SlideShare a Scribd company logo
1 of 23
   A website that is considered secure uses
    some type of encryption when transferring
    data across the Internet. Encryption
    ensures that no one is able to sniff the
    information and take all of the data a
    person is submitting on the site, but
    sometimes some sites still have some type of
    vulnerability.
   When logging into a server or buying
    online items, look out for the “padlock”
    sign which will be on the bottom right of
    the website page (refer to image
    below!)
   Pop-up ads are small windows that open
    automatically on your screen. They often
    (but not always) display advertising,
    which can be from legitimate businesses,
    but also might be scams or dangerous
    software. To filter these out, install a pop-
    up blocker.
   Security software is the preliminary step
    to keeping yourself and your computer
    safe. In order to do that, purchasing or
    downloading safe security software
    should be the first step in protecting
    yourself. There are many dangers on
    the internet that can harm your
    computer and that may violate your
    level of privacy.
   http://www.webopedia.com/DidYouKno
    w/Internet/2004/spyware.asp
› Definition- intrusive Adware that should
  be avoided for privacy/security reasons:
   http://www.webopedia.com/DidYouKnow/Int
    ernet/2004/spyware.asp
› Definition, more info:
   http://www.microsoft.com/security/pc-
    security/spyware-whatis.aspx
› How to prevent with antispyware
  software:
  http://www.microsoft.com/security/pc-
  security/products-faq.aspx
   Computer viruses (also known as “malware”) that can
    often come with things you download will harm your
    computer. They are small software programs designed to
    spread from one computer to the next and interfere with
    how your computer works. They can be disguised as
    attachments in email messages, instant messages, or
    hidden in software that you might download.

   To help avoid computer viruses, you must keep up with the
    latest updates and antivirus software. Scan your computer
    regularly with your antivirus software and beware of the
    signs of an infected computer.

   Click this link for more information:
    http://www.microsoft.com/security/pc-
    security/antivirus.aspx
BitDefender Antivirus   http://www.bitdefender.com/


Kasperky Antivirus      http://usa.kaspersky.com/store/all-products?c_id=GOO1673628


KingSoft Antivirus      http://www.kingsoftresearch.com/


Norton Antivirus        http://us.norton.com/


ESET Nod32 Antivirus    http://www.eset.com/us/


AVG Antivirus           http://www.avg.com/us-en/buyav-ppc_1


G DATA Antivirus        http://www.avg.com/us-en/buyav-ppc_1


Avira AntiVir           http://www.avira.com/


Vipre Antivirus         http://www.vipreantivirus.com/


Trend Micro Titanium    http://us.trendmicro.com/us/home/index.html


McAfee Antivirus        http://www.mcafee.com/us/
   http://www.microsoft.com/security/pc-
    security/products-faq.aspx
   Often times, the antivirus you purchase
    will include protection for an array of
    things. The software also can include
    protections such as a firewall, adware,
    antispyware, and phishing filter,
    depending on the package you
    purchase
   Firewall: Helps make your computer invisible to online attackers and
    blocks some malicious software. It can also help prevent software on
    your computer from accessing the Internet to updates and
    modification without your permission.
   Adware: disables ads from popping up on your computer
   Anti-Spyware: prevents applications from keeping tack of your
    surfing habits in order to serve ads related to you.
   Phishing Filter: helps detect phishing websites
    Firewall
    ›   Definition: http://www.microsoft.com/security/pc-security/firewalls-
        whatis.aspx
    ›   Definition, why it’s important: http://www.microsoft.com/security/pc-
        security/products-faq.aspx

 Defragmenting: To keep your computer running smoothly and at a
  good speed, remember to defragment it regularly. On PCs, there is
  an option to do so, just search it and you will be able to find it.
 http://www.wisegeek.com/what-is-defragmenting-a-computer.html
   It is possible for someone to steal your personal
    information or identity if you share this
    information on an unsecured site. One way
    you can protect yourself is by not entering
    personal data in any website that is not secure.
    Information that should be carefully guarded
    includes your name, phone number, Social
    Security number, address, birthday, account
    numbers, credit card numbers, etc.
   http://www.surfnetparents.com/talking_to_you
    r_children_about_unsecure_web_sites-
    18879.html
 Cookies are small files that websites put
  on your computer hard disk drive after
  your first visit, and may continue to save
  your data. While it is possible to misuse a
  cookie in cases where there is personal
  data in it, cookies by themselves are not
  malicious.
 http://www.microsoft.com/security/reso
  urces/cookie-whatis.aspx
   Creating strong, complex passwords you
    can remember is important for
    protecting your identity online.

   http://www.microsoft.com/security/onlin
    e-privacy/passwords-create.aspx
1)   Use caution when you click links in messages you receive; treat them like you would an email.

2)   Be aware of what you post about yourself. Never offer personal information.

3)   Don’t trust that a message is really who you think it’s from, as it may be fraudulent.

4)   To avoid giving away email addresses of your friends, do not allow social networking services to scan your
     email address book.

5)   Be selective about who you accept as a friend on a social network. Identity thieves might create fake profiles
     in order to get information from you.

6)   Choose your social network carefully. Evaluate the site that you plan to use and make sure you understand
     the privacy policy.

7)   Assume that everything you put on a social networking site is permanent. Even if you can delete your
     account, anyone on the Internet can easily print photos or text or save images and videos to a computer.

8)   Be careful about installing third-party applications that let you do more with your personal page. Criminals
     sometimes use these applications to steal your personal information.

9)   Be carefully with using social networks at work, as unwanted software can spread through social networks and
     into workplace networks. These outbreaks can damage computer systems and might even steal sensitive information
     from your company.
 http://www.microsoft.com/security/onlin
  e-privacy/social-networking.aspx
 http://www.microsoft.com/security/famil
  y-safety/blogging.aspx
 Phishing email messages and websites
  are designed to trick you into revealing
  personal or financial information through
  emails or websites.
 *Remember to only open emails you trust
  and are expecting.
 Here are some examples you should be
  aware of in an email!!
We’d love to hear from you!

Please return to the Projects page to share
 your thoughts on this presentation in the
              comments box.


              Thank you!

More Related Content

Recently uploaded

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

Featured

Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 

Verizon Internet Literacy Project

  • 1.
  • 2.
  • 3. A website that is considered secure uses some type of encryption when transferring data across the Internet. Encryption ensures that no one is able to sniff the information and take all of the data a person is submitting on the site, but sometimes some sites still have some type of vulnerability.
  • 4. When logging into a server or buying online items, look out for the “padlock” sign which will be on the bottom right of the website page (refer to image below!)
  • 5. Pop-up ads are small windows that open automatically on your screen. They often (but not always) display advertising, which can be from legitimate businesses, but also might be scams or dangerous software. To filter these out, install a pop- up blocker.
  • 6.
  • 7. Security software is the preliminary step to keeping yourself and your computer safe. In order to do that, purchasing or downloading safe security software should be the first step in protecting yourself. There are many dangers on the internet that can harm your computer and that may violate your level of privacy.
  • 8. http://www.webopedia.com/DidYouKno w/Internet/2004/spyware.asp
  • 9. › Definition- intrusive Adware that should be avoided for privacy/security reasons:  http://www.webopedia.com/DidYouKnow/Int ernet/2004/spyware.asp › Definition, more info:  http://www.microsoft.com/security/pc- security/spyware-whatis.aspx › How to prevent with antispyware software: http://www.microsoft.com/security/pc- security/products-faq.aspx
  • 10. Computer viruses (also known as “malware”) that can often come with things you download will harm your computer. They are small software programs designed to spread from one computer to the next and interfere with how your computer works. They can be disguised as attachments in email messages, instant messages, or hidden in software that you might download.  To help avoid computer viruses, you must keep up with the latest updates and antivirus software. Scan your computer regularly with your antivirus software and beware of the signs of an infected computer.  Click this link for more information: http://www.microsoft.com/security/pc- security/antivirus.aspx
  • 11. BitDefender Antivirus http://www.bitdefender.com/ Kasperky Antivirus http://usa.kaspersky.com/store/all-products?c_id=GOO1673628 KingSoft Antivirus http://www.kingsoftresearch.com/ Norton Antivirus http://us.norton.com/ ESET Nod32 Antivirus http://www.eset.com/us/ AVG Antivirus http://www.avg.com/us-en/buyav-ppc_1 G DATA Antivirus http://www.avg.com/us-en/buyav-ppc_1 Avira AntiVir http://www.avira.com/ Vipre Antivirus http://www.vipreantivirus.com/ Trend Micro Titanium http://us.trendmicro.com/us/home/index.html McAfee Antivirus http://www.mcafee.com/us/
  • 12. http://www.microsoft.com/security/pc- security/products-faq.aspx
  • 13. Often times, the antivirus you purchase will include protection for an array of things. The software also can include protections such as a firewall, adware, antispyware, and phishing filter, depending on the package you purchase
  • 14. Firewall: Helps make your computer invisible to online attackers and blocks some malicious software. It can also help prevent software on your computer from accessing the Internet to updates and modification without your permission.  Adware: disables ads from popping up on your computer  Anti-Spyware: prevents applications from keeping tack of your surfing habits in order to serve ads related to you.  Phishing Filter: helps detect phishing websites  Firewall › Definition: http://www.microsoft.com/security/pc-security/firewalls- whatis.aspx › Definition, why it’s important: http://www.microsoft.com/security/pc- security/products-faq.aspx  Defragmenting: To keep your computer running smoothly and at a good speed, remember to defragment it regularly. On PCs, there is an option to do so, just search it and you will be able to find it.  http://www.wisegeek.com/what-is-defragmenting-a-computer.html
  • 15.
  • 16. It is possible for someone to steal your personal information or identity if you share this information on an unsecured site. One way you can protect yourself is by not entering personal data in any website that is not secure. Information that should be carefully guarded includes your name, phone number, Social Security number, address, birthday, account numbers, credit card numbers, etc.  http://www.surfnetparents.com/talking_to_you r_children_about_unsecure_web_sites- 18879.html
  • 17.  Cookies are small files that websites put on your computer hard disk drive after your first visit, and may continue to save your data. While it is possible to misuse a cookie in cases where there is personal data in it, cookies by themselves are not malicious.  http://www.microsoft.com/security/reso urces/cookie-whatis.aspx
  • 18. Creating strong, complex passwords you can remember is important for protecting your identity online.  http://www.microsoft.com/security/onlin e-privacy/passwords-create.aspx
  • 19. 1) Use caution when you click links in messages you receive; treat them like you would an email. 2) Be aware of what you post about yourself. Never offer personal information. 3) Don’t trust that a message is really who you think it’s from, as it may be fraudulent. 4) To avoid giving away email addresses of your friends, do not allow social networking services to scan your email address book. 5) Be selective about who you accept as a friend on a social network. Identity thieves might create fake profiles in order to get information from you. 6) Choose your social network carefully. Evaluate the site that you plan to use and make sure you understand the privacy policy. 7) Assume that everything you put on a social networking site is permanent. Even if you can delete your account, anyone on the Internet can easily print photos or text or save images and videos to a computer. 8) Be careful about installing third-party applications that let you do more with your personal page. Criminals sometimes use these applications to steal your personal information. 9) Be carefully with using social networks at work, as unwanted software can spread through social networks and into workplace networks. These outbreaks can damage computer systems and might even steal sensitive information from your company.
  • 20.  http://www.microsoft.com/security/onlin e-privacy/social-networking.aspx  http://www.microsoft.com/security/famil y-safety/blogging.aspx
  • 21.  Phishing email messages and websites are designed to trick you into revealing personal or financial information through emails or websites.  *Remember to only open emails you trust and are expecting.  Here are some examples you should be aware of in an email!!
  • 22.
  • 23. We’d love to hear from you! Please return to the Projects page to share your thoughts on this presentation in the comments box. Thank you!