we all know we need to stay safe while using the internet, but we may not know just how to do that....

11
Internet safety By Fiona Bailey

Upload: colin-cunningham

Post on 28-Dec-2015

214 views

Category:

Documents


0 download

TRANSCRIPT

Internet safety

Internet safety By Fiona Bailey

Internet safety

1Introduction We all know we need to stay safe while using the Internet, but we may not know just how to do that. In the past, Internet safety was mostly about protecting your computer from viruses. But today, the Internet's vast reach, constantly changing technologies, and growing social nature have made users more vulnerable to identity theft, privacy violations, and even harassment. Potential issues covered throughout the power point.

VirusesComputer viruses are small software programs that spread from one computer to another SpywareSpyware is installed on a computer to collect the owner's private informationSpam Spam is any kind of unwanted online communication.PhishingPhishing is when you click on the pop up links that take you to fake websites, these get your personal information.FirewallsFirewall is a network security system that controls the incomingAnti virus softwareAntivirus software was originally developed to detect and remove computer viruses.Pop up blockers Pop-ups are often forms of online advertising on the World Wide Web intended to attract web traffic or capture email addressesUsing the internet could be a huge risk, however today the internets vast reach, constantly changing technologies to make it much more safe.Potential issues faced while on the internet, viruses, spyware, spam, phishing, firewalls, anti virus software, pop up blockers.2Viruses!

Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation.

A computer virus or worm is a self-replicating program that can spread by email or by inserting copies of itself into other programs or documents.

Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files.

Computer viruses also spread through downloads on the Internet. They can be hidden in illicit software or other files or programs you might download.

A fast way to check for viruses is to use an online scanner, such as the Microsoft Safety Scanner. The scanner is a free online service that helps you identify and remove viruses, clean up your hard disk, and generally improve your computer's performance.

About viruses how they work and how we resolve the problem A computer viruses are small software programs that are designed to spread from one computer to another and interfere with computer operation. A computer virus or worm is a self-replicating program that can spread by email or by inserting copies of itself into other programs or documents.A fast way to check for viruses is to use an online scanner, such as the Microsoft Safety Scanner. The scanner is a free online service that helps you identify and remove viruses, clean up your hard disk, and generally improve your computer's performance.

3Spyware

Spyware is a type of malware that is installed on a computer without the know ledge of the owner in order to collect the owner's private information.

Spyware is often hidden from the user in order to gather information about internet interaction, keystrokes (also known as keylogging), passwords, and other valuable data.

Spyware does not necessarily spread in the same way as a virus or worm because infected systems generally do not attempt to transmit or copy the software to other computers.

Instead, spyware installs itself on a system by deceiving the user or by exploiting software vulnerabilities.

You should use an antispyware scanner and removal tool to try to remove it. You can also try to remove spyware manually. . About spyware, Spyware is a type of malware that is installed on a computer without the know ledge of the owner in order to collect the owner's private information and is often hidden from the user in order to gather information about internet interaction, keystrokes. Spyware does not necessarily spread in the same way as a virus or worm because infected systems generally do not attempt to transmit or copy the software to other computers. To remove spyware of your computer you should use an antispyware scanner and removal tool to try to remove it. You can also try to remove spyware manually.

4Spam

Spam is any kind of unwanted online communication.

The most common form of spam is unwanted email. You can also get text message spam, instant message spam (sometimes known as spim), and social networking spam.

Some spam is annoying but harmless. However, some spam is part of an identity theft scam or other kind of fraud. Identity theft spam is often called a phishing scam.

Spam is unsolicited junk email sent indiscriminately in bulk, often for commercial purposes

Scan your computer with your anti-virus software while it is in Safe Mode by opening the program and selecting the "Scan" option

Computers can appear to function normally when infected, it's a good idea to run this tool regularly even if your computer seems to be fine. You should also use up-to-date antivirus software, such as Microsoft Security Essentials, to help protect your computer from other malware.About spam, it is any kind of unwanted online communication, The most common form of spam is unwanted email, instant message spam. Some spam is harmless, some spam is part of identity theft or some other kind of fraud, this is called phishing spam. To get rid of spam you must scan your computer with your anti-virus software while it is in Safe Mode by opening the program and selecting the "Scan" option, it's a good idea to run this tool regularly even if your computer seems to be fine. You should also use up-to-date antivirus software, such as Microsoft Security Essentials, to help protect your computer from other malware.

5PhishingThis is when users into giving up their usernames, passwords, credit card numbers and other personal information. Phishing emails will often try to get you to click on links that take you to fake websites; they often pretend to be from organizations such as a bank, PayPal, Amazon or even Stanford.

Phishing is an example of social engineering techniques used to deceive users, and exploits the poor usability of current web security technologies

The risk grows even larger in social media such as Facebook, Twitter, MySpace etc. Hackers commonly use these sites to attack persons using these media sites in their workplace, homes, or public in order to take personal and security information that can affect the user and the company

Turn off phishing and malware detection

Click the Chrome menu Chrome menu on the browser toolbar.Select Settings.Click Show advanced settings and find the "Privacy" section.Untick the box next to "Enable phishing and malware protectionAbout phishing, This is when users into giving up their usernames, passwords, credit card numbers and other personal information. Phishing emails will often try to get you to click on links that take you to fake websites; they often pretend to be from organizations such as a bank, PayPal, Amazon or even Stanford. Risk grows even larger in social media such as Facebook, Twitter, MySpace etc how to turn off phishing1. Click the Chrome menu Chrome menu on the browser toolbar.2.Select Settings.3.Click Show advanced settings and find the "Privacy" section.4.Untick the box next to "Enable phishing and malware protection

6Firewalls

In computing, a firewall is a network security system that controls the incoming and outgoing network traffic based on an applied rule set.

A firewall establishes a barrier between a trusted, secure internal network and another network (e.g., the Internet) that is assumed not to be secure and trusted.

Firewalls exist both as a software solution and as a hardware appliance

Many hardware-based firewalls also offer other functionality to the internal network they protected.

Firewalls can be used in a number of ways to add security to your home or business. Large corporations often have very complex firewalls in place to protect their extensive networks

The main goal of a personal firewall is to protect your personal computer and private network from malicious mischief.About firewalls, The main goal of a personal firewall is to protect your personal computer and private network from malicious mischief, Firewalls exist both as a software solution and as a hardware appliance. A firewall establishes a barrier between a trusted, secure internal network and another network (e.g., the Internet) that is assumed not to be secure and trusted. Firewalls can be used in a number of ways to add security to your home or business.

7This shows that the people asked think that the internet does more good than harm. About 27% think it does more harm but 41% think it does more good. 32.3% neither agree nor disagree.

This graph shows how many people gets asked and meet people over the internet, this means meeting up with a stranger and anything could happen. This is a big risk of the internet.

Anti virus software

Anti-virus software, is computer software used to prevent, detect and remove malicious software.

Antivirus software was originally developed to detect and remove computer viruses

Antivirus software provides protection from other computer threats. Antivirus software can protect from, malicious Browser Helper Objects, browser hijackers, ransom ware, key loggers, backdoors, rootkits, Trojan horses, worms, malicious LSPs, diallers, fraud tools, adware and spyware.

Anti-virus programs are not always effective against new viruses, even those that use non-signature-based methods that should detect new viruses. The reason for this is that the virus designers test their new viruses on the major anti-virus applications to make sure that they are not detected before releasing them into the wild

Some new viruses, particularly ransom ware, use polymorphic code to avoid detection by virus scanners. Jerome Segura, a security analyst with Pathologic, explained

Anti virus software, is computer software used to prevent, detect and remove malicious software. Antivirus software was originally developed to detect and remove computer viruses. Antivirus software provides protection from other computer threats. They are not always effective against new viruses, even those that use non-signature-based methods that should detect new virus, virus designers test their new viruses on the major anti-virus applications to make sure that they are not detected before releasing them into the wild. Some new viruses, particularly ransom ware, use polymorphic code to avoid detection by virus scanners. Jerome Segura, a security analyst with Pathologic, explained

10Pop up blockers

Pop-ups are often forms of online advertising on the World Wide Web intended to attract web traffic or capture email addresses.

Pop-ups are generally new web browser windows to display advertisements.

All major web browsers except Internet Explorer allowed the user to block unwanted pop-ups almost completely.

First the Mozilla browser improved on this by blocking only pop-ups generated as the page loads.

The pop-up window containing an advertisement is usually generated by JavaScript using cross-site scripting.

Block or allow pop-upsOnce you've downloaded Google Toolbar on Internet Explorer, you can block or allow pop-ups:On the right side of the Toolbar, click the wrench. Go to the Tools tab.To block pop-ups, tick the box next to "Pop-up blocker." To allow pop-ups, untick the box next to "Pop-up blocker."Then you click save.

Pop up blockers, are often forms of online advertising on the World Wide Web intended to attract web traffic or capture email addresses. Pop-ups are generally new web browser windows to display advertisements. All major web browsers except Internet Explorer allowed the user to block unwanted pop-ups almost completely. The pop-up window containing an advertisement is usually generated by JavaScript using cross-site scripting. Block or allow pop-upsOnce you've downloaded Google Toolbar on Internet Explorer, you can block or allow pop-ups:On the right side of the Toolbar, click the wrench. Go to the Tools tab.To block pop-ups, tick the box next to "Pop-up blocker." To allow pop-ups, untick the box next to "Pop-up blocker."Click Save.

11