1 UNIT 20 The ex-hacker. 2 Starter 1 3 1.Hackers Unite 2.A new phishing scam which substituted a bogus website address for any bank details in the computer.

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

Review Ch. 3 – Connecting to the Worlds Information © 2010, 2006 South-Western, Cengage Learning.
Smartphone and Mobile Device Security IT Communication Liaisons Meeting October 11, 2012 Theresa Semmens, CITSO.
UNIT 20 The ex-hacker.
Computer security Viruses Hacking Backups
Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access and attacks delivered.
1 If You Are Me, Then Who Am I? Tips on Identity Theft Prevention California Office of Privacy Protection.
The Internet Crime Kathi Subramaniyam CS-403. Overview Internet crime Types of Crime Security features Future.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Kevin Mitnick Home Internet Security Course Today, Internet criminals are going after families. They try to guess your passwords and steal your credit.
Security Risks. Introduction There are many security risks that can affect computers. How many of the following have you heard of before? We are going.
8 Mistakes That Expose You to Online Fraud to Online Fraud.
Jason Rich CIS  The purpose of this project is to inform the audience about the act of phishing. Phishing is when fake websites are created.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Prepared by: Nahed Al-Salah
1 UNIT 20 The ex-hacker Lecturer: Ghadah Aldehim.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!
INTERNET SAFETY FOR STUDENTS
Threats to I.T Internet security By Cameron Mundy.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Hierarchical file system Hierarchical file system - A hierarchical file system is how drives, folders, and files are displayed on an operating system.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
STAY SAFE ONLINE. STAY SAFE ONLINE! PLEASE MAKE SURE YOU LOGIN AT THE CORRECT BANK URL / ADDRESS 1.NEVER LOGIN VIA LINKS 2.NEVER REVEAL YOUR PIN.
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Dangers of the Internet CEL : C O M P U T E R S I N E V E R Y D A Y L I F E CEL 1 Dangers of the Internet Name: ____________________ Class: ________________.
Keeping Safe While Using the Internet. We live in a community. What are some safety rules we have in our community? Cyberspace is also a community. What.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Viruses, Hacking and Backups By Katie Louise Bieber!
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
HDSB Security Awareness Training. Introduction Good security standards follow the 90/10 rule: 10% of security safeguards are technical. 90% of security.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Viruses Hacking Backups Computer safety... Viruses A computer virus is a piece of program code that makes copies of itself by attaching itself to another.
Computer Security... By Kate Robinson 8P Viruses Hackers Backups Stuxnet Gary Mckinnon.
For brownies this PowerPoint will help you understand computer viruses and help stop them!!!!
Stay Safe on the computer!! This Is Emma and Jenny.They here to help you on the computer! By Rosie Pike.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Computer security By Isabelle Cooper.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
Internet Safety Internet Safety LPM
By Liam Wright Manga comic group Japan SAFETY on your computer.
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
Are you a COMPUTER GEEK or a COMPUTER FREAK? By Evie Watkins.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Threats to IT security Jordan pilcher. phishing Phishing is when companies or people from other people who think they can get away with scamming you for.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
INTRODUCTION & QUESTIONS.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
DoS Attacks Phishing Keylogging Computer Laws/Acts.
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
Cybersecurity Test Review Introduction to Digital Technology.
By Elena Skupenko.  1. Знать и употреблять лексику по теме: a hacker, programmer, to hack, hacking, hacking group, download, blackmail, security expert,
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Overview 1. Phishing Scams
I S P S loss Prevention.
Week 7 - Wednesday CS363.
Presentation transcript:

1 UNIT 20 The ex-hacker

2 Starter 1

3 1.Hackers Unite 2.A new phishing scam which substituted a bogus website address for any bank details in the computer. 3.Kevin Metnick 4.The hackers ran up a £ 1m phone bill 5.2 and 3 6.It forced them to slow down or even stop working.

Listening 4

Listening 2 Think about these questions before you listen How could you hack into a system? How could you stop people hacking in to a system?

Listening 3 1.Hacking in to a large American company 2.He is a computer security expert 3.They hand over information such as passwords without checking that the person asking for it is authorized 4.“guest” OR “demo” OR “help”

5.Restricts access to a network 6.You can make sure remote clintes are who they say they are 7.A common name or a dictionary word or any thing short 8.Failed access attempt

Listening 4 1.At school he discovered that what computers would let him see depended on the password he typed in 2.He got into part of the system that asked for ID but display the ID in the screen at the same time 3.For money, criminal purposes, political purposes and often because it’s challenging and exciting 4.It was a challenge and fun 5.He and his friends never tried to cover their attack. They boasted to friends and girls

6.Because he knows the ways he would try to break in to their systems 7.They tend not to these days because it’s illegal 8.Hollywood shows hackers coming into systems via the internet. In reality about 75% of all hacks into company computers are done by current staff 9.Not as risky as buying something by credit cards and throwing away the receipt 10.Get a separate card with a small limit

Listening 5 1.A rud message for the CEO 2.Someone who advises companies how to prevent hacking 3.By trying to guess somebody's password or finding a bug that will allow people with certain passwords to get in where they shouldn’t 4. a computer geek, a young anorak

5.They meet at conferences from time to time 6.He says he doesn’t go much for Hollywood hackers 7.It’s the retailers who are swindled out of money 8.Your computer needs to have a smart card reader

Language Work 12 6

Language Work 6 1.Find out. 2.Hand over. 3.Tracked (Ralph) down. 4.Break into, hack into, get into. 5.Log on. 6.Go about, set about. 7.Phone up. 8.Throw away. 9.Grown up. 10.Hacking into. 11.Keep ahead.

Language Work 14 7

Language Work 7 1.Throw away 2.Hack into 3.Grown up 4.Set about 5.Phones (you) up, hand (it) over 6.Shut down 7.Ran up 8.Work out 9.Note down 10.Checkout

Word study 16 8

ABCDE Viruses & distruvctive programs Data Protection Communicati on Systems InternetWEB Logic bomb Trigger routine Trojan Anti-virus software Backups Encryption Firwalls Passwords Bandwidth GPS IRC Pagers Usenet Bandwidth Domain name FTP IRC ISP Router URL Usenet Bandwidth Browser Domain name IRC ISP Hyperlink URL XML