Microsoft Outlook helps reduce the amount of spam in your Inbox by filtering junk mail into a special folder. You can review the mail in this folder to make sure no legitimate mail got filtered by accident, and you can add these legitimate senders to your approved sender list to make sure they don’t get filtered again. You should delete the rest of the mail in your junk mail folder without opening it. Internet Explorer 7 includes Phishing Filter technology, which blocks access to known fraudulent sites and warns you about potentially suspicious sites. You can also use Phishing Filter to report sites that you are suspicious about, so that these sites can be reviewed. OPTIONAL For example, Microsoft is using technical innovations to help prevent spam and phishing scams from ever reaching peoples’ inboxes. Safer e-mail: Microsoft is building e-mail technology that can be used in other products and services, which stops criminals from spoofing legitimate Web sites and hiding their identities. Currently, this technology helps to protect more than 200 million Windows Live Hotmail customers worldwide against online scams. Filtered e-mail: Microsoft uses technology to identify and remove vast quantities of spam before it is ever delivered. SmartScreen filtering technology blocks more than 3.2 billion spam e-mail messages per day worldwide in Hotmail alone. In addition, Microsoft provides monthly updates to the Outlook junk mail filters, to help customers better protect and manage their inboxes from spam and other e-mail-perpetrated scams.
  29. If Your Identity is Stolen On the Internet, as in life, an ounce of prevention is worth a pound of cure. But what if you do make a mistake and run into problems? To report phishing: Forward the e-mail message to your Internet service provider (ISP). File a complaint with the U.S. Federal Trade Commission (FTC). Go to onguardonline.gov, and click File a Complaint. Forward the spam to the company that is being misrepresented. It may have a special address to report such abuse—for example, abuse@microsoft.com. If you believe that you are a victim of identity theft: Speak with the security or fraud department about any fraudulently accessed or opened accounts at every bank or financial institution you deal with, including credit card companies, utilities, Internet service providers, and other places where you regularly use your credit card. Follow up with a letter and save a copy for yourself. When you open new accounts use strong passwords, not passwords such as your mother's maiden name, along with a new account number. Change the passwords on all online accounts, starting with any that are related to financial institutions or information. Place a fraud alert on your credit reports. Make sure your account is flagged with a "fraud alert" tag and a "victim's statement," and insist that the alert remain active for the maximum of seven years. In the United States, you can contact these three credit bureaus:Equifax (800) 525-6285 Experian (888) 397-3742 TransUnion (800) 680-7289 Get a copy of your report and ask that no new credit be granted without your approval. Send these requests in writing and keep copies for yourself. When you receive your reports, review them carefully. Look for things like inquiries you didn't initiate, accounts you didn't open, and unexplained debts.
  30. Microsoft works with non-governmental organizations, technology companies, and governments around the world to help you find solutions for many issues related to computer and Internet use, including keeping children safe online. Internet Service Providers: Microsoft founded an alliance of the largest ISPs from around the world to improve communications with consumers and increase their Internet safety and security. Members of this group share information to improve the way they protect customers, and coordinate to alert people to critical security and safety issues. Schools: Microsoft partners with non-profit organizations that creates school curriculum on online security and safety. This includes the development of Internet based training, in English, so any teacher can freely learn about the issues and help their students. ICMEC: Microsoft partners with the International Centre for Missing & Exploited Children and Interpol to provide law enforcement training sessions in combating computer-facilitated crimes against children. NCMEC: Microsoft has worked with the National Center for Missing & Exploited Children and their NetSmartz program to develop content intended to educate parents on safe Internet usage. GetNetWise: Microsoft is a founding partner of this industry organization offering the getnetwise.org web site full of educational information about Internet safety for parents. National Cyber Safety Alliance: Microsoft is a founding partner this government/industry organization, which offers staysafeonline.info about computing security. Staysafe.org: Microsoft created www.staysafe.org to provide a forum where non-profit organizations and child safety issue experts can contribute content that helps kids, teens, parents, and educators address online security and safety issues. Content sharing: Microsoft freely shares information and guidance with non-profit organizations, governments, and commercial partners because it is important for customers to find this information wherever they look. Partnering on Public Policy: Microsoft engages with governments and communities worldwide on Internet safety to provide technical assistance to local, state, and federal legislatures drafting bills on spam, phishing, and malicious and deceptive software. Microsoft also supports laws with penalties that are commensurate with crimes against children. American Academy of Pediatrics: Microsoft worked with the American Academy of Pediatrics in the US to provide age-based guidelines directly to parents in the Family Safety Settings service, and on http://aap.safetynet.org. Law enforcement: Microsoft is collaborating with law enforcement around the world to stop criminals who create and release malicious or potentially unwanted software that might harm computers or put personal information at risk.
  31. Microsoft, other technology companies, public agencies, and nonprofit organizations provide resources where you can learn more about how to protect yourself, your family and your computer online. The Internet is a fascinating and valuable resource. Knowing how to stay safe and secure online can help you ensure a better Internet experience for everyone in your family.
  32. For a short presentation (10-15 minutes), which highlights the issues and actions for consumers, use: slide 1 (welcome) slide 2 (introduction) slide 4 (online risks) slide 8 (steps to take) slide 31 (Microsoft effort) slide 32 (more information) slide 33 (close) For a mid-length presentation (30 minutes), which more fully covers the action steps, use: slide 1 (welcome) slide 2 (introduction) slide 4 (online risks) slide 8 (steps to take) slide 9 (protect your computer) slide 19 (protect your family) slide 26 (protect your personal information) slide 31 (Microsoft effort) slide 32 (more information) slide 33 (close) For a full presentation (1 hour), use the full slide deck to provide detailed information about each action step that consumers can take.