Understanding and Building Basic Networks Chapter 4 Protecting Yourself Online.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Jeopardy Online Safety Cyber Bullying Q $100 Q $200 Q $300 Q $400 Q $500 Q $100 Q $200 Q $300 Q $400 Q $500 Final Jeopardy Protecting Computers.
Implications and Security Issues of the Internet By Neelesh Patel.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
INTERNET SAFETY FOR STUDENTS
How to safe online E-Safety Presentation How to stay safe when online Tip 1Tip 2Tip 3Tip 4 Tip 5.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Chapter 8 Protecting People and Information: Threats and Safeguards Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
E-Safety Quiz Keeping safe online! A guide for parents & children.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
INTERNET SAFETY FOR STUDENTS
Security Advice Georgie Pepper Campsmount Acadamy.
Threats to I.T Internet security By Cameron Mundy.
Safe Surfing Tips Internet Safety Tips for Teens By: LaQuacious Garrett.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
IT Security for Users By Matthew Moody.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Staying Safe Online Keep your Information Secure.
Donette Mullinix ED 505 UWA Clipart:
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
The Wonderful World Wide Web
Everyday Cyber Security April 27 th Why Should You Care? Ensuring your privacy and security Protecting yourself and others Practicing safe internet.
Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.
Agenda Last class: Internet Literacy Lab Today: Internet Safety.
Computer Security By Joey Pawoll. Introduction to computer security Have you been wondering how to be safe online? Well look no further! This powerpoint.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
Year 9 Autumn Assessment Computer system/Information security-Planning, Communicating, Information. By Louis Smith-Lassey 9k 9Y1.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Computer Security 2 Keeping your computer safe. Computer Security 2 Computer Security 2 includes two lessons:  Lesson 3: Protecting yourself and your.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
Identity Theft Since 2005, there has been a dramatic increase in the occurrence of identity theft among students online.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Stay Safe Online. Use strong passwords Using the same password for all your accounts makes it easy to remember. However, it also means a hacker needs.
Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
Online Safety Objective8: Practice safe uses of social networking and electronic communication such as recognizing dangers of online predators and protecting.
SAFE Information & Communication Technology For the Third Grade.  Julianna Madden  ITC 525  Summer 1 Session.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Internet Security and Your Computer Welcome to Boot Camp.
safety Bailey mullan. dangers ing has become on of the main sources for communicating. When using it is more likely for someone.
ED 505 Technology and Education
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Internet safety By Suman Nazir
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Firewalls Priyanka Verma & Jessica Wong. What is it? n A firewall is a collection of security measures designed to prevent unauthorised electronic access.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Year 10 ICT. What is it about?  This module sets out essential concepts and skills relating to the ability to understand main concepts underlying the.
Digital Footprints Cyberbullying Passwords The Digital Community Staying Safe Online
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Don’t talk to people that you don’t know online. What would you do if someone that you don’t know threatens you? Call the police or tell a parent!! Be.
Responsible digital citizenship By: Aiden. What is responsible digital citizenship? Responsible digital citizenship is many things. The topics I am covering.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Unit 4 IT Security.
Protect Your Computer Against Harmful Attacks!
Unit 4 IT Security Kerris Davies.
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Presentation transcript:

Understanding and Building Basic Networks Chapter 4 Protecting Yourself Online

In this chapter, you will answer these questions: Who wants to get into my computer? Who's watching me? How do I keep them out? How do people get my information and why do they want it? How do I keep my information safe? Who would want to hurt me and how would they find me? How do I stay safe online?

Who wants to get into my computer? There are many different types of individuals who may be attacking your computer from the outside, trying to get into your system. Some of the biggest threats from the outside include hackers, viruses, and spam.

Who's watching me? In addition to people and software trying to intrude on your system and gain access to it, there are other types of software designed to watch you. This software, generally known as adware or spyware and including such things as cookies, surveillance, parental controls, and blocking software, have a variety of functions.

Cookies A cookie is a small text file that contains data. It is not a program or a virus and cannot be used to spread viruses. Cookies are not necessarily bad and can make your online life a lot easier.

How do I keep them out? The most common ways to keep people out of your system is by using firewalls, anti-virus software, anti-spam software, and by using safe Internet practices.

How do people get my information and why do they want it? There are people who attack computers to find out personal information. In many cases, they target the databases of large corporations that keep records such as social security numbers, bank account numbers, and credit card numbers on file for their customers. However, it's not unheard of for crooks to target individuals who share their information over the Internet without regard for proper security.

How do I keep my information safe? Even though there are people out there who will abuse the Internet, you can use it with a few precautions. There are secure ways to transfer data as well as some guidelines for sharing your information. An example of a secure Web site.

Who would want to hurt me and how would they find me? There are people in the world who stalk young people and try to lure them out online. You must never give personal information online to strangers. You can listen to the real life story of a young woman who befriended someone in an online chat room and what happened to her by visiting and clicking on Amy's Choice.

Online Safety The following website can be visited after discussing online safety. –

How do I stay safe online? Even though there are people out there who use the Internet for these unsavory purposes, you don't have to be afraid of going online. With a few simple guidelines, you can ensure your online experience is positive.

What You’ve Learned About Protecting Yourself Online In this lesson, you examined ways to protect yourself while online. You examined three basic threats: –those trying to attack your computer –those trying to get your information –those who want to hurt you personally You learned how to use a combination of software, hardware, and some basic guidelines to have a safe online experience.