More than Just Lines on a Map: Best Practices for U.S Bike Routes
Verizon Internet Literacy Project
1.
2.
3. A website that is considered secure uses
some type of encryption when transferring
data across the Internet. Encryption
ensures that no one is able to sniff the
information and take all of the data a
person is submitting on the site, but
sometimes some sites still have some type of
vulnerability.
4. When logging into a server or buying
online items, look out for the “padlock”
sign which will be on the bottom right of
the website page (refer to image
below!)
5. Pop-up ads are small windows that open
automatically on your screen. They often
(but not always) display advertising,
which can be from legitimate businesses,
but also might be scams or dangerous
software. To filter these out, install a pop-
up blocker.
6.
7. Security software is the preliminary step
to keeping yourself and your computer
safe. In order to do that, purchasing or
downloading safe security software
should be the first step in protecting
yourself. There are many dangers on
the internet that can harm your
computer and that may violate your
level of privacy.
9. › Definition- intrusive Adware that should
be avoided for privacy/security reasons:
http://www.webopedia.com/DidYouKnow/Int
ernet/2004/spyware.asp
› Definition, more info:
http://www.microsoft.com/security/pc-
security/spyware-whatis.aspx
› How to prevent with antispyware
software:
http://www.microsoft.com/security/pc-
security/products-faq.aspx
10. Computer viruses (also known as “malware”) that can
often come with things you download will harm your
computer. They are small software programs designed to
spread from one computer to the next and interfere with
how your computer works. They can be disguised as
attachments in email messages, instant messages, or
hidden in software that you might download.
To help avoid computer viruses, you must keep up with the
latest updates and antivirus software. Scan your computer
regularly with your antivirus software and beware of the
signs of an infected computer.
Click this link for more information:
http://www.microsoft.com/security/pc-
security/antivirus.aspx
13. Often times, the antivirus you purchase
will include protection for an array of
things. The software also can include
protections such as a firewall, adware,
antispyware, and phishing filter,
depending on the package you
purchase
14. Firewall: Helps make your computer invisible to online attackers and
blocks some malicious software. It can also help prevent software on
your computer from accessing the Internet to updates and
modification without your permission.
Adware: disables ads from popping up on your computer
Anti-Spyware: prevents applications from keeping tack of your
surfing habits in order to serve ads related to you.
Phishing Filter: helps detect phishing websites
Firewall
› Definition: http://www.microsoft.com/security/pc-security/firewalls-
whatis.aspx
› Definition, why it’s important: http://www.microsoft.com/security/pc-
security/products-faq.aspx
Defragmenting: To keep your computer running smoothly and at a
good speed, remember to defragment it regularly. On PCs, there is
an option to do so, just search it and you will be able to find it.
http://www.wisegeek.com/what-is-defragmenting-a-computer.html
15.
16. It is possible for someone to steal your personal
information or identity if you share this
information on an unsecured site. One way
you can protect yourself is by not entering
personal data in any website that is not secure.
Information that should be carefully guarded
includes your name, phone number, Social
Security number, address, birthday, account
numbers, credit card numbers, etc.
http://www.surfnetparents.com/talking_to_you
r_children_about_unsecure_web_sites-
18879.html
17. Cookies are small files that websites put
on your computer hard disk drive after
your first visit, and may continue to save
your data. While it is possible to misuse a
cookie in cases where there is personal
data in it, cookies by themselves are not
malicious.
http://www.microsoft.com/security/reso
urces/cookie-whatis.aspx
18. Creating strong, complex passwords you
can remember is important for
protecting your identity online.
http://www.microsoft.com/security/onlin
e-privacy/passwords-create.aspx
19. 1) Use caution when you click links in messages you receive; treat them like you would an email.
2) Be aware of what you post about yourself. Never offer personal information.
3) Don’t trust that a message is really who you think it’s from, as it may be fraudulent.
4) To avoid giving away email addresses of your friends, do not allow social networking services to scan your
email address book.
5) Be selective about who you accept as a friend on a social network. Identity thieves might create fake profiles
in order to get information from you.
6) Choose your social network carefully. Evaluate the site that you plan to use and make sure you understand
the privacy policy.
7) Assume that everything you put on a social networking site is permanent. Even if you can delete your
account, anyone on the Internet can easily print photos or text or save images and videos to a computer.
8) Be careful about installing third-party applications that let you do more with your personal page. Criminals
sometimes use these applications to steal your personal information.
9) Be carefully with using social networks at work, as unwanted software can spread through social networks and
into workplace networks. These outbreaks can damage computer systems and might even steal sensitive information
from your company.
21. Phishing email messages and websites
are designed to trick you into revealing
personal or financial information through
emails or websites.
*Remember to only open emails you trust
and are expecting.
Here are some examples you should be
aware of in an email!!
22.
23. We’d love to hear from you!
Please return to the Projects page to share
your thoughts on this presentation in the
comments box.
Thank you!