How It Applies In A Virtual World

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Primary Threats to Computer Security
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
The Internet.
SECURITY CHECK Protecting Your System and Yourself Source:
How It Applies In A Virtual World. Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently.
What is identity theft, and how can you protect yourself from it?
Acceptable Use Policy –The Acceptable Use Policy defines the rules of the machine and internet connection you are on. –Specific policies differ by machine.
Don’t Lose Your Identity – Protect Yourself from Spyware Dan Frommer Sherry Minton.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
What are cookies? Cookies are text files stored on one’s computer after visiting a website Used for: -Storing information such as a unique visitor ID -Allowing.
Phishing, Pharming, and Spam Margaret StewartTuesday, Oct. 21, 2006.
SPYWARE  Do you know where your personal information is?
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
SSL (Secure Socket Layer) and Secure Web Pages Rob Sodders, University of Florida CIS4930 “Advanced Web Design” Spring 2004
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Cyber Crimes.
Digital Citizenship By: Miranda Scorver.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Staying Safe Online Keep your Information Secure.
Scams & Schemes Common Sense Media.
Protecting Your Information Assets
IT security By Tilly Gerlack.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Security System Ability of a system to protect information and system resources with respect to confidentiality and integrity.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Fraud Protection.
An Introduction to Phishing and Viruses
Scams & Schemes Common Sense Media.
Phishing is a form of social engineering that attempts to steal sensitive information.
Protect Your Computer Against Harmful Attacks!
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
ICT Communications Lesson 3: Internet Life and Privacy
Internet Safety – Social Media
Presentation transcript:

How It Applies In A Virtual World Privacy How It Applies In A Virtual World

Introduction Got cookies? What is internet Privacy? The Pros and Cons Internet explorer What is internet Privacy? How secure your computer, files, and information is on the world wide web The Pros and Cons User personalization versus user violation How can it be violated? Through media (google street view), phishing, cookies Taking Precautions

Spyware Definition-Malware that can collect information about computer users without their knowledge. It can often hinder a computer’s performance. Many anti-virus programs now have anti-spyware features.

How does it occur? People can install them without meaning to as spyware is often installed with other programs. There are two ways of doing this: Piggybacking on a desirable piece of software Trojan horse method i.e tricking the user into downloading it. Can infect through security holes in internet

Effects of Spyware Can hinder a computer’s functionality System becomes slow Can disable firewall and ant-virus programs

Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently obtain credit card numbers, passwords, or other personal data.

What is Phishing? When Did it Start? The term originated in the mid 1990s in connection with AOL Phishing is usually done through fake emails or through instant messaging. The user is prompted to provide important information about bank accounts or credit card numbers through emails and sites that look legitimate, but are actually fake. Their information can then be used to commit identity theft.

Is It Illegal? It is illegal to commit Identity theft. It is not illegal to ask the user to volunteer their personal information. It is not illegal to send you an important looking message in order to prompt the user into volunteering the desired information. Therefore phishing is only illegal once the information is used to commit identity theft.

How Does This Affect The Common User? How can you spot a phishing scam? Anyone can fall victim to phishing, so every internet user must use caution when volunteering private information. Make sure that your connection is secure. Signs that an email or site is not authentic: Misspelled domain names (ex. www.yohoo.com) It has variations of domains as well (ex. www.yahoo-security.net) Don’t trust an email that leads you to a website that only shows an IP address (IP address ex. 102.199.60.250.)

What are cookies? Cookies are text files stored on one’s computer after visiting a website Used for: -Storing information such as a unique visitor ID -Allowing customization of a webpage, such that it can save information for the computer the person is currently using.

Problems with Cookies The information from cookies can be accessed by the website, which can then sell your information to others, allowing for ‘targeted’ ads Based on the ‘profile’ built up by visiting certain websites or by one’s search history, ads will attempt to be tailored to one’s perceived interests

Verdict Cookies are, for the most part, harmless Delete your cookies once in a while – some have expiration dates years in the future, and may persist indefinitely In addition, there exist many different pieces of software for those who might want to manage their cookies and maintain their privacy

What is this? 360 degree views from visual perspectives of the street Online access to ANYONE!

Why it violates one’s privacy? Gives real pictures of places. Where you live Where you work Schools Public security

What can one do? Nothing really…. Sorry Attempt to sue? (has happened, didn’t work)

What does this all mean? There are many ways for people to invade privacy through computers not just limited to spyware, phishing, cookies, and Google street view. In this computer filled world, people continuously find ways to get access to private information. While some of these activities are illegal, not everyone is caught. It is important for people to be aware of strategies used to collect personal information.

It is important for people to take precautions so their private information is protected. No one wants their passwords or credit card numbers stolen. Only give sensitive information to authenticated and secure websites. Always validate websites or emails. Run anti-virus/anti-spyware programs to ensure that your information is not being collected. Just in case, you can delete cookies. Make sure that your internet connection is secure and install a firewall. Keep up to date on computer news and how to protect yourself.