Protecting Students on the School Computer Network Enfield High School.

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

Basic Communication on the Internet:
Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access and attacks delivered.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
N ETWORK S ECURITY Presented by: Brent Vignola. M ATERIAL OVERVIEW … Basic security components that exist in all networks Authentication Firewall Intrusion.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Kamehameha Schools Kapalama High School Ke Ko’i Lipi 1 to 1 Laptop Learning Program Parent Presentation.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Safe Computing Outreach Joseph Howard Undergraduate Research Assistant 05/01/2015 Disclaimer: This research was supported by the National Science Foundation.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
By : Himanshu Mishra Nimish Agarwal CPSC 624.  A system designed to prevent unauthorized access to or from a private network.  It must have at least.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Networks and Security Monday, 10 th Week. Types of Attacks/Security Issues  Viruses  Worms  Macro Virus  Virus  Trojan Horse  Phishing 
Staying Safe Online Keep your Information Secure.
 We all know we need to stay safe while using the Internet, but we may not know just how to do that. In the past, Internet safety was mostly about.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
1. Self Awareness You should only access your accounts and private informations from a safe location (only at home as necessary if at all possible) where.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Firewalls. Intro to Firewalls Basically a firewall is a __________to keep destructive forces away from your ________ ____________.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
CSCE 201 Web Browser Security Fall CSCE Farkas2 Web Evolution Web Evolution Past: Human usage – HTTP – Static Web pages (HTML) Current: Human.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
Intro to Firewalls. A firewall is hardware, software, or a combination of both that is used to prevent unauthorized programs or Internet users from accessing.
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Internet safety By Suman Nazir
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
WHAT IS E-COMMERCE? E-COMMERCE is a online service that helps the seller/buyer complete their transaction through a secure server. Throughout the past.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
IT Ess I v.4x Chapter 1 Cisco Discovery Semester 1 Chapter 8 JEOPADY Q&A by SMBender, Template by K. Martin.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Internet Safety Topic 2 Malware Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other dangerous software exists, such.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
Chapter 5 Electronic Commerce | Security Threats - Solution
Hotspot Shield Protect Your Online Identity
Chapter 5 Electronic Commerce | Security Threats - Solution
Cyber Security By: Pratik Gandhi.
Introduction to Networking
Security in Networking
AbbottLink™ - IP Address Overview
Presentation transcript:

Protecting Students on the School Computer Network Enfield High School

Cyber Security Cyber Security addresses enforcement of secure use on the operation of computers. It is defined by how well your computer maintains confidentiality, integrity and availability of information that is processed or stored on the computer network you use. Cyber Security addresses enforcement of secure use on the operation of computers. It is defined by how well your computer maintains confidentiality, integrity and availability of information that is processed or stored on the computer network you use Go to this government site for information about cyber security. Go to this government site for information about cyber security.

General Protection to Make the School Network Secure Passwords Passwords Connecticut Education Network Connecticut Education Network Firewalls Firewalls Proxy Servers Proxy Servers IP Addresses IP Addresses Cookies Cookies Anti - SPAM Anti - SPAM

General Protection on the School Network Passwords are designed and used to keep your work secure. Passwords are designed and used to keep your work secure. Passwords allow only people who have signed a User Agreement to gain access to the network in the school. Passwords allow only people who have signed a User Agreement to gain access to the network in the school. Your password should be a combination of letters and numbers that you can remember. Your password should be a combination of letters and numbers that you can remember.

Connecticut Education Network The Connecticut Education Network (CEN) is America's first statewide K-12 (and higher education network) to be built exclusively using state-of-the-art fiber optic connections. The Connecticut Education Network (CEN) is America's first statewide K-12 (and higher education network) to be built exclusively using state-of-the-art fiber optic connections. CEN evaluates Websites and will block sites that contain inappropriate content for students. CEN evaluates Websites and will block sites that contain inappropriate content for students.

Connecticut Education Network How to Safely Use the Internet Protect your personal information. Protect your personal information. Know who you're dealing with online. Know who you're dealing with online. Use anti-virus software, a firewall, and anti-spyware software to help keep your computer safe and secure on your home machine. Use anti-virus software, a firewall, and anti-spyware software to help keep your computer safe and secure on your home machine. Be sure to set up your operating system and Web browser software properly, and update them regularly. Be sure to set up your operating system and Web browser software properly, and update them regularly. Use strong passwords or strong authentication technology to help protect your personal information. Use strong passwords or strong authentication technology to help protect your personal information. Back up important files at home and school. Back up important files at home and school. Learn what to do if something goes wrong. Learn what to do if something goes wrong. Protect all children online. Protect all children online.

Firewalls A network firewall protects a computer network from unauthorized access. Network firewalls may be hardware devices, software programs, or a combination of the two. A network firewall protects a computer network from unauthorized access. Network firewalls may be hardware devices, software programs, or a combination of the two. Network firewalls guard an internal computer network (home and school) against malicious access from the outside. Network firewalls may also be configured to limit access to the outside from internal users. Network firewalls guard an internal computer network (home and school) against malicious access from the outside. Network firewalls may also be configured to limit access to the outside from internal users. Free Personal Firewalls is a site that recommends personal firewall sites. Free Personal Firewalls is a site that recommends personal firewall sites. Free Personal Firewalls Free Personal Firewalls

Proxy Servers Proxy servers act as an intermediary between internal computers and external networks by receiving and selectively blocking data packets at the network boundary. Proxy servers act as an intermediary between internal computers and external networks by receiving and selectively blocking data packets at the network boundary. These network firewalls also provide an extra measure of safety by hiding internal Local Area Network addresses from the outside Internet. These network firewalls also provide an extra measure of safety by hiding internal Local Area Network addresses from the outside Internet.

IP Addresses An IP address (Internet Protocol address) is a unique address that computers use in order to identify and communicate with each other on a computer network. An IP address (Internet Protocol address) is a unique address that computers use in order to identify and communicate with each other on a computer network. This utilizes the Internet Protocol standard which is your computer address. This utilizes the Internet Protocol standard which is your computer address.

Cookies HTTP cookies (sometimes known as web cookies) are parcels of text sent by a server to a web browser and then sent back from the browser each time it accesses that server. HTTP cookies (sometimes known as web cookies) are parcels of text sent by a server to a web browser and then sent back from the browser each time it accesses that server. HTTP cookies are used for authenticating, tracking, and maintaining specific information about users. HTTP cookies are used for authenticating, tracking, and maintaining specific information about users.

Cookies Cookies have been of concern for internet privacy, since they can be used for tracking browsing behavior. Cookies have been of concern for internet privacy, since they can be used for tracking browsing behavior. For example, Cookies show information about the user, such as site preferences or the contents of their electronic shopping carts. For example, Cookies show information about the user, such as site preferences or the contents of their electronic shopping carts.

Anti – SPAM Spam is the material you receive on your computer that you have not requested. Spam is the material you receive on your computer that you have not requested. It is an abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages that clog you machine and the network. It is an abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages that clog you machine and the network. Anti Spam is either hardware or software that limits the SPAM getting onto your machine. Anti Spam is either hardware or software that limits the SPAM getting onto your machine.

Limiting Pop–Up Ads Pop-up ads or popups are a form of online advertising on the World Wide Web intended to increase web traffic or capture addresses. Pop-up ads or popups are a form of online advertising on the World Wide Web intended to increase web traffic or capture addresses. It works when certain web sites open a new web browser window to display advertisements. It works when certain web sites open a new web browser window to display advertisements. The pop-up window containing an advertisement is usually generated by Java, but can be generated by other means as well. The pop-up window containing an advertisement is usually generated by Java, but can be generated by other means as well.

Do You Know… Have you increased your knowledge about computer security now? To test your knowledge, try the self assessment quiz on the site below. Have you increased your knowledge about computer security now? To test your knowledge, try the self assessment quiz on the site below. assessment-quiz assessment-quiz assessment-quiz assessment-quiz