Safety in the digital world. Survey Thank you for completing the Information Security Survey!

Slides:



Advertisements
Similar presentations
Internet Safety Rockingham County Public Schools
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Internet Netiquette & Safety Next. Internet Netiquette & Safety Never use the Internet without adult supervision. –Food and drinks can damage the keyboard.
Developed by Technology Services 1:1 Laptop Initiative
Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
The Internet.
SECURITY CHECK Protecting Your System and Yourself Source:
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
INTERNET SAFETY FOR STUDENTS
How to safe online E-Safety Presentation How to stay safe when online Tip 1Tip 2Tip 3Tip 4 Tip 5.
Internet Security Passwords.
PASSWORD MANAGER Why you need one 1. WHAT IS A PASSWORD MANAGER? A modern Password Manager is a browser extension (Chrome, Internet Explorer, Firefox,
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
Computers, Security and You. Why exactly are we here?
INTERNET SAFETY FOR STUDENTS
Created by Mr. Hemmert.  Have you ever received a mean or instant message? Have you ever sent one? This is called cyberbullying. A cyberbully uses.
Information about the computer By Sophia and Christina C.
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
Evidence By Jordan Shurety. This I where you write who you are going to send the to. Cc in an means carbon copy or courtesy copy. You.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Internet Safety Guidelines
Software. stands for electronic mail. software enables you to send an electronic message to another person anywhere in the world. The message.
Threats to I.T Internet security By Cameron Mundy.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Information guide.
SACHIN DEDHIA Cyber Crime Investigator Cert. Ethical Hacker(USA)
6.2.1 Computer Applications How the use of technology affects humans GUidelines Slide Show created by Mae Thomas July 2008.
Have Fun, Be Safe Strategies for Internet and Social Media Safety.
Stay Safe & Secure Online. Outline Passwords Everyday Security Security Physical Security Protecting Personal Information.
Staying Safe Online Keep your Information Secure.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Internet Safety Helpful Tips to Stay Safe. I bet you didn’t know… 18% of 8- to 10-year-olds spend time on some kind of social networking site daily Kids'
WE ARE DATA By Hazim Zaidani Do you really think that your personal data is protected ? Well… Think Again !!!
How to be Safe Online. Online Access How many of you go online? What are your favorite things to do online? Who accesses the Internet from their smart.
Social impact of ICT. The local community The IT development that may effect the local community one person would start shopping online, chatting online,
Personal Online Safety Information Security Systems Community Outreach Program McKinley Middle School April 23, 2013.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
On-line Safety and Student . I understand there are certain rules I need to follow when I am online.
What is hacking? Hacking is the use of a computer and its files with out being allowed by the owner. Hacking is used to find out peoples passwords and.
Protecting Your Identity © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Social Networking Practices. Information Security Purpose is to protect your information’s Confidentiality Integrity Availability.
1. Guard your privacy. What people know about you is up to you. 2. Protect your reputation. Self-reflect before you self-reveal. What’s funny or edgy.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
Branch of computer security specifically related to the Internet. Security for transactions made over the Internet. Internet security encompasses browser.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Security on Peer-to-Peer Networks.
IT Security Awareness Day October 19, 2016
Internet Safety How to stay safe online.
An Introduction to Phishing and Viruses
Unit 4 IT Security.
How to build a good reputation online
Internet Safety Guidelines
Cybersecurity Awareness
What you can do to support people to be safe online
E SAFETY ASSEMBLY.
Internet Safety – Social Media
COMPUTER SAFTEY IS IMPORTANT….
Week 7 - Wednesday CS363.
Presentation transcript:

Safety in the digital world

Survey Thank you for completing the Information Security Survey!

Survey Question 1

Survey Question 2

Survey Question 3

Survey Question 4

Survey Question 5

Survey Question 6

Survey Question 7

Survey Question 8

Survey Question 9

Survey Question 10

What am I here to talk about? Computer Security What is computer security? Why is computer security important? What can you do?

What is computer security? Physically securing different types of computers; such as desktops, laptops, mobile phones, and servers. Securing the information that is contained inside of computers; such as files, passwords, and personal information. Securing the information that goes between computers, such as using the internet.

Why is computer security important? Computer security is very important to your future employers! IT Security is so important to employers that there aren’t enough IT security professionals to fill the demand for them.

Why is computer security important? A day in the life of IT security: yer_detailpage&v=TvVfDJZ7Qcg

What if Coca Cola’s secret recipe was stolen from the company’s computers? Why is computer security important?

It is important to protect your personal information so that your credit/identity isn’t compromised. Employers, landlords, and banks all check your credit. Viruses are a hassle! You don’t want strangers knowing your personal information like address or telephone number. Why is computer security important?

What information stored on your personal computer would you not want to share with a stranger?

Passwords Bad Passwords The word “password” Your name Your parent’s name A simple dictionary work, like “school” What can you do?

Passwords Good Password Guidelines Use numbers and symbols Have a minimum length of 8 characters Break up dictionary words. (For example, turn E’s into 3’s. Freshmen becomes Fr3shm3n) Avoid using words closely associated to you, such as your name What can you do?

Passwords Two factor authentication Many companies and internet sites are moving to two factor authentication. Such as an image and your password or a password and pin.

What can you do? How can we make the password “eldorado” stronger?

What can you do?

What can you do? Beware of phishing. Phishing is when someone tries to get you to reveal personal information. This is often done by sending an that appears to be from a known sender. Security

What can you do? Security Be cautious of opening attachments. An can look like it came from a friend even though it wasn’t sent by that person.

What can you do? Downloading Internet Files Be thoughtful when downloading files from the internet. Make sure that it is a site that that you are familiar with. Don’t just pick the first link that comes up in an internet search. Many search providers have advertisements at the top.

What can you do?

Facebook Security Check your Facebook security settings often because Facebook will modify the site’s available security settings often. You don’t want to assume that the default settings are good enough!

What can you do? Facebook Security Security settings are a first step but not the most important security measure. Don’t stop critical thinking! This kid could really be this guy.

Questions?