SlideShare a Scribd company logo
1 of 20
Maintaining safety of data
and personal information
  in digital environments

              Created by Toni Watt 2011
 Xtranormal Video
 http://www.xtranormal.com/watch/12253
  005/suitz-movie?listid=22577182




Has this happened to you?
   How to effectively verify Internet
    ◦ Hoaxes
    ◦ Viruses
    ◦ Scams




Protect Yourself
   Urban Legend          Academically
   Folkloric              Correct
   Academically          True
    Inaccurate            Fact
   Fallacies             Reality
   Old Wives’ Tales      Actuality
   Rumors                Authentic
   Gossip                Legitimate




Fact or Fiction
Prey upon our fears and
          worries




Urban Legends
w
                          w
                          w
                          .
                          s
                          n
                          o
                          p
                          e
                          s
                          .
                          c
                          o
                          m




A reliable source to check your
suspicious email. www.snopes.com
 Free giveaways
 Appeals to help sick children
 Pointless petitions
 Warnings about products




Recognizing a Hoax in Email
 Does the email ask you to send it to a lot
  of other people?
 Does the email fail to provide confirmation
  sources?
 Is the language used overly emotive or
  highly technical?




Questions to ask yourself about
the nature of the email
Viruses
 Computer Performance
 Computer Crashes or restarts on its own
 Mysterious pop up messages
 Computer screen is black




How can I tell if I have a Virus?
   Never download software form senders
    you do not completely trust.
   Never download software with “fun” or
    “valuable” functions
   Look out for popup windows that claim to
    be antivirus software.
   Update your antivirus
    software, antispyware software and
    firewall regularly.
   Only use licensed software.


How do I reduce the Risk?
   Install antivirus software and keep it
    updated.

   Use caution when opening and installing
    files, including those contained in e-mail
    attachments, downloads, diskettes, CDs
    and DVDs. Ask yourself if you trust the
    source of the file before taking any action.




Take Virus Protection Seriously
To cheat or defraud




Scams
   Error! Click to Scan Disk
   Phishing
   Congratulations you are a Winner!
   Overseas Auction Checks
   Friends in Trouble
   Cashing in on Disasters
   Make Money Fast




What to avoid!
   Install a firewall or antivirus software
   Always open your personal pages such as
    bank pages by directly typing into the
    address bar
   Delete emails too good to be true
   Only use auction approved payment
    methods
   Only use recognized charity websites
   Anything offering big awards for little
    effort should be researched first

How to Protect Yourself from
Scammers
Protecting Yourself with Effective
Passwords
   Is my password easy to guess?
   Do I write my passwords down?
   Are my password automated?
   Is my password my child’s name?
   Do I use the same password for
    everything




Questions to Ask Yourself?
 It's at least eight characters
 It includes upper and lower case
  letters, as well as numbers and symbols
 It is changed frequently
 A new password is significantly different
  than the previous one




What to Consider With Your
Passwords
   Christensen, B., M. (2010). Hoax-slayer. Retrieved from http://hoax-
    slayer.com/#latest-email-hoaxes
   Dictionary Entry. (2011). Retrieved from http://www.dictionary.com
   Geek News Central (2011). Ten computer scams to avoid. Retrieved from
    http://www.geeknewscentral.com/2010/04/18/computer-scams-to-avoid/
   Internet Access (2011). Retrieved from
    http://www.cybernet1.com/computer_virus.htm
   Kidsandmedia. (2010). Protect your computer. Retrieved from
    http://www.kidsandmedia.co.uk/article/314
   Microsoft (2011). Retrieved from
    http://www.microsoft.com/canada/smallbiz/themes/techwise/5stepscrashfreec
    omputing.mspx
   Microsoft (2011). How to create effective passwords. Retrieved from
    http://www.microsoft.com/canada/smallbiz/themes/techwise/createeffectivepa
    sswords.mspx
   Mikkelson, B. & Mikkelson, D. (2011). Retrieved from http://www.snopes.com




Resources

More Related Content

Viewers also liked

Sağlık Malzemeleri(İlaç) Lojistiği - Tugay Günaydın
Sağlık Malzemeleri(İlaç) Lojistiği - Tugay GünaydınSağlık Malzemeleri(İlaç) Lojistiği - Tugay Günaydın
Sağlık Malzemeleri(İlaç) Lojistiği - Tugay GünaydınTugay Günaydın
 
Tibbi̇ malzeme yöneti̇mi̇
Tibbi̇ malzeme yöneti̇mi̇Tibbi̇ malzeme yöneti̇mi̇
Tibbi̇ malzeme yöneti̇mi̇Uzmankişi
 
Sağlıkta yeni nesil tedarik zinciri yönetimi
Sağlıkta yeni nesil tedarik zinciri yönetimiSağlıkta yeni nesil tedarik zinciri yönetimi
Sağlıkta yeni nesil tedarik zinciri yönetimiUtkan Uluçay, MSc., CDDP
 
Hastane ve Sağlık Kuruluşlarında Medikal Cihaz Yönetimi
Hastane ve Sağlık Kuruluşlarında Medikal Cihaz YönetimiHastane ve Sağlık Kuruluşlarında Medikal Cihaz Yönetimi
Hastane ve Sağlık Kuruluşlarında Medikal Cihaz YönetimiErkan Tosun
 

Viewers also liked (8)

İyi eczacilik uygulamalari kilavuzu
İyi eczacilik uygulamalari kilavuzuİyi eczacilik uygulamalari kilavuzu
İyi eczacilik uygulamalari kilavuzu
 
Dermokozmetik markaları
Dermokozmetik markalarıDermokozmetik markaları
Dermokozmetik markaları
 
Sağlık Malzemeleri(İlaç) Lojistiği - Tugay Günaydın
Sağlık Malzemeleri(İlaç) Lojistiği - Tugay GünaydınSağlık Malzemeleri(İlaç) Lojistiği - Tugay Günaydın
Sağlık Malzemeleri(İlaç) Lojistiği - Tugay Günaydın
 
Tibbi̇ malzeme yöneti̇mi̇
Tibbi̇ malzeme yöneti̇mi̇Tibbi̇ malzeme yöneti̇mi̇
Tibbi̇ malzeme yöneti̇mi̇
 
Sağlıkta yeni nesil tedarik zinciri yönetimi
Sağlıkta yeni nesil tedarik zinciri yönetimiSağlıkta yeni nesil tedarik zinciri yönetimi
Sağlıkta yeni nesil tedarik zinciri yönetimi
 
Hastane ve Sağlık Kuruluşlarında Medikal Cihaz Yönetimi
Hastane ve Sağlık Kuruluşlarında Medikal Cihaz YönetimiHastane ve Sağlık Kuruluşlarında Medikal Cihaz Yönetimi
Hastane ve Sağlık Kuruluşlarında Medikal Cihaz Yönetimi
 
PTMS Eczane Projeleri
PTMS Eczane ProjeleriPTMS Eczane Projeleri
PTMS Eczane Projeleri
 
La salle!
La salle!La salle!
La salle!
 

Similar to Maintaining safety of data and personal information in [autosaved]

CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptJOHN BABATUNDE LEE
 
Security Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 VirusesSecurity Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 VirusesCatherine MacAllister
 
Security Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus TrojanSecurity Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus TrojanMegan Bell
 
The internet and safety
The internet and safetyThe internet and safety
The internet and safetyPatricia bb
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayanehaz
 
Internet safety slides
Internet safety slidesInternet safety slides
Internet safety slidesEric Castro
 
CYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWCYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWBilly Warero
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
 
Online safety 101
Online safety 101Online safety 101
Online safety 101Greg Bold
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and SafetyConor O'Neill
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital AgeMarian Merritt
 
Microsoft (Projects)
Microsoft (Projects)Microsoft (Projects)
Microsoft (Projects)Vinayak Hegde
 
Internet Safety Guide For Parents & Teachers
Internet Safety Guide For Parents & TeachersInternet Safety Guide For Parents & Teachers
Internet Safety Guide For Parents & TeachersJVGAJJAR
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Homejaysonstreet
 
How To Protect Yourself From Identity Theft
How To Protect Yourself From Identity TheftHow To Protect Yourself From Identity Theft
How To Protect Yourself From Identity Theftmkinzie
 

Similar to Maintaining safety of data and personal information in [autosaved] (20)

Netiquette
NetiquetteNetiquette
Netiquette
 
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
 
Security Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 VirusesSecurity Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 Viruses
 
Security Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus TrojanSecurity Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus Trojan
 
The internet and safety
The internet and safetyThe internet and safety
The internet and safety
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Internet safety slides
Internet safety slidesInternet safety slides
Internet safety slides
 
CYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWCYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEW
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Online safety 101
Online safety 101Online safety 101
Online safety 101
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and Safety
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Microsoft (Projects)
Microsoft (Projects)Microsoft (Projects)
Microsoft (Projects)
 
Internet Safety Guide For Parents & Teachers
Internet Safety Guide For Parents & TeachersInternet Safety Guide For Parents & Teachers
Internet Safety Guide For Parents & Teachers
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Home
 
Securityguide
SecurityguideSecurityguide
Securityguide
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
How To Protect Yourself From Identity Theft
How To Protect Yourself From Identity TheftHow To Protect Yourself From Identity Theft
How To Protect Yourself From Identity Theft
 

Recently uploaded

Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

Maintaining safety of data and personal information in [autosaved]

  • 1. Maintaining safety of data and personal information in digital environments Created by Toni Watt 2011
  • 2.  Xtranormal Video  http://www.xtranormal.com/watch/12253 005/suitz-movie?listid=22577182 Has this happened to you?
  • 3. How to effectively verify Internet ◦ Hoaxes ◦ Viruses ◦ Scams Protect Yourself
  • 4. Urban Legend  Academically  Folkloric Correct  Academically  True Inaccurate  Fact  Fallacies  Reality  Old Wives’ Tales  Actuality  Rumors  Authentic  Gossip  Legitimate Fact or Fiction
  • 5. Prey upon our fears and worries Urban Legends
  • 6. w w w . s n o p e s . c o m A reliable source to check your suspicious email. www.snopes.com
  • 7.  Free giveaways  Appeals to help sick children  Pointless petitions  Warnings about products Recognizing a Hoax in Email
  • 8.  Does the email ask you to send it to a lot of other people?  Does the email fail to provide confirmation sources?  Is the language used overly emotive or highly technical? Questions to ask yourself about the nature of the email
  • 10.  Computer Performance  Computer Crashes or restarts on its own  Mysterious pop up messages  Computer screen is black How can I tell if I have a Virus?
  • 11. Never download software form senders you do not completely trust.  Never download software with “fun” or “valuable” functions  Look out for popup windows that claim to be antivirus software.  Update your antivirus software, antispyware software and firewall regularly.  Only use licensed software. How do I reduce the Risk?
  • 12. Install antivirus software and keep it updated.  Use caution when opening and installing files, including those contained in e-mail attachments, downloads, diskettes, CDs and DVDs. Ask yourself if you trust the source of the file before taking any action. Take Virus Protection Seriously
  • 13. To cheat or defraud Scams
  • 14. Error! Click to Scan Disk  Phishing  Congratulations you are a Winner!  Overseas Auction Checks  Friends in Trouble  Cashing in on Disasters  Make Money Fast What to avoid!
  • 15. Install a firewall or antivirus software  Always open your personal pages such as bank pages by directly typing into the address bar  Delete emails too good to be true  Only use auction approved payment methods  Only use recognized charity websites  Anything offering big awards for little effort should be researched first How to Protect Yourself from Scammers
  • 16. Protecting Yourself with Effective Passwords
  • 17. Is my password easy to guess?  Do I write my passwords down?  Are my password automated?  Is my password my child’s name?  Do I use the same password for everything Questions to Ask Yourself?
  • 18.  It's at least eight characters  It includes upper and lower case letters, as well as numbers and symbols  It is changed frequently  A new password is significantly different than the previous one What to Consider With Your Passwords
  • 19.
  • 20. Christensen, B., M. (2010). Hoax-slayer. Retrieved from http://hoax- slayer.com/#latest-email-hoaxes  Dictionary Entry. (2011). Retrieved from http://www.dictionary.com  Geek News Central (2011). Ten computer scams to avoid. Retrieved from http://www.geeknewscentral.com/2010/04/18/computer-scams-to-avoid/  Internet Access (2011). Retrieved from http://www.cybernet1.com/computer_virus.htm  Kidsandmedia. (2010). Protect your computer. Retrieved from http://www.kidsandmedia.co.uk/article/314  Microsoft (2011). Retrieved from http://www.microsoft.com/canada/smallbiz/themes/techwise/5stepscrashfreec omputing.mspx  Microsoft (2011). How to create effective passwords. Retrieved from http://www.microsoft.com/canada/smallbiz/themes/techwise/createeffectivepa sswords.mspx  Mikkelson, B. & Mikkelson, D. (2011). Retrieved from http://www.snopes.com Resources

Editor's Notes

  1. Scams