The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

Primary Threats to Computer Security
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
SPYWARE Presented by The State Security Office November 17, 2004.
The Internet.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Important Facts you should know about the Net
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
The Internet = A World of Opportunities
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Don’t Lose Your Identity – Protect Yourself from Spyware Dan Frommer Sherry Minton.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
How to Protect Your PC Grayware Adware, Malware, Spyware.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Quiz Review.
How It Applies In A Virtual World
Threats to I.T Internet security By Cameron Mundy.
Security Issues: Phishing, Pharming, and Spam
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Security for Seniors SeniorNet Help Desk
Using the Internet: Making the Most of the Web’s Resources.
Online Annoyances Spam – electronic junk mail
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Protecting Students on the School Computer Network Enfield High School.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
What is Spam? d min.
Computer Skills and Applications Computer Security.
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
Internet safety By Suman Nazir
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
Any criminal action perpetrated primarily through the use of a computer.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. WHAT IS SPAM? Spam in unsolicited message NTM Microsoft Apple.
Network System Security - Task 2. Russell Johnston.
Privacy and Security.
Unit 4 IT Security.
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Presentation transcript:

The Internet Netiquette and Dangers

Outline Netiquette Dangers of the Internet

Mailing lists "Listservs" people must subscribe messages sent by sent only to people who subscribe, not general public do NOT use the "Reply All" option unless you mean to!

E-commerce buying, selling, advertising, banking look for secure "signed" sites versus check with Better Business before buying use credit card for purchase

Online Dangers Spam – electronic junk mail Pop-ups – intrusive advertising Cookies – tracking user’s browsing habits Malware - software that has a malicious intent - spyware, viruses, Trojans, worms, etc. Phishing and Hoaxes – Ruses to fool and maybe steal from users

Spam Junk May soon comprise 90% of volume Named after a Monty Python sketch LinkLink Antispam practices Don’t reply to it, even to “unsubscribe”! Use “dummy” addresses – can get free ones Read privacy statement on a site before you give them your address Spam filters

Pop-ups Usually advertising Pop-up automatically Can also contain spyware Most browsers can prevent them Pop-up blockers

Cookies Text files stored on client computers when visiting Web sites Used on return visits to Web sites Unique ID number Personal information remembered Privacy risk Selling information

Spyware Added as a program piggybacked with a requested program Secretly gathers information, usually about surfing habits Spyware removal programs are required – Ad-aware or Malwarebytes are good

Spyware Very often comes in from file-sharing, P2P sites Ties up system resources, can modify browser settings, can spawn popups and other ads Read the EULA (end user license agreement) for any software you install before you install!

Phishing and Hoaxes Phishing is a phony communication from a trusted source Phishing attempts to scam someone into sending vital information Hoaxes are attempts to scam people into sending money, or join a chain letter (see snopes.com)

Malware Software that has a malicious intent Spyware is a form of malware Other forms are viruses, worms, and Trojan horses Designed to render a computer useless or control it completely

Internet Access Security A connection that is "always on" is a security risk - turn the computer off when you’re not using it! Keep OS and anti-virus software up to date USE firewall software browser security settings for LAN, use NAT - router Network Address Translation For more privacy on the Net, virtual private network (VPN)

Issue: Free Wi-Fi access Some people offer wireless access for free to the community A good point - people who can't afford to pay for it can use it Broadband providers don't like people giving it away for free A bad point - can be used for illegal activities