Digital Security Identity theft Copyright Laws Plagiarism, and More.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Security, Privacy, and Ethics Online Computer Crimes.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
How It Applies In A Virtual World
Threats to I.T Internet security By Cameron Mundy.
Issues Raised by ICT.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
IT Security for Users By Matthew Moody.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Topic 5: Basic Security.
Computer Skills and Applications Computer Security.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Any criminal action perpetrated primarily through the use of a computer.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Chapter 15 Digital Citizenship Section 15.1 Communicating in a Digital Society.
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
INTERNET SAFETY FOR EVERYONE
Viruses & Destructive Programs
An Introduction to Phishing and Viruses
Done by… Hanoof Al-Khaldi Information Assurance
Learn how to protect yourself against common attacks
3.6 Fundamentals of cyber security
IT Security  .
Internet Identity, Safety, & Security
Unit 4 IT Security.
Lesson 3 Safe Computing.
Information Security 101 Richard Davis, Rob Laltrello.
Unit 4 IT Security.
Protect Your Computer Against Harmful Attacks!
Lesson 2- Protecting Yourself Online
Computer Technology Notes 5
Scams, Identity Theft, and Viruses Kelly & Caitlin
Internet Safety for Everyone
BCT 2.00 Analyze Technology Issues
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Staying safe on the internet
Stay Safe While Using The Internet
HOW DO I KEEP MY COMPUTER SAFE?
Internet Safety for Everyone
Computer Security.
Internet Safety and The Digital Divide
Internet Safety for Everyone
Internet Safety for Everyone
Lesson 2- Protecting Yourself Online
Security in mobile technologies
Internet Safety for Everyone
Internet Safety for Everyone
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Digital Security Identity theft Copyright Laws Plagiarism, and More

Internet protocol address Your personal information cannot be easily discovered, an IP address can reveal your approximate geographic location. Any e-mails you send from your computer or mobile devices have an IP address attached to them. Use caution when doing so. Aka an IP address, is a number used to identify and electronic device connected to the internet.

Secure Websites Public Wi-Fi hotspots should be avoided. (you inadvertently put yourself at risk to exposing your data because they are generally not secure sites). Hackers can also create illicit hotspots in locations where free or paid public Wi-Fi exists. To protect yourself online, ensure that you are transmitting data over secure web pages. A secure URL begins with HTTPS. The S stands for secure. This is not 100% fool proof, but generally is a sign of protection . Be wary of uploading personal information on sites that do not display a protection icon.

Users unknowingly connect to the incorrect network, which allows the hacker access to any data being transmitted over that connection. The signal with the best strength may not always be the legitimate hotspot. If a Wi-Fi authentication screen ask for credit card information, confirm that the Wi-Fi connection is legitimate. Hacking Is illegally accessing or altering digital devices, software, or networks.

May also contain the personal information you enter on a website. Most cookies are from legitimate websites and will not harm your computer. If a hacker gains access to your computer, you are at risk. Cookies can also be used to target you for a scam based on your internet history. Cookies Are bits of data stored on your computer that record information about the website you have visited.

Protect yourself from Cookies Prevent them from being accepted by the browsers. Delete cookies on a regular basis. Cookies can also be removed by running a disk cleanup utility.

A common form of phishing is sending a fraudulent e- mail that appears to be from a legitimate source, such as a bank. The e-mail asks for certain information such as Social Security number or bank account. Sometimes it provides a link, looks real but is used solely to commit fraud. Phishing The use of fraudulent e-mails and copies of valid websites to trick people into providing private and confidential data.

Avoid phishing. . . Most legitimate organizations do not sue e-mail to request this type of information. Never provide confidential information in response to an unsolicited email. Avoid clicking a link to a website in an e-mail. It is better to enter the website URL into a web browser. Never open an e-mail attachment that you are not expecting.

Beware of an invitation to click on a website link for more information about an advertisement, as the link may trigger malware. One click can activate a code, and your computer could be hacked or infected. Malware comes in many forms including spyware, Trojan horses, worms, and viruses. Malware short for malicious software, is a term given to software programs that are intended to damage, destroy, or steal data.

Often affected users are not aware that spyware is on their computer. Trojan horses are malware usually disguised to appear as a useful or common application in order to convince people to download or use programs. They perform malicious actions on the user’s computer such as destroying data or stealing information. They do not self-replicate, nor do they infect other files. Spyware Software that spies on a computer by capturing private information, such as e-mail messages, usernames, and passwords, bank accounts, and credit cards.

Software virus: is a computer program designed to negatively impact a computer system by infecting other files. A virus may destroy date on the computer, cause malfunction, bring harm to a network, or steal information. Viruses can be introduced by a computer in may ways, e.g., downloading infected files from an e-mail or website.

Firewall is program that monitor information coming into a computer and helps to ensure that only safe information gets through. Virus protection should have a firewall. Virus protection helps safeguard a computer and should be used on any computer or electronic device that is connected to the Internet or any type of network. Virus protection software is referred to as antivirus or antimalware software.

Digital Security Do not be lulled into a false sense of security when communicating online. Be especially careful with who you do not know personally. Avoid opening e-mails that look suspicious. Use common sense when deciding what personal details you share, especially your address, social security number, etc. Resist the urge to share too much information that could be stolen.

Identity Theft Avoid Identity Theft There are many ways that your personal information can be stolen (lost credit card, driver’s license, etc.) Criminals also steal physical mail to commit identity theft; called dumpster diving. However, computer technology has made identity theft through digital means the most prevalent. Be wary of how much information that you share on social networking sights. If you suspect that your identity has been stolen, visit the Identity Theft website provided by the Federal Trade Commission for resources and guidance. Identify theft is an illegal act that involves stealing someone’s personal information and using that information to commit theft or fraud.

How can I protect my identity? On the computer: Use passwords that are not easy to guess. Use numbers and symbols when you can. Do not respond to emails or other messages that ask for personal information. Do not put personal information on a computer in a public place, like the library. Shop on secure websites. They have an address that starts with “https”. Have security software on your own computer. There are many precautions that you can take when you are on the computer. Always use passwords that are not easy to guess. When you can, include numbers and symbols. If you receive emails or messages that ask for personal information, do not respond. Never put your personal information on a computer that is in a public place such as a library. Only shop on secure websites. Usually secure websites begin with https. Note the s at the end. It could also be helpful to download or purchase security software for your computer.

Create a Security plan Secure Passwords Secure Settings A security plan should be in place for your computer in general. Consider downloading and running antivirus software for your devices. Create a strong secure password. Do not use the obvious such as your date of birth, important names, etc. Create a Security plan Secure Passwords Secure Settings Back Up Your Computer

Become familiar with the settings and features on your browser when accessing the Internet. Enabling a pop-up blocker prevents your browser from allowing you to see pop-up, ads, which can contain malware. Back up your computer – this saves your data just in case a virus invades your computer or the hard disk crashes, it may be too late to retrieve your files and computer programs.

Secure Passwords Do not be careless or in a hurry. Do not use passwords that contain easily guessed information. Do not use the same passwords for multiple accounts or profiles. Do change your passwords often. Do record your passwords on a dedicated and secure hard-copy documents.

Resources http://www.credit.com/credit-reports/credit-reporting-agencies/ http://www.myfico.com/crediteducation/in-your-credit-report.aspx http://www.justice.gov/criminal/fraud/websites/idquiz.html