Reliability & Desirability of Data

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
What is identity theft, and how can you protect yourself from it?
Phishing and Pharming New Identity Theft Threats Presentation by Jason Guthrie.
A few simple steps, hints and tips to figure out if it is indeed fake. - By Emily Breuss.
Bsharah Presentation Threats to Information Security Protecting Your Personal Information from Phishing Scams.
Jason Rich CIS  The purpose of this project is to inform the audience about the act of phishing. Phishing is when fake websites are created.
What is Cyber bullying? Cyber bullying is when a person, or a group of people, uses the internet, mobile phones or other digital technologies to threaten,
Netiquette Rules.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Internet Phishing Not the kind of Fishing you are used to.
Cryptography: Keeping Your Information Safe. Information Assurance/Information Systems –What do we do? Keep information Safe Keep computers Safe –What.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Threats to I.T Internet security By Cameron Mundy.
E safety. Ads It’s always best to not click on ads when you see them, and it’s always a good idea to ignore them, but if there are too many you can always.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
STAY SAFE ONLINE. STAY SAFE ONLINE! PLEASE MAKE SURE YOU LOGIN AT THE CORRECT BANK URL / ADDRESS 1.NEVER LOGIN VIA LINKS 2.NEVER REVEAL YOUR PIN.
PHISHING FINANCIAL THREATS ON THE INTERNET -Alisha Esshaki 8a.
Keeping Information Safe Task 4. Basic security measures Passwords Change password on regular basis Do not use names or words easily linked to yourself.
Scams & Schemes Common Sense Media.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Dangers of the Internet CEL : C O M P U T E R S I N E V E R Y D A Y L I F E CEL 1 Dangers of the Internet Name: ____________________ Class: ________________.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Safer Online Shopping and Practices Presenter: Brian Moats Students Active In Leadership.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Stay Safe Online. Use strong passwords Using the same password for all your accounts makes it easy to remember. However, it also means a hacker needs.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
CCT355H5 F Presentation: Phishing November Jennifer Li.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
BY : MUHAMMAD KHUZAIMI B. ISHAK 4 ADIL PUAN MAZITA INFORMATION AND COMMUNICATION OF TECHNOLOGY.
Phishing A practical case study. What is phishing? Phishing involves fraudulently acquiring sensitive information (e.g. passwords, credit card details.
How Phishing Works Prof. Vipul Chudasama.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
What is Spam? d min.
Internet 1) John R. Levine, Margaret Levine Young, The Internet for Dummies. Wiley Publishing, 12 th Edition, 2010.
By Liam Wright Manga comic group Japan SAFETY on your computer.
Activity 4 Protecting Ourselves. Keeping Safe There are lots of different ways we can be at risk on the Internet. How can we protect ourselves and keep.
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
Section 6 Theory Issues with information found on the Internet.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Staying Secure Online How do we buy and sell safely on the Internet?
Phishing and online fraud What parents need to know.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
1. Guard your privacy. What people know about you is up to you. 2. Protect your reputation. Self-reflect before you self-reveal. What’s funny or edgy.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
E-Safety Parent Talk Helping to keep your children safe online.
Managing Money Workshop The National Autistic Society AGM
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Learn how to protect yourself against common attacks
Unit 4 IT Security.
How do we buy and sell on the Internet safely?
Phishing, what you should know
Information Security 101 Richard Davis, Rob Laltrello.
Phishing is a form of social engineering that attempts to steal sensitive information.
Ethics Tutorial Assignment#2
Computer Security.
Social Engineering Humans are often the weakest point in security
Presentation transcript:

Reliability & Desirability of Data ICT IGCSE Reliability & Desirability of Data

Objectives You should understand and be able to discuss issues relating to information found on the Internet, including: unreliability, undesirability and the security of data transfer

The Internet and World Wide Web are a fantastic resource for finding and sharing information. The Web contains literally billions of web pages containing information about every topic imaginable. However we need to take care when using the Internet to look for information, or to send information.

Reliability of Information The Internet and Web are not regulated - there is no organization that controls who can create web pages or what those pages can contain. Anyone can create web pages and say anything they want to.

In many ways this is a good thing In many ways this is a good thing. It means that corrupt organizations or governments, who have always been able to hide details of their activities, are no longer able to do so. When bad things happen, people write about it on the Web and the world gets to know, and hopefully do something about it.

But… it’s also a bad thing. It means that people or organizations can easily spread lies and hatred. There are thousands of websites containing bigoted viewpoints, and thousands more that are full of information that is biased, inaccurate, or just plain wrong.

How do you know if it’s OK? Check several sources of information (go to lots of different websites). If they all say them same thing, it is likely to be true Stick to websites that belong to trusted organisations. If the website address ends in .gov.uk (the UK government site) it is more likely to be reliable than one like www.tomiscool.net Look at the spelling and grammar used. Reliable websites are usually checked for errors. Too many spelling errors mean it’s probably not to be trusted.

Undesirable Information In addition to the Web being full of websites with inaccurate information, there are also a huge number of websites that contain highly offensive, or illegal material.

How to avoid it? Avoiding this type of material can be tricky. Many organizations such as schools, some governments (e.g. for religious reasons), and also many parents, make use of web page filtering software. This software attempts to prevent offensive and illegal material being accessed.

If filtering software is not installed: You can still take steps to help you avoid these types of sites: Use the 'safe search' feature on search engines such as Google. Don’t click the links that are shown in junk email (spam) Think carefully about the keywords that you use to search with.

Be careful when you search! If you are researching the causes of over-heating in young chickens, searching for ‘hot chicks’ might not find the information that you are looking for!

Security of Data Transfer you should always consider encrypting any sensitive or personal data that is sent or accessed over a public network such as the Internet.

Many websites, especially online shopping or online banking sites, require you to enter personal information, such as credit card numbers, social security IDs, etc. To make sure your data is safe, these websites use encryption - they are called secure websites.

You should always make sure that a website is secure before giving personal information... The website URL (address) should begin with https://... (normal, unsecure sites have addresses that start with http://...) Your web browser should show a closed padlock icon

Phishing

'Phishing' is the nickname given to the sending of fraudulent e-mails that attempt to trick people into revealing details about their bank accounts, or other online accounts (e.g. Amazon, eBay, etc.) The 'phishers' then use these bank details to login to the victim's bank account and take their money.

Pharming 'Pharming' is similar to phishing, but instead of deceiving you (as phishing does), a pharming attack deceives your computer. In a pharming attack, when you type in a completely genuine URL (e.g. for your online banking website), your computer is tricked into displaying a fake website (often a very accurate copy).

Then, when you try to login to the fake website, your username / password are recorded and used to take money from your real bank account. It is very difficult to spot pharming attacks, because to the user everything seems to be normal.

How pharming works

What’s the difference? The name 'pharming' is a mix of the terms 'phishing' and 'farming'. Phishing requires 'bait', pharming doesn't!