Learn how to protect yourself against common attacks

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Primary Threats to Computer Security
Victoria ISD Common Sense Media Grade 6: Scams and schemes
COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
SECURITY CHECK Protecting Your System and Yourself Source:
1 Identity Theft and Phishing: What You Need to Know.
What is identity theft, and how can you protect yourself from it?
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Internet safety By Lydia Snowden.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Scams & Schemes Common Sense Media.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
What is Spam? d min.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
Cyber Safety Jamie Salazar.
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Any criminal action perpetrated primarily through the use of a computer.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Fall Phishing - attempt to acquire sensitive information, like bank account information or an account password, by posing as a legitimate entity.
Internet Safety.
INTERNET SAFETY FOR EVERYONE
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Fraud Protection.
Edexcel GCSE Cyber security threats Computer Science 1CP1
Scams & Schemes Common Sense Media.
Fraud protection.
PHISHING Hi, The comms team asked if I could refresh everyone about Phishing after a fairly successful phishing circulated last week that led to.
DIGITAL CITIZENSHIP What You Should Know!.
IT Security  .
Unit 4 IT Security.
Digital Citizenship Middle School
Lesson 3 Safe Computing.
Unit 11 Communication & Collaboration
What to be aware of and how to avoid problems.
Phishing is a form of social engineering that attempts to steal sensitive information.
Unit 4 IT Security.
Protect Your Computer Against Harmful Attacks!
Lesson 2- Protecting Yourself Online
Information Security Session October 24, 2005
Internet Safety for Everyone
BCT 2.00 Analyze Technology Issues
Internet Safety Vocabulary
HOW DO I KEEP MY COMPUTER SAFE?
Internet Safety for Everyone
Computer Security.
Internet Safety for Everyone
Internet Safety for Everyone
Securing your system, protecting your digital data and devices.
What is Phishing? Pronounced “Fishing”
Lesson 2- Protecting Yourself Online
Internet Safety for Everyone
Internet Safety for Everyone
Communicating in the IT Industry
Cybersecurity Simplified: Phishing
Presentation transcript:

Practice e-mail safety Learn how to protect yourself against common e-mail attacks Copyright ©2005 CNET Networks, Inc. All rights reserved.

Copyright ©2005 CNET Networks, Inc. All rights reserved. Preventing problems Many malicious acts, such as identity theft, viruses, and scams, are perpetrated through e-mail. The best protection from these schemes is knowing what to look for. Copyright ©2005 CNET Networks, Inc. All rights reserved.

Copyright ©2005 CNET Networks, Inc. All rights reserved. Why e-mail? There are currently over 500 million e-mail users worldwide. Currently, there are 50 billion e-mails sent every day. This is a huge potential market for people trying to sell, steal, or simply harm others. Copyright ©2005 CNET Networks, Inc. All rights reserved.

A huge amount of bad e-mail According to a Canadian study, 73% of all e-mail sent in 2004 was SPAM. America Online currently blocks over 3 billion SPAM e-mails per day. With this many e-mails floating around, everyone needs to be aware of what to look for in e-mail. Copyright ©2005 CNET Networks, Inc. All rights reserved.

Copyright ©2005 CNET Networks, Inc. All rights reserved. Types of bad e-mails Viruses and worms Phishing scams SPAM Chain letters Copyright ©2005 CNET Networks, Inc. All rights reserved.

Copyright ©2005 CNET Networks, Inc. All rights reserved. Viruses and worms Many types of computer viruses are spread through e-mail. However, there are some steps that users can take to help prevent becoming infected. Copyright ©2005 CNET Networks, Inc. All rights reserved.

Copyright ©2005 CNET Networks, Inc. All rights reserved. Attachment safety Never open e-mail attachments from someone you do not know. If you think the attachment may be legitimate, send an e-mail to the person who sent it, and confirm that they indeed did send it. Always make sure your antivirus software is up to date. Your antivirus software will combat many bad attachments that could lead to a virus infecting your system. Copyright ©2005 CNET Networks, Inc. All rights reserved.

Copyright ©2005 CNET Networks, Inc. All rights reserved. Opening e-mails If you think something seems wrong with an e-mail, delete it immediately If you get a window asking you to install something when you open an e-mail, click “No” or simply exit, and then delete the e-mail If an e-mail directs you to a Web site that asks you to install something, click “No” or exit, and then delete the e-mail Copyright ©2005 CNET Networks, Inc. All rights reserved.

Copyright ©2005 CNET Networks, Inc. All rights reserved. Phishing Phishing is a way of fraudulently acquiring sensitive information, such as credit card or bank account information by tricking users with official-looking messages Copyright ©2005 CNET Networks, Inc. All rights reserved.

Types of phishing scams E-mail Phishing e-mails can appear to come from legitimate institutions such as your bank, eBay, Visa, etc., but they really come from a criminal trying to steal information Instant Messenging (IM) With IM phishing, you will get an IM from someone claiming to be support for your IM provider, asking you for account information Copyright ©2005 CNET Networks, Inc. All rights reserved.

How to not become a phishy Never send sensitive account information in an e-mail message Never go to a sensitive site through an e-mail link; always type the site name in your browser (such as www.paypal.com) Never give any password out to anyone. If your bank requires verification, do it over the phone or in person. Verify any person who contacts you unsolicited, claiming to be customer support Copyright ©2005 CNET Networks, Inc. All rights reserved.

Copyright ©2005 CNET Networks, Inc. All rights reserved. The SPAM problem SPAM is unsolicited commercial e-mail. SPAM e-mails are sent en mass, to thousands of people in an attempt to get them to purchase a product ranging from night lights to prescription medications. SPAM messages account for over 36 billion e-mail messages per day. Copyright ©2005 CNET Networks, Inc. All rights reserved.

Copyright ©2005 CNET Networks, Inc. All rights reserved. Ways to combat SPAM Never buy anything from a SPAM e-mail; SPAM continues to exist because it works Take advantage of SPAM filtering in your e-mail client (such as Microsoft Outlook 2003) Do not use your e-mail address to sign up for things on the Internet without reading the company’s privacy policy (make sure they won’t sell your e-mail address to other companies). Copyright ©2005 CNET Networks, Inc. All rights reserved.

Copyright ©2005 CNET Networks, Inc. All rights reserved. Chain letters Chain letters cover any variety of topics, anything from spiders in the toilet to free gift certificates or even getting paid to forward the e-mail. They are all hoaxes, and should be avoided. Copyright ©2005 CNET Networks, Inc. All rights reserved.

Copyright ©2005 CNET Networks, Inc. All rights reserved. Break the chain The problem with chain letters is the sheer volume of mail they create. If one person forwards 1 message to 10 people, and each of them forwards it to 10 people, by the sixth generation you have over 1 million messages. If you figure in the cost of each of those people reading the chain letter, you end up with a huge cost. This does not include the cost associated with the mail servers storing and sending all those messages, or slowing down because of the extra load. Copyright ©2005 CNET Networks, Inc. All rights reserved.

Copyright ©2005 CNET Networks, Inc. All rights reserved. Go forth and be safe … Copyright ©2005 CNET Networks, Inc. All rights reserved.