   A website that is considered secure uses    some type of encryption when transferring    data across the Internet. Enc...
   When logging into a server or buying    online items, look out for the “padlock”    sign which will be on the bottom r...
   Pop-up ads are small windows that open    automatically on your screen. They often    (but not always) display adverti...
   Security software is the preliminary step    to keeping yourself and your computer    safe. In order to do that, purch...
   http://www.webopedia.com/DidYouKno    w/Internet/2004/spyware.asp
› Definition- intrusive Adware that should  be avoided for privacy/security reasons:   http://www.webopedia.com/DidYouKno...
   Computer viruses (also known as “malware”) that can    often come with things you download will harm your    computer....
BitDefender Antivirus   http://www.bitdefender.com/Kasperky Antivirus      http://usa.kaspersky.com/store/all-products?c_i...
   http://www.microsoft.com/security/pc-    security/products-faq.aspx
   Often times, the antivirus you purchase    will include protection for an array of    things. The software also can in...
   Firewall: Helps make your computer invisible to online attackers and    blocks some malicious software. It can also he...
   It is possible for someone to steal your personal    information or identity if you share this    information on an un...
 Cookies are small files that websites put  on your computer hard disk drive after  your first visit, and may continue to...
   Creating strong, complex passwords you    can remember is important for    protecting your identity online.   http://...
1)   Use caution when you click links in messages you receive; treat them like you would an email.2)   Be aware of what yo...
 http://www.microsoft.com/security/onlin  e-privacy/social-networking.aspx http://www.microsoft.com/security/famil  y-sa...
 Phishing email messages and websites  are designed to trick you into revealing  personal or financial information throug...
We’d love to hear from you!Please return to the Projects page to share your thoughts on this presentation in the          ...
Verizon Internet Literacy Project
Verizon Internet Literacy Project
Verizon Internet Literacy Project
Verizon Internet Literacy Project
Verizon Internet Literacy Project
Upcoming SlideShare
Loading in …5
×

Verizon Internet Literacy Project

1,752 views
1,712 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,752
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
4
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Verizon Internet Literacy Project

  1. 1.  A website that is considered secure uses some type of encryption when transferring data across the Internet. Encryption ensures that no one is able to sniff the information and take all of the data a person is submitting on the site, but sometimes some sites still have some type of vulnerability.
  2. 2.  When logging into a server or buying online items, look out for the “padlock” sign which will be on the bottom right of the website page (refer to image below!)
  3. 3.  Pop-up ads are small windows that open automatically on your screen. They often (but not always) display advertising, which can be from legitimate businesses, but also might be scams or dangerous software. To filter these out, install a pop- up blocker.
  4. 4.  Security software is the preliminary step to keeping yourself and your computer safe. In order to do that, purchasing or downloading safe security software should be the first step in protecting yourself. There are many dangers on the internet that can harm your computer and that may violate your level of privacy.
  5. 5.  http://www.webopedia.com/DidYouKno w/Internet/2004/spyware.asp
  6. 6. › Definition- intrusive Adware that should be avoided for privacy/security reasons:  http://www.webopedia.com/DidYouKnow/Int ernet/2004/spyware.asp› Definition, more info:  http://www.microsoft.com/security/pc- security/spyware-whatis.aspx› How to prevent with antispyware software: http://www.microsoft.com/security/pc- security/products-faq.aspx
  7. 7.  Computer viruses (also known as “malware”) that can often come with things you download will harm your computer. They are small software programs designed to spread from one computer to the next and interfere with how your computer works. They can be disguised as attachments in email messages, instant messages, or hidden in software that you might download. To help avoid computer viruses, you must keep up with the latest updates and antivirus software. Scan your computer regularly with your antivirus software and beware of the signs of an infected computer. Click this link for more information: http://www.microsoft.com/security/pc- security/antivirus.aspx
  8. 8. BitDefender Antivirus http://www.bitdefender.com/Kasperky Antivirus http://usa.kaspersky.com/store/all-products?c_id=GOO1673628KingSoft Antivirus http://www.kingsoftresearch.com/Norton Antivirus http://us.norton.com/ESET Nod32 Antivirus http://www.eset.com/us/AVG Antivirus http://www.avg.com/us-en/buyav-ppc_1G DATA Antivirus http://www.avg.com/us-en/buyav-ppc_1Avira AntiVir http://www.avira.com/Vipre Antivirus http://www.vipreantivirus.com/Trend Micro Titanium http://us.trendmicro.com/us/home/index.htmlMcAfee Antivirus http://www.mcafee.com/us/
  9. 9.  http://www.microsoft.com/security/pc- security/products-faq.aspx
  10. 10.  Often times, the antivirus you purchase will include protection for an array of things. The software also can include protections such as a firewall, adware, antispyware, and phishing filter, depending on the package you purchase
  11. 11.  Firewall: Helps make your computer invisible to online attackers and blocks some malicious software. It can also help prevent software on your computer from accessing the Internet to updates and modification without your permission. Adware: disables ads from popping up on your computer Anti-Spyware: prevents applications from keeping tack of your surfing habits in order to serve ads related to you. Phishing Filter: helps detect phishing websites Firewall › Definition: http://www.microsoft.com/security/pc-security/firewalls- whatis.aspx › Definition, why it’s important: http://www.microsoft.com/security/pc- security/products-faq.aspx Defragmenting: To keep your computer running smoothly and at a good speed, remember to defragment it regularly. On PCs, there is an option to do so, just search it and you will be able to find it. http://www.wisegeek.com/what-is-defragmenting-a-computer.html
  12. 12.  It is possible for someone to steal your personal information or identity if you share this information on an unsecured site. One way you can protect yourself is by not entering personal data in any website that is not secure. Information that should be carefully guarded includes your name, phone number, Social Security number, address, birthday, account numbers, credit card numbers, etc. http://www.surfnetparents.com/talking_to_you r_children_about_unsecure_web_sites- 18879.html
  13. 13.  Cookies are small files that websites put on your computer hard disk drive after your first visit, and may continue to save your data. While it is possible to misuse a cookie in cases where there is personal data in it, cookies by themselves are not malicious. http://www.microsoft.com/security/reso urces/cookie-whatis.aspx
  14. 14.  Creating strong, complex passwords you can remember is important for protecting your identity online. http://www.microsoft.com/security/onlin e-privacy/passwords-create.aspx
  15. 15. 1) Use caution when you click links in messages you receive; treat them like you would an email.2) Be aware of what you post about yourself. Never offer personal information.3) Don’t trust that a message is really who you think it’s from, as it may be fraudulent.4) To avoid giving away email addresses of your friends, do not allow social networking services to scan your email address book.5) Be selective about who you accept as a friend on a social network. Identity thieves might create fake profiles in order to get information from you.6) Choose your social network carefully. Evaluate the site that you plan to use and make sure you understand the privacy policy.7) Assume that everything you put on a social networking site is permanent. Even if you can delete your account, anyone on the Internet can easily print photos or text or save images and videos to a computer.8) Be careful about installing third-party applications that let you do more with your personal page. Criminals sometimes use these applications to steal your personal information.9) Be carefully with using social networks at work, as unwanted software can spread through social networks and into workplace networks. These outbreaks can damage computer systems and might even steal sensitive information from your company.
  16. 16.  http://www.microsoft.com/security/onlin e-privacy/social-networking.aspx http://www.microsoft.com/security/famil y-safety/blogging.aspx
  17. 17.  Phishing email messages and websites are designed to trick you into revealing personal or financial information through emails or websites. *Remember to only open emails you trust and are expecting. Here are some examples you should be aware of in an email!!
  18. 18. We’d love to hear from you!Please return to the Projects page to share your thoughts on this presentation in the comments box. Thank you!

×