Download presentation
Presentation is loading. Please wait.
Published byTaya Oakley Modified over 9 years ago
1
Cybercrime
2
Revision-Internet addiction a community a secondary school time-consuming a trap psychologists virtual online games chat rooms addiction addicted to recognize a cure a relationship to fail
3
społeczność Szkoła średnia pożerający czas pułapka psycholodzy wirtualny gry w Internecie chat uzależnienie być uzależnionym rozpoznawać lekarstwo związek nie zdać egzaminu
4
Fill in with collocations: t…………….on\off the TV\computer f…………..angry ……………money …………..a lot of noise r…………..somebody ……………enemies
5
Who is a hacker?
6
Have you got an anti-virus software?
7
What is a firewall?
8
What is phishing?
9
Phishing is similar to fishing in a lake, but instead of trying to capture fish, phishers attempt to steal your personal information. They send out e-mails that appear to come from legitimate websites such as eBay, PayPal, or other banking institutions. The e-mails state that your information needs to be updated or validated and ask that you enter your username and password, after clicking a link included in the e-mail. Some e-mails will ask that you enter even more information, such as your full name, address, phone number, social security number, and credit card number. However, even if you visit the false website and just enter your username and password, the phisher may be able to gain access to more information by just logging in to you account.
10
Do you get a lot of spam?
11
What do you use your passwords for?How many have you got?
12
Answer the questions Have you ever had problems with a virus? Have you ever answered a spam e-mail? What happened? Do you receive a lot of spam?What do you do with it? What do you think are the most serious cybercrimes?
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.