Malware & Phishing By: mackenzie olson. Internet fraudsters send out spam, pop-ups, appealing websites, and desirable downloads.

Slides:



Advertisements
Similar presentations
Primary Threats to Computer Security
Advertisements

Don’t Be Tricked Beware of Zombies. Malicious zombie code infects computer Internet.
SECURITY CHECK Protecting Your System and Yourself Source:
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Online Onguard Jeopardy Invest Quest Case of the Cyber- Criminal P2P Three Play Phishing Scams Spam Scam Slam Q $100 Q $200 Q $300 Q $400 Q $500 Q $100.
The Internet = A World of Opportunities
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Security Advice Georgie Pepper Campsmount Acadamy.
Protecting Our Personal Space Security in a Virtual World.
Alisha horsfield.  Computer virus is something that copies itself to computer software.  Virus can delete the hosts important documents which includes.
Threats to I.T Internet security By Cameron Mundy.
COMMON COMPUTER SECURITY ISSUES. Jade Walker Jade Walker Campsmount Academy.
Security Issues: Phishing, Pharming, and Spam
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Over 3,000 computers are affected monthly by Malware and Phishing.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Phishing And Malware By Joey Pawoll. Major problems for you and your computer Phishing and malware are major problems for your computer This powerpoint.
Have Fun, Be Safe Strategies for Internet and Social Media Safety.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Scams & Schemes Common Sense Media.
Computer Security By: MacKenzie Olson. To be safer and more secure online, make these seven practices part of your online routine.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, + colleagues.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
Computer Technology Timpview High School.  is inexpensive and easy to use and track  Spam – s sent in bulk to many people’s .
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
Spyware By: Sydney Langley. Spyware Is software installed on your computer without your consent Spyware monitors or controls your computer use.
Computer Security By Joey Pawoll. Introduction to computer security Have you been wondering how to be safe online? Well look no further! This powerpoint.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
PROTECTION ON THE INTERNET NADIA SNOW VIRUS Is a file made to do harm or criminal activity there are many types: -worms -Trojan horse -Spyware How they.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
ICT Functional Skills Viruses and other malware. What is malware? software which is specifically designed to disrupt or damage a computer system – Viruses,
Computer viruses The effects of a virus are…  Slow loadings  Crashing  Not having control over the computer  Deleting documents.
Information Security Sharon Welna Information Security Officer.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
PHISHING & MALWARE By Bailey Hoover September 2, 2010.
Computer Security By Sierra Monif. “Access to information and entertainment, credit and financial services, products from every corner of the world —
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Computer Security By: Alex Metzler. Table of Contents Protecting Your Personal Info Know Who You’re Dealing With Use Updated Security Software Update.
safety Bailey mullan. dangers ing has become on of the main sources for communicating. When using it is more likely for someone.
HOW TO PREVENT IDENTITY THEFT ONLINE TIPS 1.WATCH OUT FOR PHISHING WEBSITES.
What is Spam? d min.
By Liam Wright Manga comic group Japan SAFETY on your computer.
Introduction to Desktop Security Protecting your computer and your data.
Internet safety By Suman Nazir
Cyber Safety Jamie Salazar.
By: Austin Kellogg. What’s the difference Phishing Scam where frauds send pop-up messages to lure personal information.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
Business Technology Applications What is Malware.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Onguardonline.gov By Austin Kellogg. Main ideas  Protect your personal information  Know who your dealing with  Use security software that updates.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Phishing & Malware By: Alex Metzler. Phishing Hackers trick you into giving personal information Malware Uses viruses/spyware to get personal information.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Protect Your Computer Against Harmful Attacks!
Scams, Identity Theft, and Viruses Kelly & Caitlin
Presentation transcript:

Malware & Phishing By: mackenzie olson

Internet fraudsters send out spam, pop-ups, appealing websites, and desirable downloads.

Recognize, Avoid, and Report Recognize malware What to do when malware hits Recognize phishing Avoid getting hooked by phishing Report it

Recognize malware Appealing websites Desirable downloads Compelling stories Computer slows down Computer won’t shut down or restart

What to do when malware hits Stop shopping, banking, and other online activities Have active and current security software Run it to scan for viruses and spyware How could it have been downloaded Don’t open unknown attachments Don’t download unknown software

Recognize phishing Spam Pop-up messages

Avoid getting hooked by phishing Don’t reply to s or pop-ups Don’t call a number they give you to update your account Update anti-virus, anti-spyware, and firewall regularly Don’t personal or financial information Review credit card and bank account statements

Report it File a complaint with the FTC Forward phishing s to Also report phishing s to

Malware and Phishing can steal your identity, so take the steps in avoiding it.

Sources OnGuard Online. Malware. [Online] January 2008http:// lware.aspxhttp:// lware.aspx OnGuard Online. Phishing. [Online] February g.aspx g.aspx