Polling Stations There are four questions posted in the classroom Indicate a “yes” response by placing a tally mark on the white board The results of the.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Understanding and Building Basic Networks Chapter 4 Protecting Yourself Online.
The Internet.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
The Dangers of Identity Theft By: Hannah Wolin 7 th Grade Marshall Middle School Anderson.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Breaking Trust On The Internet
INTERNET SAFETY.
What is identity theft, and how can you protect yourself from it?
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Issues Raised by ICT.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Computer Viruses. Virus Quote “ I think computer viruses should count as life. I think it says something about human nature that the only form of life.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Cyber Crimes.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah 24 Cookies: What.
Scams & Schemes Common Sense Media.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
IT security By Tilly Gerlack.
What is Identity Theft? How is it accomplished? How might it impact the victim? What can I do to protect myself? What is phishing? By Ellen Justice.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
WAYS TO OVERCOME INTERNET THREATS! IDENTIFYING INTERNET THREATS AND MITIGATION.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Identity Theft Since 2005, there has been a dramatic increase in the occurrence of identity theft among students online.
ITC Summer I Table of Contents Glossary of terms Glossary of terms Safety Tips Quiz Credits Standards Multimedia Connections Multimedia.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
By: Asfa Khan and Huda Mukhtar
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
Computer crimes.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
INTRODUCTION & QUESTIONS.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Protecting Your Assets By Preventing Identity Theft 1.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
Vocabulary Cassandra Peoples. Pharming the practice of redirecting computer users from legitimate websites to fraudulent ones for the purposes of extracting.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Government Protection Consumers protected by both laws and agencies at different levels Look at table on page 30.
Allison Gladkowski.  About privacy and why it matters  Spyware and spam vocabulary and examples  Identity theft  Unapproved access  Today's big issues.
Identity Theft It’s a crime!
Scams & Schemes Common Sense Media.
Attention Identity theft Definition
IT Security  .
Personal spaces.
Digital Citizenship Middle School
Challenges We Face On the Internet
Lesson 2- Protecting Yourself Online
HOW DO I KEEP MY COMPUTER SAFE?
Personal Safety Online
Lesson 2- Protecting Yourself Online
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Polling Stations There are four questions posted in the classroom Indicate a “yes” response by placing a tally mark on the white board The results of the polls will be tallied

Privacy and Security Issues BTT 1OE

Agenda Cybercrime – What is it? Credit Card Info Cookies Identity Theft Spyware Cyberstalking Role Play Need to keep information secure

Cybercrime How do criminals get our credit card information on the Internet? Phishing – s requesting credit card information Hacking – individuals gain illegal entry into your computer Pop-Ups – another type of spam that encourages your to enter personal information

Cybercrime What are cookies? Are a small text file that is placed in your computer’s hard drive by websites you visit It is not a virus, but rather a footprint of the sites you have visited and allow for easy navigation (do not have to re-enter information every on every visit)

Cybercrime What’s the big deal? Problems arise when banner advertisers are on these sites, they too place a cookie on your hard drive These ad networks track all the information and activity you perform online Some may use it irresponsibly

Cybercrime Identity Theft Occurs when someone steals personal information about someone else for the purpose of impersonating him/her Usually with monetary motives Criminals will get your personal information by stealing credit card applications, bank statements, or checks from your trash or mail Same type of theft can occur online

Cybercrime Signs of Identity Theft Bills or statements not arriving Calls from collection agencies when you have no debt Withdrawals on your account you did not make Receive credit card statements for accounts you do not have Receive a poor credit rating on an application

Cybercrime Cyberstalking – What is it? Individuals who stalk others on line Starts with gathering info, beginning contact, then threats or intimidation Engage in live chat harassment or flaming (online verbal abuse/defamation) Trace individuals internet activity and are also involved in identity theft

Cybercrime Cyberstalking A very dangerous type of cyberstalker are sexual predators Stalk their victims to lure them Often pedophiles who target children and teens 25% people on Internet have been asked to meet face to face

Cybercrime

Moving into groups of four, you are to perform a role play based on the privacy and security issues learned in the lesson.

1.Use common sense when a site asks for information 2.Check for privacy policies 3.Keep separate accounts for business and pleasure 4.Clear your cache after browsing 5.Encrypt whatever you can ( 6.Use anonymous web-surfing programs 7.Check your system for leaks (Web security) 8.Say no to information sharing (other org’s) 9.Use personal Internet security programs