INTERNET SAFETY* GALEN GARRETSON RASCAL MARCH 2-3, * Sources include learnfree.org, PC World, wikpedia.com, techterms.com

Similar documents
INTERNET SAFETY IS IMPORTANT

Security Awareness. Presented by OSU Institute of Technology

Keeping Your PC Safe. Tips on Safe Computing from Doug Copley

NET 311 D INFORMATION SECURITY

Quick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page

Browser Cookie Settings

Staying Safe on the Internet. Mark Schulman

How To Remove Personal Antivirus Security Pro Virus

2018 By: RemoveVirus.net. Remove A Virus From Your PC In 5 Simple Steps

Manually Remove Of Xp Internet Security Protect

How To Remove Internet Security Pro Virus. Manually >>>CLICK HERE<<<

Staying Safe Online. My Best Internet Safety Tips. and the AgeWell Computer Education Center.

How To Remove Personal Antivirus Security Pro Virus Windows 8

Technology Basics and Social Networking Presented by Gina Lobdell Graduate Student at Purdue University

Create strong passwords

Manual Removal Norton Internet Security Won't Open Or

How To Remove Personal Antivirus Security Pro Virus Manually

Remove Mcafee Antivirus Plus 2013 Link Version For 90 Days

By John Lortz DiscoverSkills.com

FACEBOOK SAFETY FOR JOURNALISTS. Thanks to these partners for reviewing these safety guidelines:

Free antivirus software download windows 10

ANNOYING COMPUTER PROBLEMS

Circle Link 1 "Know Before You Go" Web Literacy Tips:

EADS up. stop think connect

Manually Remove Of Xp Internet Security Pro Virus Windows 7

Discount Kaspersky PURE 3.0 internet download software for windows 8 ]

Protecting your Security and Privacy on the Web. Tony Brett Head of IT Support Staff Services IT Services. 11 March 2013

Looking at the Internet with Google Chrome & Firefox. Scoville Memorial Library Claudia Cayne - September, 2010

Free antivirus software download

Firewall Antivirus For Windows Xp Full Version 2013

Manually Remove Of Xp Internet Security Protect Virus Manually

The Table Privacy Policy Last revised on August 22, 2012

FAQ. Safe Anywhere PC 12. Disclaimer:

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved.

How To Stop Avg Search Appearing In New Tabs On Google Chrome

Activation Screen Virus

Introduction to the Internet. Part 1. What is the Internet?

Elementary Computing CSC 100. M. Cheng, Computer Science

(electronic mail) is the exchange of computer-stored messages by telecommunication.

How To Removing Personal Antivirus Security Pro From Windows 8

CDH Top 5. Free Recommended Cyber Security Tools. 1. Malwarebytes 2. CCleaner 3. Norton Safe Web 4. EaseUS Todo Backup 5.

STEAM Clown Production. Passwords. STEAM Clown & Productions Copyright 2016 STEAM Clown. Page 1 - Cyber Security Class

FAQ: Privacy, Security, and Data Protection at Libraries

Cybersecurity For The Small Business & Home User ( Geared toward Windows, but relevant to Apple )

TxEIS on Internet Explorer 8

BEST PRACTICES FOR PERSONAL Security

Cyber Security Guide. For Politicians and Political Parties

COMMON WAYS IDENTITY THEFT CAN HAPPEN:

PRACTICING SAFE COMPUTING AT HOME

PROTECTING YOUR BUSINESS ASSETS

Course Outline (version 2)

Keep In touch Digital skills for older people itkite.wordpress.com DON T PANIC! Just keep taking your tablet (with you)

August 12. Tips for Gmail. Tips to save time and increase your productivity. Gmail Training

Learning Center Computer and Security Settings

Download firefox with virus protection

Online Communication. Chat Rooms Instant Messaging Blogging Social Media

Security Issues When Preparing for Disasters

Report Course name ABSTRACT. Research and reporting. Survey Report. Nguyen Ngoc Long. Ann Viitala. Adesh Chymariya. Shu Sheng 5/2/2010.

Last tested with CHROME version 63 Jim McKnight Chrome.lwp revised

Keeping Your Computer Secure Quick Reference Guide

Safety and Security. April 2015

About Lavasoft. Contact. Key Facts:

Internet Crimes Against Children:

CCleaner* Available at: ccleaner.com. Galen Garretson 6/26/2018. *segments from ccleaner.com

Browser Configuration Reference

Introduction to

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

How to Encrypt Files Containing Sensitive Data (using 7zip software or Microsoft password protection) How to Create Strong Passwords

Private Browsing: an Inquiry on Usability and Privacy Protection

Browser Settings. Updated 4/30/ SSF

Schematic Antivirus 2013 For Windows Xp Full Version

Comodo Internet Security Software Version 10.0

But you can also click CC/BCC to send a carbon copy or a blind carbon copy.

Privacy Policy. LAST UPDATED: 23 June March 2017

CS Paul Krzyzanowski

Conveying Emotion. Chapter 12: Computers In Polite Society: Social Implications of IT. Improving the Effectiveness of . Problems with

EDGE, MICROSOFT S BROWSER

RNDC / NDC MicroStrategy Supplier Web Troubleshooting Guide

Internet Explorer 6 and 7 Users

7, 8, 8.1, 10. You can still get windows ten upgrade from 7, 8 and 8.1 now. Just need the right file to upgrade, I have it.

Norton 360 vs trend micro vs mcafee vs symantec: which anti-virus solution is best

Quick Heal Total Security

Getting Started Guide

SUMMARIES OF INTERACTIVE MULTIMEDIA

Welcome to our Moodle site! What is Moodle?

How To Remove A Virus Manually Windows 7 Without Antivirus Security Pro

GUIDE TO KEEPING YOUR SOCIAL MEDIA ACCOUNTS SECURE

Features. Product Highlights. Not just an app, but a friend for your phone. Optimization. Speed. Battery. Storage. Data Usage

3.5 SECURITY. How can you reduce the risk of getting a virus?

Cyber Smarts Using Social Media Wisely

A global network of computers that share pages of information called webpages or websites. Internet Service Provider

Symantec Antivirus Manual Removal Tool Corporate Edition 10.x

Learning Center Computer and Security Settings

Comodo Internet Security Software Version 10.1

Learning and Development. UWE Staff Profiles (USP) User Guide

ASTE 2016 Ning Network access our Ning on a mobile device, browsers FREE should NOT To join the ASTE 2016 Ning

UPLOADING AN IMAGE TO FACEBOOK AND MAKING IT YOUR PROFILE PICTURE

Comodo Internet Security Software Version 11.0

Chromebooks boot in seconds, and resume instantly. When you turn on a Chromebook and sign in, you can get online fast.

How To Delete Avira Antivirus From My >>>CLICK HERE<<<

Transcription:

INTERNET SAFETY* GALEN GARRETSON RASCAL MARCH 2-3, 2016 * Sources include learnfree.org, PC World, wikpedia.com, techterms.com

SOME QUESTIONS TO ASK YOURSELF. HAVE YOU.. 1. Googled yourself to see what information can be found on you? 2. Been enticed by emails or advertisements with special discount offers? 3. Set your computer's security program to make sure you are getting regular updates? 4. Created an external backup source for your computer? 5. Set secure passwords for any of your online accounts? 6. Customized your privacy settings for social networking accounts like Facebook, Skype, etc?

INTERNET SAFETY THREATS Click on each word for a definition.

Install virus protection software and keep it up to date. Security suites Security suites are generally easier to manage and offer a wide range of protection, which can be useful if you are a beginner. However, in some cases the extra functions of a suite are not as good as the stand-alone products for that function. In addition, some suites have a tendency to slow down a computer. Stand-alone products More advanced users sometimes prefer to take a pick-and-mix approach, researching and selecting the best products for each component and building their own security systems.

Virus protection software There are many antivirus programs available. Many have a free version in addition to an upgraded Pro version. Many offer a suite of tools that include malware detection, startup management, etc. Here is a list of free antivirus software programs as presented by PC Magazine as of March 1, 2016. Please investigate what best suits your needs. PC Magazine article Avast Free Antivirus 2016 AVG AntiVirus Free (2016) Panda Free Antivirus (2016) Bitdefender Antivirus Free Edition (2014) Check Point ZoneAlarm Free Antivirus + Firewall 2016 Lavasoft Ad-Aware Free Antivirus+ 11 Sophos Home Qihoo 360 Total Security Essential Comodo Antivirus 8 FortiClient 5.0

Create strong passwords for any email or online account. Never use personal information such as your name, birthday, or spouse's name. Personal information is often publicly available, which makes it easier for someone to guess your password. Use a longer password. Your password should be at least eight characters long, and for extra security it should ideally be at least 12 characters if the site allows it. If you need to write down your passwords, keep them in a secure place. It's even better if you encrypt your passwords, or write down hints for them that others won't be able to understand. Don't use the same password for each account. If someone discovers your password for one account, all of your other accounts will be vulnerable. Try to include numbers, symbols, and both uppercase and lowercase letters if the site allows it. Avoid using words that can be found in the dictionary. For example, swimming1 would be a weak password. Random passwords are the strongest. Password generators can be very helpful.

Password Management Programs As with antivirus programs, there are both free and paid password management programs. Most of the free password managers restrict the number of account passwords that will be managed. As an example, Roboform is free, but with a limit of only 10 accounts. Also, some managers store your passwords locally on your computer, while others store your passwords in the cloud. Here are some password managers you may want to consider, again from PC Magazine. Dashlane 4 LastPass 4.0 Premium Sticky Password Premium RoboForm Everywhere 7 Keeper Password Manager & Digital Vault 8 LogMeOnce Password Management Suite Ultimate Password Boss Premium Password Genie 4.4

Download with Caution One of the easiest ways malware, spyware, and adware can access your computer is through downloads; therefore, it's important to take precautions when downloading content to your computer, whether it is a software program, the latest pop song, or a cool game. There are two things that provide the best defense against infected downloads: your computer's security programs and your own judgment. Download only from trusted sites Save and then run downloads Be cautious of freeware Avoid illegal downloads Be cautious of P2P (peer-to-peer) file sharing

Is a site safe for shopping? The first thing to look for at every shopping website is the secure and encrypted connection. Every website that sells items, or services should encrypt connection and information between the user and the server. This is an easy thing to verify in seconds. Secure websites protect their most important pages where people can log in, sign up or make a payment. To verify that the payment page is secured look for the green lock at the top left of your browser. That lock represents a certification from trusted companies who verified the identity of the website owner, and they encrypt that page with SSL to make it secure. In Google Chrome, for example, the lock looks like the screenshot below:

Is a site safe for shopping? Now let s take it a step further. Left click on the green lock and then click on the connection tab. You ll will see what certificates the site has and possibly how they encrypt their information. There are a few companies in the world that are trusted by millions of users such as Truste, Norton, Geotrust.com, and Verisign.com. These companies deliver a certificate of trust and security, after doing their own check on the website that you re looking at.

What about safety for just plain browsing, not shopping? Web browsers have built-in safety checks. For example, Microsoft calls it SmartFilter for Internet Explorer, and Firefox has options to block "reported attack sites". Chrome and Safari use data from Google Safe Browsing; and Opera relies on AVG. Here s a screen shot from a Google Chrome block:

What about safety for just plain browsing, not shopping? In addition there are third party plugin or extensions that help protect you from websites that you may pick up malware or viruses. Some are reputation based. Web of Trust AVG Link Protection Trent Protect Norton Ratings And many more. In Google Chrome click menu t Then click Setting and then click Extensions. Toward the bottom of the page you will see the option to: You can then search for extensions you are interested in. Let s try it now.

Use the built-in browser protection Delete your browsing history regularly. In Google Chrome, left click on the Menu button.

Use the built-in browser protection In the Internet Explorer click on the Tools button, then:

Use the built-in browser protection Use the built-in pop-up blocker Pop-ups are small browser windows that automatically pop up when you visit certain sites. They may sometimes be part of the legitimate functioning of a site, or they may contain advertisements that can be annoying or objectionable. However, some pop-ups may contain malware; therefore, it's a good idea to make sure your browser's pop-up blocker is turned on. In Chrome, pop-ups are managed by going to the menu button, then settings, then to Show Advanced Settings. Click on Content Settings under Privacy. Scroll down to the Pop-up section.

Use the built-in browser protection Control those cookies - keep the cookies you want, get rid of the rest. Many websites add small text files to your computer called cookies. Cookies can help your computer communicate with a web server, but they can also be used to track your browsing activity. Every browser has tools for controlling, blocking, and deleting cookies from your computer. By becoming familiar with these tools, you can help protect your information from being accessed. In Chrome, cookies are managed by going to the menu button, then settings, then to Show Advanced Settings. Click on Content Settings under Privacy. Scroll down to the Cookies section.

Use the built-in browser protection Browse in private or incognito for extra safety Most browsers have a tool option that allows you to browse in private. When in private browsing mode, the following information will not be saved by the browser: 1. Pages you visit will not be recorded to your history or address bar. 2. Cookies will be deleted at the end of the session. 3. The cache that stores temporary Internet files will be emptied at the end of the session. 4. Forms, search bars, and text boxes will not save the data you have entered, including passwords. 5. Downloads listed in your download window or folder will be deleted, although the download itself will remain on your computer.

A sockpuppet is a fake identify that someone creates and uses to deceive others for some kind of personal gain. On most websites it is possible to have more than one account, so it is easy to create sockpuppets. TIPS FOR INTERNET SAFETY Social Networking on the Internet (Facebook, Skype, LinkedIn, user forums, chat rooms, etc.) If someone loses their job because of something they posted on a blog or social networking site, they have been dooced. An avatar is a virtual representation of yourself. The term usually refers to a virtual image. Meme is something that has gone viral, or spread rapidly around the internet, such as a catchphrase, hoax, topic, concept or piece of media. Instead of using your picture on a social networking profile, you might use an avatar to protect your privacy. Memes are often cute, funny or curious and make you want to pass them on! If you are forwarding an email, just remember that everyone who gets that email in the future could have access to your email address. A comment posted by someone trying to provoke a flame, or an angry response, is called flamebait. If anyone responds to the comment, they are said to have taken the bait. A troll is a person who posts comments just to get a rise out of people and cause a distraction. Trolls might say something rude, assert incorrect information, or ask questions unrelated to the topic at hand.

Social Networking on the Internet (Facebook, Skype, LinkedIn, user forums, chat rooms, etc.) Screen Name It may be OK to use your full name as a screen name on sites where you can limit your sharing to the people you know. Some sites, like Facebook, may even require you to use your real full name. However, on a message board or chat room, you should use just your first name or a pseudonym because you are interacting with strangers. Profile Picture A profile picture can either be a photo or avatar (a graphical image that represents you). On Facebook, most people use photos of themselves. However, on a more public site you may want to use an avatar because it allows you to remain more anonymous. Profile Information You should be careful about what personal information you share in your profile. If possible, set up your account so only friends can see your personal information. You hould never make your birthday or home address publicly viewable.