SlideShare a Scribd company logo
1 of 6
Technology Safety, Security,
& Filtering Training
Harold L. Richards High School
Oak Lawn, IL
Presented by:

James M. Soderstrom
Technology Safety
The Internet is a book not a personal diary


Are you comfortable with ANYONE seeing any
personal information about you?

Always side the error of caution with what is
posted online


It is not very difficult to search personal information
about anyone on the Internet

Once you hit “submit” it is there for EVERONE
and ANYONE to search


Yes you can revise and delete information, but what if
someone printed that page or saved it to their
computer before you “took it back?”
Technology Security
Update all your anti-virus, operating system, and
other software to limit people form accessing
your information on your computer


http://www.youtube.com/watch?v=aLtwmUGAhSs

Use external storage devices for important
information
ALWAYS make sure to log off or shut down
computers when you leave them for ANY
amount of time


http://www.youtube.com/watch?v=x_gcCURLOZc
Filtering Training
Just because you delete your Internet
Browsing history does not mean no can
find out where you have been and what
you have looked at.


This creates a list of websites which can be
blocked by software installations
http://www.youtube.com/watch?v=_Z4qu54CUJQ
References
Cyber Security at UC Santa Cruz. (2012).
University of California: Santa Cruz. Information
Technology Services. Retrieved from
http://its.ucsc.edu/security/docs/csbrochure.pdf.
United States Computer Emergency Readiness
Team. (2013). Security Tip (ST05-013):
Guidelines for Publishing Information Online.
Retrieved from: http://www.uscert.gov/ncas/tips/st05-013.
References
Cyber Security at UC Santa Cruz. (2012).
University of California: Santa Cruz. Information
Technology Services. Retrieved from
http://its.ucsc.edu/security/docs/csbrochure.pdf.
United States Computer Emergency Readiness
Team. (2013). Security Tip (ST05-013):
Guidelines for Publishing Information Online.
Retrieved from: http://www.uscert.gov/ncas/tips/st05-013.

More Related Content

What's hot

How to lock photos app with password on Mac
How to lock photos app with password on MacHow to lock photos app with password on Mac
How to lock photos app with password on MacNancyzeng
 
Internet Safety Aisa
Internet Safety AisaInternet Safety Aisa
Internet Safety AisaElsa Freire
 
Internet Publication
Internet PublicationInternet Publication
Internet PublicationDré Davis
 
Disable Adobe Flash Zero Day Vulnerability in Chrome, Firefox, IE
Disable Adobe Flash Zero Day Vulnerability in Chrome, Firefox, IEDisable Adobe Flash Zero Day Vulnerability in Chrome, Firefox, IE
Disable Adobe Flash Zero Day Vulnerability in Chrome, Firefox, IECheapSSLsecurity
 
[Vietnam Mobile Day 2014] Touch the future of the web - Nguyễn Việt Anh – Cou...
[Vietnam Mobile Day 2014] Touch the future of the web - Nguyễn Việt Anh – Cou...[Vietnam Mobile Day 2014] Touch the future of the web - Nguyễn Việt Anh – Cou...
[Vietnam Mobile Day 2014] Touch the future of the web - Nguyễn Việt Anh – Cou...AiTi Education
 
Security Awareness 9 10 09 V4 Web Browser
Security Awareness 9 10 09 V4 Web BrowserSecurity Awareness 9 10 09 V4 Web Browser
Security Awareness 9 10 09 V4 Web BrowserMegan Bell
 
Web Yourself Sew 2009
Web Yourself Sew 2009Web Yourself Sew 2009
Web Yourself Sew 2009Maegan.Slaten
 

What's hot (9)

Vdi for staff and students
Vdi for staff and studentsVdi for staff and students
Vdi for staff and students
 
How to lock photos app with password on Mac
How to lock photos app with password on MacHow to lock photos app with password on Mac
How to lock photos app with password on Mac
 
Internet Safety Aisa
Internet Safety AisaInternet Safety Aisa
Internet Safety Aisa
 
Internet Publication
Internet PublicationInternet Publication
Internet Publication
 
Four Things You Should Do to Your Computer Today
Four Things You Should Do to Your Computer TodayFour Things You Should Do to Your Computer Today
Four Things You Should Do to Your Computer Today
 
Disable Adobe Flash Zero Day Vulnerability in Chrome, Firefox, IE
Disable Adobe Flash Zero Day Vulnerability in Chrome, Firefox, IEDisable Adobe Flash Zero Day Vulnerability in Chrome, Firefox, IE
Disable Adobe Flash Zero Day Vulnerability in Chrome, Firefox, IE
 
[Vietnam Mobile Day 2014] Touch the future of the web - Nguyễn Việt Anh – Cou...
[Vietnam Mobile Day 2014] Touch the future of the web - Nguyễn Việt Anh – Cou...[Vietnam Mobile Day 2014] Touch the future of the web - Nguyễn Việt Anh – Cou...
[Vietnam Mobile Day 2014] Touch the future of the web - Nguyễn Việt Anh – Cou...
 
Security Awareness 9 10 09 V4 Web Browser
Security Awareness 9 10 09 V4 Web BrowserSecurity Awareness 9 10 09 V4 Web Browser
Security Awareness 9 10 09 V4 Web Browser
 
Web Yourself Sew 2009
Web Yourself Sew 2009Web Yourself Sew 2009
Web Yourself Sew 2009
 

Viewers also liked

Judson ISD Internet Safety and Filtering Hearing November 16th, 2009
Judson ISD Internet Safety and Filtering Hearing November 16th, 2009Judson ISD Internet Safety and Filtering Hearing November 16th, 2009
Judson ISD Internet Safety and Filtering Hearing November 16th, 2009Steve Young
 
ET 5063 Module 4 Assignment - Preparing a Staff Development Presentation
ET 5063 Module 4 Assignment - Preparing a Staff Development PresentationET 5063 Module 4 Assignment - Preparing a Staff Development Presentation
ET 5063 Module 4 Assignment - Preparing a Staff Development Presentationjsoderst75
 
International vietnamese final_online
International vietnamese final_onlineInternational vietnamese final_online
International vietnamese final_onlinevipkendy
 
COMM Presentation
COMM PresentationCOMM Presentation
COMM PresentationGracie Lv
 
Katarzyna baranowska prezentacja
Katarzyna baranowska prezentacjaKatarzyna baranowska prezentacja
Katarzyna baranowska prezentacjabaranovska
 
Social Media, Social Networking and School Libraries.
Social Media, Social Networking and School Libraries.Social Media, Social Networking and School Libraries.
Social Media, Social Networking and School Libraries.Judy O'Connell
 

Viewers also liked (10)

Judson ISD Internet Safety and Filtering Hearing November 16th, 2009
Judson ISD Internet Safety and Filtering Hearing November 16th, 2009Judson ISD Internet Safety and Filtering Hearing November 16th, 2009
Judson ISD Internet Safety and Filtering Hearing November 16th, 2009
 
ET 5063 Module 4 Assignment - Preparing a Staff Development Presentation
ET 5063 Module 4 Assignment - Preparing a Staff Development PresentationET 5063 Module 4 Assignment - Preparing a Staff Development Presentation
ET 5063 Module 4 Assignment - Preparing a Staff Development Presentation
 
International vietnamese final_online
International vietnamese final_onlineInternational vietnamese final_online
International vietnamese final_online
 
Warren+buffet
Warren+buffetWarren+buffet
Warren+buffet
 
Blog powerpoint
Blog powerpointBlog powerpoint
Blog powerpoint
 
Villa
VillaVilla
Villa
 
COMM Presentation
COMM PresentationCOMM Presentation
COMM Presentation
 
Katarzyna baranowska prezentacja
Katarzyna baranowska prezentacjaKatarzyna baranowska prezentacja
Katarzyna baranowska prezentacja
 
Social Media, Social Networking and School Libraries.
Social Media, Social Networking and School Libraries.Social Media, Social Networking and School Libraries.
Social Media, Social Networking and School Libraries.
 
Networking Skills Workshop
Networking Skills WorkshopNetworking Skills Workshop
Networking Skills Workshop
 

Similar to Et 5083 week 3 assignment - technology safety, security, & filtering training ppt

Web security
Web securityWeb security
Web securityekostyuk
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
 
Dark Alleys Part1740
Dark Alleys Part1740Dark Alleys Part1740
Dark Alleys Part1740guest2bd2b2
 
Dark Alleys Part1
Dark Alleys Part1Dark Alleys Part1
Dark Alleys Part1Anne Adrian
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying Saskia1234
 
Security Awareness Program
Security Awareness ProgramSecurity Awareness Program
Security Awareness ProgramDavid Wigton
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityAtlantic Training, LLC.
 
Lkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & SanjayLkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & SanjayQuek Lilian
 
Social Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus NetworkSocial Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus Networkthowell
 
Staying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘NetStaying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘NetDaniel Owens
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014B2BPlanner Ltd.
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityAshley Zimmerman
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityJFashant
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxBarakaMuyengi
 
Basic_computerHygiene
Basic_computerHygieneBasic_computerHygiene
Basic_computerHygieneEricK Gasana
 
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter Cyber Security
 

Similar to Et 5083 week 3 assignment - technology safety, security, & filtering training ppt (20)

Web security
Web securityWeb security
Web security
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Dark Alleys Part1740
Dark Alleys Part1740Dark Alleys Part1740
Dark Alleys Part1740
 
Dark Alleys Part1
Dark Alleys Part1Dark Alleys Part1
Dark Alleys Part1
 
Information security
Information securityInformation security
Information security
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Security Awareness Program
Security Awareness ProgramSecurity Awareness Program
Security Awareness Program
 
Comp 107 cep 8
Comp 107 cep 8Comp 107 cep 8
Comp 107 cep 8
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
 
Lkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & SanjayLkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & Sanjay
 
Social Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus NetworkSocial Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus Network
 
Staying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘NetStaying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘Net
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
 
Basic_computerHygiene
Basic_computerHygieneBasic_computerHygiene
Basic_computerHygiene
 
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdf
 
IT Security
IT SecurityIT Security
IT Security
 

Recently uploaded

Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 

Recently uploaded (20)

Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 

Et 5083 week 3 assignment - technology safety, security, & filtering training ppt

  • 1. Technology Safety, Security, & Filtering Training Harold L. Richards High School Oak Lawn, IL Presented by: James M. Soderstrom
  • 2. Technology Safety The Internet is a book not a personal diary  Are you comfortable with ANYONE seeing any personal information about you? Always side the error of caution with what is posted online  It is not very difficult to search personal information about anyone on the Internet Once you hit “submit” it is there for EVERONE and ANYONE to search  Yes you can revise and delete information, but what if someone printed that page or saved it to their computer before you “took it back?”
  • 3. Technology Security Update all your anti-virus, operating system, and other software to limit people form accessing your information on your computer  http://www.youtube.com/watch?v=aLtwmUGAhSs Use external storage devices for important information ALWAYS make sure to log off or shut down computers when you leave them for ANY amount of time  http://www.youtube.com/watch?v=x_gcCURLOZc
  • 4. Filtering Training Just because you delete your Internet Browsing history does not mean no can find out where you have been and what you have looked at.  This creates a list of websites which can be blocked by software installations http://www.youtube.com/watch?v=_Z4qu54CUJQ
  • 5. References Cyber Security at UC Santa Cruz. (2012). University of California: Santa Cruz. Information Technology Services. Retrieved from http://its.ucsc.edu/security/docs/csbrochure.pdf. United States Computer Emergency Readiness Team. (2013). Security Tip (ST05-013): Guidelines for Publishing Information Online. Retrieved from: http://www.uscert.gov/ncas/tips/st05-013.
  • 6. References Cyber Security at UC Santa Cruz. (2012). University of California: Santa Cruz. Information Technology Services. Retrieved from http://its.ucsc.edu/security/docs/csbrochure.pdf. United States Computer Emergency Readiness Team. (2013). Security Tip (ST05-013): Guidelines for Publishing Information Online. Retrieved from: http://www.uscert.gov/ncas/tips/st05-013.