Your SlideShare is downloading. ×
The Basics Of Internet Safety
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Introducing the official SlideShare app

Stunning, full-screen experience for iPhone and Android

Text the download link to your phone

Standard text messaging rates apply

The Basics Of Internet Safety

2,735
views

Published on

Created for adult computers classes at the Missouri River Regional Library

Created for adult computers classes at the Missouri River Regional Library

Published in: Technology, News & Politics

0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
2,735
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
1
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • Transcript

    • 1. The Missouri River Regional Library The Basics of Internet Safety
    • 2. The Good
      • Communication
      • Information
      • Entertainment
      • Sharing
      • Connecting
    • 3. The Bad
      • Spam
      • Phishing
      • Identity Theft
      • Adware
      • Spyware
      • Pop-ups
      • Flaming
      • Stalking, harassment ,bullying
    • 4. The Internet Can Seem Like a Scary Place http://www.flickr.com/photos/rling/438040809/
    • 5. The Good News Last year your odds of becoming a cyber victim dropped from 1 in 4 to 1 in 6 - stats from Consumer Reports, Sept 2008, pg 23
    • 6. The Bad News your odds of becoming a victim are 1 in 6 - stats from Consumer Reports, Sept 2008, pg 23
    • 7. Spam
      • Unsolicited messages
      http://www.flickr.com/photos/grumbler/532250527/
    • 8. True or False
      • If I get unwanted email I should click on the “unsubscribe” link
      • False!
    • 9. Not just for email anymore
      • E-mail spam,
      • Instant messaging
      • Blogs
      • Wiki
      • Mobile phone messaging
      • Internet forums
      • Fax
    • 10. Protection
      • Email with a good filter – email
      • Don’t open spam - email
      • Get an email address just for use online - email
      • Turn on comment moderation – blogs, wikis
      • Turn comments off – blogs, wikis, flickr
      • Restriction access – forums, blogs, wikis, flickr
      • Limit who get’s your contact information – email, IM, Fax, Text
    • 11. Fishing? http://www.flickr.com/photos/peterhess/2682317551/
    • 12. Not That Kind - Phishing
      • The process of attempting to acquire sensitive information such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication
      • - http://en.wikipedia.org/wiki/Phishing
    • 13. Protection
      • Don’t access your accounts from an email link
      • Don’t respond to fear tactics
      • Know who the link is from
      • Be suspicious of links from people you know
      • Look for substitutions 0 for O, 1 for L or I, etc
    • 14. Identity Theft
      • your personal information is stolen and used without your knowledge to commit fraud or other crimes
      • - http://www.ftc.gov/bcp/edu/microsites/idtheft/
      http://www.flickr.com/photos/carbonnyc/57280104/
    • 15. Protection
      • Don’t download free software
      • Don’t click on email links to log into accounts
      • Use anti-virus software
      • Use anti-spyware software
      • Use a firewall
      • https
      • Credit reports
      • Don’t send confidential information via email
      • Use a complex password
      • Use one credit card for online transactions – review the statements carefully
    • 16. Adware
      • Software that pops up advertisements on a user's computer.
      • ads targeted to the individual user based on data collected from key words entered in search engines and the types of Web sites visited.
      • - pc magazine
      http://www.flickr.com/photos/djm/17328024/
    • 17. Spyware
      • Software installed covertly on a personal computer to intercept or take partial control over the user's interaction with the computer, without the user's informed consent.
      • - http://en.wikipedia.org/wiki/Spyware
      http://www.flickr.com/photos/practicalowl/314989744/
    • 18. Pop Ups
      • A small window that is displayed on top of the existing windows on screen
      • -pc magazine
      http://www.flickr.com/photos/paperghost/876640836/
    • 19. Protection
      • Don’t download free software
      • Don’t click on pop-ups
      • Don’t click on links from people you don’t know
      • Be wary of links from people you do know
      • Look for substitutions 0 for O, 1 for L or I, etc
      • Anti-spyware software
    • 20. Flaming
      • Hostile and insulting interaction
      • Usually occurs in the social context of a discussion board, chat or e-mail.
      • Attempt to assert authority or establish a position of superiority
      • Believes he or she carries the only valid opinion.
      • Personal attacks on those who disagree.
      • Wish to upset and offend other members of the forum (trolls)
      http://flickr.com/photos/cleaneugene/2438462422/
    • 21. Protection
      • Don’t feed the “trolls”
      • Think twice, or three times
      • Count to ten
      • Know and use proper netiquette
      • Trust your instincts
      • Leave the situation
    • 22. Stalking, Harassment, Bullying
      • The attacker harasses a victim using electronic communication, such as e-mail or instant messaging or messages posted to a Web site or a discussion group.
      • Relies upon the anonymity afforded by the Internet to allow them to stalk their victim without being detected.
      http://flickr.com/photos/blogjamdotorg/463043832/
    • 23. Some examples
      • Unwanted emails
      • Unwanted Instant Messages
      • Posting lies, hateful messages on discussion boards, blogs, forums etc
      • Pose as the victim and send/post offensive comment, content or emails
      • Fake photos
      • Fake websites
    • 24. Protection
      • Don’t get involved in flame wars
      • Don’t share personal information online
      • Ignore taunts
      • Trust your instincts
    • 25. If you are being stalked, bullied or harassed
      • Save messages
      • Screenshots
      • Save screen name, email address, profiles, etc
      • Block if possible
      • Contact your Internet Service Provider
      • Contact law enforcement
    • 26. Predators
      • Attempt to exploit people, usually for sexual or financial purposes
      http://flickr.com/photos/eldave/2037762175/
    • 27. Protection
      • Consider not posting a photo
      • Limit what personal information you share
      • Limit who can see your personal information
      • Don’t talk to strangers
      • Use a screen name that doesn’t reveal too much about you
      • Trust your instincts
    • 28. 7 Online Blunders
      • Assuming your security software is protecting you
      • Accessing an account through an email link
      • Using a single password for all online accounts
      • Downloading free software
      • Thinking your Mac shields you from all risks
      • Clicking on a pop-up ad that says your pc is insecure
      • Shopping online the way you do in stores
      • - from Consumer Reports, Sept 2008 pg 26
    • 29. More Resources
      • http://besafe.more.net/
      • http://besafe.more.net/sam/resources.shtml
      • http://www.wiredsafety.org/resources/powerpoint/cyberstalking_study.ppt .
      • http://www.beverlypd.org/pdf/PERSONAL%20SAFETY/CYBERSTALKING.pdf
      • http://www.fbi.gov/publications/pguide/pguidee.htm
      • http://safekids.com/2008/03/18/safety-myths-and-web-20/
      • http://www.ftc.gov/bcp/edu/microsites/idtheft/
      • http://www.ftc.gov/bcp/conline/edcams/freereports/index.html
      • https://www.annualcreditreport.com
      • http://www.snopes.com/
      • http://besafe.more.net/
      • http://inobtr.org/Intro.aspx