The prudent man looketh well to his going.

Slides:



Advertisements
Similar presentations
Internet Safety Rockingham County Public Schools
Advertisements

Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Surrey Public Library Electronic Classrooms Essentials.
SECURITY CHECK Protecting Your System and Yourself Source:
How It Applies In A Virtual World. Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently.
David Abarca, Instructor Del Mar College Computer Corner Phishing, Pharming, Spear-Phishing, and now…. Vishing.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Jason Rich CIS  The purpose of this project is to inform the audience about the act of phishing. Phishing is when fake websites are created.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
How It Applies In A Virtual World
Over 3,000 computers are affected monthly by Malware and Phishing.
The Pendulum Have you forgotten your password? Your One-stop Online Writers’ Hub.
SAFETY What to be aware of and how to avoid problems. **This is not meant to make you fearful of . The goal of this discussion is to make sure.
Day 3 Cybersafety Presented by FJUHSD Teacher Librarian.
P HI SH I NG !. WHAT IS PHISHING ? In computer security phishing is trying to acquire important information such as; passwords, usernames and credit card.
Matthew Hardaway CSCI101 Thursday 3:30pm.  Fishing (Encyclopedia Britannica): ◦ Sport of catching fish—freshwater or saltwater— typically with rod, line,
Scams & Schemes Common Sense Media.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
Basic User Guide to Outlook. Info: Manage account settings, create automatic replies to s, clean up your mailbox, and create Rules and Alerts Print:
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
Potential Members go to our micro sites via the edm mail. User will be forwarded to Paypal payment gateway with security access. Fill in credit card info,
Basics.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Outlook Web App Crash course. Outlook Agenda Login Login Reset Password Reset Password Getting Started in Outlook Web App Getting Started in Outlook Web.
How to Attach a File to an . Step One Log onto the Internet and then onto Click on Student Resources.
CCT355H5 F Presentation: Phishing November Jennifer Li.
You will receive an containing the log in information and the link to NTREIS Transactions. Q: I just received an order, what do I do next? From:
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
By Tia, Amy & Carly Don’t share any of these things to anyone:  Phone number  address  Where you live  Your name  Age  Sex  Photos of yourself.
A Euronet Worldwide Company Welcome to epay WebPOS! Use this index to find detailed instructions for WebPOS and begin taking payments today!! 1.Downloading.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
By Liam Wright Manga comic group Japan SAFETY on your computer.
October is National CyberSecurity Awareness Month OIT and IT providers across campus are launching an awareness campaign to provide tips and resources.
Santa’s s By Alexander Britton. Sending an .
Cyber Safety Jamie Salazar.
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
Electronic Mail. Gmail Accounts USERNAME Skyward PASSWORD Same password as you use to log in to your computer.
Do you know who you’re dealing with? Social Engineering: Minimise the risk of becoming a victim.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
How To Change Your YouTube Gmail Account?. Process To Change YouTube Account Your address on YouTube is your Google Account .
Important Information Provided by Information Technology Center
3.2 Introduction to .
Phishing, identity theft, and more
Learn how to protect yourself against common attacks
Information Security and Privacy Pertaining to Phishing and Internet Scams Brian Corl COSC 316 Information Security and Privacy.
is short for electronic mail!
Phishing, what you should know
Information Security 101 Richard Davis, Rob Laltrello.
Protect Your Computer Against Harmful Attacks!
Yahoo tech support Services Contact Now For more details visit at:- support-numberus.com/yahoo-support-number/ support-numberus.com/yahoo-support-number/
Direct Secure Messaging Changing Your contact
Electronic Mail.
Multifactor Authentication & First Time Login
Step 2 MyPCC Account Setup
Electronic Mail.
Electronic Mail Opening Activity: 411 of
3.2 Introduction to .
Electronic Mail.
Internet Safety and Security Curtis Shaw nwtel.ca November 2012
Electronic Mail.
Setting up a Gmail Account & Safety Kamlesh Singh Bisht IT Specialist.
What is Phishing? Pronounced “Fishing”
Presentation transcript:

The prudent man looketh well to his going. Phishing and You The prudent man looketh well to his going.

Phishing defined Webster’s Dictionary: To request confidential information over the Internet under false pretenses in order to fraudulently obtain credit card numbers, passwords, or other personal data.

Perfect example This email was forwarded to ABUSE@UTC.EDU from a customer at UTC: -----Original Message----- From: webmaster [mailto: ] Sent: Tue 5/5/2009 3:44 PM Subject: Mailbox Shutdown Notification You are expected to verify your email account to avoid mailbox shutdown by furnishing us with the following To avoid shutting down of your mailbox which could lead to loss of your important files on our server,you must send these details on receipt of this message. Thank you very much. Webmaster webmaster@iturnon.co.th detials: Login Username: Login password: **************

Not what you might think Links won’t always take you where you want to go

Spelling counts www.bankofameria.com ≠ www.bankofamerica.com

Keep your eye on the ball

Protect yourself Don’t trust links in email Never give out personal info in an email Check the web address Type the web addresses you know Don’t call the phone numbers in strange emails Never open unexpected email attachments

Additional resources http://www.securitycartoon.com http://www.phishtank.com http://www.antiphishing.org http://blog.utc.edu/ITDAnnouncements Any additional questions or concerns: Contact the UTC ITD at 425-4000