Presentation is loading. Please wait.

Presentation is loading. Please wait.

Are you safe? Alyssa Caputo & Niki Labella Itech 1101 Dr. Nagel.

Similar presentations


Presentation on theme: "Are you safe? Alyssa Caputo & Niki Labella Itech 1101 Dr. Nagel."— Presentation transcript:

1 Are you safe? Alyssa Caputo & Niki Labella Itech 1101 Dr. Nagel

2 Internet Security

3 State of the Art Technology A barrier to keep destructive forces away from your property. physical firewall Protects computers from Spam, viruses, or bugs. Customizable to fit the needs of the user. Identifies and eliminates harmful software Phishing, worms, viruses… Scans files located on PC Popular programs include Norton and McAfee Anti Virus ProgramsFirewalls

4 History of Cyber Crime  Hacking has been around since 1970's  1980: Hacking groups emerged  1986: Computer Fraud and Abuse Act  1988: Robert Morris  1994: Hacking websites emerged  2000: "Denial of Service" aka DoS

5 Basic Terms Hired to break into computers and steal data Corperate Spy Break into employers’ computers Revenge or financial gain Unethical Employee Uses Internet to damage computers for political reasons Air traffic controls Emails used for extortion Cyber Terrorist/ Extortionist Access a computer/network illegally Hacker A hacker that has intentions of destroying or stealing Advanced computer skills just as a hacker has Cracker A cracker with limited computer skills Teenagers with hacking programs Script Kiddie

6 Advantages Disadvantages Protects Against: Spyware Internet Security Many would say: None

7 Issues dealing with Internet Security Child abuse/abduction: Children are an easy target for online predators and sex offenders [Myspace, Facebook, Instant Messaging or Chat Rooms] State authorities now pose as children Fraud: Identity theft : Credit Cards or Driver’s Licenses stolen ○ Social Security numbers, loans… Internet fraud: Using email to ask for money to help transport items ATM fraud: Intertwine the magnetic strip on a user's card and the PIN number. ○ In '99, there were 251 reported cases in the US. ○ Fake ATMs. File sharing and piracy: ○ Napster (mp3) File Sharing (LimeWire)

8 Top 5 Ways to Keep Safe Online 1) Don't leave the telecommunications cable connected to your home computer when the internet is not in use. 2) Protect, watch, and supervise children. 3) Never open an attachment from an unfamiliar sender scan suspicious attachments with a trusted virus scanner before opening. 4) Use firewalls, anti-virus, and spyware detection software on a regular basis updates 5) Protect your personal information and identity. (from Internet Safety Family Guide [ISBN 1411666631 &1411666690] by Victoria Roddel)ISBN 1411666631

9 Resources  Cashman, Thomas J., Gary B. Shelly, and Misty E. Vermaat. Discovering Computers: Fundamentals Fourth Edition.Boston: Thomson Course Technology, 2008.  Cybercrime: protect your computer. Roddel, Victoria. 8 February 2006. Computer Crime Research Center. 16 April 2008..http://www.crime-research.org/news/08.02.2006/cybercrime-protect-your- computer/  Cybercrime: Piercing the darkness. October 2004. Cybercrime. 18 April 2008..http://library.thinkquest.org/04oct/00460/hackingHistory.html  "cybercrime." Encyclopædia Britannica. 2008. Encyclopædia Britannica Online. 22 Apr. 2008.http://www.britannica.com/eb/article-235700  YouTube: What role does the Internet play in crime?. 10 May 2007. YouTube. 23 April 2008..http://youtube.com/watch?v=xdDMfpcAjtM  30 Ways to Stay Safe Online. 23 September 1998. Microsoft Corporation. 23 April 2008..http://www.chaminade.org/MIS/WebSafety/30ways.htm  Cybercrime: A Revolution in Terrorism and Criminal Behavior Creates Change in the Criminal Just. 21 July 2006. Associated Content, Inc. 23 April 2008..http://www.associatedcontent.com/article/44605/cybercrime_a_revolution_in_terrorism.html  Common Fraud Types. October 2004. Risk Management. 23 April 2008. http://www.tecbrand.com/eyrisk/newsletter1004/fraud_warning.htm


Download ppt "Are you safe? Alyssa Caputo & Niki Labella Itech 1101 Dr. Nagel."

Similar presentations


Ads by Google