What to be aware of and how to avoid problems.

Slides:



Advertisements
Similar presentations
Setting up a Gmail Account & Safety
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
Surrey Public Library Electronic Classrooms Essentials.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
SECURITY CHECK Protecting Your System and Yourself Source:
What is identity theft, and how can you protect yourself from it?
David Abarca, Instructor Del Mar College Computer Corner Phishing, Pharming, Spear-Phishing, and now…. Vishing.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Basics. 2 Class Outline Part 1 - Introduction –Explaining –Parts of an address –Types of services –Acquiring an account.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
What do I need to know?.   Instant Messages  Social Networking.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
SAFETY What to be aware of and how to avoid problems. **This is not meant to make you fearful of . The goal of this discussion is to make sure.
Matthew Hardaway CSCI101 Thursday 3:30pm.  Fishing (Encyclopedia Britannica): ◦ Sport of catching fish—freshwater or saltwater— typically with rod, line,
Scams & Schemes Common Sense Media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Phishing, Spoofing, Spamming and Security How To Protect Yourself Additional Credits: Educause/SonicWall, Hendra Harianto Tuty, Microsoft Corporation,
Santa’s s By Becky.
Basics. 2 Professional Development Centre Class Outline Part 1 - Introduction –Explaining –Parts of an address –Types of services.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
How to Read Outlook . Make sure the computer is on.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
safety Bailey mullan. dangers ing has become on of the main sources for communicating. When using it is more likely for someone.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
Basics. Stands for “electronic mail” Digital message sent over the internet Primarily text but can include pictures, sound and attachments.
Santa’s s By Alexander Britton. Sending an .
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
. Electronic. is a method of exchanging digital messages. What does the E in stand for?
1. Setting up an account- technical
is short for electronic mail!. What is ? An electronic message sent from one computer to another. saves money and time compared to regular.
How to manage your s Tips and tricks. Use Folders Folders are used to manage files in your hard disk drive. Similarly you can create folders in your.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
What it is and how to stop it.  What spam is.  Why it can be dangerous.  How to handle it.
Internet Safety.
Scams & Schemes Common Sense Media.
Phishing, identity theft, and more
& Google Gmail.
Learn how to protect yourself against common attacks
Unit 4 IT Security.
Digital Citizenship Middle School
Lesson 3 Safe Computing.
is short for electronic mail!
Information Security 101 Richard Davis, Rob Laltrello.
How to manage your s Tips and tricks.
Protect Your Computer Against Harmful Attacks!
Huntington Beach Public Library
How to Protect your Identity Online PIYUSH HARSH
What is it? Why do I keep getting from Barracuda? SPAM.
Electronic Mail Opening Activity: 411 of
Basics HURY DEPARTMENT OF COMPUTER SCIENCE M.TEJASWINI.
Electronic Mail.
HOW DO I KEEP MY COMPUTER SAFE?
Phishing Don’t fall for fake
Electronic Mail.
Qiyu chen, Xiaomin Dong, Chenhui Lai, Xinteng Chen, Vittorio DiPentino
Setting up a Gmail Account & Safety Kamlesh Singh Bisht IT Specialist.
Internet Safety – Social Media
Social Engineering Humans are often the weakest point in security
What is Phishing? Pronounced “Fishing”
Communicating in the IT Industry
Presentation transcript:

What to be aware of and how to avoid problems. **This is not meant to make you fearful of email. The goal of this discussion is to make sure all users are aware of the dangers of email and ultimately learn how to avoid those dangers. ** Email Safety What to be aware of and how to avoid problems.

Scams There are four different types of scams: Viruses and worms Phishing SPAM Chain Letters

Viruses and worms What are they? Example: Emails that are send with attachments that are actually viruses They often look like emails from someone you know Example:

Phishing Phishing: a trick to get you to enter personal information such as Credit card information Banking info Social security number Passwords Email or physical address Example: You receive an email from a Nigerian prince who needs you to help get $50 million out of Nigeria. He must leave in secret and transfer the money to your account. He promises you $5 million after he gets to safety. There probably never was a Nigerian prince, and whoever sent the email will take all your money.

Password Scam “Dear Valued PayPal Customer, You are receiving this email as a part of a security check. Someone has been accessing your PayPal account and attempting to take your money. Please verify you are the owner of this account by sending us your login name and password.” Even if this looks exactly like a PayPal email, real companies never ask for your information over email.

NEVER send your personal information via email NEVER send your personal information via email. Social security, bank, etc. Especially to people you don’t know.

Spam Spam is unsolicited commercial emails—unwanted ads in your inbox May be to phish for information or transmit a virus Sample subjects: RE: Pharmacy sale 80% off! Ama-zingly fresh sk!n with n0 wrinkles We renamed your account From an old friend Your mistake Don’t even open these emails

Anti-spam Delete without opening! If you open it, don’t click and don’t reply Gmail has really good spam filters that catch most spam. Spam filters include “mark as spam” buttons: future email from that address will be filtered out Don’t buy anything from companies that email you randomly! Especially not medicine!

Questions?