One of the NAE Grand Challenges. What is the internet? What do you use the internet for?  Email  Shopping  Banking.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Threats To A Computer Network
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Teach a man (person) to Phish Recognizing scams, spams and other personal security attacks July 17 th, 2013 High Tea at IT, Summer, 2013.
Scams Stevie's Scam School videos
Quiz Review.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Threats to I.T Internet security By Cameron Mundy.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Alisha Horsfield INTERNET SAFETY. firewall Firewall- a system made to stop unauthorised access to or from a private network Firewalls also protects your.
Protecting Yourself Online (Information Assurance)
Your Trusted Partner In All Things IT. 20 Years of IT Experience University Automotive Food Service Banking Insurance Legal Medical Dental Software Development.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
IT Security for Users By Matthew Moody.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
 We all know we need to stay safe while using the Internet, but we may not know just how to do that. In the past, Internet safety was mostly about.
Reliability & Desirability of Data
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Instructional Technology & Design Office or Digital Security Basics Presented by Mark Baldwin &
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
IT Banking Advantages and Disadvantages. Advantages IT banking is faster and more convenient for the user as they no longer are required to be at the.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.

About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
ICT & Crime Viruses & malware. What is a virus? A computer virus is a piece of software that can 'infect' a computer (install itself) and copy itself.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
What is Spam? d min.
This Guide is going to be about how to  attach files  create a signature  send to multiple recipients with using ‘Cc’ and ‘Bcc’  change the priority.
Internet safety By Suman Nazir
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Cybersecurity Test Review Introduction to Digital Technology.
Malicious Attacks By: Jamie Woznicki Rahul-Anaadi Kurl Alexander Kaufmann Curtis Songer Daniel Cardenas Rivero.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
Cyber security. Malicious Code Social Engineering Detect and prevent.
An Introduction to Phishing and Viruses
Learn how to protect yourself against common attacks
Unit 4 IT Security.
Protect Your Computer Against Harmful Attacks!
Internet Safety Vocabulary
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

One of the NAE Grand Challenges

What is the internet? What do you use the internet for?   Shopping  Banking

 Spam – “the use of electronic messaging systems to send unsolicited bulk messages, especially advertising, indiscriminately”  Phishing – “the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication”  Malware – “malicious software designed to harm a computer or network”

 Some examples of spam

UNITED STATE OF AMERICA DEPARTMENT. (SWIFT ATM DEBIT CARD DISTRIBUTION DEPARTMENT) Our Ref: DBN/IRS/CBX/011/011 (SWIFT DEBIT CARD CONSULTANT CE.) IMMEDIATE ATM DEBIT CARD PAYMENT FROM THE DESK OF VICE PRESIDENT Joseph Biden. Attention: Our Esteemed Funds Beneficiary, This is to bring to your notice that the payment of your long overdue fund which originated from United Kingdom { U.K / Africa Countries}such as contract/Inheritance/Lotto Winning fund Payment which has been on hold for many years now,despite all our efforts that failed somehow due to the activities of some corrupt governmental and bank officials handling your transaction.Please Kindly bear with us and accept the part payment compensation of US$3.5M which has been approved to your name until we finalize the modalities on when your full inheritance funds will be paid to you in full that shall be made known to you shortly. Note: Your $3.5M part payment were been loaded into an ATM VISA Debit Card,and has been registered with FedEx courier Express Delivery Services Ltd for immediate delivery to your doorstep. Please contact FeDex Courier Express Delivery Services comapny at the receipt of this notice with your personal information below where you want them to delivery your ATMcard to you. but the maximum you can withdraw in a day is USD$10, Only. We have mandated MR DANIEL.R. to send you the ATM CARD and PIN NUMBER. You are therefore advice to contact the Head of ATM VISA CARD Department, Contact the Head of Operations FedEx Courier Express Mr..R.DANIEL with the following information stated below for the immediate delivery of your approved Atm Visa Debit Card to your designated address.You will only pay FEDEX Courier Delivery Company $120 only being the Stamp Duty Fee as we have already paid on your behalf the cost of delivery.Do ask Mr.R DANIEL to direct you on how you will send the Stam Duty Fee to them... ========================================================================================================== FULL NAMES:----OCCUPATION:----TELEPHONE:----POSTAL ADDRESS: COUNTRY: SEX (M/F):----- Do let this office know immediately you receive your ATM CARD from Fenway Courier Express Courier Delivery for our record. With best regards VICE PRESIDENT Joseph Biden.

 Never reveal personal information online (usernames, passwords, SSNs, credit card numbers, etc.)  No legitimate company will ask you for this information by  Basically, be smart and cautious  Zachary Harris Story

 Virus – a computer program that can copy itself and infect a computer  Worm – a self-replicating malware computer program, which uses a computer network to send copies of itself to other computers on the network.  Spyware – a malware that collects small pieces of information about users without their knowledge  Adware – any software package which automatically plays, displays, or downloads advertisements to a computer  Trojan Horse – a destructive program that masquerades as an application. The software initially appears to perform a desirable function for the user prior to installation, but steals information or harms the system

 Use a unique password for every account  Make the password long  Include numbers and symbols in the password  Tip for creating a password: use a phrase that you can remember  Store your passwords somewhere safe: (I use KeePass -

 Make sure your OS is up-to-date  Make sure all programs are up-to-date (especially web browsers)  Use an up-to-date anti-virus program  I use Secunia PSI to make sure my programs are up-to-date - rsonal/ rsonal/

 Make sure your home wifi network uses a password  Be careful about using free, unencrypted wifi because anyone can see what is being sent  If you must login to a website over unencrypted wifi, make sure the website is secure (

 Some ads and websites are scams  If a deal is too good to be true, it’s probably too good to be true  If you are unsure about a websites trustworthiness, research it  Advice: Don’t use MyCleanPC or QuiBids

 His Gmail, Amazon, Apple, and Twitter were all hacked  Ultimately he lost a lot of his data on his MacBook  How did this happen?

1. Found his gmail address on his webpage 2. Using google account recovery he discovered that he had an AppleID 3. To hack the AppleID all that was needed was an address and credit card number 1. Address was found using simple internet search 2. Credit card number was found from Amazon 4. With that information his AppleID account was taken and all his Apple devices wiped

 Creates its own malware  Remotely activate microphones and record everything it hears  Keylogging software  Screengrab surveillance  Installed through phishing attacks

    y+on+Suspects/article33098.htm y+on+Suspects/article33098.htm