SlideShare a Scribd company logo
1 of 21
How to Protect Your Identity and Computer
Introduction
O Our files and entire operating system can be damaged
O Files
   O Work
   O Music
   O Photos
   O Games
   O Everything that we save on our computers
O It’s easy and well worth the effort
What is Malware?
O Malicious software
O Includes viruses
O Made to purposely
  harm and destroy a
  computer
O Can steal personal
  identity information
O The damage spreads
  very, very quickly
Question
O Why is it important to make sure a link is from
  a trusted source? Can’t we just click and if it’s
  not what we want or thought it would be, just
  go back?
Answer
O Experts like to say “When in doubt, always err
  on the side of caution.” Just delete the message
  and don’t click. Simply clicking on links in
  email, tweets, posts, social networking
  sites, smart phone messages and online
  advertising can infect your computer.
Question
O What should make you suspicious that a link
  could cause trouble? A message claiming
  you’ve won a big prize or an offer that seems
  too good to be true is always suspicious. In
  what other situations should you stop and not
  click?
Don’t Click
O Links from someone you don’t know
O Links that excitedly tell you to take urgent action
O Links in chain letters
O Links in messages that just look “weird”
O Links in a message that is clearly spam (junk mail)
O Links that just seem strange, even if from a good
  friend
O Links within messages that use bad grammar or
  awkward phrasing or misspellings
O Links from a friend or stranger claiming he/she is
  in trouble and asking that you send money
Don’t Click
O Links to a page asking you for any personal
    information, such as your password
O   Links in messages that appear to be from a
    favorite store, asking you to update your account
    (Reputable companies never do this)
O   Links on a social networking site that say “watch
    this funny video of you”
O   Links in messages that tell you to open an
    attachment
O   Links in messages that warn you to take urgent
    action
Question




O Why do experts tell us that we should be suspicious
  about a link or email attachment that “looks funny”
  even if it is from a family member, work colleague or
  your teacher?
Think Before You Click
O Malware can forge emails and create sneaky links
O If a friend or family member sends an attachment
  that you were not expecting, text her/him and ask
  about the attachment before you click
Question
O Experts say, “When in doubt do not download.”
  Or, as the Greeks said, “Beware of strangers
  bearing gifts.” What kinds of files do you
  download?
Stop Before You Download
 O Stopping before you download is a good first step.
     Then think, “What should I think about at that
     moment?”
 O   Make sure the most current version of your browser
     is installed on your computer
 O   Make sure automatic updates are set
 O   Use https
 O   Check that your computer is protected
 O   Check the reputation of a store or any other
     source before downloading
Question
O What does it mean when experts say a
  computer is “clean”?
Answer
O Making certain our files are not corrupted and
  our computer is not infected with
  contaminated software
Tips and Advice
  Provided by
   StaySafeOnline.org
Internet Use Agreement
     Orcutt Union School District
      Internet Use Agreement

More Related Content

More from Jenny Hubbard

Unit 1 The Accounting Equation
Unit 1 The Accounting EquationUnit 1 The Accounting Equation
Unit 1 The Accounting Equation
Jenny Hubbard
 
Unit 1 The Accounting Equation
Unit 1 The Accounting EquationUnit 1 The Accounting Equation
Unit 1 The Accounting Equation
Jenny Hubbard
 
Unit 4 The Accounting Cycle
Unit 4 The Accounting CycleUnit 4 The Accounting Cycle
Unit 4 The Accounting Cycle
Jenny Hubbard
 
Victoria and Vanessa Simpson University 2013
Victoria and Vanessa Simpson University 2013Victoria and Vanessa Simpson University 2013
Victoria and Vanessa Simpson University 2013
Jenny Hubbard
 

More from Jenny Hubbard (20)

Chapter 6 HW Answers
Chapter 6 HW AnswersChapter 6 HW Answers
Chapter 6 HW Answers
 
Chapter 5 HW Answers
Chapter 5 HW AnswersChapter 5 HW Answers
Chapter 5 HW Answers
 
CCA Chapter 4 HW Answers
CCA Chapter 4 HW AnswersCCA Chapter 4 HW Answers
CCA Chapter 4 HW Answers
 
Chapter 2 Linear Functions
Chapter 2 Linear FunctionsChapter 2 Linear Functions
Chapter 2 Linear Functions
 
Chapter 1 Functions
Chapter 1 FunctionsChapter 1 Functions
Chapter 1 Functions
 
Unit 4 Saving and Investing PPT
Unit 4 Saving and Investing PPTUnit 4 Saving and Investing PPT
Unit 4 Saving and Investing PPT
 
Unit 4 The Accounting Cycle
Unit 4 The Accounting CycleUnit 4 The Accounting Cycle
Unit 4 The Accounting Cycle
 
Unit 3 Debits and Credits
Unit 3 Debits and CreditsUnit 3 Debits and Credits
Unit 3 Debits and Credits
 
Unit 6 Renting vs. Buying
Unit 6 Renting vs. BuyingUnit 6 Renting vs. Buying
Unit 6 Renting vs. Buying
 
Unit 6 Renting vs. Owning
Unit 6 Renting vs. OwningUnit 6 Renting vs. Owning
Unit 6 Renting vs. Owning
 
Calculating Simple and Compound Interest
Calculating Simple and Compound InterestCalculating Simple and Compound Interest
Calculating Simple and Compound Interest
 
Intro Unit Workforce Readiness
Intro Unit Workforce ReadinessIntro Unit Workforce Readiness
Intro Unit Workforce Readiness
 
Intro Unit Workforce Readiness
Intro Unit Workforce ReadinessIntro Unit Workforce Readiness
Intro Unit Workforce Readiness
 
Unit 3 Debits and Credits
Unit 3 Debits and CreditsUnit 3 Debits and Credits
Unit 3 Debits and Credits
 
Unit 2 Financial Transactions
Unit 2 Financial TransactionsUnit 2 Financial Transactions
Unit 2 Financial Transactions
 
Unit 1 The Accounting Equation
Unit 1 The Accounting EquationUnit 1 The Accounting Equation
Unit 1 The Accounting Equation
 
Unit 1 The Accounting Equation
Unit 1 The Accounting EquationUnit 1 The Accounting Equation
Unit 1 The Accounting Equation
 
Unit 1 The Accounting Equation
Unit 1 The Accounting EquationUnit 1 The Accounting Equation
Unit 1 The Accounting Equation
 
Unit 4 The Accounting Cycle
Unit 4 The Accounting CycleUnit 4 The Accounting Cycle
Unit 4 The Accounting Cycle
 
Victoria and Vanessa Simpson University 2013
Victoria and Vanessa Simpson University 2013Victoria and Vanessa Simpson University 2013
Victoria and Vanessa Simpson University 2013
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Stop, Think, Connect

  • 1. How to Protect Your Identity and Computer
  • 2. Introduction O Our files and entire operating system can be damaged O Files O Work O Music O Photos O Games O Everything that we save on our computers O It’s easy and well worth the effort
  • 3. What is Malware? O Malicious software O Includes viruses O Made to purposely harm and destroy a computer O Can steal personal identity information O The damage spreads very, very quickly
  • 4.
  • 5. Question O Why is it important to make sure a link is from a trusted source? Can’t we just click and if it’s not what we want or thought it would be, just go back?
  • 6. Answer O Experts like to say “When in doubt, always err on the side of caution.” Just delete the message and don’t click. Simply clicking on links in email, tweets, posts, social networking sites, smart phone messages and online advertising can infect your computer.
  • 7.
  • 8. Question O What should make you suspicious that a link could cause trouble? A message claiming you’ve won a big prize or an offer that seems too good to be true is always suspicious. In what other situations should you stop and not click?
  • 9. Don’t Click O Links from someone you don’t know O Links that excitedly tell you to take urgent action O Links in chain letters O Links in messages that just look “weird” O Links in a message that is clearly spam (junk mail) O Links that just seem strange, even if from a good friend O Links within messages that use bad grammar or awkward phrasing or misspellings O Links from a friend or stranger claiming he/she is in trouble and asking that you send money
  • 10. Don’t Click O Links to a page asking you for any personal information, such as your password O Links in messages that appear to be from a favorite store, asking you to update your account (Reputable companies never do this) O Links on a social networking site that say “watch this funny video of you” O Links in messages that tell you to open an attachment O Links in messages that warn you to take urgent action
  • 11. Question O Why do experts tell us that we should be suspicious about a link or email attachment that “looks funny” even if it is from a family member, work colleague or your teacher?
  • 12. Think Before You Click O Malware can forge emails and create sneaky links O If a friend or family member sends an attachment that you were not expecting, text her/him and ask about the attachment before you click
  • 13.
  • 14. Question O Experts say, “When in doubt do not download.” Or, as the Greeks said, “Beware of strangers bearing gifts.” What kinds of files do you download?
  • 15.
  • 16. Stop Before You Download O Stopping before you download is a good first step. Then think, “What should I think about at that moment?” O Make sure the most current version of your browser is installed on your computer O Make sure automatic updates are set O Use https O Check that your computer is protected O Check the reputation of a store or any other source before downloading
  • 17.
  • 18. Question O What does it mean when experts say a computer is “clean”?
  • 19. Answer O Making certain our files are not corrupted and our computer is not infected with contaminated software
  • 20. Tips and Advice Provided by StaySafeOnline.org
  • 21. Internet Use Agreement Orcutt Union School District Internet Use Agreement