Lesson 3 Safe Computing.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
Victoria ISD Common Sense Media Grade 6: Scams and schemes
What is identity theft, and how can you protect yourself from it?
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Threats to I.T Internet security By Cameron Mundy.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Scams & Schemes Common Sense Media.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
What is Spam? d min.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Cybersecurity Test Review Introduction to Digital Technology.
Any criminal action perpetrated primarily through the use of a computer.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
What it is and how to stop it.  What spam is.  Why it can be dangerous.  How to handle it.
Technical Implementation: Security Risks
Internet Safety.
Chapter 40 Internet Security.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Viruses & Destructive Programs
Edexcel GCSE Cyber security threats Computer Science 1CP1
An Introduction to Phishing and Viruses
Phishing, identity theft, and more
Class Name: Online Safety & Privacy Basics
Learn how to protect yourself against common attacks
Unit 4 IT Security.
How to build a good reputation online
What to be aware of and how to avoid problems.
Information Security 101 Richard Davis, Rob Laltrello.
Protect Your Computer Against Harmful Attacks!
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Lesson 2- Protecting Yourself Online
Cybersecurity Awareness
Risk of the Internet At Home
Lesson 2: Epic Security Considerations
HOW DO I KEEP MY COMPUTER SAFE?
Protecting Senior Citizens from Phishing s
Computer Security.
9 ways to avoid viruses and spyware
Unit 4 IT Security Kerris Davies.
Lesson 2: Epic Security Considerations
Internet Safety – Social Media
Social Engineering Humans are often the weakest point in security
What is Phishing? Pronounced “Fishing”
Lesson 2- Protecting Yourself Online
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Communicating in the IT Industry
Cybersecurity Simplified: Phishing
Presentation transcript:

Lesson 3 Safe Computing

Objectives • Protect against malware/hacking • Identify potential computer viruses • Understand system and application updates • Recognize and protect against spam, scams, and phishing • Determine the strength of passwords

Hacking/Malware Hacking is the act of cracking into a computer to steal information. Malware is software that has malicious intent. Two types of malware: Discussion tips: Ask students about their experiences with hacking/malwareHacking is the act of cracking into a computer to steal information. A computer virus attaches itself to a file or program, enabling it to spread from one computer to another. Worms spread from one machine to another, rapidly, without human action.

Spotting Computer Viruses Criminals often send viruses through emails, making it important to be able to recognize potential email threats. Look at the subject line. Does it say something suspicious like “Need cash now?” or “You may have already won!”?

Spotting Computer Viruses Criminals often send viruses through emails, making it important to be able to recognize potential email threats. Use caution with attachments. Many times viruses are assigned a file extension like .exe or .vbs.

Spotting Computer Viruses Criminals often send viruses through emails, making it important to be able to recognize potential email threats. Do you recognize the sender? If you don’t recognize the sender of the email, it is best practice to not open the email.

Spotting Computer Viruses Criminals often send viruses through emails, making it important to be able to recognize potential email threats. Do not follow web links unless you are sure they are safe. Sometimes a link can direct you to a website that downloads a virus to your computer.

Spotting Computer Viruses Criminals often send viruses through emails, making it important to be able to recognize potential email threats. Spelling and grammar. Companies and organizations typically have copywriters who proofread emails for errors before they are sent.

Spotting Computer Viruses Criminals often send viruses through emails, making it important to be able to recognize potential email threats. Generic greeting. Fraudulent emails are often sent in large batches and to save time, criminals use a generic greeting like “Dear Internet user.”

Antivirus Software Antivirus software is a computer program that detects, prevents, and takes action to disarm or remove malicious software programs, such as worms and viruses. Malware can be shared by: • E-mail attachments • Fictitious websites • Pop-up ads • Spam

Hacking/Malware Defenses Avoid attacks by: Do not open e-mails or attachments from unfamiliar e-mail addresses Question suspicious attachments from people you do know Right-click the pop-up taskbar or use the task manager to close pop-up ads Discussion tips: Students may have some knowledge on the subject here. Have them share how they avoid attacks. Avoid attacks by: Use tools to prevent viewing potentially dangerous sites.

Updates Updates also: Updates are important! They keep the operating system and applications up to date. Updates also: Close security loopholes Provide critical updates Protect against threats

Spam & Email Fraud Spam - an Internet slang term referring to unsolicited junk email or online communication that is sent to a large number of recipients.

Email Scams The primary goal of an Internet scam is to trick someone into giving money or sharing information. Some examples include: dating scams investment schemes claims you won the lottery pay speeding ticket bail out a friend Have students do some current event research on email scams and share their findings. Be sure to delete these emails.

Phishing Phishing is an attempt to steal sensitive information like usernames, passwords, social security numbers, and credit card numbers. Legitimate companies will never ask for your personal sensitive information in an email. Be sure to delete these emails.

Passwords Good password practices: The whole purpose of a password is to keep important, private information safe. Good password practices: Strong passwords use upper and lower case letters, numbers and symbols. (8 or more characters) Don’t share your passwords with anyone Change your password frequently or use a different password for every site you visit Don’t use information that is personal or easy to guess Weak passwords: Bickerton01 Fluffy1992 Strong passwords: Fi#1c@t! (Fluffy is # 1 cat!) #Ih8P@$$words (I hate passwords)

I1uvS0ccer#1976 Bigbro01 Dimlyf3!7 Wallace_f12 Rate the following password examples as strong or weak: I1uvS0ccer#1976 Bigbro01 Dimlyf3!7 Wallace_f12 Answers: Strong Weak

Summary • Protect against malware/hacking • Identify potential computer viruses • Understand system and application updates • Recognize and protect against spam, scams, and phishing • Determine the strength of passwords