Computer Security Fundamentals

Slides:



Advertisements
Similar presentations
Cyber Safety Assessment Review
Advertisements

The Internet.
1 Identity Theft and Phishing: What You Need to Know.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Computer Security Fundamentals by Chuck Easttom Chapter 3 Cyber Stalking, Fraud, and Abuse.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Fraud and Identity Theft Test Review. Who should you contact if you are a victim of identity theft?
How It Applies In A Virtual World. Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Identity Theft Both Offline And Online It’s Not New Just Easier…
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
By: Beth Fulks COMPUTER CRIMES IN CYBERSPACE. COMPUTER FRAUD AND THEFT  Crime committed by using a computer to post false information in the hopes of.
Internet Fraud By Brianna Byard. What is it? The Internet is a place where you can buy products, meet people, and socialize. But it is very easy for people.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Company LOGO Internet Safety A Community Approach.
Internet Fraud By Jessica Habermehl &Ally Erwine Period 9.
(c) the7sisters.co.uk A Revision of staying safe on the Internet Internet Safety.
STAY SAFE ONLINE. STAY SAFE ONLINE! PLEASE MAKE SURE YOU LOGIN AT THE CORRECT BANK URL / ADDRESS 1.NEVER LOGIN VIA LINKS 2.NEVER REVEAL YOUR PIN.
Digital Citizenship By: Miranda Scorver.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
Objectives  Explore ways to prevent identity theft.  Determine the differences between identity theft and consumer fraud.  Examine how media and technological.
Protecting Your Information Assets
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
By Renata Jaruseviciute 1 ©Renata Jaruseviciute.  Financial Crime definition & types  Regulatory body  Legislation  Questions to be asked yourself.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
Computer Security Fundamentals by Chuck Easttom Chapter 13 Cyber Detective.
 Why is this important to you?  How do digital footprints connect with digital citizenship?  Does everyone have a digital footprint?
Computers, Cell Phones & the Internet JOSE CANO AND SAMIE GIDDENS.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Identity Theft Since 2005, there has been a dramatic increase in the occurrence of identity theft among students online.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
© 2008 Pearson Education, Inc. Prentice Hall Upper Saddle River, NJ Unit 4 Auction Fraud & Child Pornography The use of the Internet in an online.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
Identity Theft One of America's fastest growing crimes.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Technology Safety By: Stefanie Weston. Netiquette Dos and Don’ts for Children  Do  Respect the topic that is being discussed.  Be polite and make friends.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Protecting Your Assets By Preventing Identity Theft
INTERNET SAFETY FOR EVERYONE
Computer Security Fundamentals
To Know what Cyber crime is
GCSE ICT SECURITY THREATS.
Learn how to protect yourself against common attacks
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Unit 4 IT Security.
A Project on CYBER SECURITY
Information Security and Privacy Pertaining to Phishing and Internet Scams Brian Corl COSC 316 Information Security and Privacy.
#1 Consumer Fraud Complaint – 5th straight year!
Internet Fraud By (NAMES).
COMPUTER CRIME.
Cybersecurity Awareness
Scams, Identity Theft, and Viruses Kelly & Caitlin
Internet Safety for Everyone
A Gift of Fire Third edition Sara Baase
Internet Safety for Everyone
Protecting Your Credit Identity
Internet Safety for Everyone
Internet Safety for Everyone
Internet Safety for Everyone
Internet Safety for Everyone
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Computer Security Fundamentals by Chuck Easttom Chapter 3 Cyber Stalking, Fraud, and Abuse

Chapter 3 Objectives Know the various types of Internet investment scams and auction frauds Know specific steps youcan take to avoid fraud on the Internet Have an understanding of what identity theft is and how it is done Know specific steps that can be taken to avoid identity theft © 2016 Pearson, Inc. Chapter 3 Cyber Stalking, Fraud, and Abuse

Chapter 3 Objectives- Cont. Understand what cyber stalking is, and be familiar with relevant laws Know how to configure a web browsers privacy settings Know what laws apply to these computer crimes © 2016 Pearson, Inc. Chapter 3 Cyber Stalking, Fraud, and Abuse

Internet Fraud Works Investment Scams Auction Frauds Identity Theft Shill bidding Bid shielding Bid siphoning Identity Theft Phishing Cross-Site Scripting © 2016 Pearson, Inc. Chapter 3 Cyber Stalking, Fraud, and Abuse

Investment Scams Pump and dump Investment advice © 2016 Pearson, Inc. Chapter 3 Cyber Stalking, Fraud, and Abuse

Laws About Internet Fraud 18 U.S.C. 1028, also known as The Identity Theft and Assumption Deterrence Act of 1998 State laws against cyber stalking © 2016 Pearson, Inc. Chapter 3 Cyber Stalking, Fraud, and Abuse

Identity Theft How bad is it? Phishing Spear phishing Whaling © 2016 Pearson, Inc. Chapter 3 Cyber Stalking, Fraud, and Abuse

Cyber Stalking What is it? Real-world cases © 2016 Pearson, Inc. Chapter 3 Cyber Stalking, Fraud, and Abuse

Cyber Stalking Cases What is it? Real-world cases Robert James Murphy Massachusetts case How to evaluate cyber stalking © 2016 Pearson, Inc. Chapter 3 Cyber Stalking, Fraud, and Abuse

Protecting Against Investment Fraud Only invest with well-known, reputable brokers. If it sounds too good to be true, then avoid it. Ask yourself why this person is informing you of this great investment deal. Why would a complete stranger decide to share some incredible investment opportunity with you? Remember that even legitimate investment involves risk, so never invest money that you cannot afford to lose. © 2016 Pearson, Inc. Chapter 3 Cyber Stalking, Fraud, and Abuse

Protect Yourself Against Identity Theft Do not provide your personal information to anyone if it is not absolutely necessary. Destroy documents that have personal information on them. Check your credit frequently. If your state has online driving records, then check yours once per year. © 2016 Pearson, Inc. Chapter 3 Cyber Stalking, Fraud, and Abuse

Secure Browser Settings Internet Explorer Firefox Chrome © 2016 Pearson, Inc. Chapter 3 Cyber Stalking, Fraud, and Abuse

Protect Yourself Against Auction Fraud Only use reputable auction sites. If it sounds too good to be true, don’t bid. Some sites actually allow you to read feedback other buyers have provided on a given seller. Read the feedback, and only work with reputable sellers. When possible use a separate credit card (one with a low limit) for online auctions. © 2016 Pearson, Inc. Chapter 3 Cyber Stalking, Fraud, and Abuse

Protect Yourself Against Cyber Stalking If you use chat rooms, discussion boards, and so forth, do not use your real name. Set up a separate email account with an anonymous service, such as Yahoo!, Gmail, or Hotmail. Then use that account and a fake name online. This makes it hard for an online stalker to trace back to you personally. © 2016 Pearson, Inc. Chapter 3 Cyber Stalking, Fraud, and Abuse

Protect Yourself Against Cyber Stalking (cont.) If you are the victim of online harassment, keep all the e-mails in both digital and printed format. Use some of the investigative techniques you explore later in this book to try toidentify the perpetrator. If you are successful, then you can take the e-mails and the information on the perpetrator to law enforcement officials. © 2016 Pearson, Inc. Chapter 3 Cyber Stalking, Fraud, and Abuse

Protect Yourself Against Cyber Stalking (cont.) Do not, in any case, ignore cyber stalking. According to the Working to Halt Online Abuse Web site,19 % of cyber stalking cases escalate to stalking in the real world. © 2016 Pearson, Inc. Chapter 3 Cyber Stalking, Fraud, and Abuse

Summary Clearly, fraud and identity theft are real and growing problems. In this modern age of instant access to information and online purchasing, it is critical that everyone takes steps to protect themselves against this issue. Cyber stalking is one area that is often new to both civilians and law enforcement. Unfortunately, cyber stalking cases can escalate into real-world violence. © 2016 Pearson, Inc. Chapter 3 Cyber Stalking, Fraud, and Abuse