SlideShare a Scribd company logo
1 of 21
How to Protect Your Identity and Computer
Introduction
O Our files and entire operating system can be damaged
O Files
   O Work
   O Music
   O Photos
   O Games
   O Everything that we save on our computers
O It’s easy and well worth the effort
What is Malware?
O Malicious software
O Includes viruses
O Made to purposely
  harm and destroy a
  computer
O Can steal personal
  identity information
O The damage spreads
  very, very quickly
Question
O Why is it important to make sure a link is from
  a trusted source? Can’t we just click and if it’s
  not what we want or thought it would be, just
  go back?
Answer
O Experts like to say “When in doubt, always err
  on the side of caution.” Just delete the message
  and don’t click. Simply clicking on links in
  email, tweets, posts, social networking
  sites, smart phone messages and online
  advertising can infect your computer.
Question
O What should make you suspicious that a link
  could cause trouble? A message claiming
  you’ve won a big prize or an offer that seems
  too good to be true is always suspicious. In
  what other situations should you stop and not
  click?
Don’t Click
O Links from someone you don’t know
O Links that excitedly tell you to take urgent action
O Links in chain letters
O Links in messages that just look “weird”
O Links in a message that is clearly spam (junk mail)
O Links that just seem strange, even if from a good
  friend
O Links within messages that use bad grammar or
  awkward phrasing or misspellings
O Links from a friend or stranger claiming he/she is
  in trouble and asking that you send money
Don’t Click
O Links to a page asking you for any personal
    information, such as your password
O   Links in messages that appear to be from a
    favorite store, asking you to update your account
    (Reputable companies never do this)
O   Links on a social networking site that say “watch
    this funny video of you”
O   Links in messages that tell you to open an
    attachment
O   Links in messages that warn you to take urgent
    action
Question




O Why do experts tell us that we should be suspicious
  about a link or email attachment that “looks funny”
  even if it is from a family member, work colleague or
  your teacher?
Think Before You Click
O Malware can forge emails and create sneaky links
O If a friend or family member sends an attachment
  that you were not expecting, text her/him and ask
  about the attachment before you click
Question
O Experts say, “When in doubt do not download.”
  Or, as the Greeks said, “Beware of strangers
  bearing gifts.” What kinds of files do you
  download?
Stop Before You Download
 O Stopping before you download is a good first step.
     Then think, “What should I think about at that
     moment?”
 O   Make sure the most current version of your browser
     is installed on your computer
 O   Make sure automatic updates are set
 O   Use https
 O   Check that your computer is protected
 O   Check the reputation of a store or any other
     source before downloading
Question
O What does it mean when experts say a
  computer is “clean”?
Answer
O Making certain our files are not corrupted and
  our computer is not infected with
  contaminated software
Tips and Advice
  Provided by
   StaySafeOnline.org
Internet Use Agreement
     Orcutt Union School District
      Internet Use Agreement

More Related Content

More from Jenny Hubbard

Unit 1 The Accounting Equation
Unit 1 The Accounting EquationUnit 1 The Accounting Equation
Unit 1 The Accounting Equation
Jenny Hubbard
 
Unit 1 The Accounting Equation
Unit 1 The Accounting EquationUnit 1 The Accounting Equation
Unit 1 The Accounting Equation
Jenny Hubbard
 
Unit 4 The Accounting Cycle
Unit 4 The Accounting CycleUnit 4 The Accounting Cycle
Unit 4 The Accounting Cycle
Jenny Hubbard
 
Victoria and Vanessa Simpson University 2013
Victoria and Vanessa Simpson University 2013Victoria and Vanessa Simpson University 2013
Victoria and Vanessa Simpson University 2013
Jenny Hubbard
 

More from Jenny Hubbard (20)

Chapter 6 HW Answers
Chapter 6 HW AnswersChapter 6 HW Answers
Chapter 6 HW Answers
 
Chapter 5 HW Answers
Chapter 5 HW AnswersChapter 5 HW Answers
Chapter 5 HW Answers
 
CCA Chapter 4 HW Answers
CCA Chapter 4 HW AnswersCCA Chapter 4 HW Answers
CCA Chapter 4 HW Answers
 
Chapter 2 Linear Functions
Chapter 2 Linear FunctionsChapter 2 Linear Functions
Chapter 2 Linear Functions
 
Chapter 1 Functions
Chapter 1 FunctionsChapter 1 Functions
Chapter 1 Functions
 
Unit 4 Saving and Investing PPT
Unit 4 Saving and Investing PPTUnit 4 Saving and Investing PPT
Unit 4 Saving and Investing PPT
 
Unit 4 The Accounting Cycle
Unit 4 The Accounting CycleUnit 4 The Accounting Cycle
Unit 4 The Accounting Cycle
 
Unit 3 Debits and Credits
Unit 3 Debits and CreditsUnit 3 Debits and Credits
Unit 3 Debits and Credits
 
Unit 6 Renting vs. Buying
Unit 6 Renting vs. BuyingUnit 6 Renting vs. Buying
Unit 6 Renting vs. Buying
 
Unit 6 Renting vs. Owning
Unit 6 Renting vs. OwningUnit 6 Renting vs. Owning
Unit 6 Renting vs. Owning
 
Calculating Simple and Compound Interest
Calculating Simple and Compound InterestCalculating Simple and Compound Interest
Calculating Simple and Compound Interest
 
Intro Unit Workforce Readiness
Intro Unit Workforce ReadinessIntro Unit Workforce Readiness
Intro Unit Workforce Readiness
 
Intro Unit Workforce Readiness
Intro Unit Workforce ReadinessIntro Unit Workforce Readiness
Intro Unit Workforce Readiness
 
Unit 3 Debits and Credits
Unit 3 Debits and CreditsUnit 3 Debits and Credits
Unit 3 Debits and Credits
 
Unit 2 Financial Transactions
Unit 2 Financial TransactionsUnit 2 Financial Transactions
Unit 2 Financial Transactions
 
Unit 1 The Accounting Equation
Unit 1 The Accounting EquationUnit 1 The Accounting Equation
Unit 1 The Accounting Equation
 
Unit 1 The Accounting Equation
Unit 1 The Accounting EquationUnit 1 The Accounting Equation
Unit 1 The Accounting Equation
 
Unit 1 The Accounting Equation
Unit 1 The Accounting EquationUnit 1 The Accounting Equation
Unit 1 The Accounting Equation
 
Unit 4 The Accounting Cycle
Unit 4 The Accounting CycleUnit 4 The Accounting Cycle
Unit 4 The Accounting Cycle
 
Victoria and Vanessa Simpson University 2013
Victoria and Vanessa Simpson University 2013Victoria and Vanessa Simpson University 2013
Victoria and Vanessa Simpson University 2013
 

Recently uploaded

Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
UK Journal
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
UXDXConf
 

Recently uploaded (20)

Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 

Stop, Think, Connect

  • 1. How to Protect Your Identity and Computer
  • 2. Introduction O Our files and entire operating system can be damaged O Files O Work O Music O Photos O Games O Everything that we save on our computers O It’s easy and well worth the effort
  • 3. What is Malware? O Malicious software O Includes viruses O Made to purposely harm and destroy a computer O Can steal personal identity information O The damage spreads very, very quickly
  • 4.
  • 5. Question O Why is it important to make sure a link is from a trusted source? Can’t we just click and if it’s not what we want or thought it would be, just go back?
  • 6. Answer O Experts like to say “When in doubt, always err on the side of caution.” Just delete the message and don’t click. Simply clicking on links in email, tweets, posts, social networking sites, smart phone messages and online advertising can infect your computer.
  • 7.
  • 8. Question O What should make you suspicious that a link could cause trouble? A message claiming you’ve won a big prize or an offer that seems too good to be true is always suspicious. In what other situations should you stop and not click?
  • 9. Don’t Click O Links from someone you don’t know O Links that excitedly tell you to take urgent action O Links in chain letters O Links in messages that just look “weird” O Links in a message that is clearly spam (junk mail) O Links that just seem strange, even if from a good friend O Links within messages that use bad grammar or awkward phrasing or misspellings O Links from a friend or stranger claiming he/she is in trouble and asking that you send money
  • 10. Don’t Click O Links to a page asking you for any personal information, such as your password O Links in messages that appear to be from a favorite store, asking you to update your account (Reputable companies never do this) O Links on a social networking site that say “watch this funny video of you” O Links in messages that tell you to open an attachment O Links in messages that warn you to take urgent action
  • 11. Question O Why do experts tell us that we should be suspicious about a link or email attachment that “looks funny” even if it is from a family member, work colleague or your teacher?
  • 12. Think Before You Click O Malware can forge emails and create sneaky links O If a friend or family member sends an attachment that you were not expecting, text her/him and ask about the attachment before you click
  • 13.
  • 14. Question O Experts say, “When in doubt do not download.” Or, as the Greeks said, “Beware of strangers bearing gifts.” What kinds of files do you download?
  • 15.
  • 16. Stop Before You Download O Stopping before you download is a good first step. Then think, “What should I think about at that moment?” O Make sure the most current version of your browser is installed on your computer O Make sure automatic updates are set O Use https O Check that your computer is protected O Check the reputation of a store or any other source before downloading
  • 17.
  • 18. Question O What does it mean when experts say a computer is “clean”?
  • 19. Answer O Making certain our files are not corrupted and our computer is not infected with contaminated software
  • 20. Tips and Advice Provided by StaySafeOnline.org
  • 21. Internet Use Agreement Orcutt Union School District Internet Use Agreement