SlideShare a Scribd company logo
The Internet = A World of
Opportunities
Look what’s at your fingertips
•

•

Access to information
and entertainment

•

www.microsoft.com/protect

A way to communicate with
friends, family, colleagues

A means to learn, meet
people, and explore
Online Security Versus
Online Safety
Security: We must
secure our computers
with technology in the
same way that we secure
the doors to our homes.
Safety: We must act in
ways that help protect us
against the risks that
come with Internet use.

www.microsoft.com/protect
Primary Online Risks and Threats

To Computers
•
•
•
•

Viruses
Worms
Trojans
Spyware

To Families
•
•
•
•
•

www.microsoft.com/protect

Cyberbullies
File-sharing
abuses
Invasion
of privacy
Disturbing
content
Predators

To Personal
Information

•

Online fraud and
phishing
Hoaxes
Identity theft

•

Spam

•
•
Primary Threats to Computer Security

Viruses/Worms
Software programs
designed to invade
your computer, and
copy, damage, or
delete your data.

www.microsoft.com/protect

Trojans
Viruses that pretend to be
helpful programs while
destroying your data,
damaging your computer,
and stealing your
personal information.

Spyware
Software that tracks your
online activities or
displays endless ads.
Primary Online Risks for Children
Disturbing
Content
File-share Abuse

Cyberbullies
Both children and adults
may use the Internet to
harass or intimidate
other people.

Unauthorized sharing of
music, video, and other
files may be illegal,
and download
malicious software.

Predators
These people use the
Internet to trick children
into meeting with them
in person.

www.microsoft.com/protect

If kids explore
unsupervised, they
could stumble upon
images or information
you may not want
them exposed to.

Invasion of Privacy
If kids fill out online forms, they
may share information you
don’t want strangers to have
about them or your family.
Primary Threats to Personal
Online Safety
Phishing
E-mail sent by online
criminals to trick you
into going to fake Web
sites and revealing
personal information

Identity Theft
A crime where con
artists get your
personal information
and access your cash
and/or credit

www.microsoft.com/protect

Hoaxes
E-mail sent by online
criminals to trick you into
giving them money

Spam
Unwanted e-mail,
instant messages,
and other online
communication
Steps You Can Take

Your computer

Your family

Yourself

1. Turn on Windows
Internet firewall.
2. Use Microsoft Update
to keep Windows upto-date automatically.
3. Install and maintain
antivirus software.
4. Install and maintain
Microsoft Windows
Defender.

1. Talk with your kids
about what they
do online.
2. Set clear rules for
Internet use.
3. Keep personal
information private.
4. Use family safety
settings in
Microsoft software.

1. Practice Internet
behavior that lowers
your risk.
2. Manage your personal
information carefully.
3. Use anti-phishing and
anti-spam technology
built into Windows
Vista, Windows XP
SP2, Windows Live,
and Microsoft Outlook.

www.microsoft.com/protect
Four Steps to Help Protect

Your Computer
Turn on Windows Internet firewall
Use Microsoft Update to keep Windows
up-to-date automatically
Install and maintain antivirus software
Install and maintain antispyware software

www.microsoft.com/protect
Turn on Windows Internet Firewall

An Internet firewall
helps create a
protective barrier
between your
computer and
the Internet

www.microsoft.com/protect
Use Automatic Updates to
Keep Software Up-to-date
•

•

Install all updates
as soon as they
are available
Automatic updates
provide the best
protection

www.microsoft.com/protect
Install and Maintain Antivirus Software
•

•

Don’t let it expire

www.microsoft.com/protect

Antivirus software
helps to detect and
remove computer
viruses before they
can cause damage.
For antivirus
software to be
effective, you must
keep it up-to-date.
Install and Maintain Antispyware
Software
Use antispyware
software, like Microsoft
Windows Defender, so
unknown software cannot
track your online activity
and potentially steal your
information.

www.microsoft.com/protect
Other Ways to Help Protect
Your Computer
Back up your files regularly
Read Web site
privacy statements
Close pop-ups using red “X”
Think before you click

www.microsoft.com/protect
Back up Your Files

•

•

www.microsoft.com/protect

Save to CD/DVD, a
USB drive, or other
external source
Use a Web-based
backup service
Think Before You Click

•

Be cautious with e-mail
attachments and links

•

Only download
files from Web sites
you trust

www.microsoft.com/protect
Read Privacy Statements
Understand what you
are getting before you
agree to download or
share your personal
information

www.microsoft.com/protect
Use the Red “X” to Close Pop-ups
•

•

www.microsoft.com/protect

Always use the red “X”
in the corner of a popup screen.
Never click “yes,”
“accept,” or even
“cancel,” because it
could be a trick that
installs software on
your computer.
Take Steps to Help Protect

Your Family
Talk with your kids about what they do online
Set clear rules for Internet use
Keep personal information private
Use family safety software

www.microsoft.com/protect
Talk with Your Kids
about Online Risks
•

Talk frankly with your kids
about Internet risks, including
•
•
•

•

Online criminals
Inappropriate content
Invasion of privacy

Empower them by teaching
them how their own
behavior can reduce those
risks and help to keep them
safe when they are online

www.microsoft.com/protect

Helpful online resources
www.staysafe.org
www.getnetwise.org
www.microsoft.com/protect
Pay Attention to What
Your Kids Do Online
•
•
•
•
•

Keep the computer in a
central area
Get to know how your
kids use the Internet
Let your kids be the
teacher
Teach kids to trust
their instincts
Encourage them to
report any problems

www.microsoft.com/protect
Keep Personal Information Private
•

Teach children to check
with you before sharing
personal information online

•

Monitor your children’s
online activities

•

Teach your children to
report suspicious activity

•

Help children choose
appropriate screen names
and e-mail addresses

www.microsoft.com/protect
Set Clear Rules for Internet Use
•
•
•
•
•
•

Do not share files or
open attachments
Do not click links in e-mail
Treat others the way
you want to be treated
Stand up for yourself
Respect other
people’s property
Never go alone to meet an
Internet “friend” in person

www.microsoft.com/protect
Use Family Safety Software
•

Available in Windows
Vista , Windows Live
OneCare Family Safety,
Xbox 360
®

™

™

®

•

Helps parents manage
the content their children
view, what they do, and
who they communicate
with online

www.microsoft.com/protect
Take Steps to Help Protect

Your Personal Information
Practice Internet behavior that lowers
your risk
Manage your personal information carefully
Use technology to reduce nuisances,
and raise the alarm when appropriate

www.microsoft.com/protect
Practice Internet Behaviors that
Help Reduce Your Risk
•
•
•

www.microsoft.com/protect

Delete spam, don’t open it
Be on the lookout for
online scams
Use strong passwords
Manage Personal Information
Carefully
•

•
•

•
•
www.microsoft.com/protect

Do not share personal
information in e-mail or
instant messages
Use only secure and
trusted Web sites
Make sure you are where
you think you are: Web
sites can be faked
Avoid financial transactions
over wireless networks
When in public, stay private
Use Anti-Phishing and
Anti-Spam Technology
•

Most e-mail providers
and programs, like
Windows Live Hotmail
and Microsoft Outlook ,
filter most spam
®

®

•

Phishing Filter in
Internet Explorer 7
helps to block and warn
about suspicious sites
®

www.microsoft.com/protect
If Your Identity is Stolen
•
•
•
•

Report it
Follow up in writing
Change all passwords
Place fraud alert on credit reports
Get a copy of your credit report
and ensure your account is marked
“fraud alert” and “victim’s statement”

www.microsoft.com/protect
How Does Microsoft Help Improve
Security and Safety?

Partnership

Technology

Guidance

By partnering with
non-governmental
organizations, other
technology companies,
and governments
worldwide to help
keep people safe online.

By developing software
products and tools that
increase security and
safety, helping people
minimize their risk
online and make
informed choices.

By providing useful
guidance that helps
people understand
online risks and what
actions they can take.

www.microsoft.com/protect
For More Information
www.microsoft.com/protect
www.staysafe.org
www.getnetwise.org

www.microsoft.com/protect
© 2007 Microsoft Corporation. All rights reserved.
Microsoft, Hotmail, OneCare, Outlook, Windows, Windows Vista, Xbox, Xbox 360, Xbox LIVE, and other product names are or may be registered trademarks and/or trademarks
in the U.S. and/or other countries.
The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation.
Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft,
and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation.
MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

More Related Content

What's hot

Cyber Security
Cyber SecurityCyber Security
Cyber Security
Bhandari Hìmáñßhü
 
Cyber security
Cyber securityCyber security
Cyber security
Manjushree Mashal
 
Computer security
Computer securityComputer security
Computer security
fiza1975
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
Ahmed Moussa
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenance
Celia Bandelier
 
Cyber security and its advantages
Cyber security and its advantagesCyber security and its advantages
Cyber security and its advantages
Radhika Sharma
 
COMPUTER SYSTEM
COMPUTER SYSTEMCOMPUTER SYSTEM
COMPUTER SYSTEM
Yanne Evangelista
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecurity
learnt
 
Cyber security
Cyber securityCyber security
Cyber security
Rishav Sadhu
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
Rubal Sagwal
 
system Security
system Security system Security
system Security
Gaurav Mishra
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security
elmuhammadmuhammad
 
Internet security
Internet securityInternet security
Internet security
Mohamed El-malki
 
cyber security
cyber security cyber security
cyber security
sumitbajpeyee
 
How to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique PasswordsHow to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique Passwords
ConnectSafely
 
Computer security
Computer securityComputer security
Computer security
Mahesh Singh Madai
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
Ramiro Cid
 
Computer Security
Computer SecurityComputer Security
Computer Security
AkNirojan
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
Progressive Integrations
 
Information security threats
Information security threatsInformation security threats
Information security threats
complianceonline123
 

What's hot (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Computer security
Computer securityComputer security
Computer security
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenance
 
Cyber security and its advantages
Cyber security and its advantagesCyber security and its advantages
Cyber security and its advantages
 
COMPUTER SYSTEM
COMPUTER SYSTEMCOMPUTER SYSTEM
COMPUTER SYSTEM
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecurity
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
system Security
system Security system Security
system Security
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security
 
Internet security
Internet securityInternet security
Internet security
 
cyber security
cyber security cyber security
cyber security
 
How to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique PasswordsHow to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique Passwords
 
Computer security
Computer securityComputer security
Computer security
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Information security threats
Information security threatsInformation security threats
Information security threats
 

Similar to Computer Security and safety

Microsoft (Projects)
Microsoft (Projects)Microsoft (Projects)
Microsoft (Projects)
Vinayak Hegde
 
Protect
ProtectProtect
Protect
Yamitza Rosas
 
Online reputation
Online reputationOnline reputation
Online reputation
esl2m
 
Microsoft protect ppt_ms_final
Microsoft protect ppt_ms_finalMicrosoft protect ppt_ms_final
Microsoft protect ppt_ms_final
21_zaheer
 
Online reputation
Online reputationOnline reputation
Online reputation
Eslam Mohammed
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
Community IT Innovators
 
CYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWCYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEW
Billy Warero
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
peterhitch
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
amiinaaa
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online
Nader Alkeinay
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
SheryldeVilla2
 
12990739.ppt
12990739.ppt12990739.ppt
12990739.ppt
MuhammadShahidulIsla8
 
Internet safety
Internet safetyInternet safety
Internet safety
jonathancallcott-efc
 
Phish training final
Phish training finalPhish training final
Phish training final
Jen Ruhman
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
Kazi Sarwar Hossain
 
Module 5: Safety
Module 5: SafetyModule 5: Safety
Module 5: Safety
Karel Van Isacker
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
CharithraaAR
 
Cyber security
Cyber securityCyber security
Cyber security
Sannith Reddy
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Vivek Agarwal
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
ICT Frame Magazine Pvt. Ltd.
 

Similar to Computer Security and safety (20)

Microsoft (Projects)
Microsoft (Projects)Microsoft (Projects)
Microsoft (Projects)
 
Protect
ProtectProtect
Protect
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Microsoft protect ppt_ms_final
Microsoft protect ppt_ms_finalMicrosoft protect ppt_ms_final
Microsoft protect ppt_ms_final
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
CYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWCYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEW
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
 
12990739.ppt
12990739.ppt12990739.ppt
12990739.ppt
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Phish training final
Phish training finalPhish training final
Phish training final
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
Module 5: Safety
Module 5: SafetyModule 5: Safety
Module 5: Safety
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 

More from Sadaf Walliyani

Letters and Phonics
Letters and Phonics Letters and Phonics
Letters and Phonics
Sadaf Walliyani
 
Culture of pakistan
Culture of pakistanCulture of pakistan
Culture of pakistan
Sadaf Walliyani
 
Culture of pakistan game
Culture of pakistan gameCulture of pakistan game
Culture of pakistan game
Sadaf Walliyani
 
Imam ghazali philosophy of education
Imam ghazali philosophy of educationImam ghazali philosophy of education
Imam ghazali philosophy of education
Sadaf Walliyani
 
Traffic rules
Traffic rulesTraffic rules
Traffic rules
Sadaf Walliyani
 
I am a start right kid
I am a start right kidI am a start right kid
I am a start right kid
Sadaf Walliyani
 
Student council
Student council Student council
Student council
Sadaf Walliyani
 
Take care of animals
Take care of animalsTake care of animals
Take care of animals
Sadaf Walliyani
 
Habitat ppt games
Habitat ppt games Habitat ppt games
Habitat ppt games
Sadaf Walliyani
 
Habitat games
Habitat games Habitat games
Habitat games
Sadaf Walliyani
 
Animal home quick match
Animal home  quick match Animal home  quick match
Animal home quick match
Sadaf Walliyani
 
Millionaire verbs
Millionaire verbsMillionaire verbs
Millionaire verbs
Sadaf Walliyani
 
City and village
City and village City and village
City and village
Sadaf Walliyani
 
Professions
Professions  Professions
Professions
Sadaf Walliyani
 
Allah created everything
Allah created everythingAllah created everything
Allah created everything
Sadaf Walliyani
 
City and village
City and village City and village
City and village
Sadaf Walliyani
 
Goods and services
Goods and servicesGoods and services
Goods and services
Sadaf Walliyani
 
Interactive white board PPT
Interactive white board PPTInteractive white board PPT
Interactive white board PPT
Sadaf Walliyani
 
Population
Population Population
Population
Sadaf Walliyani
 
City life Village life
City life Village life City life Village life
City life Village life
Sadaf Walliyani
 

More from Sadaf Walliyani (20)

Letters and Phonics
Letters and Phonics Letters and Phonics
Letters and Phonics
 
Culture of pakistan
Culture of pakistanCulture of pakistan
Culture of pakistan
 
Culture of pakistan game
Culture of pakistan gameCulture of pakistan game
Culture of pakistan game
 
Imam ghazali philosophy of education
Imam ghazali philosophy of educationImam ghazali philosophy of education
Imam ghazali philosophy of education
 
Traffic rules
Traffic rulesTraffic rules
Traffic rules
 
I am a start right kid
I am a start right kidI am a start right kid
I am a start right kid
 
Student council
Student council Student council
Student council
 
Take care of animals
Take care of animalsTake care of animals
Take care of animals
 
Habitat ppt games
Habitat ppt games Habitat ppt games
Habitat ppt games
 
Habitat games
Habitat games Habitat games
Habitat games
 
Animal home quick match
Animal home  quick match Animal home  quick match
Animal home quick match
 
Millionaire verbs
Millionaire verbsMillionaire verbs
Millionaire verbs
 
City and village
City and village City and village
City and village
 
Professions
Professions  Professions
Professions
 
Allah created everything
Allah created everythingAllah created everything
Allah created everything
 
City and village
City and village City and village
City and village
 
Goods and services
Goods and servicesGoods and services
Goods and services
 
Interactive white board PPT
Interactive white board PPTInteractive white board PPT
Interactive white board PPT
 
Population
Population Population
Population
 
City life Village life
City life Village life City life Village life
City life Village life
 

Recently uploaded

Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 

Recently uploaded (20)

Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 

Computer Security and safety

  • 1.
  • 2. The Internet = A World of Opportunities Look what’s at your fingertips • • Access to information and entertainment • www.microsoft.com/protect A way to communicate with friends, family, colleagues A means to learn, meet people, and explore
  • 3. Online Security Versus Online Safety Security: We must secure our computers with technology in the same way that we secure the doors to our homes. Safety: We must act in ways that help protect us against the risks that come with Internet use. www.microsoft.com/protect
  • 4. Primary Online Risks and Threats To Computers • • • • Viruses Worms Trojans Spyware To Families • • • • • www.microsoft.com/protect Cyberbullies File-sharing abuses Invasion of privacy Disturbing content Predators To Personal Information • Online fraud and phishing Hoaxes Identity theft • Spam • •
  • 5. Primary Threats to Computer Security Viruses/Worms Software programs designed to invade your computer, and copy, damage, or delete your data. www.microsoft.com/protect Trojans Viruses that pretend to be helpful programs while destroying your data, damaging your computer, and stealing your personal information. Spyware Software that tracks your online activities or displays endless ads.
  • 6. Primary Online Risks for Children Disturbing Content File-share Abuse Cyberbullies Both children and adults may use the Internet to harass or intimidate other people. Unauthorized sharing of music, video, and other files may be illegal, and download malicious software. Predators These people use the Internet to trick children into meeting with them in person. www.microsoft.com/protect If kids explore unsupervised, they could stumble upon images or information you may not want them exposed to. Invasion of Privacy If kids fill out online forms, they may share information you don’t want strangers to have about them or your family.
  • 7. Primary Threats to Personal Online Safety Phishing E-mail sent by online criminals to trick you into going to fake Web sites and revealing personal information Identity Theft A crime where con artists get your personal information and access your cash and/or credit www.microsoft.com/protect Hoaxes E-mail sent by online criminals to trick you into giving them money Spam Unwanted e-mail, instant messages, and other online communication
  • 8. Steps You Can Take Your computer Your family Yourself 1. Turn on Windows Internet firewall. 2. Use Microsoft Update to keep Windows upto-date automatically. 3. Install and maintain antivirus software. 4. Install and maintain Microsoft Windows Defender. 1. Talk with your kids about what they do online. 2. Set clear rules for Internet use. 3. Keep personal information private. 4. Use family safety settings in Microsoft software. 1. Practice Internet behavior that lowers your risk. 2. Manage your personal information carefully. 3. Use anti-phishing and anti-spam technology built into Windows Vista, Windows XP SP2, Windows Live, and Microsoft Outlook. www.microsoft.com/protect
  • 9. Four Steps to Help Protect Your Computer Turn on Windows Internet firewall Use Microsoft Update to keep Windows up-to-date automatically Install and maintain antivirus software Install and maintain antispyware software www.microsoft.com/protect
  • 10. Turn on Windows Internet Firewall An Internet firewall helps create a protective barrier between your computer and the Internet www.microsoft.com/protect
  • 11. Use Automatic Updates to Keep Software Up-to-date • • Install all updates as soon as they are available Automatic updates provide the best protection www.microsoft.com/protect
  • 12. Install and Maintain Antivirus Software • • Don’t let it expire www.microsoft.com/protect Antivirus software helps to detect and remove computer viruses before they can cause damage. For antivirus software to be effective, you must keep it up-to-date.
  • 13. Install and Maintain Antispyware Software Use antispyware software, like Microsoft Windows Defender, so unknown software cannot track your online activity and potentially steal your information. www.microsoft.com/protect
  • 14. Other Ways to Help Protect Your Computer Back up your files regularly Read Web site privacy statements Close pop-ups using red “X” Think before you click www.microsoft.com/protect
  • 15. Back up Your Files • • www.microsoft.com/protect Save to CD/DVD, a USB drive, or other external source Use a Web-based backup service
  • 16. Think Before You Click • Be cautious with e-mail attachments and links • Only download files from Web sites you trust www.microsoft.com/protect
  • 17. Read Privacy Statements Understand what you are getting before you agree to download or share your personal information www.microsoft.com/protect
  • 18. Use the Red “X” to Close Pop-ups • • www.microsoft.com/protect Always use the red “X” in the corner of a popup screen. Never click “yes,” “accept,” or even “cancel,” because it could be a trick that installs software on your computer.
  • 19. Take Steps to Help Protect Your Family Talk with your kids about what they do online Set clear rules for Internet use Keep personal information private Use family safety software www.microsoft.com/protect
  • 20. Talk with Your Kids about Online Risks • Talk frankly with your kids about Internet risks, including • • • • Online criminals Inappropriate content Invasion of privacy Empower them by teaching them how their own behavior can reduce those risks and help to keep them safe when they are online www.microsoft.com/protect Helpful online resources www.staysafe.org www.getnetwise.org www.microsoft.com/protect
  • 21. Pay Attention to What Your Kids Do Online • • • • • Keep the computer in a central area Get to know how your kids use the Internet Let your kids be the teacher Teach kids to trust their instincts Encourage them to report any problems www.microsoft.com/protect
  • 22. Keep Personal Information Private • Teach children to check with you before sharing personal information online • Monitor your children’s online activities • Teach your children to report suspicious activity • Help children choose appropriate screen names and e-mail addresses www.microsoft.com/protect
  • 23. Set Clear Rules for Internet Use • • • • • • Do not share files or open attachments Do not click links in e-mail Treat others the way you want to be treated Stand up for yourself Respect other people’s property Never go alone to meet an Internet “friend” in person www.microsoft.com/protect
  • 24. Use Family Safety Software • Available in Windows Vista , Windows Live OneCare Family Safety, Xbox 360 ® ™ ™ ® • Helps parents manage the content their children view, what they do, and who they communicate with online www.microsoft.com/protect
  • 25. Take Steps to Help Protect Your Personal Information Practice Internet behavior that lowers your risk Manage your personal information carefully Use technology to reduce nuisances, and raise the alarm when appropriate www.microsoft.com/protect
  • 26. Practice Internet Behaviors that Help Reduce Your Risk • • • www.microsoft.com/protect Delete spam, don’t open it Be on the lookout for online scams Use strong passwords
  • 27. Manage Personal Information Carefully • • • • • www.microsoft.com/protect Do not share personal information in e-mail or instant messages Use only secure and trusted Web sites Make sure you are where you think you are: Web sites can be faked Avoid financial transactions over wireless networks When in public, stay private
  • 28. Use Anti-Phishing and Anti-Spam Technology • Most e-mail providers and programs, like Windows Live Hotmail and Microsoft Outlook , filter most spam ® ® • Phishing Filter in Internet Explorer 7 helps to block and warn about suspicious sites ® www.microsoft.com/protect
  • 29. If Your Identity is Stolen • • • • Report it Follow up in writing Change all passwords Place fraud alert on credit reports Get a copy of your credit report and ensure your account is marked “fraud alert” and “victim’s statement” www.microsoft.com/protect
  • 30. How Does Microsoft Help Improve Security and Safety? Partnership Technology Guidance By partnering with non-governmental organizations, other technology companies, and governments worldwide to help keep people safe online. By developing software products and tools that increase security and safety, helping people minimize their risk online and make informed choices. By providing useful guidance that helps people understand online risks and what actions they can take. www.microsoft.com/protect
  • 32. © 2007 Microsoft Corporation. All rights reserved. Microsoft, Hotmail, OneCare, Outlook, Windows, Windows Vista, Xbox, Xbox 360, Xbox LIVE, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.