SlideShare a Scribd company logo
1 of 13
Computer Safety
Session 1 – Keeping Your Computer Safe
Introduction
The Community Technology Program is a free training
program covering
– How to connect you to new FREE high speed internet
service
– Basic Computer fundamentals and skills
– How to keep your family, your identity and your
computer safe on-line
– How to use the internet to discover opportunities
– How to use the Internet for fun and enjoyment
The program is made possible by a combination of federal
stimulus funding, matching private contributions
and support from private service providers.
Internet Safety
In this SERIES we cover…
• Session 1 – Keeping Your Computer Safe
• Session 2 – Keeping Your Family Safe
• Session 3 – Protecting Your Identity
Keeping Your Computer Safe
Today we will talk about…
• Using anti-virus software.
• Not opening email from strangers.
• Using a firewall.
• Creating and securing your passwords.
• Only downloading from a trusted source.
Learning Objective: To teach a novice how to safely use
the internet and anti-virus software.
Icebreaker
Don’t Open Email From Strangers
Use Anti-Virus Software
Creating and Securing Your
Passwords
Use a Firewall
Download from trusted sources
You can download almost anything
(often for free) from the Internet :
computer programs
movies
music
screen savers
ring tones
Look for the https://
Helpful Resources
The following websites are great resources for ways
to keep your computer safe:
– http://www.getnetwise.com
– http://www.getsafeonline.org
Discussion Questions
Learning objective:
To teach a novice how to safely use the internet and
anti-virus software.
Today we discussed:
Anti-virus software, safely navigating the internet and
downloading files.
Do you have any questions about the material
covered?
Congratulations! You have just completed the
session on Keeping Your Computer Safe.
Session 1 - Conclusion

More Related Content

What's hot

WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS
 
Review unit 2 tecnology 2 eso
Review unit 2 tecnology 2 esoReview unit 2 tecnology 2 eso
Review unit 2 tecnology 2 esoPILARSUREZMENESES
 
Internet Safety Techniques
Internet Safety TechniquesInternet Safety Techniques
Internet Safety TechniquesAnup Dixit
 
Jeopardy
JeopardyJeopardy
Jeopardyzed_o07
 
Cyber Security Awareness Program
Cyber Security Awareness ProgramCyber Security Awareness Program
Cyber Security Awareness ProgramJohn Rocco
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanismCAS
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessInnocent Korie
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security riskshazirma
 
Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)Satyendra Arora
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATSJazzyNF
 
Internet security
Internet securityInternet security
Internet securityrfukunaga
 

What's hot (20)

WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurity
 
Tip sheet
 Tip sheet Tip sheet
Tip sheet
 
Review unit 2 tecnology 2 eso
Review unit 2 tecnology 2 esoReview unit 2 tecnology 2 eso
Review unit 2 tecnology 2 eso
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Internet Safety Techniques
Internet Safety TechniquesInternet Safety Techniques
Internet Safety Techniques
 
Network Security
Network SecurityNetwork Security
Network Security
 
Jeopardy
JeopardyJeopardy
Jeopardy
 
Computer security
Computer securityComputer security
Computer security
 
Cyber Security Awareness Program
Cyber Security Awareness ProgramCyber Security Awareness Program
Cyber Security Awareness Program
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanism
 
Spyware
SpywareSpyware
Spyware
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
 
Presentation on cyber safety
Presentation on cyber safetyPresentation on cyber safety
Presentation on cyber safety
 
Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
 
Internet security
Internet securityInternet security
Internet security
 
Presented to Compass
Presented to CompassPresented to Compass
Presented to Compass
 

Viewers also liked

How to Set Up E-mail
How to Set Up E-mailHow to Set Up E-mail
How to Set Up E-mailoeproducer
 
Is your ultimate goal college education powerpoint
Is your ultimate goal college education powerpointIs your ultimate goal college education powerpoint
Is your ultimate goal college education powerpointNoralyGuerrero
 
Hitting the Licensing Bullseye: The Business Aspects of Patents
Hitting the Licensing Bullseye:  The Business Aspects of PatentsHitting the Licensing Bullseye:  The Business Aspects of Patents
Hitting the Licensing Bullseye: The Business Aspects of Patentsrbillion
 
Set Up a Free Gmail Account
Set Up a Free Gmail AccountSet Up a Free Gmail Account
Set Up a Free Gmail Accountoeproducer
 
Polygons pecha kucha
Polygons pecha kuchaPolygons pecha kucha
Polygons pecha kuchaKatie Bartz
 
How to Search the Web
How to Search the WebHow to Search the Web
How to Search the Weboeproducer
 

Viewers also liked (7)

How to Set Up E-mail
How to Set Up E-mailHow to Set Up E-mail
How to Set Up E-mail
 
Is your ultimate goal college education powerpoint
Is your ultimate goal college education powerpointIs your ultimate goal college education powerpoint
Is your ultimate goal college education powerpoint
 
Hitting the Licensing Bullseye: The Business Aspects of Patents
Hitting the Licensing Bullseye:  The Business Aspects of PatentsHitting the Licensing Bullseye:  The Business Aspects of Patents
Hitting the Licensing Bullseye: The Business Aspects of Patents
 
Set Up a Free Gmail Account
Set Up a Free Gmail AccountSet Up a Free Gmail Account
Set Up a Free Gmail Account
 
Polygons pecha kucha
Polygons pecha kuchaPolygons pecha kucha
Polygons pecha kucha
 
How to Search the Web
How to Search the WebHow to Search the Web
How to Search the Web
 
Persiano
PersianoPersiano
Persiano
 

Similar to Oe keeping your computer safe rev3

Computer security and_privacy
Computer security and_privacyComputer security and_privacy
Computer security and_privacythinkict
 
Internet PC Security by Khalil Jubran Mindspring Networks
Internet PC Security  by Khalil Jubran  Mindspring Networks  Internet PC Security  by Khalil Jubran  Mindspring Networks
Internet PC Security by Khalil Jubran Mindspring Networks Khalil Jubran
 
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A  ....Salwan public schoolDev Abhijet Gagan Chaitanya VII-A  ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public schoolDevku45
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamJoelGautham
 
Cyber security and safety
Cyber security and safetyCyber security and safety
Cyber security and safetyDooremoore
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)Cyber Security Infotech
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptxUmaraZahidLecturer
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer PrivacySaqib Raza
 
Module 1 content EN.pptx
Module 1 content EN.pptxModule 1 content EN.pptx
Module 1 content EN.pptxITStudy Ltd.
 
Cyber Safety Class 4 Computers Worksheet.pdf
Cyber Safety Class 4 Computers Worksheet.pdfCyber Safety Class 4 Computers Worksheet.pdf
Cyber Safety Class 4 Computers Worksheet.pdfTakshila Learning
 

Similar to Oe keeping your computer safe rev3 (20)

Computer security and_privacy
Computer security and_privacyComputer security and_privacy
Computer security and_privacy
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
Module 5: Safety
Module 5: SafetyModule 5: Safety
Module 5: Safety
 
Internet PC Security by Khalil Jubran Mindspring Networks
Internet PC Security  by Khalil Jubran  Mindspring Networks  Internet PC Security  by Khalil Jubran  Mindspring Networks
Internet PC Security by Khalil Jubran Mindspring Networks
 
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A  ....Salwan public schoolDev Abhijet Gagan Chaitanya VII-A  ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
 
Cyber security
Cyber securityCyber security
Cyber security
 
8._safety_and_security.pdf
8._safety_and_security.pdf8._safety_and_security.pdf
8._safety_and_security.pdf
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
Cyber security and safety
Cyber security and safetyCyber security and safety
Cyber security and safety
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)
 
ICT Security.pdf
ICT Security.pdfICT Security.pdf
ICT Security.pdf
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 
IS100 Week 11
IS100 Week 11IS100 Week 11
IS100 Week 11
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 
Computer security
Computer securityComputer security
Computer security
 
Module 1 content EN.pptx
Module 1 content EN.pptxModule 1 content EN.pptx
Module 1 content EN.pptx
 
Cyber Safety Class 4 Computers Worksheet.pdf
Cyber Safety Class 4 Computers Worksheet.pdfCyber Safety Class 4 Computers Worksheet.pdf
Cyber Safety Class 4 Computers Worksheet.pdf
 

Recently uploaded

How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
EMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxEMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxElton John Embodo
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
TEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxTEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxruthvilladarez
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 

Recently uploaded (20)

YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
EMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxEMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
TEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxTEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 

Oe keeping your computer safe rev3

  • 1. Computer Safety Session 1 – Keeping Your Computer Safe
  • 2. Introduction The Community Technology Program is a free training program covering – How to connect you to new FREE high speed internet service – Basic Computer fundamentals and skills – How to keep your family, your identity and your computer safe on-line – How to use the internet to discover opportunities – How to use the Internet for fun and enjoyment The program is made possible by a combination of federal stimulus funding, matching private contributions and support from private service providers.
  • 3. Internet Safety In this SERIES we cover… • Session 1 – Keeping Your Computer Safe • Session 2 – Keeping Your Family Safe • Session 3 – Protecting Your Identity
  • 4. Keeping Your Computer Safe Today we will talk about… • Using anti-virus software. • Not opening email from strangers. • Using a firewall. • Creating and securing your passwords. • Only downloading from a trusted source. Learning Objective: To teach a novice how to safely use the internet and anti-virus software.
  • 6. Don’t Open Email From Strangers
  • 8. Creating and Securing Your Passwords
  • 10. Download from trusted sources You can download almost anything (often for free) from the Internet : computer programs movies music screen savers ring tones Look for the https://
  • 11. Helpful Resources The following websites are great resources for ways to keep your computer safe: – http://www.getnetwise.com – http://www.getsafeonline.org
  • 12. Discussion Questions Learning objective: To teach a novice how to safely use the internet and anti-virus software. Today we discussed: Anti-virus software, safely navigating the internet and downloading files. Do you have any questions about the material covered?
  • 13. Congratulations! You have just completed the session on Keeping Your Computer Safe. Session 1 - Conclusion

Editor's Notes

  1. For over ten years One Economy has established itself as a leader in bringing affordable broadband internet service into the homes of more than 375,000 low income users, has employed more than 4,000 youth to train community members to use technology effectively and has created public-purpose media visited by over 17 million people providing healthcare, employment, educational and other important information to low-income users.
  2. Activity: Ask the audience to name something very important to them and one thing they currently do to protect it. Then make the analogy to a computer.
  3. Select from the list of Ice Breakers, the one that would be best suited for your residents and your ability to deliver.
  4. Junk mail, or spam, is email that tries to sell you fake products, offers schemes to make lots of money, promises to get you out of debt, etc. Think of it in the same way that you think of traditional junk mail, flyers and advertisements sent to you at random by strangers. These e-mails subjects are catchy and sound like good opportunities but opening them may inadvertently put viruses on your computer, sell you bad products, or put you at risk to lose your money. In the same way you wouldn’t give out important information about banking or a social security number over the phone, you shouldn’t do it over the internet either. Don’t ever give your user name or password to anyone especially if the request is via email. Email messages that do not show your email address in the “to” or “cc” lines are often spam.
  5. Anti-virus software protects your computer from cyber viruses that spreads to your computer through, email, instant messages, and file-sharing programs. Viruses can delete files, cause your computer’s programs to work incorrectly, and put unwanted text, video and audio messages on your computer. A good anti-virus program will, find and delete any virus that’s on your computer and repair damaged files. If an infected file cannot be deleted your virus-protection program will tell you what steps to take next. Norton Security Scan/GooglePack is a collection of free software that includes virus protection. If you’re willing to pay for more features, try Norton 360. You might also try Windows Live OneCare, get a free 90-day trial to see if you like it. Activity: Pull up the anti-virus software on your computer and show/talk about the report.
  6. What do passwords do? Passwords protect your personal information online. A strong password is a password that is difficult for someone else to figure out with a mixture of numbers, letters and special characters. Use a combination of capital (UPPER CASE) and lower case letters, symbols, and numbers. Passwords have to be case-sensitive, which means upper case and lower case letters matter when you’re typing your password. Make sure your passwords are at least eight characters. The longer they are, the harder they are to guess. Be sure to choose a set of numbers and letters, instead of a complete word. Don’t choose a password that is too easy to guess: such as your address, kids name or birthday. Don’t keep your important passwords written on a paper posted on your computer. Be especially careful on accounts that contain sensitive date such as online banking or PayPal. Lets watch a video on creating a strong password. (Go to http://www.getsafeonline.org/nqcontent.cfm?a_id=1483 and click on the strong password video).
  7. An internet firewall filters the information coming from the Internet to your computer and protects it from: viruses, spam and other dangerous programs. It also protects your personal information and files from being stolen or hacked by an internet criminal. Microsoft Window includes a fire wall. Lets watch a demo on how to install a firewall. (Go to http://www.thebeehive.org/internet-safety/keep-your-computer-safe/install-firewall/demo-how-install-firewall)
  8. Never download a file sent by someone you don’t know. Only download from trusted sources and sites. Keep anti-virus, spam blocking and firewall software up-to-date. Software threats are constantly changing, so you need the latest versions of protection to catch them. Many files are copyrighted, such as music, film, and software, in particular. As such, it is illegal to download them for free or from an unauthorized site. Use an anti-virus program to do this. Https:// stands for Hypertext Transfer Protocol Secure and indicates the website you’re visiting is safe to use.
  9. Make sure to write these down so that you will have them when you leave today’s session.
  10. (Take a breather and regroup make sure you are on target with the objective) Now that we have reached the end of the session, do you have any questions about the material covered? (If your audience does not have question or appears to be shy prompt the following questions): Do you remember the URL prefix that lets you know a website is secure? What are some of the tips for creating a safe and secure password? Can you name a brand of anti-virus software that is recommended?