SlideShare una empresa de Scribd logo
1 de 33
Internet Safety and   You How to keep you, your children, your information, and your equipment safe. http://www.computerexplorers.com
Protecting Your Computer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com
Viruses ,[object Object],[object Object],[object Object],[object Object],[object Object],http:// www.computerexplorers.com
Trojan Horses ,[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com ,[object Object],[object Object],[object Object],[object Object]
Worms ,[object Object],[object Object],[object Object],[object Object],http:// www.computerexplorers.com ,[object Object],[object Object],[object Object]
Protect Your Computer Install complete Anti-virus protection ,[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com
Available Anti-virus Software COMPUTER EXPLORERS ®  in no way endorses or warrants the purchase, download, or use of the listed software. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com
Spyware ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com
Adware ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com
Malware ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com
Infested Computers http://www.computerexplorers.com Severe Case  Mild Case
Prevention Tips ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com
Available Spyware and Adware Products   COMPUTER EXPLORERS ®  in no way endorses or warrants the purchase, download, or use of the listed software. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com
Pop-up Blockers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com
Firewalls ,[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com What’s a Firewall? A firewall is a hardware or software device  configured to allow or deny data through a computer network with different trust levels. ,[object Object],[object Object],[object Object]
Protecting Your Information ,[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com
Spam Mail ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com Spam  – any message, regardless of its content, that is sent to multiple mailing lists, individuals or newsgroups. Also called bulk e-mail or junk e-mail.
Fraudulent E-Mail ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com Fraudulent e-mails are “spoofing” or “phishing” messages. Scammers use these methods to “fish” for consumer’s financial or other identifying information. These messages will create the impression the user has an urgent need to update his/her personal information.
Tips to Protect Against “Phishing” ,[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com
The Look of Fraudulent E-Mails http://www.computerexplorers.com Hovering over a link with the mouse cursor will reveal the real address the link will take you to. Don’t be fooled by the official looking header in this fraudulent e-mail.
General Safety Tips ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http:// www.computerexplorers.com
Protecting You or Your Children   Filtering and Site blocking http://www.computerexplorers.com ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Online Social Situations ,[object Object],[object Object],[object Object],http://www.computerexplorers.com
[object Object],[object Object],[object Object],Online Social Situations, cont. http://www.computerexplorers.com
Popular Social Sites for Teens and Pre-teens ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com Please note, your children are fickle. What may be popular today may not be popular tomorrow. Keep an eye on their surfing and investigate any unknown sites.
Can you decipher these? FWIW, I thnk U R gr8t! Btw, ur BFF is a PITA OMG!  LOL!  Cul8r, H&K, ttyl http://www.computerexplorers.com
Internet Safety Study   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com
Internet Safety Study ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com
Safety Tips for Parents or Guardians ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com
Remember Three Tips ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com
Safety Tips for Your Kids ,[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com
Don’t Be Afraid of the Internet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.computerexplorers.com
Contact Information Name: Phone: E-mail: www.computerexplorers.com   www.computerexplorers.com/yourCEsite YOUR PHOTO HERE

Más contenido relacionado

La actualidad más candente

Vocabulary link: Computer Science
Vocabulary  link: Computer ScienceVocabulary  link: Computer Science
Vocabulary link: Computer Science
nicamos
 
Information of Virus
Information of VirusInformation of Virus
Information of Virus
jazz_306
 

La actualidad más candente (20)

Viruses and Spyware
Viruses and SpywareViruses and Spyware
Viruses and Spyware
 
Ppt123
Ppt123Ppt123
Ppt123
 
Protecting your pc in the new year
Protecting your pc in the new yearProtecting your pc in the new year
Protecting your pc in the new year
 
How to Delete plus network.com
How to Delete plus network.comHow to Delete plus network.com
How to Delete plus network.com
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
IT security awareness
IT security awarenessIT security awareness
IT security awareness
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
Vocabulary link: Computer Science
Vocabulary  link: Computer ScienceVocabulary  link: Computer Science
Vocabulary link: Computer Science
 
C 7
C 7C 7
C 7
 
Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethics
 
Malware and security
Malware and securityMalware and security
Malware and security
 
Instructions to remove ads by lolliscan
Instructions to remove ads by lolliscanInstructions to remove ads by lolliscan
Instructions to remove ads by lolliscan
 
Information of Virus
Information of VirusInformation of Virus
Information of Virus
 
HELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICTHELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICT
 
Computer virus 2015
Computer virus 2015Computer virus 2015
Computer virus 2015
 
Pad 750 podcast
Pad 750 podcastPad 750 podcast
Pad 750 podcast
 
M
MM
M
 
Internet Threats: Carlo Alvarez
Internet Threats: Carlo Alvarez Internet Threats: Carlo Alvarez
Internet Threats: Carlo Alvarez
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 

Destacado

Internet Safety and Chldren
Internet Safety and ChldrenInternet Safety and Chldren
Internet Safety and Chldren
Joe Drumgoole
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
Aeman Khan
 
Employee safety and health
Employee safety and healthEmployee safety and health
Employee safety and health
rumel009
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Lipsita Behera
 

Destacado (15)

Emergency planning for school safety
Emergency planning for school safetyEmergency planning for school safety
Emergency planning for school safety
 
Internet Safety and Chldren
Internet Safety and ChldrenInternet Safety and Chldren
Internet Safety and Chldren
 
CHILD SAFETY AT HOME
CHILD SAFETY AT HOMECHILD SAFETY AT HOME
CHILD SAFETY AT HOME
 
Child Safety Tips at Home and Outside
Child Safety Tips at Home and Outside Child Safety Tips at Home and Outside
Child Safety Tips at Home and Outside
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 Challenges
 
2017 Cybersecurity Predictions
2017 Cybersecurity Predictions2017 Cybersecurity Predictions
2017 Cybersecurity Predictions
 
Class 21 and 22
Class 21 and 22Class 21 and 22
Class 21 and 22
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
General Safety Presentation
General Safety PresentationGeneral Safety Presentation
General Safety Presentation
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Employee safety and health
Employee safety and healthEmployee safety and health
Employee safety and health
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similar a Keeping Your Children, your information and your equiptment safe

Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!
Joel May
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Connecting Up
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
azman21
 

Similar a Keeping Your Children, your information and your equiptment safe (20)

Computers.ppt
Computers.pptComputers.ppt
Computers.ppt
 
Staying Safe on the Computer and Online
Staying Safe on the Computer and OnlineStaying Safe on the Computer and Online
Staying Safe on the Computer and Online
 
Spyware
SpywareSpyware
Spyware
 
Internet PC Security by Khalil Jubran Mindspring Networks
Internet PC Security  by Khalil Jubran  Mindspring Networks  Internet PC Security  by Khalil Jubran  Mindspring Networks
Internet PC Security by Khalil Jubran Mindspring Networks
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!
 
Presented to Compass
Presented to CompassPresented to Compass
Presented to Compass
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
ratzan2.ppt
ratzan2.pptratzan2.ppt
ratzan2.ppt
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 

Último

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Último (20)

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 

Keeping Your Children, your information and your equiptment safe

  • 1. Internet Safety and You How to keep you, your children, your information, and your equipment safe. http://www.computerexplorers.com
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20. The Look of Fraudulent E-Mails http://www.computerexplorers.com Hovering over a link with the mouse cursor will reveal the real address the link will take you to. Don’t be fooled by the official looking header in this fraudulent e-mail.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26. Can you decipher these? FWIW, I thnk U R gr8t! Btw, ur BFF is a PITA OMG! LOL! Cul8r, H&K, ttyl http://www.computerexplorers.com
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33. Contact Information Name: Phone: E-mail: www.computerexplorers.com www.computerexplorers.com/yourCEsite YOUR PHOTO HERE

Notas del editor

  1. Welcome to “Internet Safety and You”! I am ( your name ), ( owner, director, etc) of COMPUTER EXPLORERS. The presentation today is designed to help you arm yourself with facts and tips to keep you safe while using the Internet.