Https://www.youtube.com/watch?v=1hpU_Neg1KA. INTRODUCTION & QUESTIONS.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
How to protect yourself, your computer, and others on the internet
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
INTERNET SAFETY.
What is identity theft, and how can you protect yourself from it?
Social media threats. Warning! May contain mild peril.
8 Mistakes That Expose You to Online Fraud to Online Fraud.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
INFORMATION SECURITY AWARENESS PRESENTED BY KAMRON NELSON AND ROYCE WILKERSON.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Internet Fraud By: Noelle Woodman.
Scams Stevie's Scam School videos
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crimes.
P HI SH I NG !. WHAT IS PHISHING ? In computer security phishing is trying to acquire important information such as; passwords, usernames and credit card.
Staying Safe Online Keep your Information Secure.
You, Me & Technology. Overview Technology –Our relationship with technology Threats –What, Who, When, Where, Why & How Protection –What we can do to protect.
Scams & Schemes Common Sense Media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Digital Citizenship Project.  The etiquette guidelines that govern behavior when communicating on the internet have become known as netiquette.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Grades 3-5. Question #1  A) address and phone number  B) names of your friends  C) your school name and town you live in  D) All of the above Personal.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Topic 5: Basic Security.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
By Liam Wright Manga comic group Japan SAFETY on your computer.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
5 different ways to get tricked on the internet. 1. Viruses A virus is a computer malware program that copies it’s files to the computer. This may allow.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Scott Hervoyavich December 6 th, 2011 CYBERCRIME.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Identity Theft SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
An Introduction to Phishing and Viruses
Learn how to protect yourself against common attacks
IT Security  .
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
Cybersecurity Awareness
Internet Safety Vocabulary
HOW DO I KEEP MY COMPUTER SAFE?
How to keep the bad guys out and your data safe
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

INTRODUCTION & QUESTIONS

ERC / ENGLISH PROJECT ERC: CYBERSECURITY CONFERENCE ENG: CYBERSECURITY INFORMATION ENG: PSA PROJECT ERC: DISCUSSION ABOUT PSA PROJECTS

WHAT IS CYBER SECURITY? Cybersecurity concerns the technologies and processes used to protect computers, networks and data from unauthorized access, threats and attacks delivered through the Internet by cyber criminals. CYBER: ONLINE SECURITY: PROTECTION

MICROSOFT CYBER SECURITY VIDEO

DID YOU KNOW ? 75% North Americans will be a victim of cyber-crime. 31% of all hacks were a result of weak passwords. About 10% of all social media users have received a cyber-threat. More than 600,000 accounts are compromised every day on Facebook alone. 100% of mobile apps have had vulnerabilities in them ranging from low severity to critical severity. From 2008 until now, an estimated $1 trillion dollars of data was stolen around the world due to cyber-crimes. Companies are attacked an average of 16,856 times a year. The federal government has suffered a nearly 680 percent increase in cyber security breaches in the past six years. (Source) The estimated annual cost of global cyber-crimes is $100 billion. The Department of Homeland Security increased its cybersecurity workforce by 500 percent over the past two years.

- Text Messages -Twitter -Facebook -Apps - SnapChat - Instagram -Internet -

MOBILE (Cellphones/Smartphones) THREATMEANING VIRUS spread through anything you download from the Internet via your phone, by text attachments and by Bluetooth transfers. PHISHING SCAM They'll send a text or with a phone number for you to call to verify account information. They may also call you directly and ask you to enter your account number before continuing. TROJAN HORSES app downloads can delete your files and record personal information you've entered WIFI compromise your information, including your contact list, as well as give someone else use of your data plan THEFT potentially putting your stored usernames and passwords and photos in the wrong hands.

BANKING ($$$) THREATMEANING PHISHING SCAM fake s that look like ‘real' s from your bank or financial institution asking you to reply with personal information. MALWARE malicious software that cyber criminals spread online and can get onto your computer in a number of ways. PHARMING These attacks by cyber criminals involve redirecting your access to a legitimate website to a fake website (also known as "spoofing") that looks like the genuine one, but isn't.spoofing

SOCIAL NETWORKING USEHOW IS IT DANGEROUS Personal Info Criminals can copy and use that information. Links in Messages Phishing scam Geotagged Photos Geotags can expose where you live, when you're traveling and even what car you drive, which could make you a target for robbery. Status Update you could tip someone off to your routine, and invite real-life threats like robberies, break-ins or stalking. Deleted Apps the creator may still have access to your information. Jobs If you've uploaded damaging or embarrassing photos or posts to your social network account, you could hurt your reputation and your chances of employment.

A weak account password could leave your personal information vulnerable. In fact, a weak password is a cyber criminal's best friend so it's essential to create passwords that protect you.create passwords that protect you SpywareSpyware may be sent as an attachment in an and allow criminals access to your information. VirusesViruses can spread through to your entire contact list without you knowing it. Phishing scamsPhishing scams can trick you into opening attachments or giving up personal information. They appear to be s from organizations or companies you trust, but they're often the gateway to identity theft. SpamSpam can get through your filter and inundate you with unsolicited .

ONLINE GAMING THREATMEANING VIRUSES Game downloads contain viruses at times. FAKE ENTERTAINMENT SITES They ask you for your information but also steal your credit card info as well as personal identity. ONLINE PREDATORS Online gaming is gateway for online predators.

ONLINE SHOPPING THREATMEANING FAKE SITES Websites that say that they sell a certain item for a cheap price when it is a scam to acquire your personal info. FRAUD SELLERS You buy an item and you never receive it. HIDDEN COSTS You buy an item and pay more and not realizing that you paid more for something that was not there.

In Groups of 4: Find 2 positive and 2 negative points to using any of the online services mentioned: Online Shopping Online Gaming Social Networking Mobile Banking PADLET 35: PADLET 79:

In Groups of 4: When is it an appropriate age to start using/having: a) A Cellphone b) Facebook/Twitter c) Access to the Internet In your opinion, what are the THREE most important things you need to protect when dealing with online activity ?

Group: Based on the cyber attacks and the dangers present online, who do you think is to blame and why? 1) The Hackers 2) The Users 3) The Internet 4) Social Networks 5) Technology