SECURITY CHECK Protecting Your System and Yourself Source:

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
How to protect yourself, your computer, and others on the internet
Let’s Talk About Cyber Security
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
INTERNET SAFETY FOR EVERYONE A QUICK AND EASY CRASH COURSE.
What is identity theft, and how can you protect yourself from it?
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Acceptable Use Policy –The Acceptable Use Policy defines the rules of the machine and internet connection you are on. –Specific policies differ by machine.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
INTERNET SAFETY FOR EVERYONE
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Safe computing and Malware Presentation done by Tylor Hardwick, Alex Gilsdorf, Code Forrester, Xander Winans.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
You, Me & Technology. Overview Technology –Our relationship with technology Threats –What, Who, When, Where, Why & How Protection –What we can do to protect.
Scams & Schemes Common Sense Media.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
What is Spam? d min.
Computer Skills and Applications Computer Security.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Any criminal action perpetrated primarily through the use of a computer.
A Quick and Easy Crash Course Internet Safety for Everyone.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Managing Money Workshop The National Autistic Society AGM
Identity Theft: Protect Yourself Ronald J. Leach.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
INTERNET SAFETY FOR EVERYONE
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Learn how to protect yourself against common attacks
Protect Your Computer Against Harmful Attacks!
Scams, Identity Theft, and Viruses Kelly & Caitlin
Internet Safety for Everyone
Internet Safety for Everyone
Internet Safety for Everyone
Internet Safety for Everyone
Internet Safety for Everyone
Internet Safety for Everyone
Presentation transcript:

SECURITY CHECK Protecting Your System and Yourself Source:

Malicious Code Programs written with the intent to harm, destroy, or annoy. Several of the most common are: Viruses Worms Trojans

Virus A program that spreads itself by infecting files, and are capable of shutting your computer down. The most common way to infect your system is to open an unexpected attachment.

Worms Worms spread through networks using addresses on a host computer. They travel through shared files and programs and are capable of shutting down an entire system.

Trojans These programs are designed to look like other, desirable programs you might download. They may include “spyware” that runs behind the scenes of your computer to secretly track your Web browsing habits and cause pop-ups to occur. In the worst case scenario, Trojans can wipe out your hard drive.

Did you know According to ISafe America: 37% of computers used in the U.S. do not have antivirus protection 35% of computers at any one time are infected with some kind of malicious code Interacting with these computers can put your computer at risk, and you may never know.

Online Scams - Phishing A fairly common scam designed to get personal information from you. The will look like it’s from a legitimate company asking your to verify sensitive information: Social Security numbers, bank account numbers, PIN numbers, passwords, etc. They are really just trying to get your information in order to steal your identity or your money!

Online Scams - Identity Theft According to the Federal Trade Commision: “as many as 9 million Americans have their identities stolen each year” Identity thieves use information like your name, birthdate, Social Security number and banking numbers to: Open new credit card, phone or utility accounts in your name Steal money from your bank accounts Create a whole new identity for themselves using your information. You could have really bad credit before you’re even old enough to have credit!

Protect Yourself Back up your files – often! If your hard drive does crash, you’ll still have all your stuff. Make sure you have a firewall and antivirus software on your computer – then don’t ignore the updates! Do not open attachments you weren’t expecting, even if they came from a friend’s address. Their computer may be infected. Never respond to an asking for personal information, even if the seems to be from a legitimate company. Call them first to check the validity of the request.

Protect Yourself Make sure you only download software from sources you know. Avoid downloading anything from file sharing sites. They are common carriers of malicious code. When online, look for web addresses that say “ before entering any information. The “S” stands for secure. You can also look for a lock symbol. If your system is infected – disconnect it from the modem ASAP. Run a scan of your hard drive through your antivirus software, or take it to a professional. Check your credit report at least once a year to look for any wrong information.