Date post: | 12-Jan-2016 |
Category: |
Documents |
Upload: | jerome-leonard |
View: | 216 times |
Download: | 2 times |
KEEPING YOUR COMPUTER SAFE
Anna
by
Kristan Simonton
Internet Safety
Overview
Computer Protection
Identity Theft
Child Safety
Rules of Thumb
Computer Protection
Key Terms: Firewall –Blocks outside access to a computer
Antivirus – Prevents most destructive programs (viruses) from accessing a computer
Cookies – Stores and transmits information to parent websites
Passwords – Allows access to online accounts
Computer Protection
Online: Connected to the Internet Disconnect when not in use
Firewall: Limits the information sent to and from your computer Barrier from the internet Examples of firewall programs:
Zonealarm Comodo Norton
Internet
Your Computer
Computer Protection
Antivirus: Prevents viruses from effecting your computer Can only prevent what it recognizes
Important to keep software updated Examples of antivirus programs:
McAfee Norton AVG Anti-virus Your
Computer
Computer Protection
Cookies Allow companies to store information on your
machine Collect information on your use Sell information gathered to 3rd parties Create profiles based on information gathered Set computer to accept different level of cookies
I’ve been to this site!
Computer Protection
Keep Your Password Safe! Passwords are keys to personal information Increase password security include…
Capital letters, lowercase letters, symbols, and numbers Use abbreviations not whole words
Example: s0uth*ern ILL-in0is Change your password frequently
These precautions will not protect your computer 100%
Identity Theft
Key Terms: Email – Messages sent via the internet Websites – Locations on the internet
Identity Theft
Scamming: Tricking or deceiving a person or group of people to obtain
information
Phishing Email A common avenue for virtual scam artist. False email can appear obvious or subtle.
Phishing Website Another common venue for virtual scam artist. Attempt to gather personal information
Email Scam Clear Example
Email Scam Subtle Example
Southern Illinois Bank
Sent messages are uncontrollable
Do not open emails from email addresses you do not recognize
Treat online situations the same way you would personal situations
Identity Theft: Websites
Check out the legitimacy of a website Key icons and web addresses Well-known site Check for misspellings
Do not give out personal information Set information to private if possible
If you are unsure just remember to…Stop! Look! Call!
Child Safety
Internet is accessible from almost any location
Kids need your help navigating the internet to avoid its risk
Start a dialog and explore the internet with them
Child Safety
Key Terms: Blocking – Prevents individuals from
accessing non age appropriate material
Monitoring – Records a child’s activities while online
Child Safety
Blocking Prevents children from accessing inappropriate
material Customized to fit household needs Password protected Examples of blocking programs:
Net Nanny Safe Eyes CYBERsitter OpenDNS
Click Here for Violent Movies
Child Safety: How to Block Sites
Child Safety: Monitoring
Monitoring See the sites your kids are visiting Know who your kids are talking to Know where your kids are going online Examples of monitoring programs:
Webwatcher Spector Pro Spy Agent Guardian Monitor
Tracking Teresa
NetSmartz.org
Rules of Thumb
Treat your computer like your home!
Never give out personal information!
Talk to your kids about internet safety!
If it sounds too good to be true it usually is!
Remember: The Benefits Out Weigh The Risks
Read the local news in the SouthernPurchase Miners season tickets See what is going on at SIUCFind a physicianLearn how to protect your computer with NetSmartzFind a job through Illinois workNetGet online tutoring with Verizon’s Thinkfinity siteCheck out the services available at Union County Hospital Learn about the City of AnnaFind the score of the local game