1 / 16

Internet Security and Safety

Internet Security and Safety. By Daniel Carroll and Jarred Givens. Internet Advancements. The internet has helped further many fields and forms of technology, including: . Cell Phones TV and TV Providers Global Communication Transportation Data Storage Affordable Computers.

tovah
Télécharger la présentation

Internet Security and Safety

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Internet Security and Safety By Daniel Carroll and Jarred Givens

  2. Internet Advancements • The internet has helped further many fields and forms of technology, including: • Cell Phones • TV and TV Providers • Global Communication • Transportation • Data Storage • Affordable Computers

  3. Internet Benefits • The internet has also made noteworthy changes to communication, education and business in many ways, including social networking sites such as Facebook, web conference sites like gotowebinar, and has helped people worldwide communicate with ease, allowing business to be conducted quickly and efficiently on a global scale. • This easy mode of communication allows large amounts of information to be sent great distances with little hassle, so all of the aforementioned categories benefit from the internet.

  4. Security Vs Safety • Internet Security will help protect your computer from threats like viruses and worms, but no matter how much security your computer has, it can still get infected. • Internet Safety is what YOU do to protect your computer, yourself, and your family from online threats such as cyber bullies, disturbing content, invasion of privacy, and predators, as well as viruses, Trojans, worms, and spyware.

  5. Internet Risks • The internet is not full of nice, helpful people, and many of the internet’s citizens would like to ruin your life if you give them the chance, just for the laughs. • The internet has many good qualities, but there are just as many risks on it; knowing how to avoid risky internet behavior is key to your online safety. Taking steps such as exercising caution in which sites you go to and which emails you open are a big step towards online safety, and reduce risk significantly. • Computers can be very helpful, but if used in the wrong way, they can endanger you, your personal information, and your family. One such way is if you were to give information to someone you met on the internet like your county, the school you go to, or what fast food places you’ve recently went to, since all of those can be used to find you.

  6. Internet Threats • Viruses, Trojans, worms, and spyware can all hinder your computer and ability to utilize the internet. • Viruses are programs that once executed, replicate and may damage system files. They are typically .exe files. • Trojans are programs that pretend to be helpful but may take your personal information, delete system files, or slow down your computer. • Worms are viruses that can execute themselves, and once initially activated, they spread over a network, infecting all computers on the network. Like viruses, they replicate, and may delete important data. • Spyware monitors your website views, both what site and how often, and may keep a record of the keys you press, meaning it can steal your passwords if you use them, and may display seemingly endless ads.

  7. Dangers to Children • Cyber bullies are people who use the internet to attack others in varying ways, though mainly through posts on social networking sites. • File sharing abuse is the illegal sharing of files with others, and sometimes files acquired in this manner have viruses or other malware. • Predators try to get either enough information to find the people they talk to, or try to get you to meet them. • Disturbing content is all over the internet, and if left unattended, children may stumble across something you don’t want them to see. • Invasion of privacy could happen when a child fills out a survey promising some reward like a Xbox or PS3, when they talk to someone and give a little to much information, or if they download spyware or other malware.

  8. Identity Theft, Phishing, Hoaxes, and Spam • Identity theft is when someone takes enough of your personal information to pretend they are you and can ruin your good credit by buying things with your information. • Phishing is sending out fake emails in an attempt to get your passwords; phishing emails often act like a real email, but the hyperlink contained has some differences, like micosoft.com instead of microsoft.com. • Hoaxes are emails that pretend you are a lucky winner of some prize, whether money or goods, and ask for your personal information so they can get the prize to you. Instead, they use the information you provided to give themselves a prize. • Spam is simply unwanted and annoying ads and emails that fill up your inbox. Spam is easily deleted, and can be diverted to a “junk folder”.

  9. How to Protect Your Computer, Your Family, and Your Personal Info.

  10. Backups • Why is it important to backup your files? It is important to backup your files incase the original files are deleted. If your hard drive was to break, for example, you would lose many important files unless you had your files backed up properly. • How many backups should you have? You should have at least three backups and at least one should be stored securely off-site. • Thumb drives Thumb drives should not be used to backup your files. They are unreliable, easy to break, and are designed for temporary storage only. Thumb drives are designed as a convenient method of transporting files to another location. They should not be used for storage for an extended period of time. They should not be your only method of transporting files.

  11. Monitoring Children • Why is it important to monitor your children and what they do on the internet? It is important to monitor your children to protect them. There are many threats to children on the internet. It is important to teach your children to protect themselves from these threats, which include online criminals, invasion of privacy, inappropriate content, and predators. • What steps should you take to reduce online risk for your children? • Talk with your kids about online risks and teach them how appropriate online behavior can protect them from these risks • Keep your computer in a central location • Know how your children use the internet • Teach your children to use their instincts and report any problems or suspicious activity

  12. Built in Security and Privacy Settings • Built in security and privacy settings are very useful. They save the users a lot of trouble trying to protect themselves and their families on the internet, but only if they are utilized correctly. Facebook can be used to demonstrate how the correct usage of privacy settings will help protect you and your personal information from strangers.

  13. Facebook Privacy Settings

  14. Facebook Privacy Settings

  15. Facebook Privacy Settings

  16. Facebook Privacy Settings

More Related