Keeping Your Children, your information and your equiptment safe

33
Internet Safety and You How to keep you, your children, your information, and your equipment safe. http://www.computerexplorers.co m

description

Internet Safety from COMPUTER EXPLORERS: keeping your children, your information and your equiptment safe

Transcript of Keeping Your Children, your information and your equiptment safe

Page 1: Keeping Your Children, your information and your equiptment safe

Internet Safety and You

How to keep you, your children, your information, and your

equipment safe.

http://www.computerexplorers.com

Page 2: Keeping Your Children, your information and your equiptment safe

Protecting Your Computer

Viruses Trojan Horses Worms Spyware Adware Malware

What are they?

http://www.computerexplorers.com

Page 3: Keeping Your Children, your information and your equiptment safe

Viruses

Virus – a computer program that can copy itself and infect a computer without permission or knowledge of the user

How do viruses spread? makes copies of itself in a

computer’s memory, storage or over a network

transferred on a floppy disk, CD/DVD, or USB storage device to another computer

sent via an e-mail message over the Internet

http://www.computerexplorers.com

Page 4: Keeping Your Children, your information and your equiptment safe

Trojan Horses

Trojan Horse - a program that installs malicious software while under the guise of doing something else.

How do Trojan Horses spread?

Does not spread by inserting its code into computer files

The malicious program has to be run by the recipient in order to install

http://www.computerexplorers.com

What do Trojan Horses look like?

•An image

•A game

•Weather alerting software

Page 5: Keeping Your Children, your information and your equiptment safe

Worms

Worm - a self-replicating

computer program.

How does a worm work? Uses a network to send copies of itself

to other computers on the network May copy itself without a person

executing the program

http://www.computerexplorers.com

How is a worm different from a virus?

Does not need to attach itself to an existing program

Harms the network; viruses infect files on a computer

Page 6: Keeping Your Children, your information and your equiptment safe

Protect Your ComputerInstall complete Anti-virus protection

What should my Anti-virus software do: recognize current viruses, as well as older ones effectively reverse the damage update automatically run smart or partial scans

http://www.computerexplorers.com

Page 7: Keeping Your Children, your information and your equiptment safe

Available Anti-virus SoftwareCOMPUTER EXPLORERS® in no way endorses or warrants the purchase, download, or use of the listed software.

Software for purchase:

Norton AntiVirus®

http://www.symantec.com

McAfee®

http://www.mcafee.com

ZoneAlarm®

http://www.zonealarm.com

CA® Anti-virushttp://www.ca.com

Free downloads:

AVG Anti-virushttp://www.avg.com

avast! 4 Home Editionhttp://www.avast.com

Avira AntiVir Personal Editionhttp://www.free-av.com

http://www.computerexplorers.com

Page 8: Keeping Your Children, your information and your equiptment safe

Spyware

Spyware - programming that is put in someone's computer, without his/her knowledge, to gather information about the user and relay it to advertisers or other interested parties

How does Spyware work? Gathers information about the

user for marketing purposes Delivers unwanted pop-up ads Steals personal information Can interfere with user control

of the computer by: Installing additional software Redirecting web browser pages Diverting advertising revenue to

a third party

http://www.computerexplorers.com

Page 9: Keeping Your Children, your information and your equiptment safe

Adware

Adware - any software package which automatically plays, displays, or downloads advertising material to a computer after the software is installed on it or while the application is being used

Adware Prevention Tips: Avoid installing adware Keep up-to-date with security

patches and operating system updates from Windows Update

If using a version of Internet Explorer earlier than version 7, set the browser to prompt the user for ActiveX installation

Use an alternative Web browser (e.g. Opera, Mozilla Firefox, Safari, etc.)

Install ad-blocking software

http://www.computerexplorers.com

Page 10: Keeping Your Children, your information and your equiptment safe

Malware

Malware (Malicious Software)

– any program or file that is harmful to a computer user

Malware includes: Viruses Trojan horses worms spyware

Symptoms of Malware:

Sluggish or choppy computer performance

An onslaught of unwanted pop-up ads

New and unfamiliar toolbars or toolbar icons

Repeated or sudden changes in your Web browser home page

http://www.computerexplorers.com

Page 11: Keeping Your Children, your information and your equiptment safe

Infested

Computers

http://www.computerexplorers.com

Severe Case

Mild Case

Page 12: Keeping Your Children, your information and your equiptment safe

Prevention Tips The best defense against spyware and other unwanted software is not to

download it in the first place.

Use alternative Web browsers other than Internet Explorer. Other browsers include Netscape, Mozilla Firefox, Opera, and Safari (for Mac users).

Only download programs from Web sites you trust.

Read all security warnings, license agreements, and privacy statements associated with any downloads.

Close unwanted pop-up windows by clicking the X in the right corner of the window. Never click “agree” or “OK” to close an unwanted window.

Be cautious about using "free" music and movie file-sharing programs, and be sure you clearly understand all of the software packaged with those programs.

Use spyware and adware removal software.

http://www.computerexplorers.com

Page 13: Keeping Your Children, your information and your equiptment safe

Available Spyware and Adware Products COMPUTER EXPLORERS® in no way endorses or warrants the purchase, download, or use of the listed software.

Ad-Aware (http://www.lavasoft.com)

Windows Defender (http://www.microsoft.com/downloads)

Spybot Search & Destroy (http://www.safer-networking.org)

Spyware Blaster (http://www.javacoolsoftware.com)

Spyware Doctor (http://www.pctools.com)

Many anti-virus companies are now creating security suites that include spyware and adware prevention. Those companies include: Norton (Symantec) McAfee AVG

Important Note: Adware and spyware removers only detect and remove adware and spyware. These programs are not a replacement for anti-virus software.

http://www.computerexplorers.com

Page 14: Keeping Your Children, your information and your equiptment safe

Pop-up Blockers

Within Web browsers:

Windows Browsers Internet Explorer: Tools Pop-up blocker

Pop-up Blocker settings Mozilla Firefox: Tools Options

Content Tab Opera: Tools

**Note** Most browsers block pop-up windows or ads by default.

Within free toolbars

Yahoo! Toolbar (http://toolbar.yahoo.com)

Google Toolbar (http://toolbar.google.com)

http://www.computerexplorers.com

Page 15: Keeping Your Children, your information and your equiptment safe

Firewalls

Available Personal Firewalls:

Windows firewall (free) ZoneAlarm firewall (free or

pay) LavaSoft firewall (pay) Look ‘n’ Stop firewall (free for

30 days then pay)

http://www.computerexplorers.com

What’s a Firewall?

A firewall is a hardware or software device configured to allow or deny data through a computer network with different trust levels.

How does a Firewall work?

•Prevents network intrusions

•Prevents hackers from accessing personal information stored on your computer

Page 16: Keeping Your Children, your information and your equiptment safe

Protecting Your Information

Identity Theft

Fraudulent e-mail Spoofing or Phishing Intercepted e-mails or instant messages Lurkers on discussion boards and chat

rooms

http://www.computerexplorers.com

Page 17: Keeping Your Children, your information and your equiptment safe

Spam Mail

Tips for Preventing Spam

• Opt-out of e-mail marketing messages when registering with a Website.

• Use an alternative e-mail address when registering for services on various Websites. Free e-mail providers include Hotmail, Yahoo, GMail, and others.

• Read the fine print. Be sure you know how your e-mail will be used when registering with a site.

Daily Spam Mail Statistics*

•June 2005 – 30 billion

•June 2006 – 55 billion

•December 2006 – 85 billion

•June 2007 – 90 billion

•April 2008 – over 100 billion

*Source: IronPoint Systems, Inc. and www.spamunit.com

http://www.computerexplorers.com

Spam – any message, regardless of its content, that is sent to multiple mailing lists, individuals or newsgroups. Also called bulk e-mail or junk e-mail.

Page 18: Keeping Your Children, your information and your equiptment safe

Fraudulent E-Mail

Be suspicious of any e-mail that requests: Credit card information Complete home

address Banking information Username or

passwords Social security number

http://www.computerexplorers.com

Fraudulent e-mails are “spoofing” or “phishing” messages. Scammers use these methods to “fish” for consumer’s financial or other identifying information. These messages will create the impression the user has an urgent need to update his/her personal information.

Page 19: Keeping Your Children, your information and your equiptment safe

Tips to Protect Against “Phishing”

Remember that e-mail headers can be forged Avoid providing info or filling out forms via e-mail

because the data is not secure Avoid clicking links within an unsolicited e-mail

message Ensure a website is secure before providing any

personal information. Check for an address that begins with https or the browser has a lock icon in the address bar or bottom of the screen.

http://www.computerexplorers.com

Page 20: Keeping Your Children, your information and your equiptment safe

The Look of Fraudulent E-Mails

http://www.computerexplorers.com

Hovering over a link with the mouse cursor will reveal the real address the

link will take you to.

Don’t be fooled by the official looking header in

this fraudulent e-mail.

Page 21: Keeping Your Children, your information and your equiptment safe

General Safety Tips Use spam filters. Be suspicious of unsolicited e-mail. Treat e-mail attachments with caution. Don’t click links in e-mail messages. Create strong passwords. Use a combination of letters, numbers

and symbols. Change passwords frequently. Use a pseudonym when participating in public online forums, chat

rooms, discussion boards, etc. Don’t reveal username, passwords, or personal information to

anyone other than a trusted party. Install anti-virus software and keep it up to date. Install a personal firewall and keep it up to date. Install spyware/adware software and keep it up to date.

http://www.computerexplorers.com

Page 22: Keeping Your Children, your information and your equiptment safe

Protecting You or Your Children Filtering and Site blocking

http://www.computerexplorers.com

PC Based Software

•Cyber Patrol

•Net Nanny

•Cyber Sitter

Web Based Filters •Earthlink

•Comcast

•AOL

•Qwest

Search Engine controls•Google

•Yahoo!

•Windows Live Search (formerly MSN)

•Ask.com

What can you filter?

•Pornography

•Sexually explicit content

•Violence, including gaming sites and bomb making

Page 23: Keeping Your Children, your information and your equiptment safe

Online Social Situations

Chat rooms: a multi-user, simultaneous, real-time chat environment

MySpace: a social networking website that offers an interactive network of friends. The site includes personal profiles, blogs, groups, photos, videos and music. Other social networking sites include FaceBook, Friendster, Meetup.com, Nexopia, Orkut, hi5, and Xanga

Instant Messaging (IM): a form of real-time, text-typed communication between two computers or devices connected via a network. Yahoo! Messenger, Google Talk, Skype Messenger, AOL Instant Messenger (AIM), MSN, and ICQ are just a few of the messaging clients.

http://www.computerexplorers.com

Page 24: Keeping Your Children, your information and your equiptment safe

Blogs: or Web logs, are entries written in chronological order. Entries can be online diaries or commentaries on a specific topic. Blogs generally include text, hyperlinks, pictures, and now videos

Forums: a web application for holding discussions posted by users. Discussions generally pertain to a common topic. Forums are often referred to as discussion boards, message boards or web forums

Online games: video games played over a computer network. Online games can range from simple text-based games to games incorporating complex graphics and virtual worlds allowing for multiple players to play simultaneously.

Online Social Situations, cont.

http://www.computerexplorers.com

Page 25: Keeping Your Children, your information and your equiptment safe

Popular Social Sites for Teens and Pre-teens

Pre-teens (6-12) Club Penguin WebKinz Whyville.net Nicktropolis Disney Xtreme Digital

Teens (13+) MySpace MyYearbook Habbo Hotel FaceBook Live Journal

http://www.computerexplorers.com

Please note, your children are fickle. What may be popular today may not be popular tomorrow. Keep an eye on their surfing and investigate any unknown sites.

Page 26: Keeping Your Children, your information and your equiptment safe

Can you decipher these?FWIW, I thnk U R gr8t!

Btw, ur BFF is a PITA

OMG!

LOL!

Cul8r, H&K, ttyl

http://www.computerexplorers.com

Page 27: Keeping Your Children, your information and your equiptment safe

Internet Safety Study Teens have an established presence on social networking sites:

61% of 13-17 year-olds have a profile on sites such as MySpace, Friendster, or Xanga

50% of those have posted pictures of themselves online Older teens (16-17s) and girls especially use the Internet for social

interaction, meeting friends, and networking 71% reported receiving messages online from someone they don’t know 45% have been asked for personal information by someone they don’t

know 30% have considered meeting someone that they’ve only talk to online 14% have actually met a person face-to-face that they’ve only spoken to

over the Internet 9% were 13-15 year-olds 22% were 16-17 year-olds

Of those receiving messages from someone they don’t know, 40% report they’ll usually reply and chat with that person

Only 18% said they’ll tell an adultData from the National Center for Missing & Exploited Children

http://www.computerexplorers.com

Page 28: Keeping Your Children, your information and your equiptment safe

Internet Safety StudyPerceptions of Safety: 20% of teens report that it is somewhat or very safe to share personal

information on a public blog or networking site 37% of 13-17 year-olds said they are either “not very concerned” or “not at

all concerned” about someone using information they’ve posted online in ways they don’t want

Do you know what your child is doing?: 33% of 13-17 year-olds report their parents or guardians know “very little” or

“nothing” about what they do on the Internet 48% of 16-17 year-olds report their parents or guardians know “very little” or

“nothing” 22% of teens surveyed report their parents of guardians have never

discussed Internet safety with them 36% of teens, mostly girls and younger teens, have said their parents of

guardians have talked to them “a lot” about online safety 70% have said their parents or guardians have discussed the subject with

them during the past year Data from the National Center for Missing

& Exploited Children

http://www.computerexplorers.com

Page 29: Keeping Your Children, your information and your equiptment safe

Safety Tips for Parents or Guardians

Put the computer in a public area Use tools available to make your job

easier Know where the children surf Talk about Internet risks Emphasize the Internet is a public place Establish family rules for Internet use

http://www.computerexplorers.com

Page 30: Keeping Your Children, your information and your equiptment safe

Remember Three Tips Keep Current

Try to keep up with the latest technologies or sites.

Keep CommunicatingBe sure to communicate with your children and

keep up with their online activities. Keep Checking

Use the History feature on your Web browser to see where your children have been.

http://www.computerexplorers.com

Page 31: Keeping Your Children, your information and your equiptment safe

Safety Tips for Your Kids Use a nickname that does not closely resemble your

real name or reveal personal information. Never reveal your real name, address, phone

number, e-mail address, school, sports team, or favorite hang outs.

Refuse to meet someone you only know from online activities without a parent’s consent.

Always remember people online may not be who they say they are.

Tell a trusted adult if someone online threatens or does anything to make you feel uncomfortable.

http://www.computerexplorers.com

Page 32: Keeping Your Children, your information and your equiptment safe

Don’t Be Afraid of the Internet

Use the Internet to your advantage. Don’t know what that Website is your child visits

daily? Don’t know that acronym or short hand in your

child’s chat history? Got an attachment you’re not sure about?

Use a Search Engine.

Look it up!

http://www.computerexplorers.com

Page 33: Keeping Your Children, your information and your equiptment safe

Contact Information

Name:

Phone:

E-mail:

www.computerexplorers.com

www.computerexplorers.com/yourCEsite

YOUR

PHOTO

HERE