Lesson 2- Protecting Yourself Online

Slides:



Advertisements
Similar presentations
Part I: Making Good Online Choices
Advertisements

Victoria ISD Common Sense Media Grade 6: Scams and schemes
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
What is identity theft, and how can you protect yourself from it?
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Threats to I.T Internet security By Cameron Mundy.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Protecting Yourself Online (Information Assurance)
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Scams & Schemes Common Sense Media.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Internet Safety Internet Safety LPM
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
Cyber Safety Jamie Salazar.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Protecting Your Assets By Preventing Identity Theft 1.
Cybersecurity Test Review Introduction to Digital Technology.
Any criminal action perpetrated primarily through the use of a computer.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Computer Security Keeping you and your computer safe in the digital world.
Internet Safety.
Protecting Your Assets By Preventing Identity Theft
INTERNET SAFETY FOR EVERYONE
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Scams & Schemes Common Sense Media.
DIGITAL CITIZENSHIP What You Should Know!.
Class Name: Online Safety & Privacy Basics
Learn how to protect yourself against common attacks
Internet Identity, Safety, & Security
Unit 4 IT Security.
Digital Citizenship Middle School
Protecting What’s Yours: Your Identity
Lesson 3 Safe Computing.
Homeland Security: Computer Protection
Cyber Security By: Pratik Gandhi.
Protecting your personal information and privacy
Protect Your Computer Against Harmful Attacks!
Year 10 ICT ECDL/ICDL IT Security.
Lesson 2- Protecting Yourself Online
Cybersecurity Awareness
Scams, Identity Theft, and Viruses Kelly & Caitlin
Risk of the Internet At Home
Internet Safety for Everyone
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
HOW DO I KEEP MY COMPUTER SAFE?
Internet Safety for Everyone
Internet Safety for Everyone
Internet Safety for Everyone
Internet Safety for Everyone
Internet Safety for Everyone
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Identity Theft By Omer Ersen.
Presentation transcript:

Lesson 2- Protecting Yourself Online

Objectives Determine the strength of passwords Protect against identity theft Determine how to remain safe on public networks Evaluate online threats Protect against malware/hacking

Passwords Good password practices: The whole purpose of a password is to keep important, private information safe. Good password practices: Strong passwords use upper and lower case letters, numbers and symbols. (8 or more characters) Don’t share your passwords with anyone Change your password frequently or use a different password for every site you visit Don’t use information that is personal or easy to guess Discussion tips: Have students share their definition of digital footprint before revealing. Discuss how important it is to be careful what we add to our digital footprints. Have students discuss what types of entities consider information found in the digital footprint. (i.e., jobs, college admissions, etc…) Have students think of/share examples where they or someone they knew has something embarrassing or regretful in their digital footprint. Weak passwords: Bickerton01 Fluffy1992 Strong passwords: Fi#1c@t! (Fluffy is # 1 cat!) #Ih8P@$$words (I hate passwords)

I1uvS0ccer#1976 Bigbro01 Dimlyf3!7 Tissue_12 Examples I1uvS0ccer#1976 Bigbro01 Dimlyf3!7 Tissue_12 Answers: Strong Weak

Hacking/Malware Hacking is the act of cracking into a computer to steal information. Malware is software that has malicious intent. Two types of malware: Discussion tips: Ask students about their experiences with hacking/malwareHacking is the act of cracking into a computer to steal information. A computer virus attaches itself to a file or program, enabling it to spread from one computer to another. Worms spread from one machine to another, rapidly, without human action.

Antivirus Software Antivirus software is a computer program that detects, prevents, and takes action to disarm or remove malicious software programs, such as worms and viruses. Malware can be shared by: • E-mail attachments • Fictitious websites • Pop-up ads • Spam

Hacking/Malware Defenses Avoid attacks by: Do not open emails or attachments from unfamiliar email addresses Question suspicious attachments from people you do know Right-click the pop-up taskbar or use the task manager to close pop-up ads Discussion tips: Students may have some knowledge on the subject here. Have them share how they avoid attacks. Avoid attacks by: Use tools to prevent viewing potentially dangerous sites (ad blocker)

Internet Scams The goal of an internet scam is to trick someone into giving money or sharing information. Some of the most common Internet scams include: • Lottery wins • Contest wins • IRS audit • Dating schemes • Jury duty • Bank or credit card company Discussion tips: Discuss details of some of the internet scams you have encountered. Allow students to discuss internet scams they have encountered.

Avoiding Internet Scams Ways to Avoid Internet Scams: Never provide your social security number. Your other personal information should also be kept personal. If you are receiving some type of deal or offer, get the facts before making any commitments.

Identity Theft Identity theft is when someone wrongfully obtains and uses another person’s personal data, typically for economic gain. There are four major types of identity theft: Financial – thief spends another person’s money or opens a line of credit in their name. Criminal – thief uses someone else’s identity to commit a crime. Governmental – thief uses SSN to file taxes or reap other governmental benefits. Medical – thief uses identity to gain medical treatment or commit insurance fraud.

Public Networks Free Wi-Fi is typically offered on public networks, which are generally unencrypted. If the network is unencrypted, that means the data sent back and forth between your device and wireless router can be viewed by others. Discussion tips: Ask students how safe they believe public networks to be. Special encryption called HTTPS can protect your web browsing information.

Public Networks Handling financial transactions (online banking) Here are some tasks you should avoid while on a public network: Handling financial transactions (online banking) Logging into social media accounts Sending email Logging on to false Wi-Fi networks