5 different ways to get tricked on the internet. 1. Viruses A virus is a computer malware program that copies it’s files to the computer. This may allow.

Slides:



Advertisements
Similar presentations
Primary Threats to Computer Security
Advertisements

Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
What is identity theft, and how can you protect yourself from it?
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
  Cyberbullying can be as simple as continuing to send e- mail or text harassing someone who has said they want no further contact with the sender.
Malicious Attacks By Chris Berg-Jones, Ethan Ungchusri, and Angela Wang.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Threats To A Computer Network
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Threats to I.T Internet security By Cameron Mundy.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Protecting Information. Who We Are We are working on our Information Assurance MBA This is part of our curriculum; to present on information security.
Your Trusted Partner In All Things IT. 20 Years of IT Experience University Automotive Food Service Banking Insurance Legal Medical Dental Software Development.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Unit 2 - Hardware Computer Security.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Ashley Chambliss ED 505 Fall 2. “Digital Citizenship is a way for teachers to prepare you for a world full of technology.” (Ribble, ) “A means.
DIGITAL CITIZENSHIP DIGITAL CITIZENSHIP By: Erica Lewis ED 505.
Staying Safe Online Keep your Information Secure.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Year 9 Autumn Assessment Computer system/Information security-Planning, Communicating, Information. By Louis Smith-Lassey 9k 9Y1.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
IT Banking Advantages and Disadvantages. Advantages IT banking is faster and more convenient for the user as they no longer are required to be at the.
Digital Citizenship. Topics  Netiquette  Copyright and Fair Use  Plagiarism  Safety on the Internet  Safety on your Computer.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
How Phishing Works Prof. Vipul Chudasama.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Safety and Security issues of using ICT Alys brooks.
Security Risks Viruses, worms, Trojans Hacking Spyware, phishing Keylogging Online fraud Identity theft DOS (Denial of Service attacks.
Computer Skills and Applications Computer Security.
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Internet safety By Suman Nazir
Threats to IT security Jordan pilcher. phishing Phishing is when companies or people from other people who think they can get away with scamming you for.
Computer crimes.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
INTRODUCTION & QUESTIONS.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
DoS Attacks Phishing Keylogging Computer Laws/Acts.
Cybersecurity Test Review Introduction to Digital Technology.
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Identity Theft SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
Malware, Phishing and Network Policies
Internet Safety Vocabulary
Computer Security.
What devices use the internet?
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

5 different ways to get tricked on the internet

1. Viruses A virus is a computer malware program that copies it’s files to the computer. This may allow the creator of the virus to take control and crash the computer. Viruses usually are made to take advantage of a security flaw in a OS. E,g, Storm Trojan. Most viruses target Microsoft windows.

Security against viruses Today, there are many antiviruses available, either free or for a fee. E.g. Norton antivirus. These packages can detect and then remove malicious software from the from the computer.

2. Internet Pranks There are many ways for false information to travel across the internet. Many users of social network put up prank posts. One of the more recent pranks was the trick that you could microwave your phone and it would charge.

3. Phishing Phishing is the attempt to acquire sensitive information (passwords or credit card details) by actings as trustworthy companies. It usually happens when s are sent by someone masquerading as a bank for example. These usually tell the user that there has been a security breach and they need there bank account details to protect them. The sender can then gain access to their all their money.

catfishing Catfishing is when a person lures someone else with a fake online persona. ?v=Cj_BCc7GORA ?v=Cj_BCc7GORA The possible motivations for this act could be revenge, sex or drugs.

Hacking Hacking is when someone seeks to exploit the weakness in a computer. They may do this to gain a profit, for a challenge or as a prank. A recent case of hacking is the Ashley Madison case who had 1200 Irish peoples account information stolen and released online.

fin