Presentation is loading. Please wait.

Presentation is loading. Please wait.

Understanding and Building Basic Networks Chapter 4 Protecting Yourself Online.

Similar presentations


Presentation on theme: "Understanding and Building Basic Networks Chapter 4 Protecting Yourself Online."— Presentation transcript:

1

2 Understanding and Building Basic Networks Chapter 4 Protecting Yourself Online

3 In this chapter, you will answer these questions: Who wants to get into my computer? Who's watching me? How do I keep them out? How do people get my information and why do they want it? How do I keep my information safe? Who would want to hurt me and how would they find me? How do I stay safe online?

4 Who wants to get into my computer? There are many different types of individuals who may be attacking your computer from the outside, trying to get into your system. Some of the biggest threats from the outside include hackers, viruses, and spam.

5 Who's watching me? In addition to people and software trying to intrude on your system and gain access to it, there are other types of software designed to watch you. This software, generally known as adware or spyware and including such things as cookies, surveillance, parental controls, and blocking software, have a variety of functions.

6 Cookies A cookie is a small text file that contains data. It is not a program or a virus and cannot be used to spread viruses. Cookies are not necessarily bad and can make your online life a lot easier.

7 How do I keep them out? The most common ways to keep people out of your system is by using firewalls, anti-virus software, anti-spam software, and by using safe Internet practices.

8 How do people get my information and why do they want it? There are people who attack computers to find out personal information. In many cases, they target the databases of large corporations that keep records such as social security numbers, bank account numbers, and credit card numbers on file for their customers. However, it's not unheard of for crooks to target individuals who share their information over the Internet without regard for proper security.

9 How do I keep my information safe? Even though there are people out there who will abuse the Internet, you can use it with a few precautions. There are secure ways to transfer data as well as some guidelines for sharing your information. An example of a secure Web site.

10 Who would want to hurt me and how would they find me? There are people in the world who stalk young people and try to lure them out online. You must never give personal information online to strangers. You can listen to the real life story of a young woman who befriended someone in an online chat room and what happened to her by visiting and clicking on Amy's Choice.http://www.netsmartz.org

11 Online Safety The following website can be visited after discussing online safety. –http://www.netsmartz.comhttp://www.netsmartz.com

12 How do I stay safe online? Even though there are people out there who use the Internet for these unsavory purposes, you don't have to be afraid of going online. With a few simple guidelines, you can ensure your online experience is positive.

13 What You’ve Learned About Protecting Yourself Online In this lesson, you examined ways to protect yourself while online. You examined three basic threats: –those trying to attack your computer –those trying to get your information –those who want to hurt you personally You learned how to use a combination of software, hardware, and some basic guidelines to have a safe online experience.


Download ppt "Understanding and Building Basic Networks Chapter 4 Protecting Yourself Online."

Similar presentations


Ads by Google