Presentation is loading. Please wait.

Presentation is loading. Please wait.

Polling Stations There are four questions posted in the classroom Indicate a “yes” response by placing a tally mark on the white board The results of the.

Similar presentations


Presentation on theme: "Polling Stations There are four questions posted in the classroom Indicate a “yes” response by placing a tally mark on the white board The results of the."— Presentation transcript:

1 Polling Stations There are four questions posted in the classroom Indicate a “yes” response by placing a tally mark on the white board The results of the polls will be tallied

2 Privacy and Security Issues BTT 1OE

3 Agenda Cybercrime – What is it? Credit Card Info Cookies Identity Theft Spyware Cyberstalking Role Play Need to keep information secure

4 Cybercrime How do criminals get our credit card information on the Internet? Phishing – e-mails requesting credit card information Hacking – individuals gain illegal entry into your computer Pop-Ups – another type of spam that encourages your to enter personal information

5 Cybercrime What are cookies? Are a small text file that is placed in your computer’s hard drive by websites you visit It is not a virus, but rather a footprint of the sites you have visited and allow for easy navigation (do not have to re-enter information every on every visit)

6 Cybercrime What’s the big deal? Problems arise when banner advertisers are on these sites, they too place a cookie on your hard drive These ad networks track all the information and activity you perform online Some may use it irresponsibly

7 Cybercrime Identity Theft Occurs when someone steals personal information about someone else for the purpose of impersonating him/her Usually with monetary motives Criminals will get your personal information by stealing credit card applications, bank statements, or checks from your trash or mail Same type of theft can occur online

8 Cybercrime Signs of Identity Theft Bills or statements not arriving Calls from collection agencies when you have no debt Withdrawals on your account you did not make Receive credit card statements for accounts you do not have Receive a poor credit rating on an application

9 Cybercrime Cyberstalking – What is it? Individuals who stalk others on line Starts with gathering info, beginning contact, then threats or intimidation Engage in live chat harassment or flaming (online verbal abuse/defamation) Trace individuals internet activity and are also involved in identity theft

10 Cybercrime Cyberstalking A very dangerous type of cyberstalker are sexual predators Stalk their victims to lure them Often pedophiles who target children and teens 25% people on Internet have been asked to meet face to face

11 Cybercrime

12 Moving into groups of four, you are to perform a role play based on the privacy and security issues learned in the lesson.

13 1.Use common sense when a site asks for information 2.Check for privacy policies 3.Keep separate email accounts for business and pleasure 4.Clear your cache after browsing 5.Encrypt whatever you can (https://) 6.Use anonymous web-surfing programs 7.Check your system for leaks (Web security) 8.Say no to information sharing (other org’s) 9.Use personal Internet security programs


Download ppt "Polling Stations There are four questions posted in the classroom Indicate a “yes” response by placing a tally mark on the white board The results of the."

Similar presentations


Ads by Google