“You Really Can Stay One Step Ahead of The Bad Guys” Presented by: Keystone Computer Concepts Inc.

Slides:



Advertisements
Similar presentations
A NASSCOM ® Initiative Comprehensive Computer Security Software An advanced computer security software usually have one or more of the following utilities.
Advertisements

Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
Understanding and Building Basic Networks Chapter 4 Protecting Yourself Online.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
The Internet.
SECURITY CHECK Protecting Your System and Yourself Source:
. How it works? To send an you need an Software or Web Based To send an to a friend you need to know their Address.
What is identity theft, and how can you protect yourself from it?
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
INTERNET SAFETY FOR STUDENTS
Staying Safe How to Identify and Avoid Bad Things.
Kevin Mitnick Home Internet Security Course Today, Internet criminals are going after families. They try to guess your passwords and steal your credit.
How to safe online E-Safety Presentation How to stay safe when online Tip 1Tip 2Tip 3Tip 4 Tip 5.
ONLINE SAFETY Online safety Money Works: Level 1 Topic 3.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Security Awareness Cloud Phishing Attacks
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Teach a man (person) to Phish Recognizing scams, spams and other personal security attacks July 17 th, 2013 High Tea at IT, Summer, 2013.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
1 1 SMSishing Attacks Jim Horwath July 2012 GIAC GSE, GCUX, GCIA, GCIH, GREM, GSEC, GSIP.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
INTERNET SAFETY FOR STUDENTS
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
P.E.O. Salt Lake City Reciprocity Meeting Keeping Safe Using Technology April 8, 2010 Presented by Rebecca Conant (Y) P.E.O. Salt Lake City Reciprocity.
"Computer Resolutions For The New Year” Part 2 Presented by Keystone Computer Concepts
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Have Fun, Be Safe Strategies for Internet and Social Media Safety.
You, Me & Technology. Overview Technology –Our relationship with technology Threats –What, Who, When, Where, Why & How Protection –What we can do to protect.
Scams & Schemes Common Sense Media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
 The purpose of this report is to inform people that the spyware and virus threat is growing and what people can do to stop the spread of spyware and.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Dangers of the Internet CEL : C O M P U T E R S I N E V E R Y D A Y L I F E CEL 1 Dangers of the Internet Name: ____________________ Class: ________________.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Information Security Sharon Welna Information Security Officer.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Merging: When To Yield And When To Speed Up Presented by Keystone Computer Concepts.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Small Business Security Keith Slagle April 24, 2007.
Internet Safety Internet Safety LPM
Phishing Dennis Schmidt, CISSP Director, Office of Information Systems HIPAA Security Officer UNC School of Medicine UNC School of Medicine.
What is Spam? d min.
Internet 1) John R. Levine, Margaret Levine Young, The Internet for Dummies. Wiley Publishing, 12 th Edition, 2010.
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
By :Mitchell Christie by :Mitchell Christie safety.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Phishing and online fraud What parents need to know.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Safety in the digital world. Survey Thank you for completing the Information Security Survey!
DoS Attacks Phishing Keylogging Computer Laws/Acts.
Malicious Attacks By: Jamie Woznicki Rahul-Anaadi Kurl Alexander Kaufmann Curtis Songer Daniel Cardenas Rivero.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
IDENTITY THEFT Seneca Stairs. #1- Phishing  Phishing is when you get an from someone claiming to be an agency that you have an account in.  They.
Done by… Hanoof Al-Khaldi Information Assurance
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
If I’d only known then what I know now about phishing…
Computer Security.
Security Hardening through Awareness August 2018
COMPUTER SAFTEY IS IMPORTANT….
Presentation transcript:

“You Really Can Stay One Step Ahead of The Bad Guys” Presented by: Keystone Computer Concepts Inc.

Before We Start

“You Really Can Stay One Step Ahead of The Bad Guys” Presented by: Keystone Computer Concepts Inc.

Humor For Women

“You Really Can Stay One Step Ahead of The Bad Guys” Presented by: Keystone Computer Concepts Inc.

13

Test #1 rphishingiqtest

Clues to Phishing s  Not addressed to you by name  Asks for confidential information  Tries to instill fear – fear of losing account, money, etc.

Test #2

Clues about Spyware  Warnings try to instill fear – fear that your computer has infected files or is under attack from the outside; fear that your banking and other financial information could be stolen.

Test #3

Clues about Spam  When it sounds too good to be true…. _ _ _ _ !  Never unsubscribe!  Protect your friends – use BCC:

Keystone Computer Concepts 20

Next Seminar Saturday, May 30, 2009