online safety workshop stephanie rojas, img krystle donnelly, img cyndi backstrom, unlv oit
TRANSCRIPT
![Page 1: Online Safety Workshop Stephanie Rojas, IMG Krystle Donnelly, IMG Cyndi Backstrom, UNLV OIT](https://reader038.vdocuments.us/reader038/viewer/2022103005/56649ddf5503460f94ad8086/html5/thumbnails/1.jpg)
Online Safety Workshop
Stephanie Rojas, IMGKrystle Donnelly, IMGCyndi Backstrom, UNLV OIT
![Page 2: Online Safety Workshop Stephanie Rojas, IMG Krystle Donnelly, IMG Cyndi Backstrom, UNLV OIT](https://reader038.vdocuments.us/reader038/viewer/2022103005/56649ddf5503460f94ad8086/html5/thumbnails/2.jpg)
Purpose
To review programs and software that may put you and your computer at risk.
Ways to protect your information.
![Page 3: Online Safety Workshop Stephanie Rojas, IMG Krystle Donnelly, IMG Cyndi Backstrom, UNLV OIT](https://reader038.vdocuments.us/reader038/viewer/2022103005/56649ddf5503460f94ad8086/html5/thumbnails/3.jpg)
Malware or Badware
In legal terms, known as a “computer contaminant”.
Refers to software intended to gain access to or damage a computer system without the owner's informed consent.
Comes in many types of aggressive, invasive, or annoying software or program code
![Page 4: Online Safety Workshop Stephanie Rojas, IMG Krystle Donnelly, IMG Cyndi Backstrom, UNLV OIT](https://reader038.vdocuments.us/reader038/viewer/2022103005/56649ddf5503460f94ad8086/html5/thumbnails/4.jpg)
Terms to Know:
Infectious Malware Virus Worms
Greyware Adware Spyware
Phishing
![Page 5: Online Safety Workshop Stephanie Rojas, IMG Krystle Donnelly, IMG Cyndi Backstrom, UNLV OIT](https://reader038.vdocuments.us/reader038/viewer/2022103005/56649ddf5503460f94ad8086/html5/thumbnails/5.jpg)
Infectious Malware
Virus- Attaches itself to a program in the computer Runs when the program opens Damages/Changes files
Worm- Takes advantage of unprotected areas in
operating systems Makes copies of itself and can spread to other
computers on the same network Very commonly written for Windows
![Page 6: Online Safety Workshop Stephanie Rojas, IMG Krystle Donnelly, IMG Cyndi Backstrom, UNLV OIT](https://reader038.vdocuments.us/reader038/viewer/2022103005/56649ddf5503460f94ad8086/html5/thumbnails/6.jpg)
Greyware
Adware Files that are packaged with other
programs that automatically advertise materials
Spyware Software that takes some control of
your computer in order to redirect you somewhere, advertise, or obtain personal information
![Page 7: Online Safety Workshop Stephanie Rojas, IMG Krystle Donnelly, IMG Cyndi Backstrom, UNLV OIT](https://reader038.vdocuments.us/reader038/viewer/2022103005/56649ddf5503460f94ad8086/html5/thumbnails/7.jpg)
Adware Example
![Page 8: Online Safety Workshop Stephanie Rojas, IMG Krystle Donnelly, IMG Cyndi Backstrom, UNLV OIT](https://reader038.vdocuments.us/reader038/viewer/2022103005/56649ddf5503460f94ad8086/html5/thumbnails/8.jpg)
![Page 9: Online Safety Workshop Stephanie Rojas, IMG Krystle Donnelly, IMG Cyndi Backstrom, UNLV OIT](https://reader038.vdocuments.us/reader038/viewer/2022103005/56649ddf5503460f94ad8086/html5/thumbnails/9.jpg)
Phishing
Items such as emails and IMs that try to persuade you to give them personal information: passwords, social security numbers, usernames, etc.
Unlimited ways of what they can try to do in order to get your information
![Page 10: Online Safety Workshop Stephanie Rojas, IMG Krystle Donnelly, IMG Cyndi Backstrom, UNLV OIT](https://reader038.vdocuments.us/reader038/viewer/2022103005/56649ddf5503460f94ad8086/html5/thumbnails/10.jpg)
![Page 11: Online Safety Workshop Stephanie Rojas, IMG Krystle Donnelly, IMG Cyndi Backstrom, UNLV OIT](https://reader038.vdocuments.us/reader038/viewer/2022103005/56649ddf5503460f94ad8086/html5/thumbnails/11.jpg)
![Page 12: Online Safety Workshop Stephanie Rojas, IMG Krystle Donnelly, IMG Cyndi Backstrom, UNLV OIT](https://reader038.vdocuments.us/reader038/viewer/2022103005/56649ddf5503460f94ad8086/html5/thumbnails/12.jpg)
Not to do:
Do not click on links from emails. Type them in on the address bar.
Do not download files when you are unsure of whom they are from.
Do not give your password to anyone in an email. Companies do not ask for passwords
via email.
![Page 13: Online Safety Workshop Stephanie Rojas, IMG Krystle Donnelly, IMG Cyndi Backstrom, UNLV OIT](https://reader038.vdocuments.us/reader038/viewer/2022103005/56649ddf5503460f94ad8086/html5/thumbnails/13.jpg)
Ways to Protect
Close pop-ups. Be choosy of the websites you visit. Carefully choose what information
you post online about yourself. Be careful of which websites you
choose to shop online from. Choose passwords that aren’t easily
guessable.
![Page 14: Online Safety Workshop Stephanie Rojas, IMG Krystle Donnelly, IMG Cyndi Backstrom, UNLV OIT](https://reader038.vdocuments.us/reader038/viewer/2022103005/56649ddf5503460f94ad8086/html5/thumbnails/14.jpg)
How to Get Anti-virus Software
Symantec Anti-virus software is FREE for students. Download it from: http://oit.unlv.edu/software/symantec-antivirus
![Page 15: Online Safety Workshop Stephanie Rojas, IMG Krystle Donnelly, IMG Cyndi Backstrom, UNLV OIT](https://reader038.vdocuments.us/reader038/viewer/2022103005/56649ddf5503460f94ad8086/html5/thumbnails/15.jpg)
Constantly Update Antivirus!
New viruses and malware are constantly being developed.
Download updated anti-virus definitions at least once a week, and ideally every day.
Protect your information!!
![Page 16: Online Safety Workshop Stephanie Rojas, IMG Krystle Donnelly, IMG Cyndi Backstrom, UNLV OIT](https://reader038.vdocuments.us/reader038/viewer/2022103005/56649ddf5503460f94ad8086/html5/thumbnails/16.jpg)
What to Do if You Get a Viruso Download the newest anti-virus
definitions from the Symantec website, and run a full virus scan. Usually, Symantec will be able to quarantine the infected files.
o If the virus is on one of our lab computers, tell the lab manager.
o If the virus is on your personal computer and you have difficulty removing it, ask for help from OIT.