Successfully reported this slideshow.

The Basics Of Internet Safety



Loading in …3
1 of 29
1 of 29

More Related Content

Related Books

Free with a 14 day trial from Scribd

See all

The Basics Of Internet Safety

  1. 1. The Missouri River Regional Library The Basics of Internet Safety
  2. 2. The Good <ul><li>Communication </li></ul><ul><li>Information </li></ul><ul><li>Entertainment </li></ul><ul><li>Sharing </li></ul><ul><li>Connecting </li></ul>
  3. 3. The Bad <ul><li>Spam </li></ul><ul><li>Phishing </li></ul><ul><li>Identity Theft </li></ul><ul><li>Adware </li></ul><ul><li>Spyware </li></ul><ul><li>Pop-ups </li></ul><ul><li>Flaming </li></ul><ul><li>Stalking, harassment ,bullying </li></ul>
  4. 4. The Internet Can Seem Like a Scary Place
  5. 5. The Good News Last year your odds of becoming a cyber victim dropped from 1 in 4 to 1 in 6 - stats from Consumer Reports, Sept 2008, pg 23
  6. 6. The Bad News your odds of becoming a victim are 1 in 6 - stats from Consumer Reports, Sept 2008, pg 23
  7. 7. Spam <ul><li>Unsolicited messages </li></ul>
  8. 8. True or False <ul><li>If I get unwanted email I should click on the “unsubscribe” link </li></ul><ul><li>False! </li></ul>
  9. 9. Not just for email anymore <ul><li>E-mail spam, </li></ul><ul><li>Instant messaging </li></ul><ul><li>Blogs </li></ul><ul><li>Wiki </li></ul><ul><li>Mobile phone messaging </li></ul><ul><li>Internet forums </li></ul><ul><li>Fax </li></ul>
  10. 10. Protection <ul><li>Email with a good filter – email </li></ul><ul><li>Don’t open spam - email </li></ul><ul><li>Get an email address just for use online - email </li></ul><ul><li>Turn on comment moderation – blogs, wikis </li></ul><ul><li>Turn comments off – blogs, wikis, flickr </li></ul><ul><li>Restriction access – forums, blogs, wikis, flickr </li></ul><ul><li>Limit who get’s your contact information – email, IM, Fax, Text </li></ul>
  11. 11. Fishing?
  12. 12. Not That Kind - Phishing <ul><li>The process of attempting to acquire sensitive information such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication </li></ul><ul><li>- </li></ul>
  13. 13. Protection <ul><li>Don’t access your accounts from an email link </li></ul><ul><li>Don’t respond to fear tactics </li></ul><ul><li>Know who the link is from </li></ul><ul><li>Be suspicious of links from people you know </li></ul><ul><li>Look for substitutions 0 for O, 1 for L or I, etc </li></ul>
  14. 14. Identity Theft <ul><li>your personal information is stolen and used without your knowledge to commit fraud or other crimes </li></ul><ul><li>- </li></ul>
  15. 15. Protection <ul><li>Don’t download free software </li></ul><ul><li>Don’t click on email links to log into accounts </li></ul><ul><li>Use anti-virus software </li></ul><ul><li>Use anti-spyware software </li></ul><ul><li>Use a firewall </li></ul><ul><li>https </li></ul><ul><li>Credit reports </li></ul><ul><li>Don’t send confidential information via email </li></ul><ul><li>Use a complex password </li></ul><ul><li>Use one credit card for online transactions – review the statements carefully </li></ul>
  16. 16. Adware <ul><li>Software that pops up advertisements on a user's computer. </li></ul><ul><li>ads targeted to the individual user based on data collected from key words entered in search engines and the types of Web sites visited. </li></ul><ul><li>- pc magazine </li></ul>
  17. 17. Spyware <ul><li>Software installed covertly on a personal computer to intercept or take partial control over the user's interaction with the computer, without the user's informed consent. </li></ul><ul><li>- </li></ul>
  18. 18. Pop Ups <ul><li>A small window that is displayed on top of the existing windows on screen </li></ul><ul><li>-pc magazine </li></ul>
  19. 19. Protection <ul><li>Don’t download free software </li></ul><ul><li>Don’t click on pop-ups </li></ul><ul><li>Don’t click on links from people you don’t know </li></ul><ul><li>Be wary of links from people you do know </li></ul><ul><li>Look for substitutions 0 for O, 1 for L or I, etc </li></ul><ul><li>Anti-spyware software </li></ul>
  20. 20. Flaming <ul><li>Hostile and insulting interaction </li></ul><ul><li>Usually occurs in the social context of a discussion board, chat or e-mail. </li></ul><ul><li>Attempt to assert authority or establish a position of superiority </li></ul><ul><li>Believes he or she carries the only valid opinion. </li></ul><ul><li>Personal attacks on those who disagree. </li></ul><ul><li>Wish to upset and offend other members of the forum (trolls) </li></ul>
  21. 21. Protection <ul><li>Don’t feed the “trolls” </li></ul><ul><li>Think twice, or three times </li></ul><ul><li>Count to ten </li></ul><ul><li>Know and use proper netiquette </li></ul><ul><li>Trust your instincts </li></ul><ul><li>Leave the situation </li></ul>
  22. 22. Stalking, Harassment, Bullying <ul><li>The attacker harasses a victim using electronic communication, such as e-mail or instant messaging or messages posted to a Web site or a discussion group. </li></ul><ul><li>Relies upon the anonymity afforded by the Internet to allow them to stalk their victim without being detected. </li></ul>
  23. 23. Some examples <ul><li>Unwanted emails </li></ul><ul><li>Unwanted Instant Messages </li></ul><ul><li>Posting lies, hateful messages on discussion boards, blogs, forums etc </li></ul><ul><li>Pose as the victim and send/post offensive comment, content or emails </li></ul><ul><li>Fake photos </li></ul><ul><li>Fake websites </li></ul>
  24. 24. Protection <ul><li>Don’t get involved in flame wars </li></ul><ul><li>Don’t share personal information online </li></ul><ul><li>Ignore taunts </li></ul><ul><li>Trust your instincts </li></ul>
  25. 25. If you are being stalked, bullied or harassed <ul><li>Save messages </li></ul><ul><li>Screenshots </li></ul><ul><li>Save screen name, email address, profiles, etc </li></ul><ul><li>Block if possible </li></ul><ul><li>Contact your Internet Service Provider </li></ul><ul><li>Contact law enforcement </li></ul>
  26. 26. Predators <ul><li>Attempt to exploit people, usually for sexual or financial purposes </li></ul>
  27. 27. Protection <ul><li>Consider not posting a photo </li></ul><ul><li>Limit what personal information you share </li></ul><ul><li>Limit who can see your personal information </li></ul><ul><li>Don’t talk to strangers </li></ul><ul><li>Use a screen name that doesn’t reveal too much about you </li></ul><ul><li>Trust your instincts </li></ul>
  28. 28. 7 Online Blunders <ul><li>Assuming your security software is protecting you </li></ul><ul><li>Accessing an account through an email link </li></ul><ul><li>Using a single password for all online accounts </li></ul><ul><li>Downloading free software </li></ul><ul><li>Thinking your Mac shields you from all risks </li></ul><ul><li>Clicking on a pop-up ad that says your pc is insecure </li></ul><ul><li>Shopping online the way you do in stores </li></ul><ul><li>- from Consumer Reports, Sept 2008 pg 26 </li></ul>
  29. 29. More Resources <ul><li> </li></ul><ul><li> </li></ul><ul><li> . </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul>

Editor's Notes