SlideShare a Scribd company logo
Internet Security
Sadie Pope Dowdell
Library – South Amboy
Michael J. Elson
Technology Consultant
Avoid Online Scams
• Don’t send money to someone you
don’t know.
• Don’t respond to messages that ask
for your personal or financial
information.
• Don’t play a foreign lottery.
Avoid Online Scams
• Keep in mind that wiring money is
like sending cash: once it’s gone,
you can’t get it back.
• Don’t agree to deposit a check from
someone you don’t know and then
wire money back.
Avoid Online Scams
• Read your bills and monthly
statements regularly—on paper and
online.
• In the wake of a natural disaster or
another crisis, give to established
charities rather than one that seems
to have sprung up overnight.
Avoid Online Scams
• Talk to your doctor before buying
health products or signing up for
medical treatments.
• When considering an investment,
there’s no such thing as a sure thing.
• Know where an offer comes from and
who you’re dealing with.
Best Practices Online
1. Protect your personal information.
It's valuable.
• If you think no one would be interested
in YOUR personal information, think
again. ANYONE can be a victim of
identity theft
Identity Theft
The bottom line for online threats like
phishing, spyware, and hackers is identity
theft. ID theft occurs when someone uses
your name, Social Security number, credit
card number or other personal information
without your permission to commit fraud
or other crimes.
Top 10 Email Scams
• The "Nigerian" Email Scam
• Work-at-Home Scams
• Weight Loss Claims
• Foreign Lotteries
• Phishing
Phishing
• Criminals send email, text, or pop-up
messages that appear to come from
your bank, a government agency, an
online seller or another organization
with which you do business
Phishing
• The message asks you to click to a
website or call a phone number to
update your account information or
claim a prize or benefit. It might suggest
something bad will happen if you don't
respond quickly with your personal
information
Top 10 Email Scams
• Cure-All Products
• Check Overpayment Scams
• Pay-in-Advance Credit Offers
• Debt Relief
• Investment Schemes
Email Scams
Send these types of email to :
spam@uce.gov
Best Practices Online
2. Know who you're dealing with.
• When shopping online, look for a sellers
street address (B&M) and a working
telephone number.
• Read the fine print – some downloads
come with spyware
File-Sharing (P2P)
• Peer-to-peer (P2P) file-sharing allows
users to share files online through an
informal network of computers running
the same software.
File-Sharing (P2P)
• File-sharing can
give you access to a
wealth of
information, but it
also has a number
of risks.
File-Sharing (P2P)
• If you don't check the proper settings,
you could allow access not only to the
files you intend to share, but also to
other information on your hard drive,
like your tax returns, email messages,
medical records, photos, or other
personal documents.
File-Sharing (P2P)
• In addition, you may unwittingly
download malware or pornography
labeled as something else. Or you may
download material that is protected by
the copyright laws, which would mean
you could be breaking the law.
Best Practices Online
3. Use security software that updates
automatically.
• Keep your security software active and
current: at a minimum, your computer
should have anti-virus and anti-spyware
software, and a firewall.
Malware
• “Malicious software;" it includes viruses
– programs that copy themselves
without your permission – and spyware,
programs installed without your consent
to monitor or control your
computer activity.
Malware
• Criminals are hard at work thinking up
ways to get malware on your computer.
They create appealing web sites, desirable
downloads, & compelling stories to lure
you to links that will download malware,
especially on computers that don't use
adequate security software.
Anti-Virus Software
• Anti-virus software protects your
computer from viruses that can destroy
your data, slow your computer's
performance, cause a crash, or even
allow spammers to send email through
your account.
Anti-Spyware Software
• Installed on your computer without your
consent, spyware monitors your
computer use. It may send pop-ups,
redirect your computer to websites,
monitor internet surfing, or record your
keystrokes, which, in turn, could lead to
the theft of your personal information.
Firewalls
• A firewall helps keep hackers from using
your computer to send out your personal
information without your permission. A
firewall is like a guard, watching for outside
attempts to access your system and
blocking communications to and from
sources you don't permit.
Best Practices Online
4. Keep your operating system and
Web browser up-to-date, and learn
about their security features.
• Set your operating system and Web
browser software to download and
install security patches automatically.
"BotNet"
• Some spammers search the internet for
unprotected computers they can control &
use anonymously to send spam, turning
them into a robot network, known
as a "botnet."
"BotNet"
• A botnet is made up of many thousands of
home computers sending emails by the
millions. Most spam is sent remotely this
way; millions of home computers are part
of botnets.
Best Practices Online
5. Protect your passwords.
• Keep your passwords in a secure place,
and out of plain sight. Don't share them
on the internet, over email, or on the
phone. Your Internet Service Provider
(ISP) should never ask for your
password.
Passwords
• Use passwords that have at least eight
characters and include numbers or
symbols. The longer the password, the
tougher it is to crack. A 12-character
password is stronger than one with eight
characters.
Passwords
• Avoid common words: some hackers use
programs that can try every word in the
dictionary.
• Don't use your personal information, your
login name, or adjacent keys on the
keyboard as passwords.
Passwords
• Change your passwords regularly (at a
minimum, every 90 days).
• Don't use the same password for each
online account you access.
Best Practices Online
6. Back up important files.
• No system is completely secure. If you
have important files stored on your
computer, copy them onto a removable
disc or an external hard drive, and store
it in a safe place.
Best Practices Online
7. Learn what to do in an e-mergency.
• If you suspect malware is lurking on
your computer, stop shopping, banking,
and other online activities that involve
user names, passwords, or other
sensitive information.
Best Practices Online
• Confirm that your security software is
up-to-date, then use it to scan your
computer. Delete everything the
program identifies as a problem. You
may have to restart your computer for
the changes to take effect.
Resources
• OnGuardOnline.gov
• ftc.gov/idtheft
• GetNetWise.org
• StaySafe.org
Questions?
THANK YOU
Sadie Pope Dowdell Library

More Related Content

What's hot

Cyber security
Cyber securityCyber security
Cyber security
Bhavin Shah
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
ritik shukla
 
Internet safety
Internet safetyInternet safety
Internet safety
Dan Tomlinson
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Chitra Mudunuru
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
PradeeshSAI
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
JoshuaWisniewski3
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
Niti Arora
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri
Moumita Chatterjee
 
cyber security and threats.pptx
cyber security and threats.pptxcyber security and threats.pptx
cyber security and threats.pptx
VSAM Technologies India Private Limited
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
Arjith K Raj
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
Ashish prashar
 
Internet Securities Issues
Internet Securities IssuesInternet Securities Issues
Internet Securities Issues
Om Prakash Mishra
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
Foram Gosai
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
Akhil Nadh PC
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
Aayushi Singh
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
Jason Murray
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Vivek Agarwal
 
User security awareness
User security awarenessUser security awareness
User security awareness
K. A. M Lutfullah
 

What's hot (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri
 
cyber security and threats.pptx
cyber security and threats.pptxcyber security and threats.pptx
cyber security and threats.pptx
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
Internet Securities Issues
Internet Securities IssuesInternet Securities Issues
Internet Securities Issues
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
User security awareness
User security awarenessUser security awareness
User security awareness
 

Viewers also liked

Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpointArifa Ali
 
Internet Security
Internet SecurityInternet Security
Internet Security
Chris Rodgers
 
Internet Security
Internet SecurityInternet Security
Internet Security
Peter R. Egli
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internetdpd
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
Bijay Bhandari
 
Cyber security
Cyber securityCyber security
Cyber security
Siblu28
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Network security
Network security Network security
Network security
Madhumithah Ilango
 
Internet Security
Internet SecurityInternet Security
Internet Security
Mitesh Gupta
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 
Internet security
Internet securityInternet security
Internet security
Suneel Dogra
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety SlideshareLawrence Fine
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety PresentationPamela Moeai
 
Network Security
Network SecurityNetwork Security
Network Security
MAJU
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
Imperva
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
kusum sharma
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
Rajat Jain
 
Library On Internet Security
Library On Internet SecurityLibrary On Internet Security
Library On Internet Security
momac
 

Viewers also liked (20)

Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Network security
Network securityNetwork security
Network security
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internet
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Network security
Network security Network security
Network security
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Internet security
Internet securityInternet security
Internet security
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Network Security
Network SecurityNetwork Security
Network Security
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Library On Internet Security
Library On Internet SecurityLibrary On Internet Security
Library On Internet Security
 

Similar to Internet Security

Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
CharithraaAR
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcare
Nicholas Davis
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
KevinRiley83
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayanehaz
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraudRadiant Minds
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
Ronald Soh
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
Nicholas Davis
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
Barry Caplin
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
Kaushal Solanki
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayane Hazimeh
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
Marian Merritt
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayane Hazimeh
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training OpenFred Beck MBA, CPA
 
Living in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptxLiving in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptx
Froilan Cantillo
 
Personal Threat Models
Personal Threat ModelsPersonal Threat Models
Personal Threat Models
Geoffrey Vaughan
 
Internet Safety & Privacy
Internet Safety & PrivacyInternet Safety & Privacy
Internet Safety & PrivacyAlexine Marier
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
Courion Corporation
 
INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptx
BHUt6
 

Similar to Internet Security (20)

Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcare
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
Living in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptxLiving in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptx
 
Personal Threat Models
Personal Threat ModelsPersonal Threat Models
Personal Threat Models
 
Internet Safety & Privacy
Internet Safety & PrivacyInternet Safety & Privacy
Internet Safety & Privacy
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 
INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptx
 

Recently uploaded

From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 

Recently uploaded (20)

From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 

Internet Security

  • 1. Internet Security Sadie Pope Dowdell Library – South Amboy
  • 3. Avoid Online Scams • Don’t send money to someone you don’t know. • Don’t respond to messages that ask for your personal or financial information. • Don’t play a foreign lottery.
  • 4. Avoid Online Scams • Keep in mind that wiring money is like sending cash: once it’s gone, you can’t get it back. • Don’t agree to deposit a check from someone you don’t know and then wire money back.
  • 5. Avoid Online Scams • Read your bills and monthly statements regularly—on paper and online. • In the wake of a natural disaster or another crisis, give to established charities rather than one that seems to have sprung up overnight.
  • 6. Avoid Online Scams • Talk to your doctor before buying health products or signing up for medical treatments. • When considering an investment, there’s no such thing as a sure thing. • Know where an offer comes from and who you’re dealing with.
  • 7. Best Practices Online 1. Protect your personal information. It's valuable. • If you think no one would be interested in YOUR personal information, think again. ANYONE can be a victim of identity theft
  • 8. Identity Theft The bottom line for online threats like phishing, spyware, and hackers is identity theft. ID theft occurs when someone uses your name, Social Security number, credit card number or other personal information without your permission to commit fraud or other crimes.
  • 9. Top 10 Email Scams • The "Nigerian" Email Scam • Work-at-Home Scams • Weight Loss Claims • Foreign Lotteries • Phishing
  • 10. Phishing • Criminals send email, text, or pop-up messages that appear to come from your bank, a government agency, an online seller or another organization with which you do business
  • 11. Phishing • The message asks you to click to a website or call a phone number to update your account information or claim a prize or benefit. It might suggest something bad will happen if you don't respond quickly with your personal information
  • 12. Top 10 Email Scams • Cure-All Products • Check Overpayment Scams • Pay-in-Advance Credit Offers • Debt Relief • Investment Schemes
  • 13. Email Scams Send these types of email to : spam@uce.gov
  • 14. Best Practices Online 2. Know who you're dealing with. • When shopping online, look for a sellers street address (B&M) and a working telephone number. • Read the fine print – some downloads come with spyware
  • 15. File-Sharing (P2P) • Peer-to-peer (P2P) file-sharing allows users to share files online through an informal network of computers running the same software.
  • 16. File-Sharing (P2P) • File-sharing can give you access to a wealth of information, but it also has a number of risks.
  • 17. File-Sharing (P2P) • If you don't check the proper settings, you could allow access not only to the files you intend to share, but also to other information on your hard drive, like your tax returns, email messages, medical records, photos, or other personal documents.
  • 18. File-Sharing (P2P) • In addition, you may unwittingly download malware or pornography labeled as something else. Or you may download material that is protected by the copyright laws, which would mean you could be breaking the law.
  • 19. Best Practices Online 3. Use security software that updates automatically. • Keep your security software active and current: at a minimum, your computer should have anti-virus and anti-spyware software, and a firewall.
  • 20. Malware • “Malicious software;" it includes viruses – programs that copy themselves without your permission – and spyware, programs installed without your consent to monitor or control your computer activity.
  • 21. Malware • Criminals are hard at work thinking up ways to get malware on your computer. They create appealing web sites, desirable downloads, & compelling stories to lure you to links that will download malware, especially on computers that don't use adequate security software.
  • 22. Anti-Virus Software • Anti-virus software protects your computer from viruses that can destroy your data, slow your computer's performance, cause a crash, or even allow spammers to send email through your account.
  • 23. Anti-Spyware Software • Installed on your computer without your consent, spyware monitors your computer use. It may send pop-ups, redirect your computer to websites, monitor internet surfing, or record your keystrokes, which, in turn, could lead to the theft of your personal information.
  • 24. Firewalls • A firewall helps keep hackers from using your computer to send out your personal information without your permission. A firewall is like a guard, watching for outside attempts to access your system and blocking communications to and from sources you don't permit.
  • 25. Best Practices Online 4. Keep your operating system and Web browser up-to-date, and learn about their security features. • Set your operating system and Web browser software to download and install security patches automatically.
  • 26. "BotNet" • Some spammers search the internet for unprotected computers they can control & use anonymously to send spam, turning them into a robot network, known as a "botnet."
  • 27. "BotNet" • A botnet is made up of many thousands of home computers sending emails by the millions. Most spam is sent remotely this way; millions of home computers are part of botnets.
  • 28. Best Practices Online 5. Protect your passwords. • Keep your passwords in a secure place, and out of plain sight. Don't share them on the internet, over email, or on the phone. Your Internet Service Provider (ISP) should never ask for your password.
  • 29. Passwords • Use passwords that have at least eight characters and include numbers or symbols. The longer the password, the tougher it is to crack. A 12-character password is stronger than one with eight characters.
  • 30. Passwords • Avoid common words: some hackers use programs that can try every word in the dictionary. • Don't use your personal information, your login name, or adjacent keys on the keyboard as passwords.
  • 31. Passwords • Change your passwords regularly (at a minimum, every 90 days). • Don't use the same password for each online account you access.
  • 32. Best Practices Online 6. Back up important files. • No system is completely secure. If you have important files stored on your computer, copy them onto a removable disc or an external hard drive, and store it in a safe place.
  • 33. Best Practices Online 7. Learn what to do in an e-mergency. • If you suspect malware is lurking on your computer, stop shopping, banking, and other online activities that involve user names, passwords, or other sensitive information.
  • 34. Best Practices Online • Confirm that your security software is up-to-date, then use it to scan your computer. Delete everything the program identifies as a problem. You may have to restart your computer for the changes to take effect.
  • 37. THANK YOU Sadie Pope Dowdell Library