Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

The Basics Of Internet Safety

Created for adult computers classes at the Missouri River Regional Library

  • Login to see the comments

The Basics Of Internet Safety

  1. 1. The Missouri River Regional Library The Basics of Internet Safety
  2. 2. The Good <ul><li>Communication </li></ul><ul><li>Information </li></ul><ul><li>Entertainment </li></ul><ul><li>Sharing </li></ul><ul><li>Connecting </li></ul>
  3. 3. The Bad <ul><li>Spam </li></ul><ul><li>Phishing </li></ul><ul><li>Identity Theft </li></ul><ul><li>Adware </li></ul><ul><li>Spyware </li></ul><ul><li>Pop-ups </li></ul><ul><li>Flaming </li></ul><ul><li>Stalking, harassment ,bullying </li></ul>
  4. 4. The Internet Can Seem Like a Scary Place
  5. 5. The Good News Last year your odds of becoming a cyber victim dropped from 1 in 4 to 1 in 6 - stats from Consumer Reports, Sept 2008, pg 23
  6. 6. The Bad News your odds of becoming a victim are 1 in 6 - stats from Consumer Reports, Sept 2008, pg 23
  7. 7. Spam <ul><li>Unsolicited messages </li></ul>
  8. 8. True or False <ul><li>If I get unwanted email I should click on the “unsubscribe” link </li></ul><ul><li>False! </li></ul>
  9. 9. Not just for email anymore <ul><li>E-mail spam, </li></ul><ul><li>Instant messaging </li></ul><ul><li>Blogs </li></ul><ul><li>Wiki </li></ul><ul><li>Mobile phone messaging </li></ul><ul><li>Internet forums </li></ul><ul><li>Fax </li></ul>
  10. 10. Protection <ul><li>Email with a good filter – email </li></ul><ul><li>Don’t open spam - email </li></ul><ul><li>Get an email address just for use online - email </li></ul><ul><li>Turn on comment moderation – blogs, wikis </li></ul><ul><li>Turn comments off – blogs, wikis, flickr </li></ul><ul><li>Restriction access – forums, blogs, wikis, flickr </li></ul><ul><li>Limit who get’s your contact information – email, IM, Fax, Text </li></ul>
  11. 11. Fishing?
  12. 12. Not That Kind - Phishing <ul><li>The process of attempting to acquire sensitive information such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication </li></ul><ul><li>- </li></ul>
  13. 13. Protection <ul><li>Don’t access your accounts from an email link </li></ul><ul><li>Don’t respond to fear tactics </li></ul><ul><li>Know who the link is from </li></ul><ul><li>Be suspicious of links from people you know </li></ul><ul><li>Look for substitutions 0 for O, 1 for L or I, etc </li></ul>
  14. 14. Identity Theft <ul><li>your personal information is stolen and used without your knowledge to commit fraud or other crimes </li></ul><ul><li>- </li></ul>
  15. 15. Protection <ul><li>Don’t download free software </li></ul><ul><li>Don’t click on email links to log into accounts </li></ul><ul><li>Use anti-virus software </li></ul><ul><li>Use anti-spyware software </li></ul><ul><li>Use a firewall </li></ul><ul><li>https </li></ul><ul><li>Credit reports </li></ul><ul><li>Don’t send confidential information via email </li></ul><ul><li>Use a complex password </li></ul><ul><li>Use one credit card for online transactions – review the statements carefully </li></ul>
  16. 16. Adware <ul><li>Software that pops up advertisements on a user's computer. </li></ul><ul><li>ads targeted to the individual user based on data collected from key words entered in search engines and the types of Web sites visited. </li></ul><ul><li>- pc magazine </li></ul>
  17. 17. Spyware <ul><li>Software installed covertly on a personal computer to intercept or take partial control over the user's interaction with the computer, without the user's informed consent. </li></ul><ul><li>- </li></ul>
  18. 18. Pop Ups <ul><li>A small window that is displayed on top of the existing windows on screen </li></ul><ul><li>-pc magazine </li></ul>
  19. 19. Protection <ul><li>Don’t download free software </li></ul><ul><li>Don’t click on pop-ups </li></ul><ul><li>Don’t click on links from people you don’t know </li></ul><ul><li>Be wary of links from people you do know </li></ul><ul><li>Look for substitutions 0 for O, 1 for L or I, etc </li></ul><ul><li>Anti-spyware software </li></ul>
  20. 20. Flaming <ul><li>Hostile and insulting interaction </li></ul><ul><li>Usually occurs in the social context of a discussion board, chat or e-mail. </li></ul><ul><li>Attempt to assert authority or establish a position of superiority </li></ul><ul><li>Believes he or she carries the only valid opinion. </li></ul><ul><li>Personal attacks on those who disagree. </li></ul><ul><li>Wish to upset and offend other members of the forum (trolls) </li></ul>
  21. 21. Protection <ul><li>Don’t feed the “trolls” </li></ul><ul><li>Think twice, or three times </li></ul><ul><li>Count to ten </li></ul><ul><li>Know and use proper netiquette </li></ul><ul><li>Trust your instincts </li></ul><ul><li>Leave the situation </li></ul>
  22. 22. Stalking, Harassment, Bullying <ul><li>The attacker harasses a victim using electronic communication, such as e-mail or instant messaging or messages posted to a Web site or a discussion group. </li></ul><ul><li>Relies upon the anonymity afforded by the Internet to allow them to stalk their victim without being detected. </li></ul>
  23. 23. Some examples <ul><li>Unwanted emails </li></ul><ul><li>Unwanted Instant Messages </li></ul><ul><li>Posting lies, hateful messages on discussion boards, blogs, forums etc </li></ul><ul><li>Pose as the victim and send/post offensive comment, content or emails </li></ul><ul><li>Fake photos </li></ul><ul><li>Fake websites </li></ul>
  24. 24. Protection <ul><li>Don’t get involved in flame wars </li></ul><ul><li>Don’t share personal information online </li></ul><ul><li>Ignore taunts </li></ul><ul><li>Trust your instincts </li></ul>
  25. 25. If you are being stalked, bullied or harassed <ul><li>Save messages </li></ul><ul><li>Screenshots </li></ul><ul><li>Save screen name, email address, profiles, etc </li></ul><ul><li>Block if possible </li></ul><ul><li>Contact your Internet Service Provider </li></ul><ul><li>Contact law enforcement </li></ul>
  26. 26. Predators <ul><li>Attempt to exploit people, usually for sexual or financial purposes </li></ul>
  27. 27. Protection <ul><li>Consider not posting a photo </li></ul><ul><li>Limit what personal information you share </li></ul><ul><li>Limit who can see your personal information </li></ul><ul><li>Don’t talk to strangers </li></ul><ul><li>Use a screen name that doesn’t reveal too much about you </li></ul><ul><li>Trust your instincts </li></ul>
  28. 28. 7 Online Blunders <ul><li>Assuming your security software is protecting you </li></ul><ul><li>Accessing an account through an email link </li></ul><ul><li>Using a single password for all online accounts </li></ul><ul><li>Downloading free software </li></ul><ul><li>Thinking your Mac shields you from all risks </li></ul><ul><li>Clicking on a pop-up ad that says your pc is insecure </li></ul><ul><li>Shopping online the way you do in stores </li></ul><ul><li>- from Consumer Reports, Sept 2008 pg 26 </li></ul>
  29. 29. More Resources <ul><li> </li></ul><ul><li> </li></ul><ul><li> . </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul>