The Missouri River Regional Library The Basics of Internet Safety
The Good <ul><li>Communication </li></ul><ul><li>Information </li></ul><ul><li>Entertainment </li></ul><ul><li>Sharing </l...
The Bad <ul><li>Spam </li></ul><ul><li>Phishing </li></ul><ul><li>Identity Theft </li></ul><ul><li>Adware </li></ul><ul><l...
The Internet Can Seem Like a Scary Place http://www.flickr.com/photos/rling/438040809/
The Good News Last year your odds of becoming a cyber victim dropped  from 1 in 4 to 1 in 6  - stats from Consumer Reports...
The Bad News your odds of becoming a victim are 1 in 6 - stats from Consumer Reports, Sept 2008, pg 23
Spam <ul><li>Unsolicited messages </li></ul>http://www.flickr.com/photos/grumbler/532250527/
True or False <ul><li>If I get unwanted email I should click on the “unsubscribe” link </li></ul><ul><li>False! </li></ul>
Not just for email anymore <ul><li>E-mail spam,  </li></ul><ul><li>Instant messaging  </li></ul><ul><li>Blogs </li></ul><u...
Protection <ul><li>Email with a good filter –  email </li></ul><ul><li>Don’t open spam -  email </li></ul><ul><li>Get an e...
Fishing? http://www.flickr.com/photos/peterhess/2682317551/
Not That Kind - Phishing <ul><li>The process of attempting to acquire sensitive information such as usernames, passwords a...
Protection <ul><li>Don’t access your accounts from an email link </li></ul><ul><li>Don’t respond to fear tactics </li></ul...
Identity Theft <ul><li>your personal information is stolen and used without your knowledge to commit fraud or other crimes...
Protection <ul><li>Don’t download free software </li></ul><ul><li>Don’t click on email links to log into accounts </li></u...
Adware <ul><li>Software that pops up advertisements on a user's computer. </li></ul><ul><li>ads targeted to the individual...
Spyware <ul><li>Software installed covertly on a personal computer to intercept or take partial control over the user's in...
Pop Ups <ul><li>A small window that is displayed on top of the existing windows on screen </li></ul><ul><li>-pc magazine <...
Protection <ul><li>Don’t download free software </li></ul><ul><li>Don’t click on pop-ups </li></ul><ul><li>Don’t click on ...
Flaming <ul><li>Hostile and insulting interaction </li></ul><ul><li>Usually occurs in the social context of a discussion b...
Protection <ul><li>Don’t feed the “trolls” </li></ul><ul><li>Think twice, or three times  </li></ul><ul><li>Count to ten <...
Stalking, Harassment, Bullying   <ul><li>The attacker harasses a victim using electronic communication, such as e-mail or ...
Some examples <ul><li>Unwanted emails </li></ul><ul><li>Unwanted Instant Messages </li></ul><ul><li>Posting lies, hateful ...
Protection <ul><li>Don’t get involved in flame wars </li></ul><ul><li>Don’t share personal information online </li></ul><u...
If you are being stalked, bullied or harassed <ul><li>Save messages </li></ul><ul><li>Screenshots </li></ul><ul><li>Save s...
Predators <ul><li>Attempt to exploit  people, usually for sexual or financial purposes  </li></ul>http://flickr.com/photos...
Protection <ul><li>Consider not posting a photo </li></ul><ul><li>Limit what personal information you share </li></ul><ul>...
7 Online Blunders <ul><li>Assuming your security software is protecting you </li></ul><ul><li>Accessing an account through...
More Resources <ul><li>http://besafe.more.net/ </li></ul><ul><li>http://besafe.more.net/sam/resources.shtml </li></ul><ul>...
Upcoming SlideShare
Loading in...5
×

The Basics Of Internet Safety

2,900

Published on

Created for adult computers classes at the Missouri River Regional Library

Published in: Technology, News & Politics
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
2,900
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
1
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide
  • Transcript of "The Basics Of Internet Safety"

    1. 1. The Missouri River Regional Library The Basics of Internet Safety
    2. 2. The Good <ul><li>Communication </li></ul><ul><li>Information </li></ul><ul><li>Entertainment </li></ul><ul><li>Sharing </li></ul><ul><li>Connecting </li></ul>
    3. 3. The Bad <ul><li>Spam </li></ul><ul><li>Phishing </li></ul><ul><li>Identity Theft </li></ul><ul><li>Adware </li></ul><ul><li>Spyware </li></ul><ul><li>Pop-ups </li></ul><ul><li>Flaming </li></ul><ul><li>Stalking, harassment ,bullying </li></ul>
    4. 4. The Internet Can Seem Like a Scary Place http://www.flickr.com/photos/rling/438040809/
    5. 5. The Good News Last year your odds of becoming a cyber victim dropped from 1 in 4 to 1 in 6 - stats from Consumer Reports, Sept 2008, pg 23
    6. 6. The Bad News your odds of becoming a victim are 1 in 6 - stats from Consumer Reports, Sept 2008, pg 23
    7. 7. Spam <ul><li>Unsolicited messages </li></ul>http://www.flickr.com/photos/grumbler/532250527/
    8. 8. True or False <ul><li>If I get unwanted email I should click on the “unsubscribe” link </li></ul><ul><li>False! </li></ul>
    9. 9. Not just for email anymore <ul><li>E-mail spam, </li></ul><ul><li>Instant messaging </li></ul><ul><li>Blogs </li></ul><ul><li>Wiki </li></ul><ul><li>Mobile phone messaging </li></ul><ul><li>Internet forums </li></ul><ul><li>Fax </li></ul>
    10. 10. Protection <ul><li>Email with a good filter – email </li></ul><ul><li>Don’t open spam - email </li></ul><ul><li>Get an email address just for use online - email </li></ul><ul><li>Turn on comment moderation – blogs, wikis </li></ul><ul><li>Turn comments off – blogs, wikis, flickr </li></ul><ul><li>Restriction access – forums, blogs, wikis, flickr </li></ul><ul><li>Limit who get’s your contact information – email, IM, Fax, Text </li></ul>
    11. 11. Fishing? http://www.flickr.com/photos/peterhess/2682317551/
    12. 12. Not That Kind - Phishing <ul><li>The process of attempting to acquire sensitive information such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication </li></ul><ul><li>- http://en.wikipedia.org/wiki/Phishing </li></ul>
    13. 13. Protection <ul><li>Don’t access your accounts from an email link </li></ul><ul><li>Don’t respond to fear tactics </li></ul><ul><li>Know who the link is from </li></ul><ul><li>Be suspicious of links from people you know </li></ul><ul><li>Look for substitutions 0 for O, 1 for L or I, etc </li></ul>
    14. 14. Identity Theft <ul><li>your personal information is stolen and used without your knowledge to commit fraud or other crimes </li></ul><ul><li>- http://www.ftc.gov/bcp/edu/microsites/idtheft/ </li></ul>http://www.flickr.com/photos/carbonnyc/57280104/
    15. 15. Protection <ul><li>Don’t download free software </li></ul><ul><li>Don’t click on email links to log into accounts </li></ul><ul><li>Use anti-virus software </li></ul><ul><li>Use anti-spyware software </li></ul><ul><li>Use a firewall </li></ul><ul><li>https </li></ul><ul><li>Credit reports </li></ul><ul><li>Don’t send confidential information via email </li></ul><ul><li>Use a complex password </li></ul><ul><li>Use one credit card for online transactions – review the statements carefully </li></ul>
    16. 16. Adware <ul><li>Software that pops up advertisements on a user's computer. </li></ul><ul><li>ads targeted to the individual user based on data collected from key words entered in search engines and the types of Web sites visited. </li></ul><ul><li>- pc magazine </li></ul>http://www.flickr.com/photos/djm/17328024/
    17. 17. Spyware <ul><li>Software installed covertly on a personal computer to intercept or take partial control over the user's interaction with the computer, without the user's informed consent. </li></ul><ul><li>- http://en.wikipedia.org/wiki/Spyware </li></ul>http://www.flickr.com/photos/practicalowl/314989744/
    18. 18. Pop Ups <ul><li>A small window that is displayed on top of the existing windows on screen </li></ul><ul><li>-pc magazine </li></ul>http://www.flickr.com/photos/paperghost/876640836/
    19. 19. Protection <ul><li>Don’t download free software </li></ul><ul><li>Don’t click on pop-ups </li></ul><ul><li>Don’t click on links from people you don’t know </li></ul><ul><li>Be wary of links from people you do know </li></ul><ul><li>Look for substitutions 0 for O, 1 for L or I, etc </li></ul><ul><li>Anti-spyware software </li></ul>
    20. 20. Flaming <ul><li>Hostile and insulting interaction </li></ul><ul><li>Usually occurs in the social context of a discussion board, chat or e-mail. </li></ul><ul><li>Attempt to assert authority or establish a position of superiority </li></ul><ul><li>Believes he or she carries the only valid opinion. </li></ul><ul><li>Personal attacks on those who disagree. </li></ul><ul><li>Wish to upset and offend other members of the forum (trolls) </li></ul>http://flickr.com/photos/cleaneugene/2438462422/
    21. 21. Protection <ul><li>Don’t feed the “trolls” </li></ul><ul><li>Think twice, or three times </li></ul><ul><li>Count to ten </li></ul><ul><li>Know and use proper netiquette </li></ul><ul><li>Trust your instincts </li></ul><ul><li>Leave the situation </li></ul>
    22. 22. Stalking, Harassment, Bullying <ul><li>The attacker harasses a victim using electronic communication, such as e-mail or instant messaging or messages posted to a Web site or a discussion group. </li></ul><ul><li>Relies upon the anonymity afforded by the Internet to allow them to stalk their victim without being detected. </li></ul>http://flickr.com/photos/blogjamdotorg/463043832/
    23. 23. Some examples <ul><li>Unwanted emails </li></ul><ul><li>Unwanted Instant Messages </li></ul><ul><li>Posting lies, hateful messages on discussion boards, blogs, forums etc </li></ul><ul><li>Pose as the victim and send/post offensive comment, content or emails </li></ul><ul><li>Fake photos </li></ul><ul><li>Fake websites </li></ul>
    24. 24. Protection <ul><li>Don’t get involved in flame wars </li></ul><ul><li>Don’t share personal information online </li></ul><ul><li>Ignore taunts </li></ul><ul><li>Trust your instincts </li></ul>
    25. 25. If you are being stalked, bullied or harassed <ul><li>Save messages </li></ul><ul><li>Screenshots </li></ul><ul><li>Save screen name, email address, profiles, etc </li></ul><ul><li>Block if possible </li></ul><ul><li>Contact your Internet Service Provider </li></ul><ul><li>Contact law enforcement </li></ul>
    26. 26. Predators <ul><li>Attempt to exploit people, usually for sexual or financial purposes </li></ul>http://flickr.com/photos/eldave/2037762175/
    27. 27. Protection <ul><li>Consider not posting a photo </li></ul><ul><li>Limit what personal information you share </li></ul><ul><li>Limit who can see your personal information </li></ul><ul><li>Don’t talk to strangers </li></ul><ul><li>Use a screen name that doesn’t reveal too much about you </li></ul><ul><li>Trust your instincts </li></ul>
    28. 28. 7 Online Blunders <ul><li>Assuming your security software is protecting you </li></ul><ul><li>Accessing an account through an email link </li></ul><ul><li>Using a single password for all online accounts </li></ul><ul><li>Downloading free software </li></ul><ul><li>Thinking your Mac shields you from all risks </li></ul><ul><li>Clicking on a pop-up ad that says your pc is insecure </li></ul><ul><li>Shopping online the way you do in stores </li></ul><ul><li>- from Consumer Reports, Sept 2008 pg 26 </li></ul>
    29. 29. More Resources <ul><li>http://besafe.more.net/ </li></ul><ul><li>http://besafe.more.net/sam/resources.shtml </li></ul><ul><li>http://www.wiredsafety.org/resources/powerpoint/cyberstalking_study.ppt . </li></ul><ul><li>http://www.beverlypd.org/pdf/PERSONAL%20SAFETY/CYBERSTALKING.pdf </li></ul><ul><li>http://www.fbi.gov/publications/pguide/pguidee.htm </li></ul><ul><li>http://safekids.com/2008/03/18/safety-myths-and-web-20/ </li></ul><ul><li>http://www.ftc.gov/bcp/edu/microsites/idtheft/ </li></ul><ul><li>http://www.ftc.gov/bcp/conline/edcams/freereports/index.html </li></ul><ul><li>https://www.annualcreditreport.com </li></ul><ul><li>http://www.snopes.com/ </li></ul><ul><li>http://besafe.more.net/ </li></ul><ul><li>http://inobtr.org/Intro.aspx </li></ul>

    ×