Verizon Internet Literacy Project
-
Upload
apapaorg -
Category
Technology
-
view
1.486 -
download
1
description
Transcript of Verizon Internet Literacy Project
VERIZONRaihane DalviAdrian LeeRosalyn LiJacqueline Zhou
WEB
BR
OW
SIN
G
Distinguishing Safe Sites
A website that is considered secure uses some type of encryption when transferring data across the Internet. Encryption ensures that no one is able to sniff the information and take all of the data a person is submitting on the site, but sometimes some sites still have some type of vulnerability.
Distinguishing Safe Sites When logging into a server or buying
online items, look out for the “padlock” sign which will be on the bottom right of the website page (refer to image below!)
Pop-Up Ads
Pop-up ads are small windows that open automatically on your screen. They often (but not always) display advertising, which can be from legitimate businesses, but also might be scams or dangerous software. To filter these out, install a pop-up blocker.
SEC
UR
ITY
SO
FTW
AR
E
Security Software
Security software is the preliminary step to keeping yourself and your computer safe. In order to do that, purchasing or downloading safe security software should be the first step in protecting yourself. There are many dangers on the internet that can harm your computer and that may violate your level of privacy.
Adware
http://www.webopedia.com/DidYouKnow/Internet/2004/spyware.asp
Spyware
› Definition- intrusive Adware that should be avoided for privacy/security reasons: http://www.webopedia.com/DidYouKnow/Inte
rnet/2004/spyware.asp
› Definition, more info: http://www.microsoft.com/security/pc-securit
y/spyware-whatis.aspx
› How to prevent with antispyware software: http://www.microsoft.com/security/pc-security/products-faq.aspx
Antivirus
Computer viruses (also known as “malware”) that can often come with things you download will harm your computer. They are small software programs designed to spread from one computer to the next and interfere with how your computer works. They can be disguised as attachments in email messages, instant messages, or hidden in software that you might download.
To help avoid computer viruses, you must keep up with the
latest updates and antivirus software. Scan your computer regularly with your antivirus software and beware of the signs of an infected computer.
Click this link for more information: http://www.microsoft.com/security/pc-security/antivirus.aspx
Purchase Protection:BitDefender Antivirus http://www.bitdefender.com/
Kasperky Antivirus http://usa.kaspersky.com/store/all-products?c_id=GOO1673628
KingSoft Antivirus http://www.kingsoftresearch.com/
Norton Antivirus http://us.norton.com/
ESET Nod32 Antivirus http://www.eset.com/us/
AVG Antivirus http://www.avg.com/us-en/buyav-ppc_1
G DATA Antivirus http://www.avg.com/us-en/buyav-ppc_1
Avira AntiVir http://www.avira.com/
Vipre Antivirus http://www.vipreantivirus.com/
Trend Micro Titanium http://us.trendmicro.com/us/home/index.html
McAfee Antivirus http://www.mcafee.com/us/
Purchase Protection:
http://www.microsoft.com/security/pc-security/products-faq.aspx
Other dangers: Worms and Trojans
Often times, the antivirus you purchase will include protection for an array of things. The software also can include protections such as a firewall, adware, antispyware, and phishing filter, depending on the package you purchase
Software
Firewall: Helps make your computer invisible to online attackers and blocks some malicious software. It can also help prevent software on your computer from accessing the Internet to updates and modification without your permission.
Adware: disables ads from popping up on your computer Anti-Spyware: prevents applications from keeping tack of your surfing
habits in order to serve ads related to you. Phishing Filter: helps detect phishing websites Firewall
› Definition: http://www.microsoft.com/security/pc-security/firewalls-whatis.aspx› Definition, why it’s important:
http://www.microsoft.com/security/pc-security/products-faq.aspx
Defragmenting: To keep your computer running smoothly and at a
good speed, remember to defragment it regularly. On PCs, there is an option to do so, just search it and you will be able to find it.
http://www.wisegeek.com/what-is-defragmenting-a-computer.html
SA
FETY
/PR
IVA
CY
ISS
UES
Personal Information
It is possible for someone to steal your personal information or identity if you share this information on an unsecured site. One way you can protect yourself is by not entering personal data in any website that is not secure. Information that should be carefully guarded includes your name, phone number, Social Security number, address, birthday, account numbers, credit card numbers, etc.
http://www.surfnetparents.com/talking_to_your_children_about_unsecure_web_sites-18879.html
Cookies/History
Cookies are small files that websites put on your computer hard disk drive after your first visit, and may continue to save your data. While it is possible to misuse a cookie in cases where there is personal data in it, cookies by themselves are not malicious.
http://www.microsoft.com/security/resources/cookie-whatis.aspx
Passwords
Creating strong, complex passwords you can remember is important for protecting your identity online.
http://www.microsoft.com/security/onlin
e-privacy/passwords-create.aspx
Social Network Sites Tips for social networking safety1) Use caution when you click links in messages you receive; treat them like you would an email.
2) Be aware of what you post about yourself. Never offer personal information.
3) Don’t trust that a message is really who you think it’s from, as it may be fraudulent.
4) To avoid giving away email addresses of your friends, do not allow social networking services to scan your email address book.
5) Be selective about who you accept as a friend on a social network. Identity thieves might create fake profiles in order to get information from you.
6) Choose your social network carefully. Evaluate the site that you plan to use and make sure you understand the privacy policy.
7) Assume that everything you put on a social networking site is permanent. Even if you can delete your account, anyone on the Internet can easily print photos or text or save images and videos to a computer.
8) Be careful about installing third-party applications that let you do more with your personal page. Criminals sometimes use these applications to steal your personal information.
9) Be carefully with using social networks at work, as unwanted software can spread through social networks and into workplace networks. These outbreaks can damage computer systems and might even steal sensitive information from your company.
Social Networking Safety Links
http://www.microsoft.com/security/online-privacy/social-networking.aspx
http://www.microsoft.com/security/family-safety/blogging.aspx
Phishing Scams
Phishing email messages and websites are designed to trick you into revealing personal or financial information through emails or websites.
*Remember to only open emails you trust and are expecting.
Here are some examples you should be aware of in an email!!
http://www.microsoft.com/security/online-privacy/phishing-symptoms.aspx
Give Us Your Feedback!
We’d love to hear from you!
Please return to the Projects page to share your thoughts on this presentation
in the comments box.
Thank you!