• Like
  • Save
Verizon Internet Literacy Project
Upcoming SlideShare
Loading in...5

Verizon Internet Literacy Project






Total Views
Views on SlideShare
Embed Views



4 Embeds 626

http://www.apapa.org 490
http://apapa.org 82
http://dev.apapa.org:8081 53
http://translate.googleusercontent.com 1



Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment

    Verizon Internet Literacy Project Verizon Internet Literacy Project Presentation Transcript

    •  A website that is considered secure uses some type of encryption when transferring data across the Internet. Encryption ensures that no one is able to sniff the information and take all of the data a person is submitting on the site, but sometimes some sites still have some type of vulnerability.
    •  When logging into a server or buying online items, look out for the “padlock” sign which will be on the bottom right of the website page (refer to image below!)
    •  Pop-up ads are small windows that open automatically on your screen. They often (but not always) display advertising, which can be from legitimate businesses, but also might be scams or dangerous software. To filter these out, install a pop- up blocker.
    •  Security software is the preliminary step to keeping yourself and your computer safe. In order to do that, purchasing or downloading safe security software should be the first step in protecting yourself. There are many dangers on the internet that can harm your computer and that may violate your level of privacy.
    •  http://www.webopedia.com/DidYouKno w/Internet/2004/spyware.asp
    • › Definition- intrusive Adware that should be avoided for privacy/security reasons:  http://www.webopedia.com/DidYouKnow/Int ernet/2004/spyware.asp› Definition, more info:  http://www.microsoft.com/security/pc- security/spyware-whatis.aspx› How to prevent with antispyware software: http://www.microsoft.com/security/pc- security/products-faq.aspx
    •  Computer viruses (also known as “malware”) that can often come with things you download will harm your computer. They are small software programs designed to spread from one computer to the next and interfere with how your computer works. They can be disguised as attachments in email messages, instant messages, or hidden in software that you might download. To help avoid computer viruses, you must keep up with the latest updates and antivirus software. Scan your computer regularly with your antivirus software and beware of the signs of an infected computer. Click this link for more information: http://www.microsoft.com/security/pc- security/antivirus.aspx
    • BitDefender Antivirus http://www.bitdefender.com/Kasperky Antivirus http://usa.kaspersky.com/store/all-products?c_id=GOO1673628KingSoft Antivirus http://www.kingsoftresearch.com/Norton Antivirus http://us.norton.com/ESET Nod32 Antivirus http://www.eset.com/us/AVG Antivirus http://www.avg.com/us-en/buyav-ppc_1G DATA Antivirus http://www.avg.com/us-en/buyav-ppc_1Avira AntiVir http://www.avira.com/Vipre Antivirus http://www.vipreantivirus.com/Trend Micro Titanium http://us.trendmicro.com/us/home/index.htmlMcAfee Antivirus http://www.mcafee.com/us/
    •  http://www.microsoft.com/security/pc- security/products-faq.aspx
    •  Often times, the antivirus you purchase will include protection for an array of things. The software also can include protections such as a firewall, adware, antispyware, and phishing filter, depending on the package you purchase
    •  Firewall: Helps make your computer invisible to online attackers and blocks some malicious software. It can also help prevent software on your computer from accessing the Internet to updates and modification without your permission. Adware: disables ads from popping up on your computer Anti-Spyware: prevents applications from keeping tack of your surfing habits in order to serve ads related to you. Phishing Filter: helps detect phishing websites Firewall › Definition: http://www.microsoft.com/security/pc-security/firewalls- whatis.aspx › Definition, why it’s important: http://www.microsoft.com/security/pc- security/products-faq.aspx Defragmenting: To keep your computer running smoothly and at a good speed, remember to defragment it regularly. On PCs, there is an option to do so, just search it and you will be able to find it. http://www.wisegeek.com/what-is-defragmenting-a-computer.html
    •  It is possible for someone to steal your personal information or identity if you share this information on an unsecured site. One way you can protect yourself is by not entering personal data in any website that is not secure. Information that should be carefully guarded includes your name, phone number, Social Security number, address, birthday, account numbers, credit card numbers, etc. http://www.surfnetparents.com/talking_to_you r_children_about_unsecure_web_sites- 18879.html
    •  Cookies are small files that websites put on your computer hard disk drive after your first visit, and may continue to save your data. While it is possible to misuse a cookie in cases where there is personal data in it, cookies by themselves are not malicious. http://www.microsoft.com/security/reso urces/cookie-whatis.aspx
    •  Creating strong, complex passwords you can remember is important for protecting your identity online. http://www.microsoft.com/security/onlin e-privacy/passwords-create.aspx
    • 1) Use caution when you click links in messages you receive; treat them like you would an email.2) Be aware of what you post about yourself. Never offer personal information.3) Don’t trust that a message is really who you think it’s from, as it may be fraudulent.4) To avoid giving away email addresses of your friends, do not allow social networking services to scan your email address book.5) Be selective about who you accept as a friend on a social network. Identity thieves might create fake profiles in order to get information from you.6) Choose your social network carefully. Evaluate the site that you plan to use and make sure you understand the privacy policy.7) Assume that everything you put on a social networking site is permanent. Even if you can delete your account, anyone on the Internet can easily print photos or text or save images and videos to a computer.8) Be careful about installing third-party applications that let you do more with your personal page. Criminals sometimes use these applications to steal your personal information.9) Be carefully with using social networks at work, as unwanted software can spread through social networks and into workplace networks. These outbreaks can damage computer systems and might even steal sensitive information from your company.
    •  http://www.microsoft.com/security/onlin e-privacy/social-networking.aspx http://www.microsoft.com/security/famil y-safety/blogging.aspx
    •  Phishing email messages and websites are designed to trick you into revealing personal or financial information through emails or websites. *Remember to only open emails you trust and are expecting. Here are some examples you should be aware of in an email!!
    • We’d love to hear from you!Please return to the Projects page to share your thoughts on this presentation in the comments box. Thank you!