34
INTERNET SAFETY HOW TO PROTECT YOURSELF, YOUR COMPUTER, AND OTHERS ON THE INTERNET http://www.thetechlabs.com/tech-news/internet-explorer-9-release-candidat e/

HOW TO PROTECT YOURSELF, YOUR COMPUTER, AND OTHERS ON THE INTERNET

Embed Size (px)

Citation preview

Page 1: HOW TO PROTECT YOURSELF, YOUR COMPUTER, AND OTHERS ON THE INTERNET

INTE

RNE

T SAFE

TY

H O W T O P R O T E C T Y O U R S E L F , Y O U R C O M P U T E R , A N D O T H E R S O N T H E I N T E R N E T

http://www.thetechlabs.com/tech-news/internet-explorer-9-release-candidate/

Page 2: HOW TO PROTECT YOURSELF, YOUR COMPUTER, AND OTHERS ON THE INTERNET

INTERNET IN SOCIETY

Communication• Global Networking- communicate with people around the

world through social networking sites, webcams, instant messaging, email, etc.

Education• Use the internet to spread information and help students learn

• Classes can be taken online• Research information can be found online

Business• Online business management is available• Businesses can sell merchandise online• Online advertisement

Page 3: HOW TO PROTECT YOURSELF, YOUR COMPUTER, AND OTHERS ON THE INTERNET

INTERNET SECURITY & SAFETY

S E C U R I T Y

Internet Security is the use of software that helps protect your computer from harm.

S A F E T Y

Internet Safety is habits and precautions that you can take to help protect your computer and your safety.

Page 4: HOW TO PROTECT YOURSELF, YOUR COMPUTER, AND OTHERS ON THE INTERNET

INTERNET RISKS

Computer- can get infected with viruses, Trojans, worms, and spyware, which can all damage your computer and/or steal your personal information.

Family- your privacy can be invaded and your family can be put in danger.

Personal Information- criminals can steal your personal information and put you in financial distress.

Page 5: HOW TO PROTECT YOURSELF, YOUR COMPUTER, AND OTHERS ON THE INTERNET

VIRUSES WORMS

A software program designed to invade your computer and copy, damage, or delete your data.

It must be executed before it can infect

your computer.

You must activate the virus on your

computer by visiting unprotected websites

or downloading infected files.

A virus that needs no human interaction to

infect a computer

Worms spread through computer

systems on their own

Page 6: HOW TO PROTECT YOURSELF, YOUR COMPUTER, AND OTHERS ON THE INTERNET

TROJAN SPYWARE

A virus that pretends to be a helpful program while destroying

your data, damaging your computer and stealing your

personal information

A program used to track online

activity

Once spyware

has infected

your computer,

it can track your online path and

your location

Page 7: HOW TO PROTECT YOURSELF, YOUR COMPUTER, AND OTHERS ON THE INTERNET

RISKS T

O CHILD

REN

• Cyber Bullies• File Sharing

Abuse• Predators• Disturbing

Content• Invasion of

Privacy

Page 8: HOW TO PROTECT YOURSELF, YOUR COMPUTER, AND OTHERS ON THE INTERNET

CYBER BULLIES

Cyber Bullies are online abusers who target and bully other through use

of the internet

Cyber Bullying is illegal

Page 9: HOW TO PROTECT YOURSELF, YOUR COMPUTER, AND OTHERS ON THE INTERNET

FILE SHARING ABUSE

File sharing abuse is the downloading of illegal content through use of the internet. (music, video, etc.)

Like cyber bullying, this is a crime that is punishable by law.

Page 10: HOW TO PROTECT YOURSELF, YOUR COMPUTER, AND OTHERS ON THE INTERNET

PREDATORS

An online predator is an adult Internet user who exploits vulnerable children or teens, usually for sexual or other abusive purposes.

Be careful of giving out personal information. You never know who is on the other end.

Page 11: HOW TO PROTECT YOURSELF, YOUR COMPUTER, AND OTHERS ON THE INTERNET

DISTURBING CONTENT

If unsupervised, children may stumble upon disturbing content that you probably don’t want them to see.

Page 12: HOW TO PROTECT YOURSELF, YOUR COMPUTER, AND OTHERS ON THE INTERNET

INVASION OF PRIVACY

Children can unknowingly give away personal information that thieves can use to invade your other personal information.

Page 13: HOW TO PROTECT YOURSELF, YOUR COMPUTER, AND OTHERS ON THE INTERNET

ONLINE S

AFETY

• Identity Theft• Phishing• Hoaxes• Spam

RISKS

Page 14: HOW TO PROTECT YOURSELF, YOUR COMPUTER, AND OTHERS ON THE INTERNET

IDENTITY THEFT

Criminals can get your personal information through the internet.

If you are asked to give out personal information over the internet or phone, for example by your credit card company, check with your credit company by calling and confirming that they need your information.

After your information is stolen, thieves use it to open other accounts that ruin your finances and credibility.

Page 15: HOW TO PROTECT YOURSELF, YOUR COMPUTER, AND OTHERS ON THE INTERNET

PHISHING

Criminals often pose as trustworthy entities that request money or information from your account.

They send emails requesting usernames, passwords, and other account information.

Page 16: HOW TO PROTECT YOURSELF, YOUR COMPUTER, AND OTHERS ON THE INTERNET

HOAXES

• Hoaxes are tricks that usually ask for money in return for a fraudulent prize

• They usually say things such as “You’ve Won!” or “You’re the 100th Winner!”

Page 17: HOW TO PROTECT YOURSELF, YOUR COMPUTER, AND OTHERS ON THE INTERNET

SPAM

Spam is the same email that is sent to massive numbers of people, usually advertisements.

Page 18: HOW TO PROTECT YOURSELF, YOUR COMPUTER, AND OTHERS ON THE INTERNET

HOW T

O PROTE

CT YO

UR

LIFE

• Protecting your computer

• Protecting your family

• Protecting your personal information

Page 19: HOW TO PROTECT YOURSELF, YOUR COMPUTER, AND OTHERS ON THE INTERNET

PROTECTING YOUR COMPUTER

• Keep updated with the latest firewall and antivirus software.

• Stay away from unknown sites that you are not familiar with.

• Research them and ensure that they are legitimate before visiting.

Page 20: HOW TO PROTECT YOURSELF, YOUR COMPUTER, AND OTHERS ON THE INTERNET

PROTECTING YOURSELF

Never respond to any email or message that asks for information and has a sense of urgency. Urgency is a clear giveaway of criminal activity.

Check to see if the messages addresses you personally. This is another hint of internet fraud.

Page 21: HOW TO PROTECT YOURSELF, YOUR COMPUTER, AND OTHERS ON THE INTERNET

PROTECTING YOUR FAMILY

Be sure that your family knows the risks and dangers of the internet. Be sure that you and they know what not to do and safe steps to take on the internet.

Page 22: HOW TO PROTECT YOURSELF, YOUR COMPUTER, AND OTHERS ON THE INTERNET

Click icon to add picture

BACKING U

P YO

UR FILE

S

Page 23: HOW TO PROTECT YOURSELF, YOUR COMPUTER, AND OTHERS ON THE INTERNET

BACKING UP YOUR FILES

Backing up your files means that you keep multiple copies of them, so if one gets damaged or lost, you still have it saved in another place.

Page 24: HOW TO PROTECT YOURSELF, YOUR COMPUTER, AND OTHERS ON THE INTERNET

WHERE TO BACK UP FILES

• 3 Backups

• Have 3 backup files so that if one gets lost or infected, you wont be at a total loss.

• Keep one backup away from your original access point

• It always helps to have a backup

Page 25: HOW TO PROTECT YOURSELF, YOUR COMPUTER, AND OTHERS ON THE INTERNET

HOW TO BACK UP YOUR FILES

• DO NOT back up files on a thumb drive

• They are meant for convenience, not permanent storage

• Save files in different locations to avoid a total loss if file trouble occurs

Page 26: HOW TO PROTECT YOURSELF, YOUR COMPUTER, AND OTHERS ON THE INTERNET

CHILDREN'S

ONLIN

E

SAFETY

• Setting rules• Protecting

informationA m

essa

ge to

par

ents

Page 27: HOW TO PROTECT YOURSELF, YOUR COMPUTER, AND OTHERS ON THE INTERNET

SETTING CLEAR RULES

Setting clear rules is the first step to leading your child on a safe journey through the internet.

Set rules such as internet usage times and sites that shouldn’t be visited.

Page 28: HOW TO PROTECT YOURSELF, YOUR COMPUTER, AND OTHERS ON THE INTERNET

KEEPING YOUR INFORMATION SAFE

Be sure that your children know not to talk to anyone that they meet on the computer, and not to give out information such as their address.

Page 29: HOW TO PROTECT YOURSELF, YOUR COMPUTER, AND OTHERS ON THE INTERNET

Click icon to add picture

INTE

RNET P

RIVACY

SETTI

NGS

Keepin

g saf

e fr

om P

REDATO

RS

Page 30: HOW TO PROTECT YOURSELF, YOUR COMPUTER, AND OTHERS ON THE INTERNET

PRIVACY SETTINGS

Always have secure privacy settings on any account that you have. Any

personal information on your account can be viewed by anyone in the world

without proper privacy settings.

Page 31: HOW TO PROTECT YOURSELF, YOUR COMPUTER, AND OTHERS ON THE INTERNET

PRIVACY ON FACEBOOK

To set privacy settings on Facebook, log into your account from the home screen

Page 32: HOW TO PROTECT YOURSELF, YOUR COMPUTER, AND OTHERS ON THE INTERNET

PRIVACY SETTINGS ON FACEBOOK

Once you are signed in, scroll to the bottom screen and click the privacy link

Page 33: HOW TO PROTECT YOURSELF, YOUR COMPUTER, AND OTHERS ON THE INTERNET

PRIVACY SETTINGS

Once the link is clicked, the privacy settings options page should be displayed. Read the links to find which privacy settings you want to change. The stricter the settings, the better protected you are.

Page 34: HOW TO PROTECT YOURSELF, YOUR COMPUTER, AND OTHERS ON THE INTERNET

PRIVACY SETTINGS CONTINUED

From the previous screen, click the first link titled “Information we receive and how it is used”. This will take you to steps and information you need to learn about how the public views your personal information.