INTERNET: The Good, The Bad and The Ugly

Slides:



Advertisements
Similar presentations
Internet Safety Rockingham County Public Schools
Advertisements

Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Keeping Your Child Safe on the Internet
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
INTERNET SAFETY FOR STUDENTS
How to keep your kids safe online
James Sees Senior Network Administrator Management Analyst Cyber Protection Strategies White Hall Business Association - Cyber Security & Awareness Conference.
Using internet and cell phones safely
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
How to avoid Viruses and Malware on your Computer Use a firewall Using a firewall is like locking the front door to your house—it helps keep intruders.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
Internet Safety Background on Our Program University of New Mexico – Anderson Schools of Management Information Assurance MBA Program –Internet Security.
Internet Safety Rules for Students
INTERNET SAFETY FOR STUDENTS
1 Computer Security: Protect your PC and Protect Yourself.
Quiz Review.
Viruses & Destructive Programs
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Protecting Information. Who We Are We are working on our Information Assurance MBA This is part of our curriculum; to present on information security.
Let’s talk about Internet Safety!
How to Surf the Web Safely. What is this a picture of?
1 Kids on the Web. Child’s play? September, 2008.
Have Fun, Be Safe Strategies for Internet and Social Media Safety.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Submitted by: Donna Rembert Instructor: Dr. Laurie Fowler ED508 Technology Portfolio.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
November 10,  Acceptable use  Internet Filtering  Social Web (MySpace, Facebook, etc.)  Cyberbullying  Plagiarism  Phishing.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Computer Security By Rachel Gaines. Computers are used for work, play, and everything in between. So here’s how to keep it fun and protected.
Tim Reid Malvern Parish C.E Primary School Internet Safety.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Internet Security and Your Computer Welcome to Boot Camp.
For Grades 3-5 WOLFTEVER CREEK ELEMENTARY.  Educate Us  Entertains Us  Connects Us  False Information  Opens Your Home to the Outside World  Bad.
What is Spam? d min.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Internet Safety Wendy Varner. Internet Safety –The goal is to educate students on how to avoid dangerous, inappropriate, or unlawful online behavior.
Internet safety By Suman Nazir
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Computer and Internet Security (How to protect your computer from Threats) By: Steven Siggers Instructor: Dr. Marko Puljic.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
A Quick and Easy Crash Course Internet Safety for Everyone.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
© Net Literacy Corp. All Rights Reserved. Some Trademarks and Trade Names are Properties of Their Respective Owners. This is a 4 th, 5 th, &
Technological Awareness for Teens and Young Adults.
Computer Security Keeping you and your computer safe in the digital world.
Managing Windows Security
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Network security threats
Scams, Identity Theft, and Viruses Kelly & Caitlin
Computer Security.
Presentation transcript:

INTERNET: The Good, The Bad and The Ugly Introduction by Audrie/Sam   The name of the project that we are working is called  Information Assurance Outreach and Education sponsored by University of New Mexico. 1. Qualifiy the audience...how many of you use the Internet? How many of you have access to a computer? How many of you have used MySpace or Facebook? 2. Encourage the students to ask questions during the presentation.

Good Things A Better You A Funner You A More Knowledgeable You A Popular You A More Efficient You Audrie  

Just How Good Is The 'Net? Depends on how it is used.   You use it for school, making you a better, more knowledgeable you:  Searching the web for research Finding out facts on a subject Easy access to information leads to better grades Audrie  

What Are Some Other Uses of the 'Net? You use it for Entertainment, making you a funner more popular you:    Chat, Instant Messaging, Email, MySpace, Facebook, P2P networks, Gaming and YouTube lets you keep up with the new age stuff.  Audrie

How About the Downside?   Things to be aware of while you are on the Internet...  Social network pitfalls   Virus contraction Identity theft  Social engineering Bad guys Audrie   Briefly describe the 5 topics and let students know that we will be expanding on these topics shortly.

Be Careful with Facebook/MySpace These places are for fun and socializing but be careful   Never post any personally identifiable information about yourself... These sites are not only popular for young people but they are also popular for online predators! Audrie   You may want to explain that in addition to sexual predators, these sites are a breeding ground for cyber-bullies and scammers as well.

How Do You Avoid and Treat Viruses? VIRUS: A computer program that can copy itself and infect a computer without the permission or knowledge of the owner.   Where do viruses come from - Can be transferred through the World Wide Web, e-mail, Instant Messaging and file sharing systems. Anti-Virus Software - Install it BEFORE your computer is infected! Virus Removal - Can use a tool known as System Restore, which restores the registry and critical system files to a previous checkpoint. Reinstall Operating System -  simple to do, faster than running multiple antivirus scans, and is guaranteed to remove any malware. Downsides -having to reinstall all other software, reconfiguring, restoring user preferences. Audrie   Explain what a virus is and where they come from Mention some popular anti-virus software such as Norton and McAffee. Explain how system restore works Explaing briefly what a reinstall involves

Protecting Your Personal Identifiable Information          What not to post online...                                        Social Security Number                                            Date or Place of Birth                                            Biometric Information                                            Financial Information          Things you can do to be safe...            Use strong passwords            Lock your computer when not in use            Use anti-virus/security software             Turn on the firewall in Windows              Recognize phishing attempts Sam   Expand a bit on what theives are looking for in order to steal your identity. What is biometric information Explain what a strong password is and advise against passwords that can be found in the dictionary. Encourage keeping your computer updated with the latest antivirus files and OS updates from Microsoft for example. Explain that there is a software firewall as well as hardware firewalls. Just make sure that the software firewall is on at a minimum. Be able to recognize phishing attempts; we will cover this item in depth shortly.

What is Phishing? Definition Methods Guarding against phishing   Phishing is only one of several social engineering techniques used to trick you into divulging information about yourself               Methods                     Through email that looks authentic; directs you                       to websites using pop-ups to get your information                               Guarding against phishing                                     Never divulge confidential information                                     Use anti-virus software and firewalls                                     Do not reply to unsolicited email Sam   What is phishing? It is about trying to get you to reveal any personal information about yourself to the bad guys. Always look at the URL/address line at the top of your browser and make sure that you are hitting the correct website. Thieves are notorious for sending emails about your bank account that for example want you to verify some account information that requires you to put in some information. Never reply to mysterious emails. Many times when you reply to a sender, you are just letting them know that your email address is valid.

Beware of the Bad Guys! Hackers Child predators                                      Break in to your computer for different reasons                                    Some do it for fun or just because they can                                    Others do it because they want the attention               Child predators                                     Known to frequent chat rooms, social networks                                     There are literally thousands posing as teens                                     Never agree to meet with people you don't know                                     Tell an adult about suspicious persons Sam   There are groups of hackers out there, some are actually trying to find ways to beat the bad guys but there are far more bad hackers with intent to harm the innocent. Many of you have heard that when Myspace first came out the media reported that there were something like 30- or 40 thousand sex offenders online. Even today, you never really quite know who's who on the internet. The Dateline TV program often shows child predators that meet teen boys and girs online and attempts to meet. Fortunately, the police has caught on and often place officers in chat rooms to bust these predators. Remember, the Internet is FOREVER and can never be erased...it leaves a digital footprint. Everything is cached or logged by search engines like Google.

Useful Information Websites Other Helpful Resources   Websites http://www.wiredsafety.org http://www.ikeepsafe.org   Other Helpful Resources Parents Teachers Counselors Police Sam   This is a really good website with tons of helpful information. The IKEEPSAFE Coalition has some very useful tools that parents and and young people can use to safely use technology and the Internet.  Never think that you can't tell an adult or older person about issues that you may be having. We were also kids, so if you have a problem, chances are someone has been in a similar situation. By coming forward and exposing a bad guy, you are making the Internet safer for your friends and maybe a little brother or little sister.

Conclusion Additional Questions Or Comments?   Additional Questions Thank you for allowing us the opportunity to present to you today.   Or Comments?