1 / 32

The Internet = A World of Opportunities

Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and entertainment A means to learn, meet people and explore. The Internet = A World of Opportunities. Leading Internet Risks and Threats. To Children Predators Cyberbullies

carmine
Download Presentation

The Internet = A World of Opportunities

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and entertainment A means to learn, meet people and explore The Internet = A World of Opportunities

  2. Leading Internet Risks and Threats To Children Predators Cyberbullies File-sharing abuses Invasion of privacy Disturbing content To Personal Safety Spam Phishing or online fraud Hoaxes Identity theft To PC Security Viruses Worms Trojan Horses Spyware

  3. Online Security Versus Online Safety Security: We must secure our computers with technology in the same way that we secure the doors to our homes Safety: We must act in ways that protect us against the risks and threats that come with Internet use

  4. Leading Online Risks for Children Predators These people use the Internet to trick children into meeting with them in person Cyber-bullies Both children and adults may use the Internet to harass or intimidate other people File-share Abuse Exchanging music, video, and other files with strangers may be illegal, and can give them access to your PC or download viruses or worms Disturbing Content If kids explore unsupervised, they could stumble upon images or information you may not want them exposed to Invasion of Privacy If kids fill out online forms, they may share information you don’t want strangers to have about them or your family

  5. Leading Threats to Personal Online Safety Phishing E-mail sent by online criminals that tries to trick you into revealing personal information Spam Unwanted e-mail, instant messages, e-cards, and other online communication Identity Theft A crime where con artists get your personal information and access your cash and/or credit Hoaxes E-mail sent by online criminals that tries to trick you into giving them money

  6. Leading Threats to PC Security Viruses/Worms Software programs designed to invade your computer, and copy, damage or delete your data Trojan Horses Viruses that pretend to be programs that help you while destroying your data and damaging your computer Spyware Software that secretly watches and records your online activities or send you endless pop-up ads

  7. Steps You Can Take Your family Talk with your kids about what they do online Keep personal information private Set clear rules for Internet use Use family safety software Your safety Practice Internet behavior that lowers your risk Manage your personal information carefully Use technology to reduce nuisances, and raise the alarm when appropriate Your computer Turn on an Internet firewall Keep your operating system up to date Install and maintain antivirus software Install and maintain antispyware software

  8. Take Steps to Help Protect Your Family Talk with your kids about what they do online Keep personal information private Set clear rules for Internet use Use family safety software

  9. Talk with Your Kids about Online Risks • Talk frankly with your kids about Internet risks, including: • Sexual predators • Inappropriate content • Invasion of privacy • Empower them by teaching them how their own behavior can reduce those risks and help to keep them safe when they are online Helpful online resources: • www.staysafe.org • www.getnetwise.org • www.microsoft.com/athome/security

  10. Pay Attention to What Your Kids Do Online • Keep the computer in a central area • Get to know how your kids use the Internet • Let your kids be the teacher • Teach kids to trust their instincts • And to report any problems

  11. Keep Personal Information Private • Teach children never to share personal information online without permission • Monitor your children’s online activities • Teach your children to report suspicious activity • Help children choose appropriate screen names and e-mail addresses

  12. Set Clear Rules for Internet Use • Never go alone to meet an Internet “friend” in person • Do not share files or open attachments • Do not click links from strangers • Treat others the way you want to be treated • Stand up for yourself • Respect other people’s property

  13. Use Family Safety Software • Use family safety software to control and monitor your children’s Internet use • Learn more about tools available for families at: http://kids.getnetwise.org/tools/ • Build strong computer defenses

  14. How to Handle Problems: • Make it safe for your children to tell you when they feel threatened or scared online • Contact police to report any threat to your family immediately • Report incidents to: CyberTipline 800.843.5678www.cybertipline.com

  15. Take Steps to Help Protect Yourself Practice Internet behavior that lowers your risk Manage your personal information carefully Use technology to reduce nuisances, and raise the alarm when appropriate

  16. Delete Spam without Opening It • Never reply to spam • Technology can help you identify spam so you can delete it • Many Internet providers delete it for you

  17. Be on the Lookout for Scams! There are signs that you can alert you of e-mail scams Alarmist messages and threats of account closures Promises of big bucks for little effort Deals that sound too good to be true Misspellings and grammatical errors

  18. Don’t Share Personal Information • Delete e-mails that request personal information • Do not use e-mail or instant messages to share personal information

  19. Use Strong Passwords • Keep passwords private and create ones that are hard to “crack” • Never share your passwords with friends or be tricked into giving them away

  20. If Your Identity Is Stolen • Report it • Follow up in writing • Change all passwords • Place fraud alert on credit reports Get a copy of your credit report and ensure your account is flagged with a “fraud alert” and “victim’s statement”

  21. Four Steps To Protect Your Computer Turn on an Internet firewall Keep your operating system up to date Install and maintain antivirus software Install and maintain antispyware software

  22. Turn on an Internet Firewall An Internet firewall is like a moat around a castle, creating a barrier between your computer and the Internet

  23. Keep Your Operating System Updated • Install all security updates as soon as they are available • Automatic updates provide the best protection

  24. Install Antivirus Software • Antivirus software can detect and destroy computer viruses before they can cause damage • Just like flu shots, for antivirus software to be effective, you must keep it up to date Don’t let it expire

  25. Install And Maintain Antispyware Software Use antispyware software so unknown people cannot lurk on your computer and potentially steal your information

  26. Other Ways to Protect Your PC Back up your files regularly Think before you click Read website privacy statements Close pop-ups using red “X”

  27. Back Up Your Files • Save to CD or DVD • Use a Web-based backup service

  28. Think Before You Click • Don’t open e-mail attachments unless you know what they contain and who sent them • Only download files from websites you trust

  29. Read Privacy Statements Understand what you are getting before you agree to download or share your personal information

  30. Close Pop-ups Using Red “X” • Always use the red “X” in the corner of a pop-up screen • Never click “yes,” “accept” or even “cancel”, because it could be a trick that installs software on your PC

  31. For More Information www.microsoft.com/protect www.staysafe.org www.getnetwise.org www.microsoft.com/athome/security

More Related