Your SlideShare is downloading. ×
  • Like
Keeping Your Children, your information and your equiptment safe
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Now you can save presentations on your phone or tablet

Available for both IPhone and Android

Text the download link to your phone

Standard text messaging rates apply

Keeping Your Children, your information and your equiptment safe

  • 1,525 views
Published

Internet Safety from COMPUTER EXPLORERS: keeping your children, your information and your equiptment safe

Internet Safety from COMPUTER EXPLORERS: keeping your children, your information and your equiptment safe

Published in Education , Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads

Views

Total Views
1,525
On SlideShare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
58
Comments
0
Likes
2

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide
  • Welcome to “Internet Safety and You”! I am ( your name ), ( owner, director, etc) of COMPUTER EXPLORERS. The presentation today is designed to help you arm yourself with facts and tips to keep you safe while using the Internet.

Transcript

  • 1. Internet Safety and You How to keep you, your children, your information, and your equipment safe. http://www.computerexplorers.com
  • 2. Protecting Your Computer
    • Viruses
    • Trojan Horses
    • Worms
    • Spyware
    • Adware
    • Malware
    • What are they?
    http://www.computerexplorers.com
  • 3. Viruses
    • Virus – a computer program that can copy itself and infect a computer without permission or knowledge of the user
    • How do viruses spread?
    • makes copies of itself in a computer’s memory, storage or over a network
    • transferred on a floppy disk, CD/DVD, or USB storage device to another computer
    • sent via an e-mail message over the Internet
    http:// www.computerexplorers.com
  • 4. Trojan Horses
    • Trojan Horse - a program that installs malicious software while under the guise of doing something else.
    • How do Trojan Horses spread?
    • Does not spread by inserting its code into computer files
    • The malicious program has to be run by the recipient in order to install
    http://www.computerexplorers.com
    • What do Trojan Horses look like?
    • An image
    • A game
    • Weather alerting software
  • 5. Worms
    • Worm - a self-replicating computer program.
    • How does a worm work?
    • Uses a network to send copies of itself to other computers on the network
    • May copy itself without a person executing the program
    http:// www.computerexplorers.com
    • How is a worm different from a virus?
    • Does not need to attach itself to an existing program
    • Harms the network; viruses infect files on a computer
  • 6. Protect Your Computer Install complete Anti-virus protection
    • What should my Anti-virus software do :
    • recognize current viruses, as well as older ones
    • effectively reverse the damage
    • update automatically
    • run smart or partial scans
    http://www.computerexplorers.com
  • 7. Available Anti-virus Software COMPUTER EXPLORERS ® in no way endorses or warrants the purchase, download, or use of the listed software.
    • Software for purchase:
    • Norton AntiVirus ®
    • http://www.symantec.com
    • McAfee ®
    • http://www.mcafee.com
    • ZoneAlarm ®
    • http://www.zonealarm.com
    • CA ® Anti-virus
    • http://www.ca.com
    • Free downloads :
    • AVG Anti-virus
    • http://www.avg.com
    • avast! 4 Home Edition
    • http://www.avast.com
    • Avira AntiVir Personal Edition
    • http://www.free-av.com
    http://www.computerexplorers.com
  • 8. Spyware
    • Spyware - programming that is put in someone's computer, without his/her knowledge, to gather information about the user and relay it to advertisers or other interested parties
    • How does Spyware work?
    • Gathers information about the user for marketing purposes
    • Delivers unwanted pop-up ads
    • Steals personal information
    • Can interfere with user control of the computer by:
      • Installing additional software
      • Redirecting web browser pages
      • Diverting advertising revenue to a third party
    http://www.computerexplorers.com
  • 9. Adware
    • Adware - any software package which automatically plays, displays, or downloads advertising material to a computer after the software is installed on it or while the application is being used
    • Adware Prevention Tips:
    • Avoid installing adware
    • Keep up-to-date with security patches and operating system updates from Windows Update
    • If using a version of Internet Explorer earlier than version 7, set the browser to prompt the user for ActiveX installation
    • Use an alternative Web browser (e.g. Opera, Mozilla Firefox, Safari, etc.)
    • Install ad-blocking software
    http://www.computerexplorers.com
  • 10. Malware
    • Malware
    • (Malicious Software) – any program or file that is harmful to a computer user
    • Malware includes:
          • Viruses
          • Trojan horses
          • worms
          • spyware
    • Symptoms of Malware :
    • Sluggish or choppy computer performance
    • An onslaught of unwanted pop-up ads
    • New and unfamiliar toolbars or toolbar icons
    • Repeated or sudden changes in your Web browser home page
    http://www.computerexplorers.com
  • 11. Infested Computers http://www.computerexplorers.com Severe Case Mild Case
  • 12. Prevention Tips
    • The best defense against spyware and other unwanted software is not to download it in the first place.
    • Use alternative Web browsers other than Internet Explorer. Other browsers include Netscape, Mozilla Firefox, Opera, and Safari (for Mac users).
    • Only download programs from Web sites you trust.
    • Read all security warnings, license agreements, and privacy statements associated with any downloads.
    • Close unwanted pop-up windows by clicking the X in the right corner of the window. Never click “agree” or “OK” to close an unwanted window.
    • Be cautious about using "free" music and movie file-sharing programs, and be sure you clearly understand all of the software packaged with those programs.
    • Use spyware and adware removal software .
    http://www.computerexplorers.com
  • 13. Available Spyware and Adware Products COMPUTER EXPLORERS ® in no way endorses or warrants the purchase, download, or use of the listed software.
    • Ad-Aware
    • ( http://www.lavasoft.com )
    • Windows Defender ( http://www.microsoft.com/downloads )
    • Spybot Search & Destroy ( http://www.safer-networking.org )
    • Spyware Blaster ( http://www.javacoolsoftware.com )
    • Spyware Doctor ( http://www.pctools.com )
    • Many anti-virus companies are now creating security suites that include spyware and adware prevention. Those companies include:
      • Norton (Symantec)
      • McAfee
      • AVG
    • Important Note: Adware and spyware removers only detect and remove adware and spyware. These programs are not a replacement for anti-virus software.
    http://www.computerexplorers.com
  • 14. Pop-up Blockers
    • Within Web browsers:
    • Windows Browsers
    • Internet Explorer : Tools  Pop-up blocker  Pop-up Blocker settings
    • Mozilla Firefox : Tools  Options  Content Tab
    • Opera : Tools
    • **Note** Most browsers block pop-up windows or ads by default.
    • Within free toolbars
    • Yahoo! Toolbar ( http://toolbar.yahoo.com )
    • Google Toolbar ( http://toolbar.google.com )
    http://www.computerexplorers.com
  • 15. Firewalls
    • Available Personal Firewalls:
    • Windows firewall (free)
    • ZoneAlarm firewall (free or pay)
    • LavaSoft firewall (pay)
    • Look ‘n’ Stop firewall (free for 30 days then pay)
    http://www.computerexplorers.com What’s a Firewall? A firewall is a hardware or software device configured to allow or deny data through a computer network with different trust levels.
    • How does a Firewall work?
    • Prevents network intrusions
    • Prevents hackers from accessing personal information stored on your computer
  • 16. Protecting Your Information
    • Identity Theft
    • Fraudulent e-mail
    • Spoofing or Phishing
    • Intercepted e-mails or instant messages
    • Lurkers on discussion boards and chat rooms
    http://www.computerexplorers.com
  • 17. Spam Mail
    • Tips for Preventing Spam
    • Opt-out of e-mail marketing messages when registering with a Website.
    • Use an alternative e-mail address when registering for services on various Websites. Free e-mail providers include Hotmail, Yahoo, GMail, and others.
    • Read the fine print. Be sure you know how your e-mail will be used when registering with a site.
    • Daily Spam Mail Statistics *
      • June 2005 – 30 billion
      • June 2006 – 55 billion
      • December 2006 – 85 billion
      • June 2007 – 90 billion
      • April 2008 – over 100 billion
    • *Source: IronPoint Systems, Inc. and www.spamunit.com
    http://www.computerexplorers.com Spam – any message, regardless of its content, that is sent to multiple mailing lists, individuals or newsgroups. Also called bulk e-mail or junk e-mail.
  • 18. Fraudulent E-Mail
    • Be suspicious of any e-mail that requests:
      • Credit card information
      • Complete home address
      • Banking information
      • Username or passwords
      • Social security number
    http://www.computerexplorers.com Fraudulent e-mails are “spoofing” or “phishing” messages. Scammers use these methods to “fish” for consumer’s financial or other identifying information. These messages will create the impression the user has an urgent need to update his/her personal information.
  • 19. Tips to Protect Against “Phishing”
    • Remember that e-mail headers can be forged
    • Avoid providing info or filling out forms via e-mail because the data is not secure
    • Avoid clicking links within an unsolicited e-mail message
    • Ensure a website is secure before providing any personal information. Check for an address that begins with http s or the browser has a lock icon in the address bar or bottom of the screen.
    http://www.computerexplorers.com
  • 20. The Look of Fraudulent E-Mails http://www.computerexplorers.com Hovering over a link with the mouse cursor will reveal the real address the link will take you to. Don’t be fooled by the official looking header in this fraudulent e-mail.
  • 21. General Safety Tips
    • Use spam filters.
    • Be suspicious of unsolicited e-mail.
    • Treat e-mail attachments with caution.
    • Don’t click links in e-mail messages.
    • Create strong passwords. Use a combination of letters, numbers and symbols.
    • Change passwords frequently.
    • Use a pseudonym when participating in public online forums, chat rooms, discussion boards, etc.
    • Don’t reveal username, passwords, or personal information to anyone other than a trusted party.
    • Install anti-virus software and keep it up to date.
    • Install a personal firewall and keep it up to date.
    • Install spyware/adware software and keep it up to date.
    http:// www.computerexplorers.com
  • 22. Protecting You or Your Children Filtering and Site blocking http://www.computerexplorers.com
    • PC Based Software
    • Cyber Patrol
    • Net Nanny
    • Cyber Sitter
    • Web Based Filters
    • Earthlink
    • Comcast
    • AOL
    • Qwest
    • Search Engine controls
    • Google
    • Yahoo!
    • Windows Live Search (formerly MSN)
    • Ask.com
    • What can you filter?
    • Pornography
    • Sexually explicit content
    • Violence, including gaming sites and bomb making
  • 23. Online Social Situations
    • Chat rooms : a multi-user, simultaneous, real-time chat environment
    • MySpace : a social networking website that offers an interactive network of friends. The site includes personal profiles, blogs, groups, photos, videos and music. Other social networking sites include FaceBook, Friendster, Meetup.com, Nexopia, Orkut, hi5, and Xanga
    • Instant Messaging (IM) : a form of real-time, text-typed communication between two computers or devices connected via a network. Yahoo! Messenger, Google Talk, Skype Messenger, AOL Instant Messenger (AIM), MSN, and ICQ are just a few of the messaging clients.
    http://www.computerexplorers.com
  • 24.
    • Blogs : or Web logs, are entries written in chronological order. Entries can be online diaries or commentaries on a specific topic. Blogs generally include text, hyperlinks, pictures, and now videos
    • Forums : a web application for holding discussions posted by users. Discussions generally pertain to a common topic. Forums are often referred to as discussion boards, message boards or web forums
    • Online games : video games played over a computer network. Online games can range from simple text-based games to games incorporating complex graphics and virtual worlds allowing for multiple players to play simultaneously.
    Online Social Situations, cont. http://www.computerexplorers.com
  • 25. Popular Social Sites for Teens and Pre-teens
    • Pre-teens (6-12)
    • Club Penguin
    • WebKinz
    • Whyville.net
    • Nicktropolis
    • Disney Xtreme Digital
    • Teens (13+)
    • MySpace
    • MyYearbook
    • Habbo Hotel
    • FaceBook
    • Live Journal
    http://www.computerexplorers.com Please note, your children are fickle. What may be popular today may not be popular tomorrow. Keep an eye on their surfing and investigate any unknown sites.
  • 26. Can you decipher these? FWIW, I thnk U R gr8t! Btw, ur BFF is a PITA OMG! LOL! Cul8r, H&K, ttyl http://www.computerexplorers.com
  • 27. Internet Safety Study
    • Teens have an established presence on social networking sites:
      • 61% of 13-17 year-olds have a profile on sites such as MySpace, Friendster, or Xanga
      • 50% of those have posted pictures of themselves online
        • Older teens (16-17s) and girls especially use the Internet for social interaction, meeting friends, and networking
      • 71% reported receiving messages online from someone they don’t know
      • 45% have been asked for personal information by someone they don’t know
      • 30% have considered meeting someone that they’ve only talk to online
      • 14% have actually met a person face-to-face that they’ve only spoken to over the Internet
        • 9% were 13-15 year-olds
        • 22% were 16-17 year-olds
      • Of those receiving messages from someone they don’t know, 40% report they’ll usually reply and chat with that person
        • Only 18% said they’ll tell an adult
            • Data from the National Center for Missing & Exploited Children
    http://www.computerexplorers.com
  • 28. Internet Safety Study
    • Perceptions of Safety:
    • 20% of teens report that it is somewhat or very safe to share personal information on a public blog or networking site
    • 37% of 13-17 year-olds said they are either “not very concerned” or “not at all concerned” about someone using information they’ve posted online in ways they don’t want
    • Do you know what your child is doing?:
    • 33% of 13-17 year-olds report their parents or guardians know “very little” or “nothing” about what they do on the Internet
    • 48% of 16-17 year-olds report their parents or guardians know “very little” or “nothing”
    • 22% of teens surveyed report their parents of guardians have never discussed Internet safety with them
    • 36% of teens, mostly girls and younger teens, have said their parents of guardians have talked to them “a lot” about online safety
    • 70% have said their parents or guardians have discussed the subject with them during the past year
            • Data from the National Center for Missing & Exploited Children
    http://www.computerexplorers.com
  • 29. Safety Tips for Parents or Guardians
    • Put the computer in a public area
    • Use tools available to make your job easier
    • Know where the children surf
    • Talk about Internet risks
    • Emphasize the Internet is a public place
    • Establish family rules for Internet use
    http://www.computerexplorers.com
  • 30. Remember Three Tips
    • Keep Current
      • Try to keep up with the latest technologies or sites.
    • Keep Communicating
      • Be sure to communicate with your children and keep up with their online activities.
    • Keep Checking
      • Use the History feature on your Web browser to see where your children have been.
    http://www.computerexplorers.com
  • 31. Safety Tips for Your Kids
    • Use a nickname that does not closely resemble your real name or reveal personal information.
    • Never reveal your real name, address, phone number, e-mail address, school, sports team, or favorite hang outs.
    • Refuse to meet someone you only know from online activities without a parent’s consent.
    • Always remember people online may not be who they say they are.
    • Tell a trusted adult if someone online threatens or does anything to make you feel uncomfortable.
    http://www.computerexplorers.com
  • 32. Don’t Be Afraid of the Internet
    • Use the Internet to your advantage.
    • Don’t know what that Website is your child visits daily?
    • Don’t know that acronym or short hand in your child’s chat history?
    • Got an attachment you’re not sure about?
    • Use a Search Engine.
    • Look it up!
    http://www.computerexplorers.com
  • 33. Contact Information Name: Phone: E-mail: www.computerexplorers.com www.computerexplorers.com/yourCEsite YOUR PHOTO HERE