Lesson 5 protecting yourself on the internet

Download Lesson 5 protecting yourself on the internet

Post on 20-Aug-2015




0 download

Embed Size (px)


  1. 1. Protecting yourself on the InternetTake charge of your computer
  2. 2. Objectives Learn the terms involved in Internet safety Discuss the types of security & how to beprotected online Discover how to tell if your computer isinfected, and then what to do Discuss safe online browsing, socialnetworking and email
  3. 3. Terminology Spam: Unsolicited mail Virus: Self replicating software Malware: Malicious software Spyware: Collects your personal info Phishing: Looks like the real website Pharming: Sends you to a bad siteGo to next screen for more
  4. 4. Terminology (continued) Browser hijacking: Replaces your homepage Hoax: Email with erroneous information Mousetrapping: Keeps you locked into awindow Trojan horse: Software that appears to be OK
  5. 5. Good security for your computer Anti-virus software is KEY Scans files & computer for patterns which maysignal infection Can be set up for automatic , daily scanning Should run a manual scan if you think you havea virus May clean automatically, may quarantine To install new one, must uninstall old one Good free one: Microsoft Security Essentials More
  6. 6. Good security for your computer Anti Malware and Spyware (Often can be taken care of with same program. Check the program) Firewall: (blocks connections between your computers and other computers.. Keep it turned on) If infected, run a one time virus scanner like MicrosoftSecurity Scanner Keep important software up to date including: Operatingsystem, Adobe flash, Adobe reader, Java, Apple, MicrosoftOffice, etc. Install Web of Trust on browsers
  7. 7. Important security for your computer: Passwords!No: Personalinformation onpassword Predictable patterns(123,789)Yes: If you write themdown, keep in a safeplace Try a passwordgeneratorhttp://www.ghacks.net/2012/04/07/how-secure-is-your-password/
  8. 8. How do I get a virus? Download an infected file (or open emailattachment) .exe: most dangerous, program file .zip: compressed file, can contain a virus .scr: free screen saver, can contain virus .doc: a Microsoft word file, can be infected Can have other extensions so CAREFUL! Can be spread with a thumb drive Visit bad website Clicking on a bad link
  9. 9. Signs my computer may have avirusNote: Only guidelines: Other things maycause these computer behaviors Computer running slowly Unexpected messages or programs that startautomatically Modem or hard drive seem to be workingall the time
  10. 10. Signs that my computer mayhave Spyware New toolbars, links or favorites on yourweb browser Home page, mouse pointer or searchprogram changes You type an address into the web browserbut end up at an unrelated site Pop-up ads, even without the Internet Computer may be running slowly
  11. 11. What to do if you think you areinfected Download and run a one time scanner such asMicrosoft Safety Scannerhttp://www.microsoft.com/security/scanner/en-us/default.aspx Or use other online virus scanners such as:Symantec Security Check, McAfeeFreeScan, Kaspersky lab, & Bitdefender. (Theymight not cure your computer, but at least can tellyou if you are infected.)
  12. 12. Email security Dont forward hoax emails(trysnopes.com or factcheck.org) Dont open attachments unless you arecertain of their source (just reading email isOK) Dont be too sure even if they are from afriend! Dont click on links in the body of the email Continue for Email Red Flags
  13. 13. Email Red Flags Images blocked: Dont open unless you aresure! Urgent letters needing your personalinformation or money Statements from your bank to click here A claim that seems far fetched Anything from an online pharmacy, WesternUnion and PayPal. Go directly to the siteinstead. A note from a friend that seem strange
  14. 14. Safe social networkingDO Caution when clicking on links Limit personal information on sites Create multiple aliases for some Dont believe it is really from Uncle Joe Type network address directly Be careful of your friends Understand Privacy terms on the siteNext: Safe social networkingDont
  15. 15. Safe social networkingDONT Use personal information for passwords Install programs from the social networks Click on links on the page Allow social network to scan your contacts Respond to flames Say anything you may regret later
  16. 16. Safe Online Browsing Set own homepage (Options, settings) Use InPrivate browsing for sensitive use Dont use public Wi Fi for personal data Double check web addresses if it seemsdifferentBest to type it in directly HTTPS always when privacy is important More on Safe online browsing
  17. 17. Safe Online Browsing (cont.) Install Web of Trust on all browsers If money is involved: HTTPS Credit card or PayPal is best Beware if money is required up front Research to make sure company is legitimate Do not respond to unsolicited emails Use caution even if it looks authentic (Fakecampaigns for Windows security updates,Facebook apps, 9/11 scams, Anti-Virus) Download only from reputable sources!
  19. 19. Internet Scams with the most complaints:http://mashable.com/2012/06/17/internet-scams-infographic/internet-scam-hotspots-972/
  20. 20. Other Internet Scamshttp://mashable.com/2012/06/17/internet-scams-infographic/
  21. 21. Newest scams from BBB (clickon link to read article) Scammers Taunt Twitter Users With Fake FacebookVideo Fake Attorney Website Sparks FBI Investigation Email with "Visual Voicemail" Have Scam Attached Company Claims to Be Local, Scam Alert Issued Free Turns to Fee Media alert - Fire Victim WarningCheck the BBB site for updates:http://www.bbb.org/us/scams