Ethics Tutorial Assignment#2

Slides:



Advertisements
Similar presentations
Protect Yourself Against Phishing. The good news: The number of US adult victims of identity fraud decreased from 9.3 million in 2005, to 8.4 million.
Advertisements

Hacker’s tricks for online users to reveal their sensitive information such as credit card, bank account, and social security. Phishing s are designed.
8 Mistakes That Expose You to Online Fraud to Online Fraud.
Jason Rich CIS  The purpose of this project is to inform the audience about the act of phishing. Phishing is when fake websites are created.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Phishing, Pharming, and Spam Margaret StewartTuesday, Oct. 21, 2006.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Identity Theft Kayla Brooks 7 th Grade Marshall Middle School Mr. Dryer.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Digital Citizenship Project
P HI SH I NG !. WHAT IS PHISHING ? In computer security phishing is trying to acquire important information such as; passwords, usernames and credit card.
Matthew Hardaway CSCI101 Thursday 3:30pm.  Fishing (Encyclopedia Britannica): ◦ Sport of catching fish—freshwater or saltwater— typically with rod, line,
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
Reliability & Desirability of Data
Scams & Schemes Common Sense Media.
Computer Ethics. 2 Networking * The Internet is a network of networks that uses two protocols, known as TCP/IP, to control the exchange of data. * The.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
What is Phishing?.  Phishing attempts are attempts to get valuable personal information from people via the internet.  Attempts usually come in the.
Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
CCT355H5 F Presentation: Phishing November Jennifer Li.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
BY : MUHAMMAD KHUZAIMI B. ISHAK 4 ADIL PUAN MAZITA INFORMATION AND COMMUNICATION OF TECHNOLOGY.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
Phishing Dennis Schmidt, CISSP Director, Office of Information Systems HIPAA Security Officer UNC School of Medicine UNC School of Medicine.
What is Spam? d min.
BY JESSICA SCHOLEY p1. Id Fraud Is When Someone Pretends To Be Someone Else Using There Address, Birthday And Other Information. People Also Use Id Fraud.
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
Phishing and online fraud What parents need to know.
Lecture2 Networking. Overview and spam World Wide Web Censorship Freedom of expression Children and inappropriate content Breaking trust on the.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
 Definition  How thieves steal identity  Origin  Possible impacts on the small island nation of Vanuatu  Precaution Measures.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
 77.4% of the perpetrators are male.  50% live in one of the following states: California, New York, Florida, Texas, and Washington.  55.4% complainants.
PHISHING A Melbourne Athenaeum Library Cybersafety Information Guide
A Student’s Guide to Proper and Safe Web Behavior
Mrs. Esman Computer Special
Phishing, identity theft, and more
Done by… Hanoof Al-Khaldi Information Assurance
Learn how to protect yourself against common attacks
Identity theft vector of the electronic age
ISYM 540 Current Topics in Information System Management
Lesson 3 Safe Computing.
Information Security and Privacy Pertaining to Phishing and Internet Scams Brian Corl COSC 316 Information Security and Privacy.
Phishing, what you should know
Unit 11 Communication & Collaboration
What to be aware of and how to avoid problems.
How to Protect your Identity Online PIYUSH HARSH
Information Security Session October 24, 2005
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Phishing Don’t fall for fake
Setting up a Gmail Account & Safety Kamlesh Singh Bisht IT Specialist.
Personal Safety Online
Internet Safety – Social Media
Social Engineering Humans are often the weakest point in security
What is Phishing? Pronounced “Fishing”
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Ethics Tutorial Assignment#2 Ins.Arwa Al-Issa Footer Text 11/16/2018

Question 1 What is spam? What does a spam filter do? Spam is unsolicited, bulk email. A spam filter attempts to keep spam from reaching someone’s mailbox by identifying and discarding (or routing to a special folder) emails that appear to be spam. Footer Text 11/16/2018

Question 2 What characteristics of the Internet make censorship difficult? Censorship is difficult on the Internet because: (a) The Internet supports many-to-many communication. The Internet has far more information outlets than television or radio. (b) The Internet is dynamic. Millions of computers are being added to the Internet every year. Footer Text 11/16/2018

Question 2 (c) The Web is huge, containing billions of pages. Nobody can keep track of everything published on the Web. (d) The Internet is global. Laws passed in one nation may have no effect outside that nation’s borders. (e) It is hard to distinguish between children and adults on the Internet. Footer Text 11/16/2018

Phishing Phishing is a type of online fraud that tries to trick you into revealing personal financial information, passwords, credit card numbers, etc. In most cases, phishing takes the form of an e-mail message claiming to come from a bank, credit card Company, online retailer or some other legitimate source. Footer Text 11/16/2018

Question 3 Phishing is kind of identity theft define it? Search the Internet to find an example; you may have a real example show it to us? Use of email to attempt to deceive people into revealing personal information. Footer Text 11/16/2018

Footer Text 11/16/2018

Phishing Phished email: Don’t specify your name Have a spelling or grammar mistake Usually contains a link that directs you to another website. 1- They do not say my name. It is addressed to Dear Commonwealth Bank client. If this was truly from the Commonwealth Bank it would say Dear Heather. 2- The grammar and typos. If you look closely there are a couple of errors that you would not expect to find in an email from such a respected organization. They rely on the fact that most of us don’t read these emails in depth but rather skim over and don’t notice these errors. 3- You should always check the link that the email is sending you to. You can do this by hovering your mouse over the link without clicking on it. The image below shows the link for the email that I received. Although it has www.commonwealth.com.au in the link it is the first part of the link that is important. So the website we are being directed to is www.fmslnj.com which is definitely not the Commonwealth Bank. Footer Text 11/16/2018

Footer Text 11/16/2018

Thanks Arwa Al-Issa 11/16/2018