Presentation is loading. Please wait.

Presentation is loading. Please wait.

Cyber Info Gathering Techniques

Similar presentations


Presentation on theme: "Cyber Info Gathering Techniques"— Presentation transcript:

1 Cyber Info Gathering Techniques

2 What are we going to talk about?
How bad guys collect information from you What happens when they get information How can you avoid becoming a victim

3 Direct Solicitation HOW: A bad guy just asks you for info
WHAT HAPPENS: This info is usually to track you down or use personal information against you Cyber-bullying, blackmail, worse Example: you send a picture, and the bad guy asks for money or for you to do something, or else they post it on your Facebook AVOIDANCE: Don’t give out personal information or any other information that is not related to what you are doing If you are playing a multiplayer game, do you really need to know where each other lives, what your real names are, and where you go to school? If those things are needed for the game, consider not playing the game

4 Phishing HOW: A bad guy sends you an with an evil link, and you click on the link WHAT HAPPENS: The links almost always bring you to a web site that has “malware” (evil software) on it You don’t even know the bad software is there – after that first click, your computer is given instructions by the bad guy or malware AVOIDANCE: Don’t open s from people or organizations you do not know Even if it is a person or organization you know about, ask yourself if you expect the you get without asking to be ed is “unsolicited” – you are probably not doing things online that should cause you to get legitimate s without you asking for them

5 Open Source Collection
HOW: A bad guy looks you up on Google or Facebook, collects all your tweets, etc WHAT HAPPENS: The information found on you can be used to find even more, and with enough time, sometimes gain control of your accounts Bad guys do this for many reasons, but they are all designed to get access to your accounts online ( , Facebook, online game, bank, etc) or help the bad guy do direct asking AVOIDANCE: Be careful what you post online VERY hard to remove something completely; as a trusted adult to help you type your name into Google and see what comes up Do not make your password something related to what you post somewhere If you already posted stuff you want to remove, remove it right away – it will reduce the chances of it being found. You can also ask the site that was hosting it if it will delete it completely, and Google will remove a search result if you ask

6 Fake Websites / Customer Service
HOW: A bad guy pretends to be customer service or sets up a web site that looks ok, then asks you for information you would never give a bad guy! WHAT HAPPENS: This information is usually used by the bad guy to pretend he is you If he is going to do something bad or rack up a huge bill somewhere, he wants someone else to take the blame or pay the bill Bad guys can also set up an account to look like you and ask your friends for their information AVOIDANCE: ALWAYS ask a trusted adult when you are putting in personal information to a website or giving it to customer service Even adults are fooled – even EXPERT adults are fooled – but two heads are better than one

7 Final Tips Bad guys want your information so they can do bad things with it You can enjoy the Internet without giving them this stuff No website, game, or “new online friend” is worth the pain and suffering you will endure if you give out the wrong information You can always ask a trusted adult for help, and you can always simply stop what you are doing and let the computer sit until you figure it out (or get help)

8 QUESTIONS?


Download ppt "Cyber Info Gathering Techniques"

Similar presentations


Ads by Google