P.E.O. Salt Lake City Reciprocity Meeting Keeping Safe Using Technology April 8, 2010 Presented by Rebecca Conant (Y) P.E.O. Salt Lake City Reciprocity.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

How to protect yourself, your computer, and others on the internet
Primary Threats to Computer Security
Thank you to IT Training at Indiana University Computer Malware.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
PC Security 101 Keeping your data and your computer safe.
Jason Rich CIS  The purpose of this project is to inform the audience about the act of phishing. Phishing is when fake websites are created.
How to avoid Viruses and Malware on your Computer Use a firewall Using a firewall is like locking the front door to your house—it helps keep intruders.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Protecting Yourself Online. VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One in every 200 containing.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Utility Programs and their Functions. Antivirus Software (Virus Checker) Keep the Computer software healthy and free of virus’ that can harm the function.
Teach a man (person) to Phish Recognizing scams, spams and other personal security attacks July 17 th, 2013 High Tea at IT, Summer, 2013.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Security. Physical security Protection from fire/water Protection from dust and extremes of temperature.
1 Computer Security: Protect your PC and Protect Yourself.
Security Advice Georgie Pepper Campsmount Acadamy.
Securing Your Home Computer Presenter: Donnie Green Date: February 11, 2009 National Aeronautics and Space Administration
Alisha horsfield.  Computer virus is something that copies itself to computer software.  Virus can delete the hosts important documents which includes.
Threats to I.T Internet security By Cameron Mundy.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Security for Seniors SeniorNet Help Desk
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
1 Kids on the Web. Child’s play? September, 2008.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Learning In A Techno World How Safe is Your Cyberspace?
Stay Safe & Secure Online. Outline Passwords Everyday Security Security Physical Security Protecting Personal Information.
Staying Safe Online Keep your Information Secure.
 We all know we need to stay safe while using the Internet, but we may not know just how to do that. In the past, Internet safety was mostly about.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
1. Self Awareness You should only access your accounts and private informations from a safe location (only at home as necessary if at all possible) where.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
This Is A PowerPoint Presentation On Computer Viruses. This Presentation Will Show You What Can Be Done To Deal With The Viruses. Mr Owen 10C.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
advantages The system is nearly universal because anyone who can access the Internet has an address. is fast because messages.
Safer Online Shopping and Practices Presenter: Brian Moats Students Active In Leadership.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Internet Security and Your Computer Welcome to Boot Camp.
safety Bailey mullan. dangers ing has become on of the main sources for communicating. When using it is more likely for someone.
Safety and Security issues of using ICT Alys brooks.
Internet Définition: Internet: interconnected networks: an interconnected system of networks that connects computers around the world via the TCP/IP protocol.
What is Spam? d min.
Internet 1) John R. Levine, Margaret Levine Young, The Internet for Dummies. Wiley Publishing, 12 th Edition, 2010.
Keeping Your Computer Safe and Running Efficiently.
Internet safety By Suman Nazir
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
W elcome to our Presentation. Presentation Topic Virus.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Social Networking Practices. Information Security Purpose is to protect your information’s Confidentiality Integrity Availability.
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Safety.
Managing Windows Security
Protect Your Computer Against Harmful Attacks!
Computer Security.
Presentation transcript:

P.E.O. Salt Lake City Reciprocity Meeting Keeping Safe Using Technology April 8, 2010 Presented by Rebecca Conant (Y) P.E.O. Salt Lake City Reciprocity Meeting 1

Technology Challenged? P.E.O. Salt Lake City Reciprocity Meeting 2

You and Internet P.E.O. Salt Lake City Reciprocity Meeting 3 You Internet Service Provider such as XMission or Qwest World Wide Web or The Internet

Keeping Safe Using Technology Computer Security – A few topics we will discuss  Computer Viruses  Spyware  Firewalls  Spam  Phishing Computer Security – Other importants topics to be discussed another time o Protecting your cildren and grandchildren o Proper use of social networking sites – FaceBook, MySpace P.E.O. Salt Lake City Reciprocity Meeting 4

Viruses  What is a computer virus? A malicious software program designed to do damage to your computer  Delete files or takes over your computer to launch attacks on other systems  How do you detect a computer virus?  Whenever your computer is acting different from normal  Your computer is running slow  Might see strange pictures or graphics  When your friends receive s from you (that you never sent) that have a suspcious file attached  Your virus protection software tells you that it blocked a virus P.E.O. Salt Lake City Reciprocity Meeting 5

How Does Your Computer Catch a Virus? Opening an infected file attached to an or instant message Using an infected program file downloaded from the Internet Sharing a data CD, USB memory drive, or floppy disk that contains an infected file Sharing a computer file over a network that contains an infected file Most common mean of virus infection is via P.E.O. Salt Lake City Reciprocity Meeting 6

Safety First!  Don’t open attachments from people you do not know  Even if you do know the person, be aware of them sending you an attachment you are not expecting  You can view the but don’t open the attachment if you are suspicious  Don’t download from music or video file-sharing networks; they are notoriouly virus- and spyware-ridden; instead download music and movies from legitmate sites such as iTunes and Amazon for MP3 downloads  P.E.O. Salt Lake City Reciprocity Meeting 7

Safety First! Don’t click on links sent to you from strangers via instant messaging or in a chat room Share disks and files only with users you know and trust Use antivirus software-keep it current with the most recent virus definitions Most important of all these suggestions: NEVER OPEN AN UNEXPECTED FILE ATTACHMENT  P.E.O. Salt Lake City Reciprocity Meeting 8

Use Good Software to Combat Bad Software Antivirus software protects your computer from new, unknown viruses - New viruses are released often and regularly You’ll need to download software updates regularly to keep your computer protected Antivirus software can check for a virus every time you turn on your computer or when you download files from the internet Antivirus software can desinfect your system if it becomes infected with a virus  P.E.O. Salt Lake City Reciprocity Meeting 9

Antivirus Software Norton AntiVirus McAfee VirusScan Microsoft Security Essentials AVG AntiVirus – free Avira AntiVir - free Some ISP’s offer free antivirus software, Comcast is an example  P.E.O. Salt Lake City Reciprocity Meeting 10

Spyware Spyware is just that – software that spys! It infects your computer and sends information about how you use your computer to a third party Your computer is usually infected with spyware when you load other software – especially peer- to-peer trading sites Prevention - Only download software from legtimate and trusted websites P.E.O. Salt Lake City Reciprocity Meeting 11

Spyware Software Windows Defender – free with Windows 7 Ad-Aware Spybot Search and Destroy Webroot Spy Sweeper Norton Internet Security McAfee Internet Security Suite P.E.O. Salt Lake City Reciprocity Meeting 12

Use a Firewall for Added Protection Connecting to the internet is a two-way street A firewall is the first line defense against hackers A firewall is a software program that forms a virtual barrier between your computer and the internet It selectively filters data between both ends of the communication and protects your computer from attack P.E.O. Salt Lake City Reciprocity Meeting 13

Firewall Software Built into Windows 7 – The Windows Firewall McAfee Total Protection Norton Internet Security ZoneAlarm Free Firewall P.E.O. Salt Lake City Reciprocity Meeting 14

Spam  Over half of can be unwanted, unsolicited, or unauthorized  There are ways to dramactically reduce spam  Protect your address  Do not use it on message boards, chat rooms or instant messaging  Use two addresses, one to use for public messages and internet ordering, and one for personal use given only to friends and family  You can get a free address from hotmail.com or yahoo.com  spam filters sends to a Junk Folder that you should review periodically P.E.O. Salt Lake City Reciprocity Meeting 15

Phishing A phony message with a link to a website masquerading as the real site Usually from a bank, eBay or PayPal and asks for credit card information, account information, passwords The fake web sites look VERY official - beware NEVER click on a link to a bank or financial website Windows 7 provides SmartScreen Filter – gives you a warning before you enter a web site or that is a known phishing site P.E.O. Salt Lake City Reciprocity Meeting 16

Keeping Safe Using Technology Your take-aways! Never open up an unexpected attachment Use antivirus software and keep it updated Only download software from legtimate and trusted websites Protect the use of your address – don’t use it on message boards, chat rooms or instant messaging Don’t link to banks, financial accounts from an Use common sense at all times! P.E.O. Salt Lake City Reciprocity Meeting 17

How Utah P.E.O. Uses Technology State Chapter website ( a password protected web site (member section) Google Groups to sign up for Sister to Sister eNewsletter Chapter AI is using GoogleGroups and has a Flickr account to share photos There is a central address, that you can use if you would like to submit article ideas or are having trouble signing up or receiving the newsletter P.E.O. Salt Lake City Reciprocity Meeting 18

Sister to Sister eNewsletter Sign Up Instructions The Sister to Sister eNewsletter is rich with information including P.E.O. news including convention news, P.E.O. Generations, Membership Minutes and articles on Cottey College, special events, and fundraisers Signing up is SO EASY! You can Or You can log into the member section of Utah State P.E.O. website ( P.E.O. Salt Lake City Reciprocity Meeting 19

Sister to Sister eNewsletter Sign Up Instructions Enter your address and click on “Subscribe” You will see the message below: Almost there! In order to confirm your request to join UtahPEO, a confirmation message has been sent to the following address: [your address]. Please check your mailbox for this message. You must click on the link in the message to confirm your subscription. P.E.O. Salt Lake City Reciprocity Meeting 20

Please Stay Safe! P.E.O. Salt Lake City Reciprocity Meeting 21