Online Safety and Security
Online Safety and Security
Security
The Internet = A World of Opportunities
To Computers To Personal
(Security) Information
(Safety)
• Viruses
• Online fraud and
• Worms phishing
• Trojans • Hoaxes
• Spyware • Identity theft
• Adware • Spam
Primary Threats to Computer Security
Viruses/Worms
Software programs
designed to invade your Trojans
computer, and copy, Viruses that pretend to be
damage, or delete your helpful programs while
data. destroying your data,
Spyware/Adware
damaging your computer, Software that tracks your
and stealing your personal online activities or displays
information. endless ads.
Four Steps to Help Protect Your Computer
11/19/24
Use Automatic Updates to Keep Software
Up-to-date
11/19/24
Keep Java, Flash, and other add-on
programs up to date
• Antivirus software
helps to detect and
remove computer
viruses before they can
cause damage.
• For antivirus software
to be effective, you Don’t let it expire
must keep it up-to-date.
Install and Maintain Antispyware Software
Phishing
E-mail sent by online
criminals to trick you
into going to fake
Web sites and Spam
revealing personal Unwanted e-mail,
information instant messages,
and other online
Identity Theft communication
Hoaxes
A crime where con
artists get your E-mail sent by online
personal information criminals to trick you
and access your cash into giving them
and/or credit money
Three Steps to Help Protect Your Personal
Information
Do Not:
Use your name or your Username in any form
Use your spouse's, child's or pet’s name
Use other information easily obtained about you
(License plate, telephone, or social security numbers,
brand of your automobile, street address, etc.)
Use words found in dictionaries
Choosing secure passwords
Do:
Use a password with mixed-case alphabetic characters
Use a password with non-alphabetic characters (e.g., digits or
punctuation)
Use a password that is easy to remember, so you don't have to
write it down
Try using a the first letter of each word in a long phrase, then
substitute caps and symbols
Choosing a secure password
11/19/24
From: Webmaster [mailto:[email protected]]
Sent: Thursday, March 10, 2011 5:25 AM
Subject: User Quarantine Release Notification
Hello,
Sample
We are carrying out a routine quarantine exercise . we have started our yearly
server (inactive email-accounts / spam protecting etc) clean-up process to enable
service upgrade/migration efficiency. Please be informed that your account usage
Phishing email
will be fully restricted if you do not adhere to this notice.
sent to FSU users
You are to provide your account details for immediate Quarantine by clicking on
your reply button to respond as follows (This will confirm your account login/usage
Frequency / account continuation potentials):
*Username:
*Password:
*Alternate Email:
All IT Service utilities will not be altered during this period, This will not affect the
operation of your IT service systems or the manner in which you currently login to
your account. Account access and usage will be disabled if you fail to comply as
required.
Help Desk
Information Technology
© 2011 All rights reserved
11/19/24
Ways to Tell that an Email Message is
Fraudulent
If a wireless network is
unsecured:
Use a firewall
Don't type in credit card
numbers or passwords
Turn off your wireless
network when you're not
using it
Check your Social Network settings