Presentation on theme: "How to protect yourself, your computer, and others on the internet"— Presentation transcript:
1 How to protect yourself, your computer, and others on the internet Internet SafetyHow to protect yourself, your computer, and others on the internet
2 Internet in society Communication Education Business Global Networking- communicate with people around the world through social networking sites, webcams, instant messaging, , etc.EducationUse the internet to spread information and help students learnClasses can be taken onlineResearch information can be found onlineBusinessOnline business management is availableBusinesses can sell merchandise onlineOnline advertisement
3 Internet Security & Safety Internet Security is the use of software that helps protect your computer from harm.Internet Safety is habits and precautions that you can take to help protect your computer and your safety.
4 Internet risksComputer- can get infected with viruses, Trojans, worms, and spyware, which can all damage your computer and/or steal your personal information. Family- your privacy can be invaded and your family can be put in danger. Personal Information- criminals can steal your personal information and put you in financial distress.
5 Viruses WORMsA software program designed to invade your computer and copy, damage, or delete your data.A virus that needs no human interaction to infect a computerIt must be executed before it can infect your computer.Worms spread through computer systems on their ownYou must activate the virus on your computer by visiting unprotected websites or downloading infected files.
6 A program used to track online activity Trojan SpywareA virus that pretends to be a helpful program while destroying your data, damaging your computer and stealing your personal informationA program used to track online activityOnce spyware has infected your computer, it can track your online path and your location
7 Cyber Bullies File Sharing Abuse Predators Disturbing Content Risks to childrenCyber BulliesFile Sharing AbusePredatorsDisturbing ContentInvasion of Privacy
8 Cyber Bullying is illegal Cyber bulliesCyber Bullies are online abusers who target and bully other through use of the internetCyber Bullying is illegal
9 File sharing abuseFile sharing abuse is the downloading of illegal content through use of the internet. (music, video, etc.) Like cyber bullying, this is a crime that is punishable by law.
10 predatorsAn online predator is an adult Internet user who exploits vulnerable children or teens, usually for sexual or other abusive purposes. Be careful of giving out personal information. You never know who is on the other end.
11 Disturbing contentIf unsupervised, children may stumble upon disturbing content that you probably don’t want them to see.
12 Invasion of privacyChildren can unknowingly give away personal information that thieves can use to invade your other personal information.
14 Identity TheftCriminals can get your personal information through the internet. If you are asked to give out personal information over the internet or phone, for example by your credit card company, check with your credit company by calling and confirming that they need your information. After your information is stolen, thieves use it to open other accounts that ruin your finances and credibility.
15 PhishingCriminals often pose as trustworthy entities that request money or information from your account. They send s requesting usernames, passwords, and other account information.
16 HoaxesHoaxes are tricks that usually ask for money in return for a fraudulent prizeThey usually say things such as “You’ve Won!” or “You’re the 100th Winner!”
17 SPAMSpam is the same that is sent to massive numbers of people, usually advertisements.
18 How to protect Your Life Protecting your computerProtecting your familyProtecting your personal information
19 Protecting your computer Keep updated with the latest firewall and antivirus software.Stay away from unknown sites that you are not familiar with.Research them and ensure that they are legitimate before visiting.
20 Protecting yourselfNever respond to any or message that asks for information and has a sense of urgency. Urgency is a clear giveaway of criminal activity. Check to see if the messages addresses you personally. This is another hint of internet fraud.
21 Protecting your family Be sure that your family knows the risks and dangers of the internet. Be sure that you and they know what not to do and safe steps to take on the internet.
23 Backing up your filesBacking up your files means that you keep multiple copies of them, so if one gets damaged or lost, you still have it saved in another place.
24 Where to back up files 3 Backups Have 3 backup files so that if one gets lost or infected, you wont be at a total loss.Keep one backup away from your original access pointIt always helps to have a backup
25 How to back up your files DO NOT back up files on a thumb driveThey are meant for convenience, not permanent storageSave files in different locations to avoid a total loss if file trouble occurs
26 Children's online safety A message to parentsSetting rulesProtecting information
27 Setting clear rulesSetting clear rules is the first step to leading your child on a safe journey through the internet. Set rules such as internet usage times and sites that shouldn’t be visited.
28 Keeping your information safe Be sure that your children know not to talk to anyone that they meet on the computer, and not to give out information such as their address.
29 Internet Privacy settings Keeping safe from PREDATORS
30 Privacy settingsAlways have secure privacy settings on any account that you have. Any personal information on your account can be viewed by anyone in the world without proper privacy settings.
31 PRIVACY ON FACEBOOKTo set privacy settings on Facebook, log into your account from the home screen
32 Privacy settings on Facebook Once you are signed in, scroll to the bottom screen and click the privacy link
33 PRIVACY SETTINGSOnce the link is clicked, the privacy settings options page should be displayed. Read the links to find which privacy settings you want to change. The stricter the settings, the better protected you are.
34 PRIVACY SETTINGS CONTINUED From the previous screen, click the first link titled “Information we receive and how it is used”. This will take you to steps and information you need to learn about how the public views your personal information.