Presentation is loading. Please wait.

Presentation is loading. Please wait.

Click here to start. NextPrevious Threat Trends in Australia One in five children (10 to 17 years old) receive unwanted sexual solicitations online Identity.

Similar presentations


Presentation on theme: "Click here to start. NextPrevious Threat Trends in Australia One in five children (10 to 17 years old) receive unwanted sexual solicitations online Identity."— Presentation transcript:

1 Click here to start

2 NextPrevious Threat Trends in Australia One in five children (10 to 17 years old) receive unwanted sexual solicitations online Identity theft and financial fraud have become much more widespread Cyber-bullying is on the rise – by e-mail, blogs, SMS etc. Phishing attacks are becoming more sophisticated – targeted social engineering Malicious code is proliferating and being used for financial gain Hackers are promulgating attacks through armies of zombie computers – or “BotNets”

3 NextPrevious Viruses/Worms Software programs designed to invade your computer, and copy, damage or delete your data Trojan Horses Viruses that pretend to be programs that help you while destroying your data and damaging your computer Spyware Software that secretly watches and records your online activities or send you endless pop-up ads Leading Threats to PC Security

4 NextPrevious Turn on an Internet firewall Keep the operating system up to date Install and maintain antivirus software Install and maintain antispyware software Four Steps To Protect Your Computer

5 NextPrevious Turn on an Internet Firewall An Internet firewall is like a moat around a castle, creating a barrier between your computer and the Internet

6 NextPrevious Keep Your Operating System Updated Install all security updates as soon as they are available Automatic updates provide the best protection

7 NextPrevious Install Antivirus Software Anti-virus software can detect and destroy computer viruses before they can cause damage Just like flu shots, for anti-virus software to be effective, you must keep it up to date Don’t let it expire

8 NextPrevious Install And Maintain Antispyware Software Use anti-spyware software so unknown people cannot lurk on your computer and potentially steal your information Spyware may slow your computer, show pop up ads, change computer behavior and track your activity Automatic updates often provide the best protection

9 NextPrevious Spam Unwanted e-mail, instant messages, e-cards, and other online communication Phishing E-mail sent by online criminals that tries to trick you into revealing personal information Identity Theft A crime where con artists get your personal information and access your cash and/or credit Hoaxes E-mail sent by online criminals that tries to trick you into giving them money Leading Threats to Personal Online Safety

10 NextPrevious Take Steps to Help Protect Yourself Practice Internet behavior that lowers your risk Manage personal information carefully Use technology to reduce nuisances, and raise the alarm when appropriate

11 NextPrevious Delete Spam without Opening It Never reply to spam Technology can help you identify spam so you can delete it Many Internet providers delete it for you Sign up to the ACMA SpamMatters Tool: www.spam.acma.gov.au

12 NextPrevious Be on the Lookout for Scams! There are signs that can alert you to e-mail scams Alarmist messages and threats of account closures Promises of big bucks for little effort Deals that sound too good to be true Misspellings and grammatical errors Go to: www.scamwatch.gov.au for the latest known scams by the ACCC.www.scamwatch.gov.au

13 NextPrevious Don’t Share Personal Information Delete e-mails that request personal information Do not use e-mail or instant messages to share personal information Secure websites with trusted vendors are different

14 NextPrevious Use Strong Passwords Keep passwords private and create ones that are hard to “crack” Never share your passwords with friends or be tricked into giving them away Passwords are often “cracked” by high speed computer programs – not guesswork

15 NextPrevious What do Phish look like? Phishing emails will: Ask you to provide personal details such as bank account numbers, dates of birth etc Often provide a link for you to follow

16 NextPrevious Phishing Filters Can be built into Browsers e.g. Internet Explorer, MSN / Windows Live Toolbar (Opt-in required to turn it on) Most phishing sites are active for 2 to 3 days, at the most 3 “checks” to protect you from phishing Compares web site with local list of known legitimate sites Scans the site for characteristics common to phishing sites Double checks site with online Microsoft service of reported phishing sites dynamically updated Level 1: Warn Suspicious Website Signaled Level 2: Block Confirmed Phishing Site Signaled and Blocked Two Levels of Warning and Protection in IE7 Security Status Bar

17 NextPrevious Phishing Filters If the site is flagged as suspicious you receive a warning, so you can investigate and make an informed choice.

18 NextPrevious Phishing Filters If the site is flagged as a known phishing site, it is blocked. You have to choose to continue to get to the site.

19 NextPrevious More Safe Internet Behavior Back up your files regularly Think before you click Read website privacy statements Close pop-ups using red “X”

20 NextPrevious Back Up Your Files Save to CD, DVD or flash drive Use a Web-based backup service

21 NextPrevious Think Before You Click Don’t open e-mail attachments unless you know what they contain and who sent them Only download files from websites you trust

22 NextPrevious Read Privacy Statements Understand what you are getting before you agree to download or share your personal information

23 NextPrevious Close Pop-ups Using Red “X” Always use the red “X” in the corner of a pop-up screen Never click “yes,” “accept” or even “cancel”, because it could be a trick that installs software on your PC

24 NextPrevious Predators These people use the Internet to trick children into meeting with them in person File-share Abuse Exchanging music, video, and other files with strangers may be illegal, and can give them access to your PC or download viruses or worms Cyber-bullies Both children and adults may use the Internet to harass or intimidate other people Invasion of Privacy If kids fill out online forms, they may share information you don’t want strangers to have about them or your family Disturbing Content If kids explore unsupervised, they could stumble upon images or information you may not want them exposed to Leading Online Risks for Youth

25 NextPrevious Take Steps to Help Protect Young People Talk with kids about what they do online Keep personal information private Set clear rules for Internet use Use family safety software

26 NextPrevious Reporting SPAM and Scams Australian Communications and Media Authority (ACMA) www.acma.gov.au One click reporting tool for spam. See FAQ’s and SpamMatters Download tool at: www.spam.acma.gov.au For guidance on reporting scams, go to: http://www.scamwatch.gov.au/content/index.p html/tag/reportascam http://www.scamwatch.gov.au/content/index.p html/tag/reportascam

27 NextPrevious Reporting Offensive Material or Child Abuse Images In an emergency (if a child is being abused or in danger of being abused): –Dial 000 –Crimestoppers: www.crimestoppers.com.auwww.crimestoppers.com.au To report suspicious behaviour online (online sexual exploitation): https://www.afp.gov.au/online_forms/ocset_form For illegal or offensive content: www.acma.gov.au

28 NextPrevious If You Become a Victim of Cybercrime Report it to: –Your state or territory police agency (if necessary, they will refer it to the Federal authorities) –Crimestoppers: www.crimestoppers.com.auwww.crimestoppers.com.au Preserve information stored in your computer as evidence (and save to CD or flash drive). Keep a log of all online sessions or print them out. Save any annoying or threatening email. Follow-up in writing. Change all of your passwords.

29 NextPrevious Recap: Internet Safety Protection Basics Your PCs 1.Turn on an Internet firewall 2.Keep your operating system up to date 3.Install and maintain antivirus software 4.Install and maintain antispyware software 5.Use only trusted sites Yourself 1.Practice Internet behavior that lowers risk 2.Manage your personal information carefully 3.Use technology to reduce nuisances, and raise the alarm when appropriate 4.Stay alert and think before you click Your children 1.Talk with your children about what they do online 2.Teach them to keep personal information private 3.Set clear guidelines for Internet use 4.Use family safety software

30 NextPrevious For More Information www.staysmartonline.gov.au www.microsoft.com/athome/security http://international.isafe.org www.ahtcc.gov.au www.thinkuknow.com.au www.netalert.com.au www.staysafe.org/unicef www.acma.gov.au www.virtualglobaltaskforce.com www.crimestoppers.com.au


Download ppt "Click here to start. NextPrevious Threat Trends in Australia One in five children (10 to 17 years old) receive unwanted sexual solicitations online Identity."

Similar presentations


Ads by Google