We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byKane Pouch
Modified over 2 years ago
© C. Kerry Ltd. 2011 - The Internet – It is not as safe as most of us think … Safe(r) Surfing C. Kerry Nemovicher, Ph.D. However … Understanding the Internet and the use of Common Sense Safety Can render the Internet reasonably Safe Common Sense Safety For Internet Usage and Browsing
© C. Kerry Ltd. 2011 What is the Internet? 2
© C. Kerry Ltd. 2011 What is the Internet? 3 The Internet
© C. Kerry Ltd. 2011 The Internet What is the Internet? 4 ISP
© C. Kerry Ltd. 2011 What is the Internet? How eMail works 5 Alice Bob ISP
© C. Kerry Ltd. 2011 What is the Internet? How browsing works 6 Alice Bob ISP
© C. Kerry Ltd. 2011 What are the Dangers The malefactors and what they want 7 Originally, the malefactors were pranksters and mischief makers Now, Internet Crime is Organized Crime … Big Business. Internet Crime Online scams, ID theft, and undelivered goods made up most of the 300,000 complaints [received by the FBIs Internet Crime Complaint Center] in 2010 (http://www.fbi.gov) U.S. Internet crime loss complaints almost doubled in value from $265 million in 2008 to reach $560 million [in 2009], according to official figures. (http://homelandsecuritynewswire.com) The Primary Goals: Extortion Identity Theft Intellectual Property Theft
© C. Kerry Ltd. 2011 What are the Dangers? Where the eMail sharks hide 8 Alice Bob ISP
© C. Kerry Ltd. 2011 What are the Dangers? Where the browser sharks hide 9 Alice Bob ISP
© C. Kerry Ltd. 2011 What are the Dangers? … and … What you need to know 10 With whom are you communicating? Who is listening to the communication? What information do the malefactors want? What will the malefactors do with the information they obtain?
© C. Kerry Ltd. 2011 What are the Dangers? What you need to know about eMail 11 Bogus eMails – with embedded malicious links Bogus eMails – with scam contents Bogus eMails – with embedded or attached malware Legitimate eMails – with anti-social tendencies Legitimate eMails – with confidential information in the content Legitimate eMails – with risky content
© C. Kerry Ltd. 2011 What are the Dangers? Bogus eMails – with malicious links 12 http://22.214.171.124:75/citi.us/check.php For IP Address: 126.96.36.199 www.citibank.com http://188.8.131.52:75/citi.us/check.php
© C. Kerry Ltd. 2011 What are the Dangers? Bogus eMails – with scam contents 13
© C. Kerry Ltd. 2011 What are the Dangers? Bogus eMails – embedded malware 14
© C. Kerry Ltd. 2011 What are the Dangers? Legitimate eMails – anti-social behavior 15 3 21 = 10,460,353,203 2 44 = 17,592,186,044,416 sheets 2 44 /1,000 = 17,592,186,044 inches 17,792,186,044/12 = 1,466,015,503 feet 1,466,015,503/5,280 = 276,544 miles Average distance to the moon = 238,854 miles 3 21 = ?
© C. Kerry Ltd. 2011 What are the Dangers? Legitimate eMails – with confidential data 16
© C. Kerry Ltd. 2011 What are the Dangers? Legitimate eMails – with risky content 17
© C. Kerry Ltd. 2011 What are the Dangers? Legitimate? eMails – with risky content 18
© C. Kerry Ltd. 2011 What are the Dangers? … and … How to protect yourself 19 Bogus eMails – with embedded malicious links Never click on embedded links in an email … retype them into your browser Bogus eMails – with scam contents Be wary of offers too good to be true or those that play on your good nature Bogus eMails – with embedded or attached malware Never open an email with an attached executable file (.exe,.zip et cetera) Legitimate eMails – with anti-social tendencies Do NOT pass along mass mailings (Do NOT become a computer virus) Legitimate eMails – with confidential information in the content Complain to any vendor that does not practice safe computing Legitimate eMails – with risky content When sending and/or forwarding emails, clean out the To & cc lists And NEVER open eMails which do not have a Subject or have an unusual Subject
© C. Kerry Ltd. 2011 What are the Dangers? Definition of terms - Browser 20 A web browser or Internet browser is a software application for retrieving, presenting, and traversing information resources on the World Wide Web (WWW). An information resource is identified by a Uniform Resource Identifier (URI) and may be a webpage, image, video, or other piece of content. (http://en.wikipedia.org/wiki/Web_browser) Important: A browser is software that runs on YOUR computer, and therefore has access to everything on your computer. Yet, it executes instructions received from a remote website.
© C. Kerry Ltd. 2011 What are the Dangers? Definition of terms - Cookies 21 A cookie, also known as a web cookie, browser cookie, and HTTP cookie, is a piece of text stored on a user's computer by their web browser. A cookie can be used for authentication, storing site preferences, shopping cart contents, the identifier for a server-based session, or anything else that can be accomplished through storing text data. (http://en.wikipedia.org/wiki/HTTP_cookie) Important: Cookies can contain private information (e.g., Passwords) that are accessible to Browsers, as well as instructions for Browsers to execute. Important: In a computer, text is stored as a series of binary codes (1s and 0s). Therefore in a computer there is no way to distinguish between text and a set of instructions for the computer to execute.
© C. Kerry Ltd. 2011 What are the Dangers? What you need to know about Websites 23 Bogus sites – that download malware Bogus sites – that mimic legitimate sites Legitimate sites – that intentionally track your browsing behavior Legitimate sites – that intentionally violate your privacy Legitimate sites – that intentionally download spyware Legitimate sites – that have been compromised Sniffers that monitor web traffic for private information
© C. Kerry Ltd. 2011 The Dangers – They Exist But does that mean we must stay away? 25 Alice Bob ISP
© C. Kerry Ltd. 2011 Even if the Dangers exist … It IS possible to swim with the sharks 26
© C. Kerry Ltd. 2011 Even if the Dangers exist … It IS possible to swim with the sharks 27
© C. Kerry Ltd. 2011 It IS possible to swim with the sharks We do, however, need to exercise caution 28
© C. Kerry Ltd. 2011 Safe Surfing Can web surfing be 100% safe? No. … There are definitely dangers and for many of them we have no real counter-measures
© C. Kerry Ltd. 2011 Safe(r) Surfing That IS possible! … IF we take the appropriate precautions. The Internet is like the ocean. Its value and allure cannot be ignored. Our safety lies in its vastness and in our respect for, and understanding of, its dangers.
© C. Kerry Ltd. 2011 Safe(r) Surfing Post Script
© C. Kerry Ltd. 2011 In the news recently … 32
© C. Kerry Ltd. 2011 Safe(r) Surfing Questions?
Review Ch. 3 – Connecting to the Worlds Information © 2010, 2006 South-Western, Cengage Learning.
1 And Tips to Avoid Becoming a Victim Recent Cyber Crime Cases.
Setting up a Gmail Account & Safety
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
1. XP 2 * The Web is a collection of files that reside on computers, called Web servers. * Web servers are connected to each other through the Internet.
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
Cyber Safety Assessment Review Grades Question #1 Hurtful cell phone messages are not considered a cyber bully threat. TRUE FALSE.
Protecting Students on the School Computer Network Enfield High School.
Copyright © 2003 Pearson Education, Inc. Slide 7-1 The Web Wizards Guide to PHP by David Lash.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
25 seconds left….. 24 seconds left….. 23 seconds left…..
Introduction to HTML, XHTML, and CSS
® Microsoft Office 2010 Browser and Basics.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
How It Applies In A Virtual World. Introduction Got cookies? Internet explorer What is internet Privacy? How secure your computer, files, and information.
Macromedia Dreamweaver MX 2004 – Design Professional Dreamweaver GETTING STARTED WITH.
Web Programming 1 Darby Chang Web Programming. Cookie 2 Web Programming.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
The Internet and the World Wide Web. Una DooneySlide 2Internet and WWW What is the Internet? This is the physical infrastructure or backbone of computers,
How Does the Internet Work? A Basic Introduction to the Worlds Biggest Computer Network.
ABC Technology Project Mrs. Kiddle. ABCs of Technology Word 1 Word 2 Word 3 Word 4 Word 5 Word 6 Word 7 Word 8 Word 9 Word 19 Word 20 Word 21 Word 22.
By: Jasmin Smith ability to control what information one reveals about one’s self over the Internet.
Staying Safe Online Keep your Information Secure.
1 Wiki Tutorial. 2 Outline of Wiki Tutorial 1) Welcome and Introductions 2) What is a wiki, and why is it useful for our work in moving forward the program.
1 SANS Technology Institute - Candidate for Master of Science Degree 1 Assessing Privacy Risks of Flash Cookies Kevin Fuller and Stacy Jordan February.
© 2012 National Heart Foundation of Australia. Slide 2.
1 The phone in the cloud Utilizing resources hosted anywhere Claes Nilsson.
© 2010 Cisco and/or its affiliates. All rights reserved.Presentation_IDCisco Confidential CISCO LEARNING CREDITS MANAGEMENT TOOL CLP ADMINISTRATOR – USER.
1 NCDesk % of the test will be Telecommunication/Internet Questions.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Staying Safe Online Stephan Freeman. Increasing numbers of people on social networking sites More and more people leading their lives online Varying degrees.
Services Course Windows Live SkyDrive Participant Guide.
A lesson approach © 2011 The McGraw-Hill Companies, Inc. All rights reserved. a lesson approach Microsoft® PowerPoint 2010 © 2011 The McGraw-Hill Companies,
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Digital Literacy Tour Google/iKeepSafe/YouTube Presenter Introduction Davina Pruitt-Mentle, Ph.D. Ed Tech Policy, Research and Outreach.
How to create a wiki using pbwiki. Step 1: Choose a wiki website I have chosen.
© Paradigm Publishing, Inc Excel 2013 Level 2 Unit 2Managing and Integrating Data and the Excel Environment Chapter 6Protecting and Sharing Workbooks.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
June 2008 Surf Safely with a Clean Computer Roger Thornburn.
Internet safety By Lydia Snowden. Intro internet safety Staying safe on the internet. It involves protecting Your computer: Viruses Spyware Phishing Spam.
1 Advanced with GMail A CYC Electives Module
Nick Feamster CS 6262 Spring 2009
The Internet and the Web
CSWA Provider: Program and Tech Review
Computer Security Keeping you and your computer safe in the digital world.
In The Name Of Allah, The Most Beneficent, The Most Merciful 1 1 Copyright 2010 © Punjab Education Foundation. All rights reserved.
© 2017 SlidePlayer.com Inc. All rights reserved.