Verizon Internet Literacy Project

23
VERIZON Raihane Dalvi Adrian Lee Rosalyn Li Jacqueline Zhou

description

 

Transcript of Verizon Internet Literacy Project

Page 1: Verizon Internet Literacy Project

VERIZONRaihane DalviAdrian LeeRosalyn LiJacqueline Zhou

Page 2: Verizon Internet Literacy Project

WEB

BR

OW

SIN

G

Page 3: Verizon Internet Literacy Project

Distinguishing Safe Sites

A website that is considered secure uses some type of encryption when transferring data across the Internet. Encryption ensures that no one is able to sniff the information and take all of the data a person is submitting on the site, but sometimes some sites still have some type of vulnerability.

Page 4: Verizon Internet Literacy Project

Distinguishing Safe Sites When logging into a server or buying

online items, look out for the “padlock” sign which will be on the bottom right of the website page (refer to image below!)

Page 5: Verizon Internet Literacy Project

Pop-Up Ads

Pop-up ads are small windows that open automatically on your screen. They often (but not always) display advertising, which can be from legitimate businesses, but also might be scams or dangerous software. To filter these out, install a pop-up blocker.

Page 6: Verizon Internet Literacy Project

SEC

UR

ITY

SO

FTW

AR

E

Page 7: Verizon Internet Literacy Project

Security Software

Security software is the preliminary step to keeping yourself and your computer safe. In order to do that, purchasing or downloading safe security software should be the first step in protecting yourself. There are many dangers on the internet that can harm your computer and that may violate your level of privacy.

Page 9: Verizon Internet Literacy Project

Spyware

› Definition- intrusive Adware that should be avoided for privacy/security reasons: http://www.webopedia.com/DidYouKnow/Inte

rnet/2004/spyware.asp

› Definition, more info: http://www.microsoft.com/security/pc-securit

y/spyware-whatis.aspx

› How to prevent with antispyware software: http://www.microsoft.com/security/pc-security/products-faq.aspx

Page 10: Verizon Internet Literacy Project

Antivirus

Computer viruses (also known as “malware”) that can often come with things you download will harm your computer. They are small software programs designed to spread from one computer to the next and interfere with how your computer works. They can be disguised as attachments in email messages, instant messages, or hidden in software that you might download.

To help avoid computer viruses, you must keep up with the

latest updates and antivirus software. Scan your computer regularly with your antivirus software and beware of the signs of an infected computer.

Click this link for more information: http://www.microsoft.com/security/pc-security/antivirus.aspx

Page 11: Verizon Internet Literacy Project

Purchase Protection:BitDefender Antivirus http://www.bitdefender.com/

Kasperky Antivirus http://usa.kaspersky.com/store/all-products?c_id=GOO1673628

KingSoft Antivirus http://www.kingsoftresearch.com/

Norton Antivirus http://us.norton.com/

ESET Nod32 Antivirus http://www.eset.com/us/

AVG Antivirus http://www.avg.com/us-en/buyav-ppc_1

G DATA Antivirus http://www.avg.com/us-en/buyav-ppc_1

Avira AntiVir http://www.avira.com/

Vipre Antivirus http://www.vipreantivirus.com/

Trend Micro Titanium http://us.trendmicro.com/us/home/index.html

McAfee Antivirus http://www.mcafee.com/us/

Page 12: Verizon Internet Literacy Project

Purchase Protection:

http://www.microsoft.com/security/pc-security/products-faq.aspx

Page 13: Verizon Internet Literacy Project

Other dangers: Worms and Trojans

Often times, the antivirus you purchase will include protection for an array of things. The software also can include protections such as a firewall, adware, antispyware, and phishing filter, depending on the package you purchase

Page 14: Verizon Internet Literacy Project

Software

Firewall: Helps make your computer invisible to online attackers and blocks some malicious software. It can also help prevent software on your computer from accessing the Internet to updates and modification without your permission.

Adware: disables ads from popping up on your computer Anti-Spyware: prevents applications from keeping tack of your surfing

habits in order to serve ads related to you. Phishing Filter: helps detect phishing websites  Firewall

› Definition: http://www.microsoft.com/security/pc-security/firewalls-whatis.aspx› Definition, why it’s important:

http://www.microsoft.com/security/pc-security/products-faq.aspx

  Defragmenting: To keep your computer running smoothly and at a

good speed, remember to defragment it regularly. On PCs, there is an option to do so, just search it and you will be able to find it.

http://www.wisegeek.com/what-is-defragmenting-a-computer.html

Page 15: Verizon Internet Literacy Project

SA

FETY

/PR

IVA

CY

ISS

UES

Page 16: Verizon Internet Literacy Project

Personal Information

It is possible for someone to steal your personal information or identity if you share this information on an unsecured site. One way you can protect yourself is by not entering personal data in any website that is not secure. Information that should be carefully guarded includes your name, phone number, Social Security number, address, birthday, account numbers, credit card numbers, etc.

http://www.surfnetparents.com/talking_to_your_children_about_unsecure_web_sites-18879.html

Page 17: Verizon Internet Literacy Project

Cookies/History

Cookies are small files that websites put on your computer hard disk drive after your first visit, and may continue to save your data. While it is possible to misuse a cookie in cases where there is personal data in it, cookies by themselves are not malicious.

http://www.microsoft.com/security/resources/cookie-whatis.aspx

Page 18: Verizon Internet Literacy Project

Passwords

Creating strong, complex passwords you can remember is important for protecting your identity online.

  http://www.microsoft.com/security/onlin

e-privacy/passwords-create.aspx

Page 19: Verizon Internet Literacy Project

Social Network Sites Tips for social networking safety1) Use caution when you click links in messages you receive; treat them like you would an email.

2) Be aware of what you post about yourself. Never offer personal information.

3) Don’t trust that a message is really who you think it’s from, as it may be fraudulent.

4) To avoid giving away email addresses of your friends, do not allow social networking services to scan your email address book.

5) Be selective about who you accept as a friend on a social network. Identity thieves might create fake profiles in order to get information from you.

6) Choose your social network carefully. Evaluate the site that you plan to use and make sure you understand the privacy policy.

7) Assume that everything you put on a social networking site is permanent. Even if you can delete your account, anyone on the Internet can easily print photos or text or save images and videos to a computer.

8) Be careful about installing third-party applications that let you do more with your personal page. Criminals sometimes use these applications to steal your personal information.

9) Be carefully with using social networks at work, as unwanted software can spread through social networks and into workplace networks. These outbreaks can damage computer systems and might even steal sensitive information from your company.

Page 20: Verizon Internet Literacy Project

Social Networking Safety Links

http://www.microsoft.com/security/online-privacy/social-networking.aspx

http://www.microsoft.com/security/family-safety/blogging.aspx

Page 21: Verizon Internet Literacy Project

Phishing Scams

Phishing email messages and websites are designed to trick you into revealing personal or financial information through emails or websites.

*Remember to only open emails you trust and are expecting.

Here are some examples you should be aware of in an email!!

Page 23: Verizon Internet Literacy Project

Give Us Your Feedback!

We’d love to hear from you!

Please return to the Projects page to share your thoughts on this presentation

in the comments box.

Thank you!