Apostolos Paraskevas School Advisor in Primary Education Level.

Slides:



Advertisements
Similar presentations
®® Microsoft Windows 7 for Power Users Tutorial 7 Enhancing Your Computers Security.
Advertisements

Integrating people, process and technology! Social Media Specialist Making a Difference in Business.
Safer, Speedier and Sexier Surfing with Safari. Which Web Browser?
Make-N-Take A Wiki Jenifer Marquis and Shawna Andrews.
Services Course Windows Live SkyDrive Participant Guide.
Web Filtering. ExchangeDefender Web Filtering provides policy-controlled protection from dangerous content on the web. Web Filtering is agent based, allowing.
Browser Comparisons Internet Explorer 8 & 9, Chrome 11 and Firefox 4 Security, Privacy, Add-ons & Convenience.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
EDW647 Internet For Educators Setting Up a Gmail Account Roger W. Webster, Ph.D. Department of Computer Science Millersville University (717)
Objectives Moodle is an online learning environment where instructors & their students interact. In this workshop you will learn: 1.Configure system requirements.
Chapter 9: Configuring Internet Explorer. Internet Explorer Usability Features Reorganized user interface Instant Search box RSS support Tabbed browsing.
1 of 6 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Downloading and Installing AutoCAD Architecture 2015 This is a 4 step process 1.Register with the Autodesk Student Community 2.Downloading the software.
LEARN THE QUICK AND EASY WAY! VISUAL QUICKSTART GUIDE HTML and CSS 8th Edition Chapter 21: Publishing Your Pages on the Web.
New School Websites Teacher Pages. Visit the SCUSD Website for videos tutorials: For more information.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
10 Privacy Settings Every Facebook User Should Know.
Created by Amber Craddock, Kylee Stone & Caleb Truette.
You can customize your privacy settings. The privacy page gives you control over who can view your content. At most only your friends, their friends and.
Browser Comparisons - Convenience Internet Explorer 8 & 9, Chrome 11 and Firefox 4 Searching, Convenience & Add-ons.
Google Chrome Your Customized Google Buddy April 2012 John Riley and Denise Tate-Kuhler.
Google Confidential and Proprietary Chrome 101 & Max Stacy Behmer Google Certified Teacher & Google Education Trainer
With Internet Explorer 9 Getting Started© 2013 Pearson Education, Inc. Publishing as Prentice Hall1 Exploring the World Wide Web with Internet Explorer.
Starter for 10 Unit 10: Flickr & YouTube Transform IT SFT10_Flickr_YouTube.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Microsoft Windows LEARNING HOW USE AN OPERATING SYSTEM 1.
©2006, CSA Creating and Managing Your COS Expertise Profile Managing Your CV and Promoting Your Work ® Resources for Research, Worldwide.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
EDW647: Internet for Educators Dr. Roger Webster Department of Computer Science Millersville University July 23, 2008 Create.
FACEBOOK IS THE BEST THING THAT EVER HAPPENED TO FRIENDSHIP WHY I LIKE FACEBOOK! By Mike Matthews.
Intro to Facebook workshop Dominican Sisters of Springfield, Illinois January 21 & 23, 2012.
Visiting Angels Presenter: Social Angel Facebook.com/VisitingAngelsCorporate Social Care.
Using LastPass. Great password management is impossible w/o a great tool Auto-fill (hands-free login) will save you approximately one hour per month You.
Protecting Yourself on Social Media – Friend Requests And Messages.
Activity 4 Protecting Ourselves. Keeping Safe There are lots of different ways we can be at risk on the Internet. How can we protect ourselves and keep.
Internet Safety and Productivity Tips Presented by ITS Kerri Sorenson and Sean Hernandez December 11, 8:30-9:00 am.
FACEBOOK Material adapted from
Facebook for Beginners One Session Class. What will you learn today? What can you do on Facebook? Creating a profile Privacy Connecting with friends Sending.
How to create an educational wiki. Laurie Roberts 2010.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Downloading the App 1 Go to the right store. Access the App Store on iOS devices, the Play Store on Android, and for a.
Tech Tuesday: Facebook 101 People’s Resource Center January 26, 2016.
Lindsey Velez, Director of Instructional Technology Single Sign-On One Click.
Remove [Browser Hijackers] For more information regarding [Browser Hijackers] Please Visit:
Get Secure! Facebook Privacy Tutorial Becky Benishek | November 2013.
AN INTRODUCTION TO FACEBOOK. Learning Objectives A brief introduction to the social networking site Facebook. Instructions to create an account. How to.
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
How to fix Netflix Signing In Issues? For More Details Visit Our Website
Windows Tutorial 5 Protecting Your Computer
Creating your online identity
Social Media Security: Understanding how to keep yourself safe.
Weebly Elements, Continued
About SharePoint Server 2007 My Sites
Shavonne Henry, Nikia Clarke, David Heymann, Brandon Knight
Importance of Privacy Internet Safety
Lesson #8 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer.
Collaboration with Google Docs
Online sales.
Welcome and thank you for choosing SharkGate
1. Download the Instagram app
What is Google+? Google+ is a social network and social layer for google services Some of its tools and features come from existing services and platforms,
How to Protect your Privacy on Facebook Facebook Privacy.
Windows Vista Inside Out
Business Zone - Clearing your Cache
Chapter 9: Configuring Internet Explorer
Online Safety Evening 2019.
Presentation transcript:

Apostolos Paraskevas School Advisor in Primary Education Level

A world of applications…..

Dangers from Internet…

Some practical advices…..

Practical Advices for Parents…..

REMEMBER……..

When you need help……. Speak, speak, speak.. to your Teachers and your parents… Then search…

Free call to “Support line”…..

Educational material……

Practical Advices for safer browsing….. Security settings for Internet Browsers..

These settings can be accessed through the “Internet Options” menu. Configure security settings: Under the “Security” tab, do the following: Set security zones: IE offers the option to configure different security settings for different “zones,” including the Internet, local intranet, trusted sites, and restricted sites. Set up the zones for Intranet, Trusted Sites, and Restricted sites to your desired security level. Set Internet zone security to “Medium High” or higher. This blocks certain cookie types, enables ActiveX filtering, and implements several other default settings for increased security. Disable javaScript: Click “Custom Level,” locate the “Active Scripting” setting, and select “Disable.” It is recommended that users disable JavaScript because of the high amount of vulnerabilities it contains. Automatically clear history: Select “Delete browsing history on exit” under the “General” tab. Clearing your history at the end of each session helps to limit the amount of information IE saves when you browse. Configure privacy settings: Under the “Privacy” tab, complete the following steps: Privacy setting: Set the Internet zone privacy to “Medium High” or higher. This blocks certain cookie types to prevent sites from tracking or contacting you without your consent. Location: Select “Never allow websites to request your physical location.” Pop-up Blocker: Double check that Pop-up Blocker is enabled.

Configure Advanced Security settings: Scroll down to the “Security” section under the “Advanced” tab and do the following: Ensure that all default settings are in place. If you aren’t sure, click “Restore advanced settings” before making any other changes. Select “Do not save encrypted pages to disk.” This will delete files cached from HTTPS pages when the browser is closed. Select “Empty Temporary Internet Files folder when browser is closed.” This prevents IE from storing your personal info (logins, passwords, activity, etc) beyond your browsing session. Turn off autoComplete: The AutoComplete feature should be turned off for forms and usernames/passwords. Keeping AutoComplete turned off ensures that your sensitive information isn’t being stored unnecessarily. Tracking protection: IE’s Tracking Protection feature keeps your browsing private from specified third-party websites. This feature can be accessed through IE’s “Safety” menu. In order to use Tracking Protection you will need to provide a Tracking Protection List that names all of the sites you don’t want your information being sent to. You can create a list yourself or download lists online.

These settings can be accessed through Chrome’s “Advanced Settings” menu or by navigating to “chrome://settings/.“ Enable phishing and malware protection: Make sure that Chrome’s phishing and malware protection feature is enabled under the “Privacy” section. This feature will warn you if a site you’re trying to visit may be phishing or contain malware. Turn off instant search: The Instant search feature should be turned off for optimal security. While it offers some convenience in searching, having this feature enabled means that anything you type in the address bar is instantly sent to Google. Don’t sync: Disconnect your account from your browser under the “Personal Stuff” tab. Syncing your account with your Chrome browser means that personal information such as passwords, autofill data, preferences, and more is stored on Google’s servers. If you must use sync, select the “Encrypt all synced data” option and create a unique passphrase for encryption. Configure content settings: Click “Content settings” under the “Privacy” section and do the following:

These settings can be accessed through the “Options” menu. Configure privacy settings: Under the “Privacy” tab, complete the following steps. These measures ensure that Firefox is storing only as much of your information as it needs to function normally. Select “Use custom settings for history.” Deselect “Remember my browsing and download history.” Deselect “Remember search and form history.” Deselect “Accept third-party cookies.” Set cookie storage to “Keep until I close Firefox.” Select “Clear history when Firefox closes.”

Configure security settings: Under the “Security” tab, choose the following settings. These steps prevent Firefox from saving your passwords and keep you from visiting potentially harmful sites. Verify that “Warn me when sites try to install add-ons,” “Block reported attack sites,” and “Block reported web forgeries” are all selected.Deselect “Remember passwords for sites.” Disable javaScript: Deselect “Enable JavaScript” under the “Content” tab. JavaScript is notorious for containing security vulnerabilities and it is recommended that users only enable it for trusted sites. Enable pop-up blocking: Verify that “Block pop-up windows” is selected under the “Content” tab. This feature should be turned on by default as it protects users from unwarranted advertisements and windows. Don’t sync: Avoid using Firefox Sync. By doing so you prevent Firefox from storing your logins, passwords, and other sensitive information. Turn on automatic updates: Verify that “Automatically install updates” is selected in the “Update” tab under “Advanced.” Doing so will ensure that your browser receives critical security updates. Verify that “Automatically update Search Engines” is selected as well. Use secure protocols: Verify that “Use SSL 3.0” and “Use TLS 1.0” are selected in the “Encryption” tab under “Advanced.”

6 Practical Security steps for Facebook….. account-in-six-easy-steps/

Step one: See your profile as others see it To view your account as others view it, sign into your account, choose the gear icon in the top-right corner, click Privacy Settings, and select Timeline and Tagging in the left pane. Next, click View As to the right of "Review what other people see on your timeline" in the "Who can see things on my timeline?" section. Click Okay to close the pop-up window, if necessary. Your timeline will then appear as the public sees it.

Step two: Make sure you're browsing securely Last month Facebook made secure browsing the default for all users. To ensure you're using a secure connection whenever one is available, click Security in the left pane of Facebook's Account Settings and make sure Secure Browsing is enabled. The security settings also let you enable log-in notifications and approvals, and view and edit your recognized devices and active sessions. To remove a device, click Edit to the right and then Remove next to the device's entry. Likewise, to end one or all active Facebook sessions, click Edit to the right of Active Sessions and choose End Activity or End All Activity, respectively. End some or all active Facebook sessions by clicking Edit to the right of Active Sessions in the Security Settings and select either End Activity or End All Activity.

Step three: Limit access to you and your Facebook stuff To restrict access to your past and future Facebook posts, click Privacy in the left pane of the Account Settings. Then choose Limit Past Posts under "Who can see my posts?" and Edit to the right of "Who can see your future posts?" in the same section. A warning appears when you attempt to limit access to all your past posts at once rather than changing the setting post-by-post. The options under "Who can contact me?" let you limit friend requests and filter the messages you receive. You can also restrict who can look you up by address and phone number, who can look up your timeline by name, and whether your timeline will link to search engines.

Step four: Tame your timeline and tags You've already determined who can view your timeline (see step one), but you can also block friends from adding to your timeline and review photos someone attempts to tag you in via the Timeline and Tagging Settings. The only two options for "Who can post to my timeline?" under "Who can add things to my timeline?" are Friends and Only Me. To enable review of posts your tagged in before they appear on your timeline, click Edit to the right of the entry and select Enable in the drop-down menu. Under "How can I manage tags people add and tagging suggestions?" you can enable the feature that allows you to review tags people add to your own posts before they appear, set who besides the normal audience sees the posts you're tagged in, and decide whether tag suggestions appear when photos that look like you are uploaded.

Step five: Don't let your apps run amok Some Facebook apps grab all the permissions they can, including access to your information and the ability to post photos and status updates "on your behalf." For example, the IFTTT app lays claim to your complete profile and all your activities, as well as some of the profile and activities of your friends. To review your Facebook app permissions, click Apps in the left pane of the Account Settings window, choose Edit to the right of the app's entry, and either change the app's visibility via the drop-down menu, or click "Remove app" at the bottom of the entry. You can also click "Report app" to let Facebook know the app is spam, inappropriate, or requesting too much information, or to contact the developer to report a bug or abusive content, or for another reason.

Step six: Opt out of Facebook ads Facebook currently doesn't let third-party apps or ad networks use your image or name in ads, but that may change in the future. To opt out ahead of time, click Ads in the left pane of the Account Settings window and choose Edit in the Third Party Sites section. Select "No one" in the drop-down menu under "If we allow this in the future, show my information to" and then click Save Changes. To exclude yourself from Facebook's social ads, click Edit in the Ads & Friends section, choose "No one" on the drop-down menu next to "Pair my social actions with ads for," and select Save Changes.

Practical Advices for Instagram….. instagram-privacy-settings/

How To: Managing Your Instagram Privacy Settings Instagram is a great app for sharing your photos with your friends. But you also want to make sure your photos are not shared with everyone, so personal information does not fall into the wrong hands. Below are some security tips you can follow when using Instagram. Managing the Privacy Setting of Your Feed When you publish a snapshot to your Instagram photo feed, anyone can view it. Luckily, you can change this default setting to only allow your friends and hand picked people to view it. Tap Profile in the bottom-left corner of the Instagram interface. Tap Edit your profile. Scroll down to the Posts are Private setting and change it to On. Managing Facebook Sharing Options Instagram makes it easy to share your latest photos with your Facebook friends. But do you know exactly who you are sharing your photos with? Login to Facebook and click the Settings icon in the top-right corner of the page. Select Account Settings > Apps. Find Instagram in the Apps your use section and then click Edit. Check the setting that’s selected next to Visibility of app and change if necessary.

Delete Personal Information from Your Profile Those who follow you on Instagram can view everything in your Instagram profile. The only thing you really need in your profile is your username, which could be anything. To edit your profile: Tap Profile in the bottom-right corner of the page. Tap Edit Your Profile. Edit your profile as necessary. Remove Your Photos From Instagram's Map Instagram has a default that pins your photos to a map that’s viewable from your profile. While this is a neat feature, it also allow anyone following you to know exactly where you are, such as your home address or when you are not at home. This is a security issue, so you should think twice before using this feature. Before sharing a photo on Instagram, you have the option of clicking the Add to your Photo Map setting on the final confirmation page. Before you do so, be sure to ask yourself if this is the right thing to do. Share Photos Only With Those You Indicate A new feature called Instagram Direct allows you to choose who can see your latest photo. After taking a new photo using the Instagram app, tap the Direct tab on the final confirmation page. This displays a list of all of your Instagram followers. Scroll down and select only the ones with whom you want to share the photo.

ΘΕΜΑΤΙΚΟΥ ΔΙΚΤΥΟΥ: