understanding and building basic networks chapter 4 protecting yourself online

13

Upload: jaheim-beville

Post on 15-Dec-2015

218 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Understanding and Building Basic Networks Chapter 4 Protecting Yourself Online
Page 2: Understanding and Building Basic Networks Chapter 4 Protecting Yourself Online

Understanding and Building Basic NetworksChapter 4

Protecting Yourself Online

Page 3: Understanding and Building Basic Networks Chapter 4 Protecting Yourself Online

In this chapter, you will answer these questions:

• Who wants to get into my computer?• Who's watching me?• How do I keep them out?• How do people get my information and why

do they want it?• How do I keep my information safe?• Who would want to hurt me and how would

they find me?• How do I stay safe online?

Page 4: Understanding and Building Basic Networks Chapter 4 Protecting Yourself Online

Who wants to get into my computer?

• There are many different types of individuals who may be attacking your computer from the outside, trying to get into your system.

• Some of the biggest threats from the outside include hackers, viruses, and spam.

Page 5: Understanding and Building Basic Networks Chapter 4 Protecting Yourself Online

Who's watching me?

• In addition to people and software trying to intrude on your system and gain access to it, there are other types of software designed to watch you.

• This software, generally known as adware or spyware and including such things as cookies, surveillance, parental controls, and blocking software, have a variety of functions.

Page 6: Understanding and Building Basic Networks Chapter 4 Protecting Yourself Online

Cookies

• A cookie is a small text file that contains data. It is not a program or a virus and cannot be used to spread viruses.

• Cookies are not necessarily bad and can make your online life a lot easier.

Page 7: Understanding and Building Basic Networks Chapter 4 Protecting Yourself Online

How do I keep them out?

• The most common ways to keep people out of your system is by using firewalls, anti-virus software, anti-spam software, and by using safe Internet practices.

Page 8: Understanding and Building Basic Networks Chapter 4 Protecting Yourself Online

How do people get my information and why do they

want it?• There are people who attack computers to find

out personal information. • In many cases, they target the databases of

large corporations that keep records such as social security numbers, bank account numbers, and credit card numbers on file for their customers.

• However, it's not unheard of for crooks to target individuals who share their information over the Internet without regard for proper security.

Page 9: Understanding and Building Basic Networks Chapter 4 Protecting Yourself Online

How do I keep my information safe?• Even though there

are people out there who will abuse the Internet, you can use it with a few precautions. There are secure ways to transfer data as well as some guidelines for sharing your information.

• An example of a secure Web site.

Page 10: Understanding and Building Basic Networks Chapter 4 Protecting Yourself Online

Who would want to hurt me and how would they find me?

• There are people in the world who stalk young people and try to lure them out online.

• You must never give personal information online to strangers.

• You can listen to the real life story of a young woman who befriended someone in an online chat room and what happened to her by visiting http://www.netsmartz.org and clicking on Amy's Choice.

Page 11: Understanding and Building Basic Networks Chapter 4 Protecting Yourself Online

Online Safety

• The following website can be visited after discussing online safety.– http://www.netsmartz.com

Page 12: Understanding and Building Basic Networks Chapter 4 Protecting Yourself Online

How do I stay safe online?

• Even though there are people out there who use the Internet for these unsavory purposes, you don't have to be afraid of going online.

• With a few simple guidelines, you can ensure your online experience is positive.

Page 13: Understanding and Building Basic Networks Chapter 4 Protecting Yourself Online

What You’ve Learned About Protecting Yourself Online

• In this lesson, you examined ways to protect yourself while online.

• You examined three basic threats: – those trying to attack your computer – those trying to get your information– those who want to hurt you personally

• You learned how to use a combination of software, hardware, and some basic guidelines to have a safe online experience.