• Like
  • Save
The Basics Of Internet Safety
Upcoming SlideShare
Loading in...5
×

The Basics Of Internet Safety

  • 2,682 views
Uploaded on

Created for adult computers classes at the Missouri River Regional Library

Created for adult computers classes at the Missouri River Regional Library

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads

Views

Total Views
2,682
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
1
Comments
0
Likes
1

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. The Missouri River Regional Library The Basics of Internet Safety
  • 2. The Good
    • Communication
    • Information
    • Entertainment
    • Sharing
    • Connecting
  • 3. The Bad
    • Spam
    • Phishing
    • Identity Theft
    • Adware
    • Spyware
    • Pop-ups
    • Flaming
    • Stalking, harassment ,bullying
  • 4. The Internet Can Seem Like a Scary Place http://www.flickr.com/photos/rling/438040809/
  • 5. The Good News Last year your odds of becoming a cyber victim dropped from 1 in 4 to 1 in 6 - stats from Consumer Reports, Sept 2008, pg 23
  • 6. The Bad News your odds of becoming a victim are 1 in 6 - stats from Consumer Reports, Sept 2008, pg 23
  • 7. Spam
    • Unsolicited messages
    http://www.flickr.com/photos/grumbler/532250527/
  • 8. True or False
    • If I get unwanted email I should click on the “unsubscribe” link
    • False!
  • 9. Not just for email anymore
    • E-mail spam,
    • Instant messaging
    • Blogs
    • Wiki
    • Mobile phone messaging
    • Internet forums
    • Fax
  • 10. Protection
    • Email with a good filter – email
    • Don’t open spam - email
    • Get an email address just for use online - email
    • Turn on comment moderation – blogs, wikis
    • Turn comments off – blogs, wikis, flickr
    • Restriction access – forums, blogs, wikis, flickr
    • Limit who get’s your contact information – email, IM, Fax, Text
  • 11. Fishing? http://www.flickr.com/photos/peterhess/2682317551/
  • 12. Not That Kind - Phishing
    • The process of attempting to acquire sensitive information such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication
    • - http://en.wikipedia.org/wiki/Phishing
  • 13. Protection
    • Don’t access your accounts from an email link
    • Don’t respond to fear tactics
    • Know who the link is from
    • Be suspicious of links from people you know
    • Look for substitutions 0 for O, 1 for L or I, etc
  • 14. Identity Theft
    • your personal information is stolen and used without your knowledge to commit fraud or other crimes
    • - http://www.ftc.gov/bcp/edu/microsites/idtheft/
    http://www.flickr.com/photos/carbonnyc/57280104/
  • 15. Protection
    • Don’t download free software
    • Don’t click on email links to log into accounts
    • Use anti-virus software
    • Use anti-spyware software
    • Use a firewall
    • https
    • Credit reports
    • Don’t send confidential information via email
    • Use a complex password
    • Use one credit card for online transactions – review the statements carefully
  • 16. Adware
    • Software that pops up advertisements on a user's computer.
    • ads targeted to the individual user based on data collected from key words entered in search engines and the types of Web sites visited.
    • - pc magazine
    http://www.flickr.com/photos/djm/17328024/
  • 17. Spyware
    • Software installed covertly on a personal computer to intercept or take partial control over the user's interaction with the computer, without the user's informed consent.
    • - http://en.wikipedia.org/wiki/Spyware
    http://www.flickr.com/photos/practicalowl/314989744/
  • 18. Pop Ups
    • A small window that is displayed on top of the existing windows on screen
    • -pc magazine
    http://www.flickr.com/photos/paperghost/876640836/
  • 19. Protection
    • Don’t download free software
    • Don’t click on pop-ups
    • Don’t click on links from people you don’t know
    • Be wary of links from people you do know
    • Look for substitutions 0 for O, 1 for L or I, etc
    • Anti-spyware software
  • 20. Flaming
    • Hostile and insulting interaction
    • Usually occurs in the social context of a discussion board, chat or e-mail.
    • Attempt to assert authority or establish a position of superiority
    • Believes he or she carries the only valid opinion.
    • Personal attacks on those who disagree.
    • Wish to upset and offend other members of the forum (trolls)
    http://flickr.com/photos/cleaneugene/2438462422/
  • 21. Protection
    • Don’t feed the “trolls”
    • Think twice, or three times
    • Count to ten
    • Know and use proper netiquette
    • Trust your instincts
    • Leave the situation
  • 22. Stalking, Harassment, Bullying
    • The attacker harasses a victim using electronic communication, such as e-mail or instant messaging or messages posted to a Web site or a discussion group.
    • Relies upon the anonymity afforded by the Internet to allow them to stalk their victim without being detected.
    http://flickr.com/photos/blogjamdotorg/463043832/
  • 23. Some examples
    • Unwanted emails
    • Unwanted Instant Messages
    • Posting lies, hateful messages on discussion boards, blogs, forums etc
    • Pose as the victim and send/post offensive comment, content or emails
    • Fake photos
    • Fake websites
  • 24. Protection
    • Don’t get involved in flame wars
    • Don’t share personal information online
    • Ignore taunts
    • Trust your instincts
  • 25. If you are being stalked, bullied or harassed
    • Save messages
    • Screenshots
    • Save screen name, email address, profiles, etc
    • Block if possible
    • Contact your Internet Service Provider
    • Contact law enforcement
  • 26. Predators
    • Attempt to exploit people, usually for sexual or financial purposes
    http://flickr.com/photos/eldave/2037762175/
  • 27. Protection
    • Consider not posting a photo
    • Limit what personal information you share
    • Limit who can see your personal information
    • Don’t talk to strangers
    • Use a screen name that doesn’t reveal too much about you
    • Trust your instincts
  • 28. 7 Online Blunders
    • Assuming your security software is protecting you
    • Accessing an account through an email link
    • Using a single password for all online accounts
    • Downloading free software
    • Thinking your Mac shields you from all risks
    • Clicking on a pop-up ad that says your pc is insecure
    • Shopping online the way you do in stores
    • - from Consumer Reports, Sept 2008 pg 26
  • 29. More Resources
    • http://besafe.more.net/
    • http://besafe.more.net/sam/resources.shtml
    • http://www.wiredsafety.org/resources/powerpoint/cyberstalking_study.ppt .
    • http://www.beverlypd.org/pdf/PERSONAL%20SAFETY/CYBERSTALKING.pdf
    • http://www.fbi.gov/publications/pguide/pguidee.htm
    • http://safekids.com/2008/03/18/safety-myths-and-web-20/
    • http://www.ftc.gov/bcp/edu/microsites/idtheft/
    • http://www.ftc.gov/bcp/conline/edcams/freereports/index.html
    • https://www.annualcreditreport.com
    • http://www.snopes.com/
    • http://besafe.more.net/
    • http://inobtr.org/Intro.aspx