Cyber Info Gathering Techniques

Slides:



Advertisements
Similar presentations
Cyber Time First Grade.
Advertisements

Cyber Time 4th Grade Personal Information You can share your favorite food! You can share your favorite colors! Don’t share your cell phone number! Don’t.
Don’t be bullied, or be a bully.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Internet Online Safety How to have FUN and Stay in Control.
INTERNET SAFETY.
Cyberbullying information for teens. Are you a cyberbully? For the following questions: Give yourself a 0 = no, I have never done this 1 = yes, I have.
e-safety and cyber bullying
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Threats to I.T Internet security By Cameron Mundy.
E safety. Ads It’s always best to not click on ads when you see them, and it’s always a good idea to ignore them, but if there are too many you can always.
Stop the Creepers and Cyberbullies! 5 Easy Ways to keep yourself safer online!
Digital Citizenship By Bhavna. Plagiarism Plagiarism is illegal and can get you arrested. If a teacher finds out you used plagiarism he/she can fail you.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
A Student’s Guide to Proper and Safe Web Behavior
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Agenda Last class: Internet Literacy Lab Today: Internet Safety.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
Advisory Lesson.  The internet can be a fun way to share information and “stay connected” with your friends, but bad things can happen.  The following.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
 Don’t respond when a cyberbully is saying something mean about you online. Just block it.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
MY ONLINE CODE In the last 2 years of digital literacy I have learned the proper ways to act and why to act that way online, I have also learned other.
Have fun on the internet while being safe!!  Do you know what cyber safety means?.. YesNo.
Activity 3 Identifying the Risks. Questions What do you do online? What sort of sites do you visit? Have you ever had a bad experience online?
Jeopardy Danger SafteySecret Info Q $100 Q $200 Q $300 Q $400 Q $500 Q $100 Q $200 Q $300 Q $400 Q $500 Final Jeopardy.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
By Hessahn yousofi.  Internet is a global system of interconnected computer networks, a computer that connects to the internet can access information.
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
Internet Safety Mrs. Lijó. Some Names for the Internet Cyberspace The Web The Net The Information Highway The World Wide Web.
YEAR 6’S GUIDE TO STAYING SAFE ON THE INTERNET. CHATTING When you are chatting to people online, try not to give out any personal information about yourself.
By: Alina. If I’m signing up for a job the people who might hire me have to search on the internet if I’m mature or capable of having a job because if.
Information Guide to Cyber Bullying. Cyber bullying is a relatively new form of bullying which has started happening a lot on social networking sites,
What it is and how to stop it.  What spam is.  Why it can be dangerous.  How to handle it.
1 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt Category.
Cyber Security and Computer Safety
Safety.
Safe Surfin’ on the Internet
Safer Internet Day.
E – SAFETY Being safe online
As modern children, we have a huge number of electronic devices available to us. We might use computers, tablets, mobile phones or games consoles; for.
MEDIA LITERACY Isabelle M.
SafeSurfing Module 2 September 2016.
8 online danger tips By: kailee bariring.
To Know what Cyber crime is
E – SAFETY Being safe online
How To Be Safe On The Internet
How to use the internet safely and How to protect my personal data?
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
Online Safety! By: Michelle Deng.
How to use the internet safely and How to protect my personal data?
6 Internet Safety Tips By: Aaron
A POWERPOINT MADE TO KEEP YOU SAFE ONLINE!
Online Safety.
Avatars.
STOP. THINK. CONNECT. Online Safety Quiz.
Information is at the heart of any University, and Harvard is no exception. We create it, analyze it, share it, and apply it. As you would imagine, we.
Cyber Safety By: Lindsey C..
What you can do to support people to be safe online
Cyber Security and Computer Safety
Safer computing week Create, connect and share respect.
Rules for Being Safe on the Internet for Kids
Phishing Don’t fall for fake
Be safe by: Not going on unsafe sites Not clicking on ads or pop ups
E - safety How e-safe are you?.
2.8.2 Being Online Being smart online
Personal Safety Online
Internet Safety – Social Media
Presentation transcript:

Cyber Info Gathering Techniques

What are we going to talk about? How bad guys collect information from you What happens when they get information How can you avoid becoming a victim

Direct Solicitation HOW: A bad guy just asks you for info WHAT HAPPENS: This info is usually to track you down or use personal information against you Cyber-bullying, blackmail, worse Example: you send a picture, and the bad guy asks for money or for you to do something, or else they post it on your Facebook AVOIDANCE: Don’t give out personal information or any other information that is not related to what you are doing If you are playing a multiplayer game, do you really need to know where each other lives, what your real names are, and where you go to school? If those things are needed for the game, consider not playing the game

Phishing HOW: A bad guy sends you an email with an evil link, and you click on the link WHAT HAPPENS: The links almost always bring you to a web site that has “malware” (evil software) on it You don’t even know the bad software is there – after that first click, your computer is given instructions by the bad guy or malware AVOIDANCE: Don’t open emails from people or organizations you do not know Even if it is a person or organization you know about, ask yourself if you expect the email Email you get without asking to be emailed is “unsolicited” – you are probably not doing things online that should cause you to get legitimate emails without you asking for them

Open Source Collection HOW: A bad guy looks you up on Google or Facebook, collects all your tweets, etc WHAT HAPPENS: The information found on you can be used to find even more, and with enough time, sometimes gain control of your accounts Bad guys do this for many reasons, but they are all designed to get access to your accounts online (email, Facebook, online game, bank, etc) or help the bad guy do direct asking AVOIDANCE: Be careful what you post online VERY hard to remove something completely; as a trusted adult to help you type your name into Google and see what comes up Do not make your password something related to what you post somewhere If you already posted stuff you want to remove, remove it right away – it will reduce the chances of it being found. You can also ask the site that was hosting it if it will delete it completely, and Google will remove a search result if you ask

Fake Websites / Customer Service HOW: A bad guy pretends to be customer service or sets up a web site that looks ok, then asks you for information you would never give a bad guy! WHAT HAPPENS: This information is usually used by the bad guy to pretend he is you If he is going to do something bad or rack up a huge bill somewhere, he wants someone else to take the blame or pay the bill Bad guys can also set up an account to look like you and ask your friends for their information AVOIDANCE: ALWAYS ask a trusted adult when you are putting in personal information to a website or giving it to customer service Even adults are fooled – even EXPERT adults are fooled – but two heads are better than one

Final Tips Bad guys want your information so they can do bad things with it You can enjoy the Internet without giving them this stuff No website, game, or “new online friend” is worth the pain and suffering you will endure if you give out the wrong information You can always ask a trusted adult for help, and you can always simply stop what you are doing and let the computer sit until you figure it out (or get help)

QUESTIONS?