ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Computer Viruses.
Malicious Attacks By Chris Berg-Jones, Ethan Ungchusri, and Angela Wang.
Malicious Attacks Angela Ku Adeline Li Jiyoung You Selena Yuen.
Threats To A Computer Network
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Quiz Review.
Viruses, Worms & Trojan Horses
Threats to I.T Internet security By Cameron Mundy.
Issues Raised by ICT.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Matthew Hardaway CSCI101 Thursday 3:30pm.  Fishing (Encyclopedia Britannica): ◦ Sport of catching fish—freshwater or saltwater— typically with rod, line,
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
IT security By Tilly Gerlack.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Types of Electronic Infection
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Topic 5: Basic Security.
Computer Skills and Applications Computer Security.
Internet safety By Kenan.  Viruses are written by malicious programmers who wish to cause problems for other computer users.  The primary source of.
Internet safety By Suman Nazir
Computer crimes.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
Vocabulary Cassandra Peoples. Pharming the practice of redirecting computer users from legitimate websites to fraudulent ones for the purposes of extracting.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Malicious Attacks By: Jamie Woznicki Rahul-Anaadi Kurl Alexander Kaufmann Curtis Songer Daniel Cardenas Rivero.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Cyber security. Malicious Code Social Engineering Detect and prevent.
ITS220 – How To Prevent Your PC From Infected by Virus presented by Desmond Ho.
Technical Implementation: Security Risks
Digital Security Identity theft Copyright Laws Plagiarism, and More.
An Introduction to Phishing and Viruses
Done by… Hanoof Al-Khaldi Information Assurance
IT Security  .
Big Picture Consider this How many online threats might you be faced with a day?
Instructor Materials Chapter 7 Network Security
Lesson 3 Safe Computing.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Protect Your Computer Against Harmful Attacks!
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
COMPUTER CRIME.
Lesson 2- Protecting Yourself Online
Computer Technology Notes 5
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Internet Safety and The Digital Divide
Faculty of Science IT Department By Raz Dara MA.
Ch9 E-commerce Security
Unit 1 Fundamentals of IT
Technology Mrs. Huddleston
Lesson 2- Protecting Yourself Online
Security in mobile technologies
What devices use the internet?
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Privacy, Security, and Ethics
Presentation transcript:

ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY

DANGERS ON THE INTERNET SPAM a.k.a. Junk mail usually unsolicited commercial sent from an unknown source with identical message sent to multiple recipients. usually not dangerous but can be time and space consuming. Dangerous ones can carry viruses and other malicious software(Malware)

SITUATIONAL ANALYSIS What is the best way to get rid of JUNK MAILS?

DANGERS ON THE INTERNET SPOOFING It is a deceitful amail practice in which the sender address is changed, so that it would appear to have come from a different source which is usually someone you know. spoofing is usually used by spammers to hide the origin of the spam

SITUATIONAL ANALYSIS How would you know if someone is spoofing you?

DANGERS ON THE INTERNET PHISHING It is a deceitful practice of trying to get confidential information such as passwords and usernames, and credit card details by making it appears as if it comes from a trustworthy source. it is usually done through s or using popular entity such as Microsoft, Yahoo, Google, Amazon, and financial institutions

SITUATIONAL ANALYSIS How would you know if someone is phishing you?

DANGERS ON THE INTERNET PHARMING This is a dangerous hacker attack on a website which directs all traffic to that website to another fictitious website. the main objective is to obtain username and passwords as well as credit cards and financial information, and use these to steal their money electronically or use the credit cards of the victims. it is a major concern of many online banking and electronic commerce transactions

SITUATIONAL ANALYSIS How would you know if someone is trying to pharm you?

DANGERS ON THE INTERNET SPYWARE A computer program that is installed covertly on a personal computer to collect information or even take control over the computer without the knowledge of the user. it can moniter and collect information about the user's internet habits and practices it can also affect the performance and setting of the computer.

SITUATIONAL ANALYSIS What can we do to prevent installing a spyware?

DANGERS ON THE INTERNET COMPUTER WORM it is a dangerous computer program that replicates itself through a network some worms delete files, others discrupt the network function it is usually spread through and running of attachments froms suspicious sources it spreads by exploiting weaknesses in operating systems (but BLESS OS updates)

SITUATIONAL ANALYSIS How do we know it is a worming infected file?

DANGERS ON THE INTERNET TROJAN HORSE A malware fronting to perform a good task, but covertly performs undesirable function with intention of entering the computer without the user's consent it can disable the computer's defenses, opening it to unauthorized entry. It can erase data, can corrupt files and allow access to computer.

How do we know it is a trojan horse- infected file?

DANGERS ON THE INTERNET COMPUTER VIRUSES It is a program that duplicates itself and then infects the computer. It spreads like a biological virus. it can be transferred by the use of removable storage media devices. damages may be mild to severe

How do we know it is a virus-infected file?

DANGERS ON THE INTERNET HACKER This is a person who is able to enter control other people's computer without authorization. usually vandalzes the victim's website, steal personal information, obtains intellectual property, and performs credit card fraud. Firewalls are able to prevent entry by hackers

How do we know you are being hacked?

What are the dangers can we meet encounter in the internet?