Presentation is loading. Please wait.

Presentation is loading. Please wait.

One of the NAE Grand Challenges. What is the internet? What do you use the internet for?  Email  Shopping  Banking.

Similar presentations


Presentation on theme: "One of the NAE Grand Challenges. What is the internet? What do you use the internet for?  Email  Shopping  Banking."— Presentation transcript:

1 One of the NAE Grand Challenges

2 What is the internet? What do you use the internet for?  Email  Shopping  Banking

3  Spam – “the use of electronic messaging systems to send unsolicited bulk messages, especially advertising, indiscriminately”  Phishing – “the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication”  Malware – “malicious software designed to harm a computer or network”

4  Some examples of spam

5 UNITED STATE OF AMERICA DEPARTMENT. (SWIFT ATM DEBIT CARD DISTRIBUTION DEPARTMENT) Our Ref: DBN/IRS/CBX/011/011 (SWIFT DEBIT CARD CONSULTANT CE.) IMMEDIATE ATM DEBIT CARD PAYMENT FROM THE DESK OF VICE PRESIDENT Joseph Biden. Attention: Our Esteemed Funds Beneficiary, This is to bring to your notice that the payment of your long overdue fund which originated from United Kingdom { U.K / Africa Countries}such as contract/Inheritance/Lotto Winning fund Payment which has been on hold for many years now,despite all our efforts that failed somehow due to the activities of some corrupt governmental and bank officials handling your transaction.Please Kindly bear with us and accept the part payment compensation of US$3.5M which has been approved to your name until we finalize the modalities on when your full inheritance funds will be paid to you in full that shall be made known to you shortly. Note: Your $3.5M part payment were been loaded into an ATM VISA Debit Card,and has been registered with FedEx courier Express Delivery Services Ltd for immediate delivery to your doorstep. Please contact FeDex Courier Express Delivery Services comapny at the receipt of this notice with your personal information below where you want them to delivery your ATMcard to you. but the maximum you can withdraw in a day is USD$10,000.00 Only. We have mandated MR DANIEL.R. to send you the ATM CARD and PIN NUMBER. You are therefore advice to contact the Head of ATM VISA CARD Department, Contact the Head of Operations FedEx Courier Express Mr..R.DANIEL with the following information stated below for the immediate delivery of your approved Atm Visa Debit Card to your designated address.You will only pay FEDEX Courier Delivery Company $120 only being the Stamp Duty Fee as we have already paid on your behalf the cost of delivery.Do ask Mr.R DANIEL to direct you on how you will send the Stam Duty Fee to them... ========================================================================================================== FULL NAMES:----OCCUPATION:----TELEPHONE:----POSTAL ADDRESS:---------COUNTRY:-------SEX (M/F):----- Do let this office know immediately you receive your ATM CARD from Fenway Courier Express Courier Delivery for our record. With best regards VICE PRESIDENT Joseph Biden.

6  Never reveal personal information online (usernames, passwords, SSNs, credit card numbers, etc.)  No legitimate company will ask you for this information by email  Basically, be smart and cautious  Zachary Harris Story

7  Virus – a computer program that can copy itself and infect a computer  Worm – a self-replicating malware computer program, which uses a computer network to send copies of itself to other computers on the network.  Spyware – a malware that collects small pieces of information about users without their knowledge  Adware – any software package which automatically plays, displays, or downloads advertisements to a computer  Trojan Horse – a destructive program that masquerades as an application. The software initially appears to perform a desirable function for the user prior to installation, but steals information or harms the system http://www.google.com/goodtoknow/online-safety/malware/

8

9  Use a unique password for every account  Make the password long  Include numbers and symbols in the password  Tip for creating a password: use a phrase that you can remember  Store your passwords somewhere safe: (I use KeePass - http://keepass.info/)http://keepass.info/

10  Make sure your OS is up-to-date  Make sure all programs are up-to-date (especially web browsers)  Use an up-to-date anti-virus program  I use Secunia PSI to make sure my programs are up-to-date - http://secunia.com/vulnerability_scanning/pe rsonal/ http://secunia.com/vulnerability_scanning/pe rsonal/

11  Make sure your home wifi network uses a password  Be careful about using free, unencrypted wifi because anyone can see what is being sent  If you must login to a website over unencrypted wifi, make sure the website is secure (https://)

12  Some ads and websites are scams  If a deal is too good to be true, it’s probably too good to be true  If you are unsure about a websites trustworthiness, research it  Advice: Don’t use MyCleanPC or QuiBids

13  His Gmail, Amazon, Apple, and Twitter were all hacked  Ultimately he lost a lot of his data on his MacBook  How did this happen? http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/all/

14 1. Found his gmail address on his webpage 2. Using google account recovery he discovered that he had an AppleID (mn@me.com) 3. To hack the AppleID all that was needed was an address and credit card number 1. Address was found using simple internet search 2. Credit card number was found from Amazon 4. With that information his AppleID account was taken and all his Apple devices wiped http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/all/

15  Creates its own malware  Remotely activate microphones and record everything it hears  Keylogging software  Screengrab surveillance  Installed through phishing attacks

16

17

18  http://en.wikipedia.org/wiki/Spam_(electronic) http://en.wikipedia.org/wiki/Spam_(electronic)  http://en.wikipedia.org/wiki/Phishing http://en.wikipedia.org/wiki/Phishing  http://www.google.com/goodtoknow/online-safety/ http://www.google.com/goodtoknow/online-safety/  http://www.dailytech.com/Report+FBI+Turning+to+Cybercriminal+Tactics+to+Sp y+on+Suspects/article33098.htm http://www.dailytech.com/Report+FBI+Turning+to+Cybercriminal+Tactics+to+Sp y+on+Suspects/article33098.htm


Download ppt "One of the NAE Grand Challenges. What is the internet? What do you use the internet for?  Email  Shopping  Banking."

Similar presentations


Ads by Google