We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byKane Pouch
Modified over 2 years ago
© C. Kerry Ltd The Internet – It is not as safe as most of us think … Safe(r) Surfing C. Kerry Nemovicher, Ph.D. However … Understanding the Internet and the use of Common Sense Safety Can render the Internet reasonably Safe Common Sense Safety For Internet Usage and Browsing
© C. Kerry Ltd What is the Internet? 2
© C. Kerry Ltd What is the Internet? 3 The Internet
© C. Kerry Ltd The Internet What is the Internet? 4 ISP
© C. Kerry Ltd What is the Internet? How works 5 Alice Bob ISP
© C. Kerry Ltd What is the Internet? How browsing works 6 Alice Bob ISP
© C. Kerry Ltd What are the Dangers The malefactors and what they want 7 Originally, the malefactors were pranksters and mischief makers Now, Internet Crime is Organized Crime … Big Business. Internet Crime Online scams, ID theft, and undelivered goods made up most of the 300,000 complaints [received by the FBIs Internet Crime Complaint Center] in 2010 (http://www.fbi.gov) U.S. Internet crime loss complaints almost doubled in value from $265 million in 2008 to reach $560 million [in 2009], according to official figures. (http://homelandsecuritynewswire.com) The Primary Goals: Extortion Identity Theft Intellectual Property Theft
© C. Kerry Ltd What are the Dangers? Where the sharks hide 8 Alice Bob ISP
© C. Kerry Ltd What are the Dangers? Where the browser sharks hide 9 Alice Bob ISP
© C. Kerry Ltd What are the Dangers? … and … What you need to know 10 With whom are you communicating? Who is listening to the communication? What information do the malefactors want? What will the malefactors do with the information they obtain?
© C. Kerry Ltd What are the Dangers? What you need to know about 11 Bogus s – with embedded malicious links Bogus s – with scam contents Bogus s – with embedded or attached malware Legitimate s – with anti-social tendencies Legitimate s – with confidential information in the content Legitimate s – with risky content
© C. Kerry Ltd What are the Dangers? Bogus s – with malicious links 12 For IP Address:
© C. Kerry Ltd What are the Dangers? Bogus s – with scam contents 13
© C. Kerry Ltd What are the Dangers? Bogus s – embedded malware 14
© C. Kerry Ltd What are the Dangers? Legitimate s – anti-social behavior = 10,460,353, = 17,592,186,044,416 sheets 2 44 /1,000 = 17,592,186,044 inches 17,792,186,044/12 = 1,466,015,503 feet 1,466,015,503/5,280 = 276,544 miles Average distance to the moon = 238,854 miles 3 21 = ?
© C. Kerry Ltd What are the Dangers? Legitimate s – with confidential data 16
© C. Kerry Ltd What are the Dangers? Legitimate s – with risky content 17
© C. Kerry Ltd What are the Dangers? Legitimate? s – with risky content 18
© C. Kerry Ltd What are the Dangers? … and … How to protect yourself 19 Bogus s – with embedded malicious links Never click on embedded links in an … retype them into your browser Bogus s – with scam contents Be wary of offers too good to be true or those that play on your good nature Bogus s – with embedded or attached malware Never open an with an attached executable file (.exe,.zip et cetera) Legitimate s – with anti-social tendencies Do NOT pass along mass mailings (Do NOT become a computer virus) Legitimate s – with confidential information in the content Complain to any vendor that does not practice safe computing Legitimate s – with risky content When sending and/or forwarding s, clean out the To & cc lists And NEVER open s which do not have a Subject or have an unusual Subject
© C. Kerry Ltd What are the Dangers? Definition of terms - Browser 20 A web browser or Internet browser is a software application for retrieving, presenting, and traversing information resources on the World Wide Web (WWW). An information resource is identified by a Uniform Resource Identifier (URI) and may be a webpage, image, video, or other piece of content. (http://en.wikipedia.org/wiki/Web_browser) Important: A browser is software that runs on YOUR computer, and therefore has access to everything on your computer. Yet, it executes instructions received from a remote website.
© C. Kerry Ltd What are the Dangers? Definition of terms - Cookies 21 A cookie, also known as a web cookie, browser cookie, and HTTP cookie, is a piece of text stored on a user's computer by their web browser. A cookie can be used for authentication, storing site preferences, shopping cart contents, the identifier for a server-based session, or anything else that can be accomplished through storing text data. (http://en.wikipedia.org/wiki/HTTP_cookie) Important: Cookies can contain private information (e.g., Passwords) that are accessible to Browsers, as well as instructions for Browsers to execute. Important: In a computer, text is stored as a series of binary codes (1s and 0s). Therefore in a computer there is no way to distinguish between text and a set of instructions for the computer to execute.
© C. Kerry Ltd What are the Dangers? What you need to know about Websites 23 Bogus sites – that download malware Bogus sites – that mimic legitimate sites Legitimate sites – that intentionally track your browsing behavior Legitimate sites – that intentionally violate your privacy Legitimate sites – that intentionally download spyware Legitimate sites – that have been compromised Sniffers that monitor web traffic for private information
© C. Kerry Ltd The Dangers – They Exist But does that mean we must stay away? 25 Alice Bob ISP
© C. Kerry Ltd Even if the Dangers exist … It IS possible to swim with the sharks 26
© C. Kerry Ltd Even if the Dangers exist … It IS possible to swim with the sharks 27
© C. Kerry Ltd It IS possible to swim with the sharks We do, however, need to exercise caution 28
© C. Kerry Ltd Safe Surfing Can web surfing be 100% safe? No. … There are definitely dangers and for many of them we have no real counter-measures
© C. Kerry Ltd Safe(r) Surfing That IS possible! … IF we take the appropriate precautions. The Internet is like the ocean. Its value and allure cannot be ignored. Our safety lies in its vastness and in our respect for, and understanding of, its dangers.
© C. Kerry Ltd Safe(r) Surfing Post Script
© C. Kerry Ltd In the news recently … 32
© C. Kerry Ltd Safe(r) Surfing Questions?
Parenting the Online Child. Your Child Is on the Internet The Internet is a wonderful research tool. Reliance on the Internet in schools has grown rapidly.
New Mexico Broadband Program Introduction to the Internet Module 1 Understanding the Internet Key Features of Websites Navigating within a website.
+ Internet Safety – Overview and Discussion. + The Internet is a Great Tool The Internet is a great tool and can make your life easier and more fun: It.
1 Information Security Awareness Training: Good Computing Practices for Confidential Electronic Information Information Security Training for all Workforce.
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Phishing, Bot Herding, and Other Emerging Cyber Terms.
WRAP and the Internet Presented by Anne Frank Anne Northeast WRAP Conference Amherst, MA 21 July 2005.
1 Wiki Tutorial. 2 Outline of Wiki Tutorial 1) Welcome and Introductions 2) What is a wiki, and why is it useful for our work in moving forward the program.
What Companies Need to Know about P3P Lorrie Faith Cranor P3P Specification Working Group Chair AT&T Labs-Research July 2002
Personal Information Security and Malware Awareness Workshop Bard College at Simons Rock Information Technology Services (ITS) Summer 2012 (Please sign.
1 NCDesk % of the test will be Telecommunication/Internet Questions.
CYBER SECURITY TRAINING Virginia Marine Resources Commission MIS Dept. October 2012.
Android 11: Google Play for Education Kirk Scott 1.
ING Fraud Collection GPCE Credit Union has arranged a collection of scams, outlining the most prevalent financial scams. We want our members to be aware,
Securing Your Computer 1,2,3 The Basics Just the facts…….. In 2003, Symantec documented 2,636 new computer vulnerabilities, an average of seven per.
University Services. Agenda Technology Support Data Privacy and Security Software and Hardware Discounts for U of M Staff.
SECURITY AWARENESS. The Importance of Security Awareness Training Security Awareness Training provides the knowledge to protect information systems and.
Setting up a Gmail Account & Safety Patrick Therrien Technology & Education Training Specialist.
1 Introduction to ASP.NET. 2 Static and Dynamic Web Applications HTML is used to create static content Browser software interprets HTML tags and formats.
1 And Tips to Avoid Becoming a Victim Recent Cyber Crime Cases.
CYBER SECURITY-PHISHING: DON’T BECOME A VICTIM OF FRAUD.
1 Computer Networks: A Systems Approach, 5e Larry L. Peterson and Bruce S. Davie Chapter 9 Applications Copyright © 2010, Elsevier Inc. All rights Reserved.
The Role of Information Security in Everyday Business.
Copyright © 2003 Pearson Education, Inc. Slide 11-1.
1 Kaspersky CCleaner VerbAce WinRar. 2 About VerbAce 2008 Freeware VerbAce 2008 freeware is a translation software with a Arabic-English-Arabic dictionary.
The Internet and the Web. Is the Internet and the Web the same thing? Computers, networks, routers, modems, etc., make up one large network called the.
Mount Auburn Hospital Information Security Awareness Training How to protect electronic information at work and at home.
1 Copyright © 2002 Pearson Education, Inc.. 2 Chapter 8 Managing End-User Sessions.
Lifelong Learning Service Monday 30 th or Tuesday 31 st March :30pm Safe use of the Internet.
Desktop Self-Defense Instructor: Eileen OShea An Infopeople Workshop Fall/Winter 2005.
© 2016 SlidePlayer.com Inc. All rights reserved.