SlideShare une entreprise Scribd logo
1  sur  7
Adults Internet Safety
       By: Reid Collins
Firewall & Back
      Up
•   Set up a firewall on your computer. This prevents other
    computers from accessing your information without
    your permission. And keeps all your personal
    information safe.

•   A big mistake computer users make is not making sure
    to back up their computer

•   If their computer gets a virus or hacked, and it isn’t
    backed up, they could loose all of their personal
    information.

•   Purchase an external hard drive to start backing your
    information right away.
Up To Date &
       Educated
•   To avoid running into computer problems simply keep
    your software up to date.

•   When a update pops up on your computer don’t avoid
    it. Turn on Automatic Updates, if possible, to make it
    even easier to update.

•   Be educated enough to know what to open and what not
    to open. Such as in email attachments, pop-ups, or
    internet downloads.

•   Use creative passwords that others wouldn’t think of.
    Keep these passwords in a safe place to remember.
Wifi
•   Having simple wifi setups can allow your information to
    be monitored by outside sources. Make sure to set your
    wifi with WPA security.

•   Require a password to use your internet. Will encrypt
    your data so it can’t be monitored.

•   While using internet over wifi hotspots, make sure sites
    you visit use a https connection. Be careful of sending
    and receiving emails over hotspots as well.
Viruses /
              Spyware
•   Make sure to use a credible anti-virus tool to prevent
    viruses. Even with a secure firewall and up to date
    system, viruses can still occur.

•   Make sure the anti-virus tool is always up to date, and
    that it is looking over your hard drive daily to check for
    a virus.

•   Spyware is like a virus. It “spies” on the user and
    captures sometimes sensitive information.

•   Download the latest anti-spyware updates, like anti-
    virus, to make sure your computer is always staying
    safe.
Internet Settings
•   While using the internet it would be smart to turn your
    pop-up blocker on. This will prevent you from being
    tempted to click on pop-ups that could lead to viruses.

•   Make sure, in your security settings, your have the
    right things checked. It is important to make sure your
    computer warns you before you enter a fraudulent
    website.

•   When you are warned you should usually never
    continue onto the site, since it could lead to a virus on
    your computer.
Internet Settings
•   While using the internet it would be smart to turn your
    pop-up blocker on. This will prevent you from being
    tempted to click on pop-ups that could lead to viruses.

•   Make sure, in your security settings, your have the
    right things checked. It is important to make sure your
    computer warns you before you enter a fraudulent
    website.

•   When you are warned you should usually never
    continue onto the site, since it could lead to a virus on
    your computer.

Contenu connexe

Tendances

Module5 desktop-laptop-security-b
Module5 desktop-laptop-security-bModule5 desktop-laptop-security-b
Module5 desktop-laptop-security-b
BbAOC
 
Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)
Satyendra Arora
 
Network basic security
Network basic  securityNetwork basic  security
Network basic security
Mohamed Radji
 
Noorhidayu Yussof (Presentation 3)
Noorhidayu Yussof (Presentation 3)Noorhidayu Yussof (Presentation 3)
Noorhidayu Yussof (Presentation 3)
Noorhidayu Yussof
 
Renfrow Internet Safety
Renfrow Internet SafetyRenfrow Internet Safety
Renfrow Internet Safety
mrenfrow
 

Tendances (20)

Module5 desktop-laptop-security-b
Module5 desktop-laptop-security-bModule5 desktop-laptop-security-b
Module5 desktop-laptop-security-b
 
Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)
 
Spoofing v2
Spoofing v2Spoofing v2
Spoofing v2
 
7 Signs that Tell your Computer has been Hacked
7 Signs that Tell your Computer has been Hacked7 Signs that Tell your Computer has been Hacked
7 Signs that Tell your Computer has been Hacked
 
Network basic security
Network basic  securityNetwork basic  security
Network basic security
 
Noorhidayu Yussof (Presentation 3)
Noorhidayu Yussof (Presentation 3)Noorhidayu Yussof (Presentation 3)
Noorhidayu Yussof (Presentation 3)
 
Cyber Espionage: Are You Being Hunted?
Cyber Espionage: Are You Being Hunted?Cyber Espionage: Are You Being Hunted?
Cyber Espionage: Are You Being Hunted?
 
Hacking
HackingHacking
Hacking
 
SANS OUCH Newsletter April 2016
SANS OUCH Newsletter April 2016SANS OUCH Newsletter April 2016
SANS OUCH Newsletter April 2016
 
Renfrow Internet Safety
Renfrow Internet SafetyRenfrow Internet Safety
Renfrow Internet Safety
 
T3 conference talk nov 2014
T3 conference talk nov 2014T3 conference talk nov 2014
T3 conference talk nov 2014
 
Hacker Tricks: How You Can Protect Yourself
Hacker Tricks: How You Can Protect YourselfHacker Tricks: How You Can Protect Yourself
Hacker Tricks: How You Can Protect Yourself
 
Pc security and_safety
Pc security and_safetyPc security and_safety
Pc security and_safety
 
eSecurity! Keeping your Business and Customers Safe
eSecurity! Keeping your Business and Customers SafeeSecurity! Keeping your Business and Customers Safe
eSecurity! Keeping your Business and Customers Safe
 
Signs of a zombie computer!
Signs of a zombie computer!Signs of a zombie computer!
Signs of a zombie computer!
 
10 Cyber Safety Tips Every Internet User Must Follow
10 Cyber Safety Tips Every Internet User Must Follow10 Cyber Safety Tips Every Internet User Must Follow
10 Cyber Safety Tips Every Internet User Must Follow
 
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
Extreme Hacking: Encrypted Networks SWAT style - Wayne BurkeExtreme Hacking: Encrypted Networks SWAT style - Wayne Burke
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
 
Swisscom: Smart Homes & Security Risks
Swisscom: Smart Homes & Security RisksSwisscom: Smart Homes & Security Risks
Swisscom: Smart Homes & Security Risks
 
30 Killer Internet Security Tips
30 Killer Internet Security Tips30 Killer Internet Security Tips
30 Killer Internet Security Tips
 
Virus Precautions
Virus PrecautionsVirus Precautions
Virus Precautions
 

En vedette (13)

Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Online Safety
Online SafetyOnline Safety
Online Safety
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08
 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school students
 
Online Shopping Presentation
Online Shopping PresentationOnline Shopping Presentation
Online Shopping Presentation
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Ppt on internet
Ppt on internetPpt on internet
Ppt on internet
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
The Internet Presentation
The Internet Presentation The Internet Presentation
The Internet Presentation
 

Similaire à Adult Internet Safety

The most dangerous places on the web
The most dangerous places on the webThe most dangerous places on the web
The most dangerous places on the web
Joel May
 
Online reputation
Online reputationOnline reputation
Online reputation
esl2m
 

Similaire à Adult Internet Safety (20)

The most dangerous places on the web
The most dangerous places on the webThe most dangerous places on the web
The most dangerous places on the web
 
Secure End User
Secure End UserSecure End User
Secure End User
 
Basic Computer Security for Doctors
Basic Computer Security for DoctorsBasic Computer Security for Doctors
Basic Computer Security for Doctors
 
Internet security
Internet securityInternet security
Internet security
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Computer security
Computer securityComputer security
Computer security
 
Internet
InternetInternet
Internet
 
Safe_IT
Safe_ITSafe_IT
Safe_IT
 
Cyber pledge infoMagnum
Cyber pledge infoMagnumCyber pledge infoMagnum
Cyber pledge infoMagnum
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
online and offline computer security
online and offline computer securityonline and offline computer security
online and offline computer security
 
Digital Security and Hygiene.pptx
Digital Security and Hygiene.pptxDigital Security and Hygiene.pptx
Digital Security and Hygiene.pptx
 
Spyware
SpywareSpyware
Spyware
 
spyware
spyware spyware
spyware
 
IS100 Week 11
IS100 Week 11IS100 Week 11
IS100 Week 11
 
anti_virus
anti_virusanti_virus
anti_virus
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
It security,malware,phishing,information theft
It security,malware,phishing,information theftIt security,malware,phishing,information theft
It security,malware,phishing,information theft
 
Online reputation
Online reputationOnline reputation
Online reputation
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Adult Internet Safety

  • 1. Adults Internet Safety By: Reid Collins
  • 2. Firewall & Back Up • Set up a firewall on your computer. This prevents other computers from accessing your information without your permission. And keeps all your personal information safe. • A big mistake computer users make is not making sure to back up their computer • If their computer gets a virus or hacked, and it isn’t backed up, they could loose all of their personal information. • Purchase an external hard drive to start backing your information right away.
  • 3. Up To Date & Educated • To avoid running into computer problems simply keep your software up to date. • When a update pops up on your computer don’t avoid it. Turn on Automatic Updates, if possible, to make it even easier to update. • Be educated enough to know what to open and what not to open. Such as in email attachments, pop-ups, or internet downloads. • Use creative passwords that others wouldn’t think of. Keep these passwords in a safe place to remember.
  • 4. Wifi • Having simple wifi setups can allow your information to be monitored by outside sources. Make sure to set your wifi with WPA security. • Require a password to use your internet. Will encrypt your data so it can’t be monitored. • While using internet over wifi hotspots, make sure sites you visit use a https connection. Be careful of sending and receiving emails over hotspots as well.
  • 5. Viruses / Spyware • Make sure to use a credible anti-virus tool to prevent viruses. Even with a secure firewall and up to date system, viruses can still occur. • Make sure the anti-virus tool is always up to date, and that it is looking over your hard drive daily to check for a virus. • Spyware is like a virus. It “spies” on the user and captures sometimes sensitive information. • Download the latest anti-spyware updates, like anti- virus, to make sure your computer is always staying safe.
  • 6. Internet Settings • While using the internet it would be smart to turn your pop-up blocker on. This will prevent you from being tempted to click on pop-ups that could lead to viruses. • Make sure, in your security settings, your have the right things checked. It is important to make sure your computer warns you before you enter a fraudulent website. • When you are warned you should usually never continue onto the site, since it could lead to a virus on your computer.
  • 7. Internet Settings • While using the internet it would be smart to turn your pop-up blocker on. This will prevent you from being tempted to click on pop-ups that could lead to viruses. • Make sure, in your security settings, your have the right things checked. It is important to make sure your computer warns you before you enter a fraudulent website. • When you are warned you should usually never continue onto the site, since it could lead to a virus on your computer.