1 / 22

By: Brittany Jones & Charles Helton.!

By: Brittany Jones & Charles Helton.!. Internet now days. Internet has advanced a lot throughout the years. It has changed the way people communicate, work, find knowledge and much more.

dasan
Download Presentation

By: Brittany Jones & Charles Helton.!

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. By: Brittany Jones & Charles Helton.!

  2. Internet now days Internet has advanced a lot throughout the years. It has changed the way people communicate, work, find knowledge and much more. Education has advanced because students can use the internet to look up information and read data they didn’t know using search engines such as Google, and Wikipedia People can email, use social networking such as Facebook, and Twitter, IM, and Skype. Work has became easier for business people by using the internet. They can communicate with more than one person and increase sales by communicating over seas. Therefore increasing the profit and making their business more money.

  3. AND SAFETY SECURITY • Online safety is very important. There is a lot of situations that can happen just by putting to much personal information online. Your identity could get stolen, or your house can get robbed, and much more. • Online security involves having software on your computer that stops virus and other harmful programs from hurting your computer.

  4. Risk to take. COMPUTERS: Viruses are very easy to catch, being on unfamiliar sites and even clicking on random pop ups can put viruses on your computer. Catching certain viruses can crash your hard drive and even erase your data. FAMILY: Your family can be in serious danger if the wrong person comes across to much information. For example: Putting that you are going out to eat Dad without your sister because she is grounded as your status and having your address on Facebook shows that she is alone and gives directions right to where she is at. PERSONAL INFORMATION: Having to much of your personal information on social networking sites and even falling for scams popping up asking for personal information is a good way for your identity to get taken. This problem can also affect your family.

  5. VIRUS: Software programs designed to invade your computer, and copy, damage or delete data. WORM: are malicious software applications designed to spread via computer networks. SPYWARE: software installed via the internet on a computer without the user's knowledge and used to send information about the user to another computer TROJAN: Viruses pretending to protect your computer while destroying your data.

  6. Cyberbullying Cyberbullying is the use of the Internet and related technologies to harm other people, in a deliberate, repeated, and hostile manner. As it has become more common in society, particularly among young people, legislation and awareness campaigns have arisen to combat it. • There is a lot of risk to take when it comes to cyber bullying. • Impulsive Behaviors • Social Insecurity • Isolation • Depression • Suicide

  7. File Sharing Abuse File sharing abuse- unauthorized sharing of music, video and other files, maybe illegal, and download malicious software.

  8. Predators The term sexual predator is used pejoratively to describe a person seen as obtaining or trying to obtain sexual contact with another person in a metaphorically "predatory" manner. Analogous to how a predator hunts down its prey, so the sexual predator is thought to "hunt" for his or her sex partners. People who commit sex crimes, such as rape or child sexual abuse, are commonly referred to as sexual predators, particularly in tabloid media or as a power phrase by politicians.

  9. Disturbing Content • Children can be introduced to images they shouldn’t know until a certain age in life. • They may become very interested into knowing what the images are which can change their behavior and actions.

  10. Invasion of Privacy • Physical Risks • Psychological Risks • Risks due to Invasion of Privacy & Breach of Confidentiality

  11. Identity theft • Risk of identity theft • Debt • Warrants • Court Dates • Jail Time

  12. Phishing Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. The information may be used to commit various forms of fraud and identity theft, ranging from compromising a single existing bank account to setting up multiple new ones

  13. Hoaxes Hoax is a message warning the recipient of a non-existent computer virus threat. The message is usually a chain e-mail that tells the recipient to forward it to everyone they know. Most hoaxes are sensational in nature and easily identified by the fact that they indicate that the virus will do nearly impossible things, like blow up the recipient's computer and set it on fire, or less sensationally, delete everything on the user's computer.

  14. Spam Spam is the use of electronic messaging to send unsolicited bulk messages indiscriminately. A person who creates electronic spam is called a spammer. The objective may be identity theft, or advance fee fraud. Some spam attempts to capitalize on human greed whilst other attempts to use the victims' inexperience with computer technology to trick them (Also know as phishing)

  15. Steps you can take: • Steps to take in order to protect your computer: • Turn on internet firewall • Use Microsoft Update to keep windows up-to-date automatically • Install and maintain Microsoft windows defender • Install and maintain antivirus software • Steps to take in order to protect your family: • Talk to your kids about what they do online • Set clear rules for Internet use • Keep personal information private • Use family safety settings in Microsoft software • Steps to take in order to protect your personal information: • Practice Internet behavior that lowers your risk • Manage your personal information carefully • Use anti- phishing and anti- spam technology built into Windows vista, Windows XP, SP2, Windows Outlook, Windows Live • Internet firewall helps create a protective barrier

  16. Back up files regularly (3 back ups, spreaded) • Read websites privacy statements • Close pop ups using red “x” • Think before you click • Save to a usb, cd/ dvd • Be cautious with email attachments and links • Only download files from web sites familiar

  17. Importance of monitoring your child It is very important to monitor your child's use of the internet. The internet is a very dangerous place for small children. They can come across predators, put your family in danger by sharing to much personal information and even coming across disturbing content.

  18. Brittany’s Facebook privacy settings

  19. Click on the arrow beside “home” in the right corner, go to privacy settings. I changed my Facebook from being viewed to pubic to being viewed by my friends.

  20. Click on “how you connect”. • I changed my timeline being looked up only by my friends • I changed that my friends and friends of friends can message me • I changed that only my friends can post on my timeline • I changed that my friends of friends can see what is posted on my timeline.

  21. I changed that I have to review what people tag me in before it is put on my timeline. • I changed that my friends of friends can see what my friend tag on my timeline.

  22. The end.!

More Related