SlideShare una empresa de Scribd logo
1 de 39
Computer / Internet Security
West Haven Public Library
www.westhavenlibrary.org
Computer / Internet Security
• Use of internet services are unavoidable
▫ Job applications, school applications, taxes, credit,
banking, DMV forms, personal communication
(email), social networking (facebook), shopping,
research, entertainment
• All parts of your life potentially have an online
counterpart
Computer / Internet Security
• Everything you do online…
▫ Every account you make
▫ Every purchase
▫ Every job application
• Creates data about you
Computer / Internet Security
• Not always a bad thing… BUT
▫ Danger in losing control of your data (accounts)
▫ Danger in over sharing
▫ Danger in important data being destroyed
(photos, records, documents)
Good News
It’s easy to stay safe and protect yourself
Computer / Internet Security
Goals
• Secure your data
• Keep what’s private
PRIVATE
• Prevent attack/ intrusion
• Prepare for the worst,
prevent loss
Computer / Internet Security
Goals Action
• Secure your data
• Keep what’s private PRIVATE
• Prevent attack/ intrusion
• Prepare for the worst, prevent
loss
• Use better password practices
• Be aware of what/how you
share
• Be proactive- use protective
software- be vigilant
• BACKUP, BACKUP, BACKUP
Data?
• Your data is anything on your computer or
information stored in online accounts
▫ Documents, files, photos
▫ Online shopping sites
▫ Banking, credit card
▫ Social networking profiles
• Data that you own/control
• Private (banking info)
• Public (online profiles)
Why bother?
• Whether public (online profiles) or private
(financial info) you need to stay in control
• Ensure that only authorized people can access
your data, accounts, files
Web-based accounts and services are increasingly
important
Dangers
•Breaches can come from
▫ Leaked/ stolen data
 Leaked by a company or organization
 Stolen via virus on a computer you use
▫ Targeted attacks
▫ Automated attacks- cracks
Dangers
• Virus, Malware, Spyware, Adware, Trojans
▫ Software created to steal information, change
settings, destroy files, take control of your system
▫ Most commonly contracted online unbeknownst
to the user
 Email attachments, malicious websites, software
downloads, toolbars
Secure Your Data
• Biggest step is use better password
practices
▫ more difficult to guess
▫ Harder to crack (longer in length)
▫ Make it easier to deal with if username/passwords
are leaked
Better Passwords
• Don't use passwords that are based on personal
information that can be easily accessed or
guessed.
▫ It may be easier than you think to guess your pet’s
name, birthday, child’s name, favorite
color, mother’s maiden name, etc.
▫ “password” “love” are extremely common and
easily guessed
25 Worst Passwords of 2011
1. password
2. 123456
3.12345678
4. qwerty
5. abc123
6. monkey
7. 1234567
8. letmein
9. trustno1
10. dragon
11. baseball
12. 111111
13. iloveyou
14. master
15. sunshine
16. ashley
17. bailey
18. passw0rd
19. shadow
20. 123123
21. 654321
22. superman
23. qazwsx
24. michael
25. football
http://mashable.com/2011/11/17/worst-internet-
passwords/
Better Passwords
• Don't use words that can be found in any
dictionary of any language.
▫ A single word, spelled correctly, is easy to check
against a dictionary
▫ Single words are also short, easy to break using
random guesses.
Stronger Passwords
• Use both lowercase and capital letters.
• Use a combination of letters, numbers, and
special characters.
▫ Maine96knees@MtSnow
• Develop a mnemonic for remembering complex
passwords.
Stronger Passwords
• Use passphrases when you can.
▫ Longer in length- harder to guess/ crack
▫ Easier to remember
▫ puppytograndmasforsummervacation
Stronger Passwords
• Use different passwords on different systems
▫ If you use the same password at one site that is
broken into- then attackers can access your data at
other sites using that same username/password.
Use different
passwords on
different systems
Keep what’s private PRIVATE
• Be aware of what you share
• When creating an account consider who you are
giving your data to
• Any site asking for banking, social security, or
login information for a different site should be
closely examined.
Keep what’s private PRIVATE
• When creating accounts consider what you are
entering and how it will be used
• You decide your comfort level with what you
share
Email
• Email is more like a postcard than a letter
• Chances are no one other than the recipient will
see it BUT it is possible for others see its content
along the way (just like a postcard)
• Do not email: credit card #, logins/passwords
Web Addresses- URL
URL (Uniform Resource Locator)
The address that connects you with a website.
Parts of the URL
http://www.google.com
http:// = protocol [Hypertext Transfer Protocol]
www. = World Wide Web
google = domain name
.com = domain type
Domain Types
.com = commercial
.org = generally nonprofit organizations
.edu = higher education
.gov = U.S. government agency
Browsing the Web- Secure Sites
• Any site asking for sensitive info should be
encrypted (Banks, Insurance, etc.)
• Encrypted site addresses begin with
▫ https://www.google.com- ENCRYPTED
▫ http://www.google.com- NOT encrypted
Browsing the Web- Secure Sites
Browsing the Web
• As you browse the web- websites collect info
about you
• Your web browser keeps a history and collects
cookies from websites
• Use your browser settings to:
▫ Clear your browser cache/history/cookies
▫ Limit 3rd party cookies
Keep what’s private PRIVATE
• If you have WiFi at home, set a password
▫ Keep your neighbors off your network (unless you
want them there)
▫ Refer to the directions that came with your
Router/Modem/Wifi
Prevent attack/ intrusion
• A Virus will get in through an open door or you
unwillingly open the door yourself
Anti-Virus
• A program that scans your files and actively
monitors to prevent infection
• Once installed, anti-virus monitors for virus
activity, quarantines, and deletes
• Be sure to frequently run the virus scan
• Be sure that “definitions” are updated
Anti-Virus
• Free
▫ AVG
▫ Avast
▫ Microsoft Security Essentials
 www.windows.microsoft.com/mse
• Commercial
▫ McAffee
▫ Symantec Norton
▫ Bit Defender
Prevent attack/ intrusion
• Be vigilant
• Don’t download email attachments that you
don’t trust
• If something from someone you trust looks
suspicious check with them before opening
Prevent attack/ intrusion
• Scareware
▫ Virus/Malware that looks like an anti-virus
program
▫ Popup while browsing the web
• Know what Anti-virus you have and how to use it
Fake Anti-Virus Warning
Prepare for the worst
• Backup your important files
▫ Keep duplicate copies
• Worst case scenario: you will still have what’s
important to you
• Keep your backup current
Prepare for the worst
• Backup files locally
▫ Copy to cdr
▫ Flash drive
▫ external hard drive
• Paper copies
▫ tax returns
▫ Important photos
Prepare for the worst
• Cloud storage- files copied to a secure site over
the internet
▫ Be sure that service is reputable, safe, stable
▫ Backup regularly
Resources
• http://www.us-cert.gov/cas/tips/
• http://www.ftc.gov/bcp/edu/microsites/onguard/
westhavenlibrary.org
David Cirella, decirella@gmail.com - 2012-03-01

Más contenido relacionado

La actualidad más candente

Protect digital content before upload to Facebook, Utube and Flickr
Protect digital content before upload to Facebook, Utube and FlickrProtect digital content before upload to Facebook, Utube and Flickr
Protect digital content before upload to Facebook, Utube and Flickr
Strategic Business & IT Services
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
Sadaf Walliyani
 
Password protection
Password protectionPassword protection
Password protection
post_it
 
Online reputation
Online reputationOnline reputation
Online reputation
esl2m
 
CyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_WatsonCyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_Watson
Patricia M Watson
 

La actualidad más candente (20)

An Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereAn Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & Anywhere
 
An Introduction To IT Security And Privacy In Libraries
 An Introduction To IT Security And Privacy In Libraries An Introduction To IT Security And Privacy In Libraries
An Introduction To IT Security And Privacy In Libraries
 
Keeping you and your library safe and secure
Keeping you and your library safe and secureKeeping you and your library safe and secure
Keeping you and your library safe and secure
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and Libraries
 
An Introduction To IT Security And Privacy - Servers And More
An Introduction To IT Security And Privacy - Servers And MoreAn Introduction To IT Security And Privacy - Servers And More
An Introduction To IT Security And Privacy - Servers And More
 
Protect digital content before upload to Facebook, Utube and Flickr
Protect digital content before upload to Facebook, Utube and FlickrProtect digital content before upload to Facebook, Utube and Flickr
Protect digital content before upload to Facebook, Utube and Flickr
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Password protection
Password protectionPassword protection
Password protection
 
Internet safety presentation sv
Internet safety presentation svInternet safety presentation sv
Internet safety presentation sv
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Ten Important Rules
Ten Important RulesTen Important Rules
Ten Important Rules
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
 
001 ho basic computer
001 ho basic computer001 ho basic computer
001 ho basic computer
 
NHC Tips - Secure your ID Theft - By Bijay Acharya
NHC Tips - Secure your ID Theft - By Bijay AcharyaNHC Tips - Secure your ID Theft - By Bijay Acharya
NHC Tips - Secure your ID Theft - By Bijay Acharya
 
CyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_WatsonCyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_Watson
 
Safe Internet Banking Cyber Security
Safe  Internet Banking Cyber SecuritySafe  Internet Banking Cyber Security
Safe Internet Banking Cyber Security
 
CYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWCYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEW
 
Confidentiality in a Digital World
Confidentiality in a Digital WorldConfidentiality in a Digital World
Confidentiality in a Digital World
 
Personal security
Personal securityPersonal security
Personal security
 

Destacado (6)

Questions to consider
Questions to considerQuestions to consider
Questions to consider
 
Account-Based Literacy A New Focus in Library Computer Instruction
Account-Based Literacy A New Focus in Library Computer InstructionAccount-Based Literacy A New Focus in Library Computer Instruction
Account-Based Literacy A New Focus in Library Computer Instruction
 
M-ETH: Man in the Middle Ethernet - LaCon'09
M-ETH: Man in the Middle Ethernet - LaCon'09M-ETH: Man in the Middle Ethernet - LaCon'09
M-ETH: Man in the Middle Ethernet - LaCon'09
 
Wave 5 Srbija
Wave 5   SrbijaWave 5   Srbija
Wave 5 Srbija
 
Insights u kreiranje online medija kampanje
Insights u kreiranje online medija kampanjeInsights u kreiranje online medija kampanje
Insights u kreiranje online medija kampanje
 
Jeopardy watsons
Jeopardy watsonsJeopardy watsons
Jeopardy watsons
 

Similar a Computer / Internet Security

Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
Randy Bowman
 

Similar a Computer / Internet Security (20)

TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
Lesson 5 protecting yourself on the internet
Lesson 5 protecting yourself on the internetLesson 5 protecting yourself on the internet
Lesson 5 protecting yourself on the internet
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Security Best Practices for Regular Users
Security Best Practices for Regular UsersSecurity Best Practices for Regular Users
Security Best Practices for Regular Users
 
Security best practices for regular users
Security best practices for regular usersSecurity best practices for regular users
Security best practices for regular users
 
Cyber security
Cyber security Cyber security
Cyber security
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
Personal Threat Models
Personal Threat ModelsPersonal Threat Models
Personal Threat Models
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcare
 
securityawareness.pptx
securityawareness.pptxsecurityawareness.pptx
securityawareness.pptx
 
Securityawareness
SecurityawarenessSecurityawareness
Securityawareness
 
securityawareness.pptx
securityawareness.pptxsecurityawareness.pptx
securityawareness.pptx
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library Setup
 

Último

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Último (20)

On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 

Computer / Internet Security

  • 1. Computer / Internet Security West Haven Public Library www.westhavenlibrary.org
  • 2. Computer / Internet Security • Use of internet services are unavoidable ▫ Job applications, school applications, taxes, credit, banking, DMV forms, personal communication (email), social networking (facebook), shopping, research, entertainment • All parts of your life potentially have an online counterpart
  • 3. Computer / Internet Security • Everything you do online… ▫ Every account you make ▫ Every purchase ▫ Every job application • Creates data about you
  • 4. Computer / Internet Security • Not always a bad thing… BUT ▫ Danger in losing control of your data (accounts) ▫ Danger in over sharing ▫ Danger in important data being destroyed (photos, records, documents)
  • 5. Good News It’s easy to stay safe and protect yourself
  • 6. Computer / Internet Security Goals • Secure your data • Keep what’s private PRIVATE • Prevent attack/ intrusion • Prepare for the worst, prevent loss
  • 7. Computer / Internet Security Goals Action • Secure your data • Keep what’s private PRIVATE • Prevent attack/ intrusion • Prepare for the worst, prevent loss • Use better password practices • Be aware of what/how you share • Be proactive- use protective software- be vigilant • BACKUP, BACKUP, BACKUP
  • 8. Data? • Your data is anything on your computer or information stored in online accounts ▫ Documents, files, photos ▫ Online shopping sites ▫ Banking, credit card ▫ Social networking profiles • Data that you own/control • Private (banking info) • Public (online profiles)
  • 9. Why bother? • Whether public (online profiles) or private (financial info) you need to stay in control • Ensure that only authorized people can access your data, accounts, files Web-based accounts and services are increasingly important
  • 10. Dangers •Breaches can come from ▫ Leaked/ stolen data  Leaked by a company or organization  Stolen via virus on a computer you use ▫ Targeted attacks ▫ Automated attacks- cracks
  • 11. Dangers • Virus, Malware, Spyware, Adware, Trojans ▫ Software created to steal information, change settings, destroy files, take control of your system ▫ Most commonly contracted online unbeknownst to the user  Email attachments, malicious websites, software downloads, toolbars
  • 12. Secure Your Data • Biggest step is use better password practices ▫ more difficult to guess ▫ Harder to crack (longer in length) ▫ Make it easier to deal with if username/passwords are leaked
  • 13. Better Passwords • Don't use passwords that are based on personal information that can be easily accessed or guessed. ▫ It may be easier than you think to guess your pet’s name, birthday, child’s name, favorite color, mother’s maiden name, etc. ▫ “password” “love” are extremely common and easily guessed
  • 14. 25 Worst Passwords of 2011 1. password 2. 123456 3.12345678 4. qwerty 5. abc123 6. monkey 7. 1234567 8. letmein 9. trustno1 10. dragon 11. baseball 12. 111111 13. iloveyou 14. master 15. sunshine 16. ashley 17. bailey 18. passw0rd 19. shadow 20. 123123 21. 654321 22. superman 23. qazwsx 24. michael 25. football http://mashable.com/2011/11/17/worst-internet- passwords/
  • 15. Better Passwords • Don't use words that can be found in any dictionary of any language. ▫ A single word, spelled correctly, is easy to check against a dictionary ▫ Single words are also short, easy to break using random guesses.
  • 16. Stronger Passwords • Use both lowercase and capital letters. • Use a combination of letters, numbers, and special characters. ▫ Maine96knees@MtSnow • Develop a mnemonic for remembering complex passwords.
  • 17. Stronger Passwords • Use passphrases when you can. ▫ Longer in length- harder to guess/ crack ▫ Easier to remember ▫ puppytograndmasforsummervacation
  • 18. Stronger Passwords • Use different passwords on different systems ▫ If you use the same password at one site that is broken into- then attackers can access your data at other sites using that same username/password.
  • 20. Keep what’s private PRIVATE • Be aware of what you share • When creating an account consider who you are giving your data to • Any site asking for banking, social security, or login information for a different site should be closely examined.
  • 21. Keep what’s private PRIVATE • When creating accounts consider what you are entering and how it will be used • You decide your comfort level with what you share
  • 22. Email • Email is more like a postcard than a letter • Chances are no one other than the recipient will see it BUT it is possible for others see its content along the way (just like a postcard) • Do not email: credit card #, logins/passwords
  • 24. URL (Uniform Resource Locator) The address that connects you with a website. Parts of the URL http://www.google.com http:// = protocol [Hypertext Transfer Protocol] www. = World Wide Web google = domain name .com = domain type Domain Types .com = commercial .org = generally nonprofit organizations .edu = higher education .gov = U.S. government agency
  • 25. Browsing the Web- Secure Sites • Any site asking for sensitive info should be encrypted (Banks, Insurance, etc.) • Encrypted site addresses begin with ▫ https://www.google.com- ENCRYPTED ▫ http://www.google.com- NOT encrypted
  • 26. Browsing the Web- Secure Sites
  • 27. Browsing the Web • As you browse the web- websites collect info about you • Your web browser keeps a history and collects cookies from websites • Use your browser settings to: ▫ Clear your browser cache/history/cookies ▫ Limit 3rd party cookies
  • 28.
  • 29. Keep what’s private PRIVATE • If you have WiFi at home, set a password ▫ Keep your neighbors off your network (unless you want them there) ▫ Refer to the directions that came with your Router/Modem/Wifi
  • 30. Prevent attack/ intrusion • A Virus will get in through an open door or you unwillingly open the door yourself
  • 31. Anti-Virus • A program that scans your files and actively monitors to prevent infection • Once installed, anti-virus monitors for virus activity, quarantines, and deletes • Be sure to frequently run the virus scan • Be sure that “definitions” are updated
  • 32. Anti-Virus • Free ▫ AVG ▫ Avast ▫ Microsoft Security Essentials  www.windows.microsoft.com/mse • Commercial ▫ McAffee ▫ Symantec Norton ▫ Bit Defender
  • 33. Prevent attack/ intrusion • Be vigilant • Don’t download email attachments that you don’t trust • If something from someone you trust looks suspicious check with them before opening
  • 34. Prevent attack/ intrusion • Scareware ▫ Virus/Malware that looks like an anti-virus program ▫ Popup while browsing the web • Know what Anti-virus you have and how to use it
  • 36. Prepare for the worst • Backup your important files ▫ Keep duplicate copies • Worst case scenario: you will still have what’s important to you • Keep your backup current
  • 37. Prepare for the worst • Backup files locally ▫ Copy to cdr ▫ Flash drive ▫ external hard drive • Paper copies ▫ tax returns ▫ Important photos
  • 38. Prepare for the worst • Cloud storage- files copied to a secure site over the internet ▫ Be sure that service is reputable, safe, stable ▫ Backup regularly