Identifying the Risks.

Slides:



Advertisements
Similar presentations
Part I: Making Good Online Choices
Advertisements

Digital Disasters Laura M Cyberbulling Digital Reputation Identity Theft Offensive or Illegal Content Sexting Unwanted Contact.
Internet Online Safety How to have FUN and Stay in Control.
INTERNET SAFETY.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Teach a man (person) to Phish Recognizing scams, spams and other personal security attacks July 17 th, 2013 High Tea at IT, Summer, 2013.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
INTERNET SAFETY FOR STUDENTS
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
Threats to I.T Internet security By Cameron Mundy.
CYBERBULLYING Hopkins School Guidance Program.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Digital Citizenship By Bhavna. Plagiarism Plagiarism is illegal and can get you arrested. If a teacher finds out you used plagiarism he/she can fail you.
Internet Safety Dr. Steve Broskoske Misericordia University.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
How can you protect yourself from online identity theft?
Staying Safe Online Keep your Information Secure.
Reliability & Desirability of Data
IT security By Tilly Gerlack.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
Agenda Last class: Internet Literacy Lab Today: Internet Safety.
Identity theft is one of the main problems in cyberspace increasing each year by 500%. Identity theft is when another public citizen/citizens take your.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Identity Theft Since 2005, there has been a dramatic increase in the occurrence of identity theft among students online.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
Activity 3 Identifying the Risks. Questions What do you do online? What sort of sites do you visit? Have you ever had a bad experience online?
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Staying Secure Online How do we buy and sell safely on the Internet?
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Your good friend enjoys uploading videos to the internet sharing top tips for Minecraft. Yesterday you went to check out his latest post and.
that keeping money and personal information safe is very important That losing money or having personal information stolen can be distressing.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Use Familiar Websites Begin at a trusted site instead of shopping with a web crawler. List items can be fixed to lead you off track, particularly when.
Cyber Info Gathering Techniques
Mrs. Esman Computer Special
As modern children, we have a huge number of electronic devices available to us. We might use computers, tablets, mobile phones or games consoles; for.
Scams & Schemes Common Sense Media.
Unit 4 IT Security.
Personal spaces.
How to use the internet safely and How to protect my personal data?
ISYM 540 Current Topics in Information System Management
How do we buy and sell on the Internet safely?
Online Safety! By: Michelle Deng.
How to use the internet safely and How to protect my personal data?
Safe Internet Mechatronika Budapest.
Effective Method to Recover Norton Antivirus Key.
Phishing is a form of social engineering that attempts to steal sensitive information.
STOP. THINK. CONNECT. Online Safety Quiz.
How to Recover the Disabled Facebook Account
Information is at the heart of any University, and Harvard is no exception. We create it, analyze it, share it, and apply it. As you would imagine, we.
Scams, Identity Theft, and Viruses Kelly & Caitlin
Internet Safety Tips for Parents.
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Shopping experience! Avoiding online fraud Ian Ramsey C of E School
Internet Safety Vocabulary
Computer Security.
Phishing Don’t fall for fake
ICT Communications Lesson 3: Internet Life and Privacy
Personal Safety Online
Internet Safety – Social Media
Company Name | Phone Number | Website | Address
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Identifying the Risks

? What do you do online? What sort of sites do you visit? Have you ever had a bad experience when going online? If you have, keep this in mind when we look at the next slides…

Risks When you go online you might come across some risks This means there are things that could go wrong and times where you might be unsafe Lets look at examples of what might happen

1. Cybersquatting Scammers will sometimes register a Web address that looks like it belongs to a real business, or one that can easily be typed by accident when you are trying to type in the real business’s Web address. Have you ever typed an address in wrong and been taken to a strange site?

www.bbcc.co.uk

2. Cookies These are small files that your Browser saves on your computer. They often include things like your login and password. Cookies can stay on your computer for months and may even record everywhere you go online

3. Data Theft Your financial and personal information can be very valuable in the wrong hands! People can take your personal details and use these if they are typed into fake or untrustworthy websites.

Fake Ebay (check URL)

4. Spending Too Much The ability to buy real or virtual things instantly when you are online can make it easy to lose track of how much money you’re spending!

5. Griefing Some people enjoy annoying other people on purpose and ruining experiences that should be fun. This could be something like sending rude messages to you on an online game or making fun of a photo/video you put online.

Minecraft Griefing

6. Identity Theft Scammers can steal your online identity by getting access to your credit card or bank information or to other information you use to prove who you are Scammers can use your details to buy things using your account information

Fake Facebook

7. Malware These programs — which may pretend to be something useful or install themselves by getting you to click a box — can hurt your computer or even take control of it

Activity In groups, read each of the scenarios Try to match each of these to the risk. Remember the examples we have just looked at and think about what is going wrong in each case