Breaking Trust On The Internet

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

How to protect yourself, your computer, and others on the internet
Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
The Internet.
COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
INTERNET SAFETY.
INTERNET SAFETY FOR STUDENTS
Hacker’s tricks for online users to reveal their sensitive information such as credit card, bank account, and social security. Phishing s are designed.
Cyber X-Force-SMS alert system for threats.
Threats To A Computer Network
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
INTERNET SAFETY FOR STUDENTS
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Cyber Crimes.
By Daniel Carroll and Jarred Givens. The internet has helped further many fields and forms of technology, including: Internet Advancements Cell Phones.
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
Cyber Bullying: Not Something To Be Ignored A Presentation By Tyler Mulford.
DIGITAL CITIZENSHIP DIGITAL CITIZENSHIP By: Erica Lewis ED 505.
Web Browser Security Prepared By Mohammed EL-Batta Mohammed Soubih Supervised By Eng. Eman alajrami Explain Date 10. may University of Palestine.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Digital Citizenship Project.  The etiquette guidelines that govern behavior when communicating on the internet have become known as netiquette.
CYBER CRIME.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
A guide to netiquette, copyright & fair use, plagiarism, internet and computer safety By Briana Horton.
Computer Security. 2 Computer Crime and Cybercrime Computer crimes occur when intruders gain unauthorized access to computer systems Cybercrime is crime.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Topic 5: Basic Security.
Internet Safety Internet Safety LPM
Safety and Security issues of using ICT Alys brooks.
What is Spam? d min.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Internet safety By Suman Nazir
Internet Dangers Technology Communication Tools E-Literate.
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
Computer crimes.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
INTRODUCTION & QUESTIONS.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Tech Vocab Slideshow Quarter 4 By: Jordan McCamman.
Lecture2 Networking. Overview and spam World Wide Web Censorship Freedom of expression Children and inappropriate content Breaking trust on the.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Scott Hervoyavich December 6 th, 2011 CYBERCRIME.
WHEN SHARING IS NOT CARING: INTERNET ETHICS By Baikgopodi “Bai” Ditiso Presented at CLTD– 09 May 2016.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Digital Citizenship Project Submitted by: Etta Pope Instructor: Laurie Fowler.
Digital Citizenship Project Justin Lann. Netiquette Netiquette on Social Media Sites – A set of social conventions that facilitate interactions over networks.
GCSE ICT SECURITY THREATS.
Scams, Identity Theft, and Viruses Kelly & Caitlin
Internet Safety Vocabulary
Computer Security.
Computer Security.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Breaking Trust On The Internet Ethical and Social Issues in Information Systems By Prosper Oli stdno: 117424

INTRODUCTION: What is Internet? The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to serve several billion users worldwide. What is Trust? Complete confidence in something.

INTRODUCTION(continue) Internet is today one of the most important part of our daily life. There are large numbers of things that can be done using the internet and is used for different purposes depending upon the requirement. Easy and cheap communication Share files with others easily. Loads of information Financial Transaction services

INTRODUCTION(continue) Then this presentation is on the BREAK of that trust in the accept of internet perspective.

Breaking Trust on the Internet Identity Theft Phishing. Chat Room Predators False Information Cyber Bullying E-mail Spam Virus Threat Security

Identity Theft Definition: when someone uses your personal information without your permission to commit fraud or other crime. This can be done in various ways like using someone’s Name. Social security number. Credit card number. Bank account number. Etc.

Identity Theft Graph

How it Occurs Phishing: Emails that appear to be from IRS requesting you to confirm information. Emails that are thanking you for a recent purchase (or something you didn’t buy).

Examples of Phishing

Chat Room Predators Chat room : supports real-time discussions among many people connected to network Some pedophiles(any sexual interest in children or the act of child sexual abuse, often termed "pedophilic behavior".) meeting children, Through chat rooms.

False information Quality of web-based information varies widely. Internet helps spread false information Anybody can write and update false information on the internet through blog or other means. Not everything on the internet is accurate or correct.

Cyber bullying What Is Cyber bullying? Cyber bullying is the use of technology to harass, threaten, embarrass, or target another person. By definition, it occurs among young people. When an adult is involved, it may meet the definition of cyber-harassment or cyber-stalking, a crime that can have legal consequences and involve jail time.

E-mail spam Electronic spamming is the use of electronic messaging systems to send unwanted bulk messages (spam), especially advertising. While the most widely recognized form of spam is e-mail spam, 

Virus Threat A computer virus is a small software program that spreads from one computer to another and interferes with computer operation. A computer virus might corrupt or delete data on a computer, use an email program to spread the virus to other computers, or even delete everything on the hard disk. 

Virus threat case A hacker provided electronic files containing hotel advertisements to the newspaper, which began running the advertisements on its website. He then replaced the hotel advertisements with a file containing a malicious computer code, or malware, which infected the computers of people who visited the website and required them to purchase antivirus software for $49.95 to regain control of their computers. If the users did not purchase the software, their computers immediately became flooded with pop-ups containing false "security alerts," and all information, data and files stored on the computers became unreachable. http://www.fbi.gov/wanted/cyber/peteris-sahurovs

Security Internet security is a branch of computer security specifically related to the Internet, often involving browser security but also network security on a more general level as it applies to other applications or operating systems on a whole.

Security Its objective is to establish rules and measures to use against attacks over the Internet.  The Internet represents an insecure channel for exchanging information leading to a high risk of fraud, such as phishing.  Different methods have been used to protect the transfer of data, including encryption.

Security

Security break case Attackers forge Google's Gmail credentials Skype, Microsoft, Yahoo, Mozilla also targeted Extremely sophisticated hackers, broke into the servers of a web authentication authority and counterfeited certificates for Google mail and six other sensitive addresses. http://www.theregister.co.uk/2011/03/23/gmail_microsoft_web_credential_forgeries/

Law Enforcement needs to be aware of: Final thoughts Know this, your bank will NEVER ask you for account number or password. Law Enforcement needs to be aware of: Difference between annoying and dangerous communications How to investigate a cyber crime How to obtain information from an ISP

QUESTION TIME