Section 6 Theory Issues with information found on the Internet.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

ICT iGCSE.  You should be able to describe the use of Internet developments such as:  Web 2.0  blogs  wikis  digital media uploading websites  social.
By fox. You will need to log onto your computer and the you will need to open up any searching device : Google chrome, internet explorer or fire fox.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Jason Rich CIS  The purpose of this project is to inform the audience about the act of phishing. Phishing is when fake websites are created.
Starter for 10 Unit 3: Stay safe online Transform IT SFT03_stay_safe_online.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
ICT Curriculum Evening – an introduction to Wizkid.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Opening a bank account.
INFORMATION SECURITY AWARENESS PRESENTED BY KAMRON NELSON AND ROYCE WILKERSON.
Using the Internet? Is the internet a safe place?.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Threats to I.T Internet security By Cameron Mundy.
Security Issues: Phishing, Pharming, and Spam
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Social impacts of the use of it By: Mohamed Abdalla.
G046 Lecture 05 Task E Briefing Notes Mr C Johnston ICT Teacher
Security of systems Security risks come from two areas: employees (who introduce accidental and intentional risks) and external computer crime. Unfortunately.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Reliability & Desirability of Data
Impacts of the use of IT -Social network sites This is a site that lets you post messages, upload pictures and stories on your own personal page. You can.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Section 6 Theory Software Copyright, Viruses and Hacking.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Dangers of the Internet CEL : C O M P U T E R S I N E V E R Y D A Y L I F E CEL 1 Dangers of the Internet Name: ____________________ Class: ________________.
Section 4 – Computer Networks Setting up a small network.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
Spam Act 2003 Consumer Education and Awareness. About the ACA Independent government regulator Ensures industry compliance with legislation (Telecommunications.
Starter How many methods of keeping data secure can you think of… Username and Password Biometrics Digital Signature Encryption Access Levels Physical.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Etiquette – a list of rules that we observe Phishing - sending an to a user falsely claiming to be a legitimate company to scam the user into providing.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
ONLINE COMMUNICATION 2 Lesson 5. Starter  How has online communication changed the way in which we communicate?  How has online communication affected.
Dimeji Ogunshola 10b  There are many threats to your computer system. The computer threats can be mainly transferred through unknown s or accidental.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
BY : MUHAMMAD KHUZAIMI B. ISHAK 4 ADIL PUAN MAZITA INFORMATION AND COMMUNICATION OF TECHNOLOGY.
3.4 How do businesses operate1 Unit 3.3/4.3 Information in Decision Making.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
Internet Safety Internet Safety LPM
BY JESSICA SCHOLEY p1. Id Fraud Is When Someone Pretends To Be Someone Else Using There Address, Birthday And Other Information. People Also Use Id Fraud.
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Threats to IT security Jordan pilcher. phishing Phishing is when companies or people from other people who think they can get away with scamming you for.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
Policies and Security for Internet Access
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
An Introduction to Phishing and Viruses
Antisocial use of ICT and Computer Fraud
Internet developments
TB2 Lesson 8 Online Banking
Starter What is identity theft?
What is it? Why do I keep getting from Barracuda? SPAM.
Shopping experience! Avoiding online fraud Ian Ramsey C of E School
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Unit 4 IT Security Kerris Davies.
Unit 1 Fundamentals of IT
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Wireless Spoofing Attacks on Mobile Devices
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Lesson 2: Gathering and Organizing Information Using ICT KEY QUESTION: HOW DO YOU GATHER AND ORGANIZE INFORMATION USING THE COMPUTER AND INTERNET?
Presentation transcript:

Section 6 Theory Issues with information found on the Internet

Lesson Objectives By the end of this lesson you will be able to: (a)Understand that internet can be unreliable (b)Understand that undesirable information exists on the internet. (c)Realise that connecting to the internet can pose a security risk.

Starter- Are these sites genuine? m/fisher/ m/fisher/ No they are all bogus(false) sites

Is the internet reliable? “Just because information is on the internet does not make it true. Any information from the internet needs to treated with caution” Write down this statement. Information on the internet can be unreliable. List three reasons why? Lets share our answers.

Why use information from the internet? AdvantagesDisadvantages Information up-to-date compared to booksInformation can be unreliable Quick to search for informationCould be too much information to read (too many hits) Available on home computer or mobile device Can obtain information from other parts of the world Checks for accurate information Check the site is up-to-date Only use sites produced by organisations you have heard of or know to be reliable. Use several sites to compare and check information is similar. Check the links work, as bogus sites often have faulty links Is the author stated? Are they an expert/reputable/known in that field?

Is the Internet Bad? Once you are connected to the internet others may hack your system. There are security concerns about the information you exchange online, these are as follows:

Phishing ture=related This is getting people to reveal, username, passwords, credit cards details, account details etc. by the use of s.

Pharming Only play 1min 50 sec When software/malware stored on your computer redirect the user to a bogus site and not the website they wanted. Problems – Website look the same – Collect passwords and banking/credit card detail - used for fraud

Spam Bulk/junk sent from people unknown, sent to everyone hoping a few will read/open the . Problems – Spam can carry viruses – Spammers collect to send spam – Spam filter software can filter spam but good s can end up as spam.

Capabilities and limitation of ICT Using the task sheet in section 06 - The Effects of Using ICT, lesson 3 Capabilities and limitation of ICT.doc and the information on pages 57 & 58 write a description for each feature.

Plenary Questions … List three security risks associated to connecting to the internet? Answer: Phishing Pharming Spam What is the meaning of each?

aA6UV9iQOo&feature=relmfu