SlideShare une entreprise Scribd logo
1  sur  22
Protecting yourself on the
         Internet

Take charge of your computer
Objectives

• Learn the terms involved in Internet safety
• Discuss the types of security & how to be
  protected online
• Discover how to tell if your computer is
  infected, and then what to do
• Discuss safe online browsing, social
  networking and email
Terminology
•   Spam: Unsolicited mail
•   Virus: Self replicating software
•   Malware: Malicious software
•   Spyware: Collects your personal info
•   Phishing: Looks like the real website
•   Pharming: Sends you to a bad site

                      Go to next screen for more…
Terminology (continued)
• Browser hijacking: Replaces your homepage
• Hoax: Email with erroneous information
• Mousetrapping: Keeps you locked into a
  window
• Trojan horse: Software that appears to be OK
Good security for your computer
• Anti-virus software is KEY
  • Scans files & computer for patterns which may
    signal infection
  • Can be set up for automatic , daily scanning
  • Should run a manual scan if you think you have
    a virus
  • May clean automatically, may quarantine
  • To install new one, must uninstall old one
  • Good free one: Microsoft Security Essentials
                                             More…
Good security for your computer
• Anti Malware and Spyware (Often can be taken care of with same
   program. Check the program)
• Firewall: (blocks connections between your computers and other
   computers.. Keep it turned on)
• If infected, run a one time virus scanner like Microsoft
  Security Scanner
• Keep important software up to date including: Operating
  system, Adobe flash, Adobe reader, Java, Apple, Microsoft
  Office, etc.
• Install Web of Trust on browsers
Important security for your
     computer: Passwords!
                                            No:
                                            • Personal
                                              information on
                                              password
                                            • Predictable patterns
                                              (123,789)
                                            Yes:
                                            • If you write them
                                              down, keep in a safe
                                              place
                                            • Try a password
                                              generator


http://www.ghacks.net/2012/04/07/how-secure-is-your-password/
How do I get a virus?
• Download an infected file (or open email
  attachment)
  •   .exe: most dangerous, program file
  •   .zip: compressed file, can contain a virus
  •   .scr: free screen saver, can contain virus
  •   .doc: a Microsoft word file, can be infected
  •   Can have other extensions so CAREFUL!
  •   Can be spread with a thumb drive
• Visit bad website
• Clicking on a bad link
Signs my computer may have a
            virus
Note: Only guidelines: Other things may
cause these computer behaviors
• Computer running slowly
• Unexpected messages or programs that start
  automatically
• Modem or hard drive seem to be working
  all the time
Signs that my computer may
          have Spyware
• New toolbars, links or favorites on your
  web browser
• Home page, mouse pointer or search
  program changes
• You type an address into the web browser
  but end up at an unrelated site
• Pop-up ads, even without the Internet
• Computer may be running slowly
What to do if you think you are
            infected
• Download and run a one time scanner such as
  Microsoft Safety Scanner
  http://www.microsoft.com/security/scanner/en-
  us/default.aspx
• Or use other online virus scanners such as:
  Symantec Security Check, McAfee
  FreeScan, Kaspersky lab, & Bitdefender. (They
  might not cure your computer, but at least can tell
  you if you are infected.)
Email security
• Don’t forward hoax emails…(try
  snopes.com or factcheck.org)
• Don’t open attachments unless you are
  certain of their source (just reading email is
  OK)
• Don’t be too sure even if they are from a
  friend!
• Don’t click on links in the body of the email
               Continue for Email Red Flags…
Email Red Flags
• Images blocked: Don’t open unless you are
  sure!
• Urgent letters needing your personal
  information or money
• Statements from your bank to click here
• A claim that seems far fetched
• Anything from an online pharmacy, Western
  Union and PayPal. Go directly to the site
  instead.
• A note from a friend that seem strange
Safe social networking…DO
•   Caution when clicking on links
•   Limit personal information on sites
•   Create multiple aliases for some
•   Don’t believe it is really from Uncle Joe
•   Type network address directly
•   Be careful of your “friends”
•   Understand Privacy terms on the site

          Next: Safe social networking…Don’t
Safe social networking…DON’T
•   Use personal information for passwords
•   Install programs from the social networks
•   Click on links on the page
•   Allow social network to scan your contacts
•   Respond to “flames”
•   Say anything you may regret later
Safe Online Browsing
• Set own homepage (Options, settings)
• Use InPrivate browsing for sensitive use
• Don’t use public Wi Fi for personal data
• Double check web addresses if it seems
  different…Best to type it in directly
• HTTPS always when privacy is important

               More on Safe online browsing
Safe Online Browsing (cont.)
• Install Web of Trust on all browsers
• If money is involved:
   •   HTTPS
   •   Credit card or PayPal is best
   •   Beware if money is required up front
   •   Research to make sure company is legitimate
   •   Do not respond to unsolicited emails
• Use caution even if it looks authentic (Fake
  campaigns for Windows security updates,
  Facebook apps, 9/11 scams, Anti-Virus)
• Download only from reputable sources!
FACTS AND FIGURES
Internet Scams with the most
                     complaints:




http://mashable.com/2012/06/17/internet-scams-infographic/internet-scam-hotspots-972/
Other Internet Scams




http://mashable.com/2012/06/17/internet-scams-infographic/
Newest scams from BBB (click
    on link to read article)
• Scammers Taunt Twitter Users With Fake Facebook
  Video
• Fake Attorney Website Sparks FBI Investigation
• Email with "Visual Voicemail" Have Scam Attached
• Company Claims to Be Local, Scam Alert Issued
• Free Turns to Fee
• Media alert - Fire Victim Warning

Check the BBB site for updates:
http://www.bbb.org/us/scams
DON’T FALL FOR A
 SCAM: BE SAFE
    ONLINE!

Contenu connexe

Tendances

Negative side of Social meadia
Negative side of Social meadia Negative side of Social meadia
Negative side of Social meadia Sarath Mathew
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Antivirus And Malware Protection
Antivirus And Malware ProtectionAntivirus And Malware Protection
Antivirus And Malware Protectionreasonsecurity
 
Phishing awareness
Phishing awarenessPhishing awareness
Phishing awarenessPhishingBox
 
Information security awareness training
Information security awareness trainingInformation security awareness training
Information security awareness trainingSandeep Taileng
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeAtlantic Training, LLC.
 
Information Security Awareness for everyone
Information Security Awareness for everyoneInformation Security Awareness for everyone
Information Security Awareness for everyoneYasir Nafees
 
Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing ThreatNick Miller
 
MK Keamanan Komputer - Sesi 5 : Keamanan Internet
MK Keamanan Komputer - Sesi 5 : Keamanan Internet MK Keamanan Komputer - Sesi 5 : Keamanan Internet
MK Keamanan Komputer - Sesi 5 : Keamanan Internet Bambang
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 
Ransomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDFRansomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDFAndy Thompson
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet SecurityGerard Lamusse
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101mateenzero
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGudipudiDayanandam
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness TrainingDave Monahan
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee TrainingPaige Rasid
 
Lesson 1 digital identity & footprint
Lesson 1   digital identity & footprintLesson 1   digital identity & footprint
Lesson 1 digital identity & footprintTSageer
 
[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet CrimeGerman Teran
 

Tendances (20)

Negative side of Social meadia
Negative side of Social meadia Negative side of Social meadia
Negative side of Social meadia
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Antivirus And Malware Protection
Antivirus And Malware ProtectionAntivirus And Malware Protection
Antivirus And Malware Protection
 
Phishing awareness
Phishing awarenessPhishing awareness
Phishing awareness
 
Information security awareness training
Information security awareness trainingInformation security awareness training
Information security awareness training
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
Information Security Awareness for everyone
Information Security Awareness for everyoneInformation Security Awareness for everyone
Information Security Awareness for everyone
 
Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing Threat
 
MK Keamanan Komputer - Sesi 5 : Keamanan Internet
MK Keamanan Komputer - Sesi 5 : Keamanan Internet MK Keamanan Komputer - Sesi 5 : Keamanan Internet
MK Keamanan Komputer - Sesi 5 : Keamanan Internet
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Ransomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDFRansomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDF
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
 
Penetration Testing Guide
Penetration Testing GuidePenetration Testing Guide
Penetration Testing Guide
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
Lesson 1 digital identity & footprint
Lesson 1   digital identity & footprintLesson 1   digital identity & footprint
Lesson 1 digital identity & footprint
 
[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime
 
Spyware
SpywareSpyware
Spyware
 

Similaire à Protect yourself online with Internet safety tips

Online Self Defense
Online Self DefenseOnline Self Defense
Online Self DefenseBarry Caplin
 
Computer / Internet Security
Computer / Internet SecurityComputer / Internet Security
Computer / Internet SecurityDavid Cirella
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital AgeMarian Merritt
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayanehaz
 
The most dangerous places on the web
The most dangerous places on the webThe most dangerous places on the web
The most dangerous places on the webJoel May
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptxCharithraaAR
 
Viruses & security threats
Viruses & security threatsViruses & security threats
Viruses & security threatswardjo
 
Online reputation
Online reputationOnline reputation
Online reputationesl2m
 
Internet Security
Internet SecurityInternet Security
Internet Securitymjelson
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security PracticeBrian Pichman
 
Overview of information security
Overview of information securityOverview of information security
Overview of information securityAskao Ahmed Saad
 
Cyber security
Cyber security Cyber security
Cyber security ZwebaButt
 
Cybersecurity-Keeping-Your-Computers-Devices-Safe.pptx
Cybersecurity-Keeping-Your-Computers-Devices-Safe.pptxCybersecurity-Keeping-Your-Computers-Devices-Safe.pptx
Cybersecurity-Keeping-Your-Computers-Devices-Safe.pptxPrinceYdvz
 
Securtiy Issues 17.05.2020.pptx
Securtiy Issues 17.05.2020.pptxSecurtiy Issues 17.05.2020.pptx
Securtiy Issues 17.05.2020.pptxvatsalrbhatt13
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcareNicholas Davis
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupBrian Pichman
 

Similaire à Protect yourself online with Internet safety tips (20)

Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
 
Computer / Internet Security WHPL
Computer / Internet Security WHPLComputer / Internet Security WHPL
Computer / Internet Security WHPL
 
Computer / Internet Security
Computer / Internet SecurityComputer / Internet Security
Computer / Internet Security
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
The most dangerous places on the web
The most dangerous places on the webThe most dangerous places on the web
The most dangerous places on the web
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Viruses & security threats
Viruses & security threatsViruses & security threats
Viruses & security threats
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
 
Overview of information security
Overview of information securityOverview of information security
Overview of information security
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cybersecurity-Keeping-Your-Computers-Devices-Safe.pptx
Cybersecurity-Keeping-Your-Computers-Devices-Safe.pptxCybersecurity-Keeping-Your-Computers-Devices-Safe.pptx
Cybersecurity-Keeping-Your-Computers-Devices-Safe.pptx
 
Securtiy Issues 17.05.2020.pptx
Securtiy Issues 17.05.2020.pptxSecurtiy Issues 17.05.2020.pptx
Securtiy Issues 17.05.2020.pptx
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcare
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library Setup
 

Plus de San Diego Continuing Education

Plus de San Diego Continuing Education (20)

Presentation net neutrality updated December 2017
Presentation net neutrality updated December 2017Presentation net neutrality updated December 2017
Presentation net neutrality updated December 2017
 
No one cares about your damn emails
No one cares about your damn emailsNo one cares about your damn emails
No one cares about your damn emails
 
What happened on October 21
What happened on October 21What happened on October 21
What happened on October 21
 
An introduction to diabetes
An introduction to diabetesAn introduction to diabetes
An introduction to diabetes
 
An end to net neutrality
An end to net neutralityAn end to net neutrality
An end to net neutrality
 
Burning fat
Burning fatBurning fat
Burning fat
 
Security gap in Internet Explorer
Security gap in Internet ExplorerSecurity gap in Internet Explorer
Security gap in Internet Explorer
 
Osteoarthritis
OsteoarthritisOsteoarthritis
Osteoarthritis
 
Healthy communication presentation
Healthy communication presentationHealthy communication presentation
Healthy communication presentation
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
Review of brain plasticity
Review of brain plasticityReview of brain plasticity
Review of brain plasticity
 
Depression
DepressionDepression
Depression
 
5 technologies that have changed our lives
5 technologies that have changed our lives5 technologies that have changed our lives
5 technologies that have changed our lives
 
Communications presentation
Communications presentationCommunications presentation
Communications presentation
 
Depression & anxiety
Depression & anxietyDepression & anxiety
Depression & anxiety
 
Finding reliable health information online
Finding reliable health information onlineFinding reliable health information online
Finding reliable health information online
 
Windows 7: The Basics
Windows 7:  The BasicsWindows 7:  The Basics
Windows 7: The Basics
 
Week 4 internet overview
Week 4 internet overviewWeek 4 internet overview
Week 4 internet overview
 
Finding a purpose
Finding a purposeFinding a purpose
Finding a purpose
 
Social networks
Social networks Social networks
Social networks
 

Dernier

INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 

Dernier (20)

INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 

Protect yourself online with Internet safety tips

  • 1. Protecting yourself on the Internet Take charge of your computer
  • 2. Objectives • Learn the terms involved in Internet safety • Discuss the types of security & how to be protected online • Discover how to tell if your computer is infected, and then what to do • Discuss safe online browsing, social networking and email
  • 3. Terminology • Spam: Unsolicited mail • Virus: Self replicating software • Malware: Malicious software • Spyware: Collects your personal info • Phishing: Looks like the real website • Pharming: Sends you to a bad site Go to next screen for more…
  • 4. Terminology (continued) • Browser hijacking: Replaces your homepage • Hoax: Email with erroneous information • Mousetrapping: Keeps you locked into a window • Trojan horse: Software that appears to be OK
  • 5. Good security for your computer • Anti-virus software is KEY • Scans files & computer for patterns which may signal infection • Can be set up for automatic , daily scanning • Should run a manual scan if you think you have a virus • May clean automatically, may quarantine • To install new one, must uninstall old one • Good free one: Microsoft Security Essentials More…
  • 6. Good security for your computer • Anti Malware and Spyware (Often can be taken care of with same program. Check the program) • Firewall: (blocks connections between your computers and other computers.. Keep it turned on) • If infected, run a one time virus scanner like Microsoft Security Scanner • Keep important software up to date including: Operating system, Adobe flash, Adobe reader, Java, Apple, Microsoft Office, etc. • Install Web of Trust on browsers
  • 7. Important security for your computer: Passwords! No: • Personal information on password • Predictable patterns (123,789) Yes: • If you write them down, keep in a safe place • Try a password generator http://www.ghacks.net/2012/04/07/how-secure-is-your-password/
  • 8. How do I get a virus? • Download an infected file (or open email attachment) • .exe: most dangerous, program file • .zip: compressed file, can contain a virus • .scr: free screen saver, can contain virus • .doc: a Microsoft word file, can be infected • Can have other extensions so CAREFUL! • Can be spread with a thumb drive • Visit bad website • Clicking on a bad link
  • 9. Signs my computer may have a virus Note: Only guidelines: Other things may cause these computer behaviors • Computer running slowly • Unexpected messages or programs that start automatically • Modem or hard drive seem to be working all the time
  • 10. Signs that my computer may have Spyware • New toolbars, links or favorites on your web browser • Home page, mouse pointer or search program changes • You type an address into the web browser but end up at an unrelated site • Pop-up ads, even without the Internet • Computer may be running slowly
  • 11. What to do if you think you are infected • Download and run a one time scanner such as Microsoft Safety Scanner http://www.microsoft.com/security/scanner/en- us/default.aspx • Or use other online virus scanners such as: Symantec Security Check, McAfee FreeScan, Kaspersky lab, & Bitdefender. (They might not cure your computer, but at least can tell you if you are infected.)
  • 12. Email security • Don’t forward hoax emails…(try snopes.com or factcheck.org) • Don’t open attachments unless you are certain of their source (just reading email is OK) • Don’t be too sure even if they are from a friend! • Don’t click on links in the body of the email Continue for Email Red Flags…
  • 13. Email Red Flags • Images blocked: Don’t open unless you are sure! • Urgent letters needing your personal information or money • Statements from your bank to click here • A claim that seems far fetched • Anything from an online pharmacy, Western Union and PayPal. Go directly to the site instead. • A note from a friend that seem strange
  • 14. Safe social networking…DO • Caution when clicking on links • Limit personal information on sites • Create multiple aliases for some • Don’t believe it is really from Uncle Joe • Type network address directly • Be careful of your “friends” • Understand Privacy terms on the site Next: Safe social networking…Don’t
  • 15. Safe social networking…DON’T • Use personal information for passwords • Install programs from the social networks • Click on links on the page • Allow social network to scan your contacts • Respond to “flames” • Say anything you may regret later
  • 16. Safe Online Browsing • Set own homepage (Options, settings) • Use InPrivate browsing for sensitive use • Don’t use public Wi Fi for personal data • Double check web addresses if it seems different…Best to type it in directly • HTTPS always when privacy is important More on Safe online browsing
  • 17. Safe Online Browsing (cont.) • Install Web of Trust on all browsers • If money is involved: • HTTPS • Credit card or PayPal is best • Beware if money is required up front • Research to make sure company is legitimate • Do not respond to unsolicited emails • Use caution even if it looks authentic (Fake campaigns for Windows security updates, Facebook apps, 9/11 scams, Anti-Virus) • Download only from reputable sources!
  • 19. Internet Scams with the most complaints: http://mashable.com/2012/06/17/internet-scams-infographic/internet-scam-hotspots-972/
  • 21. Newest scams from BBB (click on link to read article) • Scammers Taunt Twitter Users With Fake Facebook Video • Fake Attorney Website Sparks FBI Investigation • Email with "Visual Voicemail" Have Scam Attached • Company Claims to Be Local, Scam Alert Issued • Free Turns to Fee • Media alert - Fire Victim Warning Check the BBB site for updates: http://www.bbb.org/us/scams
  • 22. DON’T FALL FOR A SCAM: BE SAFE ONLINE!