Communicating in the IT Industry

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
Social Network Security Issues: Social Engineering and Phishing Attacks Jeffrey Allen, Leon Gomez, Marlon Green, Phillip Ricciardi, Christian Sanabria.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Social media threats. Warning! May contain mild peril.
e-safety and cyber bullying
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Threats to I.T Internet security By Cameron Mundy.
Internet safety By Lydia Snowden.
E safety. Ads It’s always best to not click on ads when you see them, and it’s always a good idea to ignore them, but if there are too many you can always.
Social impacts of the use of it By: Mohamed Abdalla.
BY AISLING PHILPOTT e-safety. S s can be dangerous because you could Fall victim to a scam for money. you could fall for someone wanting to.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Reliability & Desirability of Data
Scams & Schemes Common Sense Media.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
The Internet contains an infinite number of high- quality, interesting, intriguing, and well-designed sites, and surfing on the Web is usually a source.
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Berkeley Unified School District Cyber Savvy social networking and netiquette.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Safety and Security issues of using ICT Alys brooks.
Social impacts of ICT. Local Community IT has been good in the local community for families who need to keep in touch with family they can use Facebook.
What is Spam? d min.
BY JESSICA SCHOLEY p1. Id Fraud Is When Someone Pretends To Be Someone Else Using There Address, Birthday And Other Information. People Also Use Id Fraud.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Internet safety.. Dangers of the internet: Paedophiles. Cyber bullying. Money theft. Sexual harassment. Identity theft. Hacking of your accounts. Viruses.
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
The Impact of IT. It is hard to believe the impact IT has had on society over the last 40 to 50 years. Many of the things we take for granted now rely.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
Cyber security. Malicious Code Social Engineering Detect and prevent.
‘e-Safety’ and it’s importance
Edexcel GCSE Cyber security threats Computer Science 1CP1
An Introduction to Phishing and Viruses
Scams & Schemes Common Sense Media.
Social Media Attacks.
Done by… Hanoof Al-Khaldi Information Assurance
Learn how to protect yourself against common attacks
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Unit 4 IT Security.
Digital Citizenship Middle School
How to use the internet safely and How to protect my personal data?
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
Online Safety! By: Michelle Deng.
How to use the internet safely and How to protect my personal data?
Lesson 3 Safe Computing.
Cyber Security Awareness Workshop
What to be aware of and how to avoid problems.
Phishing is a form of social engineering that attempts to steal sensitive information.
Lesson 2- Protecting Yourself Online
What you can do to support people to be safe online
IGraphic Social impacts of IT
Lesson 2- Protecting Yourself Online
Lecture 7: Specialist Communication Channels
Communicating in the IT Industry
Wireless Spoofing Attacks on Mobile Devices
Lecture 5: Communicating and exchanging information
Presentation transcript:

Communicating in the IT Industry Lecture 11: Abuse of IT Warm up? Zatil Ridh'wah Hj Darot

Abuse of IT: Learning objectives Threats: Cyber bullying Spam Phishing Denial of service attack (DOS)

Threats As with so many things in life, good things have a downside. This is certainly the case with the IT revolution and with the Internet in particular. There is a whole range of threats and annoyances that IT users need to be aware of and protected against.

Cyber bullying Cyber bullying can be a worrying problem for young people. There are a range of different methods that can be used, including social networking sites like Facebook, emails and chatrooms. Cyber bullies often encourage their friends to join in the bullying.

spam Spam is unwanted email advertising. Anyone with an email account will tend to get unsolicited emails, most of which are __________ rather than dangerous. But email users should take particular care with emails that have attachments, as these may contain viruses.

Phishing Phishing is a method used by criminals trying to trick people into providing their online banking password and security details. The scam works by criminals sending people an email which looks as though it comes from their bank. The email tells them to click a link within the email which then directs them to a web page that looks like the log-on screen to their online bank account. However, the web page is under the criminals’ control and allows them to discover the victim’s username, _________ and other security details. The criminals then use these details to steal money from the victim’s bank account.

Denial of service attacks (DOS) This is a method of preventing a web server from providing a service by overwhelming it with so many requests that it is unable to cope. There are several reasons why these types of attack might be made. For example, a criminal might attempt to _________an online retail company by threatening to attack the site unless given a large sum of money. Sometimes political sites are attacked in this way by people who don’t agree with the political views expressed on the sites.