Computer Hope
Computer Hope: Free Computer Help for Everyone
ComputerHope.com offers an archive of free computer-related information, including tutorials, troubleshooting tips, hints and more. Select "Hardware Listing" and "Software Listing" to choose from the extensive directory, or perform a...
Khan Academy
Khan Academy: Computer Malware
Learn abou9t the types of malware and how to protect computers from malware.
Khan Academy
Khan Academy: Computer Malware
Learn about malware, how it is installed on a computer, and what type of damage it can do.
Other
Anti Virus Research Center
Symantec offers a chart of security threats and clear explanations of various types of security threats. Keeps a current list of viruses.
Other
Symantec Corporation: Symantec Security Center
An information resource on threats to computer security, how to identify and report viruses, up-to-date articles on computer system vulnerabilities, etc.
Department of Defense
Do Dea: Spreadsheet Software Applications: M1: L1: Computer Essentials
In Module 1 Lesson 1 of this course, students are introduced to the basic functions of computer system components, to some technical vocabulary, and they will learn about computer security, privacy, and crimes. They will also learn how...
Other
Ryerson University: Safety Online: Understanding Online Risks [Pdf]
This resource offers information on safety awareness, to empower students with the skills they need to understand the risks to both themselves and their devices when online - so they don't fall victim to scams or identity theft, or find...
Get Safe Online
Get Safe Online: Use a Firewall
Firewall software forms the first line of defense against hackers and certain types of computer viruses. This site explains what a firewall can do to help secure a computer and what it cannot do. The site also discusses different types...
Other
Process Library
An in-depth informational site to learn the internal processes running on a Windows computer. The source will help you understand and correct the invisible problems of computers such as viruses, hackers compromising the system, and slow...
Other
V Myths
Resource cracks the myths, hoaxes, and urban legends related to computer viruses. Also provides information on how to tell the difference between a hoax and a real virus and ways to reduce the number of false-alarms received.
TED Talks
Ted: Ted Ed: Defining Cyberwarfare in Hopes of Preventing It
Can you imagine a future where wars are fought not with bombs and bullets but computer viruses and pacemaker shutdowns? Cyberware is unique in that it is not covered by existing legal framework and it often inspires more questions than...
Mocomi & Anibrain Digital Technologies
Mocomi: Hacking and Viruses: Facts
Learn all about hacking. Find out about spam, viruses, how to protect your computer, and how to tell if your computer has been hacked.
Other
Tennessee Department of Education
Whether you're a student looking for "Ancient Cultures in the Andes," a teacher looking for grant information, or a parent and teacher looking for the latest information on computer viruses, Tennessee helps you locate what you need. This...
Other
Net Smartz Kids
This interactive resource for children teaches all about using the Internet safely. Children will enjoy the colorful games and activities while learning about topics such as protecting personal information, passwords, computer viruses,...
University of Arizona
The Biology Project: Immunology: Hiv Simulation: Simulating the Spread of Hiv
This web-based simulation demonstrates potential spread of HIV through a population. Each participant exchanges virtual body fluids with other participants, some of whom are HIV positive. A computer-simulated ELISA will illustrate the...
Khan Academy
Khan Academy: User Authentication Methods
Some practice problems on user authentication methods regarding computer security.
Learn My Way
Learn My Way: Keeping Your Device Safe
In this course, you will learn how to protect your device and the information on it. You will learn how to keep your devices safe from possible threats, and how to use screen locks. You will also learn how to save a backup of the...
PBS
Pbs Teachers:cyber War
Examine the extent to which the critical infrastructure of the U.S., including electrical power, finance, telecommunications, health care, transportation, water, defense and the Internet, is vulnerable to cyber attack.
Goodwill
Gcf Global: Internet Safety : How to Avoid Malware
Malware is one of the most common hazards to your computer when you're online, but it's easy to avoid. Developing safe and smart browsing habits can protect you from malware and other threats, like viruses. Securing your computer and...
Other
Internet Scam Busters
This website provides up-to-date info on the current scams on the Internet. It also gives tips for avoiding scams and what to do if you have been scammed.
Get Safe Online
Get Safe Online: Safe Internet Use
No matter what software a person uses to browse the internet, there are security risks involved. This article describes some of the security risks and how to browse the internet safely.
Get Safe Online
Get Safe Online: What Are the Risks?
There are many ways for online criminals to take advantage of internet users. They may invade your privacy, steal your identity, rob you of your wealth, and infect your computer. This site provides links to information that can be used...
Khan Academy
Khan Academy: Unit: Online Data Security
Readings and practice problems about online data security.