SlideShare a Scribd company logo
1 of 23
   A website that is considered secure uses
    some type of encryption when transferring
    data across the Internet. Encryption
    ensures that no one is able to sniff the
    information and take all of the data a
    person is submitting on the site, but
    sometimes some sites still have some type of
    vulnerability.
   When logging into a server or buying
    online items, look out for the “padlock”
    sign which will be on the bottom right of
    the website page (refer to image
    below!)
   Pop-up ads are small windows that open
    automatically on your screen. They often
    (but not always) display advertising,
    which can be from legitimate businesses,
    but also might be scams or dangerous
    software. To filter these out, install a pop-
    up blocker.
   Security software is the preliminary step
    to keeping yourself and your computer
    safe. In order to do that, purchasing or
    downloading safe security software
    should be the first step in protecting
    yourself. There are many dangers on
    the internet that can harm your
    computer and that may violate your
    level of privacy.
   http://www.webopedia.com/DidYouKno
    w/Internet/2004/spyware.asp
› Definition- intrusive Adware that should
  be avoided for privacy/security reasons:
   http://www.webopedia.com/DidYouKnow/Int
    ernet/2004/spyware.asp
› Definition, more info:
   http://www.microsoft.com/security/pc-
    security/spyware-whatis.aspx
› How to prevent with antispyware
  software:
  http://www.microsoft.com/security/pc-
  security/products-faq.aspx
   Computer viruses (also known as “malware”) that can
    often come with things you download will harm your
    computer. They are small software programs designed to
    spread from one computer to the next and interfere with
    how your computer works. They can be disguised as
    attachments in email messages, instant messages, or
    hidden in software that you might download.

   To help avoid computer viruses, you must keep up with the
    latest updates and antivirus software. Scan your computer
    regularly with your antivirus software and beware of the
    signs of an infected computer.

   Click this link for more information:
    http://www.microsoft.com/security/pc-
    security/antivirus.aspx
BitDefender Antivirus   http://www.bitdefender.com/


Kasperky Antivirus      http://usa.kaspersky.com/store/all-products?c_id=GOO1673628


KingSoft Antivirus      http://www.kingsoftresearch.com/


Norton Antivirus        http://us.norton.com/


ESET Nod32 Antivirus    http://www.eset.com/us/


AVG Antivirus           http://www.avg.com/us-en/buyav-ppc_1


G DATA Antivirus        http://www.avg.com/us-en/buyav-ppc_1


Avira AntiVir           http://www.avira.com/


Vipre Antivirus         http://www.vipreantivirus.com/


Trend Micro Titanium    http://us.trendmicro.com/us/home/index.html


McAfee Antivirus        http://www.mcafee.com/us/
   http://www.microsoft.com/security/pc-
    security/products-faq.aspx
   Often times, the antivirus you purchase
    will include protection for an array of
    things. The software also can include
    protections such as a firewall, adware,
    antispyware, and phishing filter,
    depending on the package you
    purchase
   Firewall: Helps make your computer invisible to online attackers and
    blocks some malicious software. It can also help prevent software on
    your computer from accessing the Internet to updates and
    modification without your permission.
   Adware: disables ads from popping up on your computer
   Anti-Spyware: prevents applications from keeping tack of your
    surfing habits in order to serve ads related to you.
   Phishing Filter: helps detect phishing websites
    Firewall
    ›   Definition: http://www.microsoft.com/security/pc-security/firewalls-
        whatis.aspx
    ›   Definition, why it’s important: http://www.microsoft.com/security/pc-
        security/products-faq.aspx

 Defragmenting: To keep your computer running smoothly and at a
  good speed, remember to defragment it regularly. On PCs, there is
  an option to do so, just search it and you will be able to find it.
 http://www.wisegeek.com/what-is-defragmenting-a-computer.html
   It is possible for someone to steal your personal
    information or identity if you share this
    information on an unsecured site. One way
    you can protect yourself is by not entering
    personal data in any website that is not secure.
    Information that should be carefully guarded
    includes your name, phone number, Social
    Security number, address, birthday, account
    numbers, credit card numbers, etc.
   http://www.surfnetparents.com/talking_to_you
    r_children_about_unsecure_web_sites-
    18879.html
 Cookies are small files that websites put
  on your computer hard disk drive after
  your first visit, and may continue to save
  your data. While it is possible to misuse a
  cookie in cases where there is personal
  data in it, cookies by themselves are not
  malicious.
 http://www.microsoft.com/security/reso
  urces/cookie-whatis.aspx
   Creating strong, complex passwords you
    can remember is important for
    protecting your identity online.

   http://www.microsoft.com/security/onlin
    e-privacy/passwords-create.aspx
1)   Use caution when you click links in messages you receive; treat them like you would an email.

2)   Be aware of what you post about yourself. Never offer personal information.

3)   Don’t trust that a message is really who you think it’s from, as it may be fraudulent.

4)   To avoid giving away email addresses of your friends, do not allow social networking services to scan your
     email address book.

5)   Be selective about who you accept as a friend on a social network. Identity thieves might create fake profiles
     in order to get information from you.

6)   Choose your social network carefully. Evaluate the site that you plan to use and make sure you understand
     the privacy policy.

7)   Assume that everything you put on a social networking site is permanent. Even if you can delete your
     account, anyone on the Internet can easily print photos or text or save images and videos to a computer.

8)   Be careful about installing third-party applications that let you do more with your personal page. Criminals
     sometimes use these applications to steal your personal information.

9)   Be carefully with using social networks at work, as unwanted software can spread through social networks and
     into workplace networks. These outbreaks can damage computer systems and might even steal sensitive information
     from your company.
 http://www.microsoft.com/security/onlin
  e-privacy/social-networking.aspx
 http://www.microsoft.com/security/famil
  y-safety/blogging.aspx
 Phishing email messages and websites
  are designed to trick you into revealing
  personal or financial information through
  emails or websites.
 *Remember to only open emails you trust
  and are expecting.
 Here are some examples you should be
  aware of in an email!!
We’d love to hear from you!

Please return to the Projects page to share
 your thoughts on this presentation in the
              comments box.


              Thank you!

More Related Content

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Recently uploaded (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Featured

Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 

Verizon Internet Literacy Project

  • 1.
  • 2.
  • 3. A website that is considered secure uses some type of encryption when transferring data across the Internet. Encryption ensures that no one is able to sniff the information and take all of the data a person is submitting on the site, but sometimes some sites still have some type of vulnerability.
  • 4. When logging into a server or buying online items, look out for the “padlock” sign which will be on the bottom right of the website page (refer to image below!)
  • 5. Pop-up ads are small windows that open automatically on your screen. They often (but not always) display advertising, which can be from legitimate businesses, but also might be scams or dangerous software. To filter these out, install a pop- up blocker.
  • 6.
  • 7. Security software is the preliminary step to keeping yourself and your computer safe. In order to do that, purchasing or downloading safe security software should be the first step in protecting yourself. There are many dangers on the internet that can harm your computer and that may violate your level of privacy.
  • 8. http://www.webopedia.com/DidYouKno w/Internet/2004/spyware.asp
  • 9. › Definition- intrusive Adware that should be avoided for privacy/security reasons:  http://www.webopedia.com/DidYouKnow/Int ernet/2004/spyware.asp › Definition, more info:  http://www.microsoft.com/security/pc- security/spyware-whatis.aspx › How to prevent with antispyware software: http://www.microsoft.com/security/pc- security/products-faq.aspx
  • 10. Computer viruses (also known as “malware”) that can often come with things you download will harm your computer. They are small software programs designed to spread from one computer to the next and interfere with how your computer works. They can be disguised as attachments in email messages, instant messages, or hidden in software that you might download.  To help avoid computer viruses, you must keep up with the latest updates and antivirus software. Scan your computer regularly with your antivirus software and beware of the signs of an infected computer.  Click this link for more information: http://www.microsoft.com/security/pc- security/antivirus.aspx
  • 11. BitDefender Antivirus http://www.bitdefender.com/ Kasperky Antivirus http://usa.kaspersky.com/store/all-products?c_id=GOO1673628 KingSoft Antivirus http://www.kingsoftresearch.com/ Norton Antivirus http://us.norton.com/ ESET Nod32 Antivirus http://www.eset.com/us/ AVG Antivirus http://www.avg.com/us-en/buyav-ppc_1 G DATA Antivirus http://www.avg.com/us-en/buyav-ppc_1 Avira AntiVir http://www.avira.com/ Vipre Antivirus http://www.vipreantivirus.com/ Trend Micro Titanium http://us.trendmicro.com/us/home/index.html McAfee Antivirus http://www.mcafee.com/us/
  • 12. http://www.microsoft.com/security/pc- security/products-faq.aspx
  • 13. Often times, the antivirus you purchase will include protection for an array of things. The software also can include protections such as a firewall, adware, antispyware, and phishing filter, depending on the package you purchase
  • 14. Firewall: Helps make your computer invisible to online attackers and blocks some malicious software. It can also help prevent software on your computer from accessing the Internet to updates and modification without your permission.  Adware: disables ads from popping up on your computer  Anti-Spyware: prevents applications from keeping tack of your surfing habits in order to serve ads related to you.  Phishing Filter: helps detect phishing websites  Firewall › Definition: http://www.microsoft.com/security/pc-security/firewalls- whatis.aspx › Definition, why it’s important: http://www.microsoft.com/security/pc- security/products-faq.aspx  Defragmenting: To keep your computer running smoothly and at a good speed, remember to defragment it regularly. On PCs, there is an option to do so, just search it and you will be able to find it.  http://www.wisegeek.com/what-is-defragmenting-a-computer.html
  • 15.
  • 16. It is possible for someone to steal your personal information or identity if you share this information on an unsecured site. One way you can protect yourself is by not entering personal data in any website that is not secure. Information that should be carefully guarded includes your name, phone number, Social Security number, address, birthday, account numbers, credit card numbers, etc.  http://www.surfnetparents.com/talking_to_you r_children_about_unsecure_web_sites- 18879.html
  • 17.  Cookies are small files that websites put on your computer hard disk drive after your first visit, and may continue to save your data. While it is possible to misuse a cookie in cases where there is personal data in it, cookies by themselves are not malicious.  http://www.microsoft.com/security/reso urces/cookie-whatis.aspx
  • 18. Creating strong, complex passwords you can remember is important for protecting your identity online.  http://www.microsoft.com/security/onlin e-privacy/passwords-create.aspx
  • 19. 1) Use caution when you click links in messages you receive; treat them like you would an email. 2) Be aware of what you post about yourself. Never offer personal information. 3) Don’t trust that a message is really who you think it’s from, as it may be fraudulent. 4) To avoid giving away email addresses of your friends, do not allow social networking services to scan your email address book. 5) Be selective about who you accept as a friend on a social network. Identity thieves might create fake profiles in order to get information from you. 6) Choose your social network carefully. Evaluate the site that you plan to use and make sure you understand the privacy policy. 7) Assume that everything you put on a social networking site is permanent. Even if you can delete your account, anyone on the Internet can easily print photos or text or save images and videos to a computer. 8) Be careful about installing third-party applications that let you do more with your personal page. Criminals sometimes use these applications to steal your personal information. 9) Be carefully with using social networks at work, as unwanted software can spread through social networks and into workplace networks. These outbreaks can damage computer systems and might even steal sensitive information from your company.
  • 20.  http://www.microsoft.com/security/onlin e-privacy/social-networking.aspx  http://www.microsoft.com/security/famil y-safety/blogging.aspx
  • 21.  Phishing email messages and websites are designed to trick you into revealing personal or financial information through emails or websites.  *Remember to only open emails you trust and are expecting.  Here are some examples you should be aware of in an email!!
  • 22.
  • 23. We’d love to hear from you! Please return to the Projects page to share your thoughts on this presentation in the comments box. Thank you!