Presentation is loading. Please wait.

Presentation is loading. Please wait.

Lesson 3 Safe Computing.

Similar presentations


Presentation on theme: "Lesson 3 Safe Computing."— Presentation transcript:

1 Lesson 3 Safe Computing

2 Objectives • Protect against malware/hacking
• Identify potential computer viruses • Understand system and application updates • Recognize and protect against spam, scams, and phishing • Determine the strength of passwords

3 Hacking/Malware Hacking is the act of cracking into a computer to steal information. Malware is software that has malicious intent. Two types of malware: Discussion tips: Ask students about their experiences with hacking/malwareHacking is the act of cracking into a computer to steal information. A computer virus attaches itself to a file or program, enabling it to spread from one computer to another. Worms spread from one machine to another, rapidly, without human action.

4 Spotting Computer Viruses
Criminals often send viruses through s, making it important to be able to recognize potential threats. Look at the subject line. Does it say something suspicious like “Need cash now?” or “You may have already won!”?

5 Spotting Computer Viruses
Criminals often send viruses through s, making it important to be able to recognize potential threats. Use caution with attachments. Many times viruses are assigned a file extension like .exe or .vbs.

6 Spotting Computer Viruses
Criminals often send viruses through s, making it important to be able to recognize potential threats. Do you recognize the sender? If you don’t recognize the sender of the , it is best practice to not open the .

7 Spotting Computer Viruses
Criminals often send viruses through s, making it important to be able to recognize potential threats. Do not follow web links unless you are sure they are safe. Sometimes a link can direct you to a website that downloads a virus to your computer.

8 Spotting Computer Viruses
Criminals often send viruses through s, making it important to be able to recognize potential threats. Spelling and grammar. Companies and organizations typically have copywriters who proofread s for errors before they are sent.

9 Spotting Computer Viruses
Criminals often send viruses through s, making it important to be able to recognize potential threats. Generic greeting. Fraudulent s are often sent in large batches and to save time, criminals use a generic greeting like “Dear Internet user.”

10 Antivirus Software Antivirus software is a computer program that detects, prevents, and takes action to disarm or remove malicious software programs, such as worms and viruses. Malware can be shared by: • attachments • Fictitious websites • Pop-up ads • Spam

11 Hacking/Malware Defenses
Avoid attacks by: Do not open s or attachments from unfamiliar addresses Question suspicious attachments from people you do know Right-click the pop-up taskbar or use the task manager to close pop-up ads Discussion tips: Students may have some knowledge on the subject here. Have them share how they avoid attacks. Avoid attacks by: Use tools to prevent viewing potentially dangerous sites.

12 Updates Updates also: Updates are important!
They keep the operating system and applications up to date. Updates also: Close security loopholes Provide critical updates Protect against threats

13 Spam & Fraud Spam - an Internet slang term referring to unsolicited junk or online communication that is sent to a large number of recipients.

14 Scams The primary goal of an Internet scam is to trick someone into giving money or sharing information. Some examples include: dating scams investment schemes claims you won the lottery pay speeding ticket bail out a friend Have students do some current event research on scams and share their findings. Be sure to delete these s.

15 Phishing Phishing is an attempt to steal sensitive information like usernames, passwords, social security numbers, and credit card numbers. Legitimate companies will never ask for your personal sensitive information in an . Be sure to delete these s.

16 Passwords Good password practices:
The whole purpose of a password is to keep important, private information safe. Good password practices: Strong passwords use upper and lower case letters, numbers and symbols. (8 or more characters) Don’t share your passwords with anyone Change your password frequently or use a different password for every site you visit Don’t use information that is personal or easy to guess Weak passwords: Bickerton01 Fluffy1992 Strong passwords: (Fluffy is # 1 cat!) (I hate passwords)

17 I1uvS0ccer#1976 Bigbro01 Dimlyf3!7 Wallace_f12
Rate the following password examples as strong or weak: I1uvS0ccer#1976 Bigbro01 Dimlyf3!7 Wallace_f12 Answers: Strong Weak

18 Summary • Protect against malware/hacking
• Identify potential computer viruses • Understand system and application updates • Recognize and protect against spam, scams, and phishing • Determine the strength of passwords


Download ppt "Lesson 3 Safe Computing."

Similar presentations


Ads by Google