Scams, Identity Theft, and Viruses Kelly & Caitlin

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Review Ch. 3 – Connecting to the Worlds Information © 2010, 2006 South-Western, Cengage Learning.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Implications and Security Issues of the Internet By Neelesh Patel.
The Internet.
SECURITY CHECK Protecting Your System and Yourself Source:
Breaking Trust On The Internet
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
INTERNET SAFETY FOR STUDENTS
Internet safety By Lydia Snowden.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Preventing Identity Theft in Aspen Falls Helping citizens protect themselves IdentityTheft.
How can you protect yourself from online identity theft?
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
IT security By Tilly Gerlack.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
Types of Electronic Infection
FINANCIAL MANAGEMENT 29 AUG 05 OC CARUSO. OVERVIEW BUDGETS CREDIT CARDS IDENTITY THEFT IMPORTANT FINANCIAL TOPICS FOR NEW COLLEGE STUDENTS.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
Malware & Phishing By: mackenzie olson. Internet fraudsters send out spam, pop-ups, appealing websites, and desirable downloads.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
INTERNET: The Good, The Bad and The Ugly
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
Computer Skills and Applications Computer Security.
Cyber Safety Jamie Salazar.
By: Austin Kellogg. What’s the difference Phishing Scam where frauds send pop-up messages to lure personal information.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
Society & Computers PowerPoint
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Internet safety.. Dangers of the internet: Paedophiles. Cyber bullying. Money theft. Sexual harassment. Identity theft. Hacking of your accounts. Viruses.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Protecting Yourself Against Identity Theft A Financial Literacy Presentation by.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Computer Security Keeping you and your computer safe in the digital world.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Internet Safety.
Safety.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Shopping online tips.
Done by… Hanoof Al-Khaldi Information Assurance
Learn how to protect yourself against common attacks
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Internet Identity, Safety, & Security
Unit 4 IT Security.
Unit 4 IT Security.
Internet Safety.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Protect Your Computer Against Harmful Attacks!
Lesson 2- Protecting Yourself Online
Information Security Session October 24, 2005
Internet Safety Vocabulary
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Bethesda Cybersecurity Club
Lesson 2- Protecting Yourself Online
Security in mobile technologies
Privacy, Security, and Ethics
Presentation transcript:

Scams, Identity Theft, and Viruses Kelly & Caitlin Digital Commerce Scams, Identity Theft, and Viruses Kelly & Caitlin

What is Digital Commerce? Digital Commerce is commonly known as e-commerce, is the buying of product or service over electronic systems such as the Internet and other computer networks. What is Digital Commerce?

You should never sign up for anything or purchase anything online without first talking to an adult. One sign that an adult can look for to help you determine if a website is secure is that the URL starts with HTTPS. HTTPS means HTTP Secure, and it uses cryptography to hide any information you send over the web through that site, so it can’t be stolen by hackers. Scams

If you share your financial information, identity thieves can use it to clean out your bank account or run up purchases on your credit card. And if you share too much personal material on a personal webpage or social networking site, you could end up being harassed by Internet predators or other weirdos. Identity Theft

It is a program that reproduces itself automatically, computer viruses attach themselves to various programs or software, and use these files to copy themselves. Also called malicious software or “malware”. To protect your computer from virus you can buy special software programs that scan and “clean” out the files on their own computers. Another way to prevent viruses is to not open e-mail from people you don’t know, or ask a parent for permission or help. Viruses

http://www.brainpop.com/