Week 7 Oct 9 2012. Virus in the news charges-firms-with-tech-support-scams- 3924204.phphttp://www.chron.com/default/article/FTC-

Slides:



Advertisements
Similar presentations
Financial Fraud DEVISE A PLAN TO PROTECT YOUR PERSONAL FINANCIAL INFORMATION 1©2012 National Endowment for Financial Education | Lesson 5-3: Financial.
Advertisements

 Today there are no formal diplomatic relations between Iran and The US  Do not exchange ambassadors -Iran maintains an interests section at the Pakistani.
Friday June 6, 2014 OBJ: SWBAT understand what identity theft is, what the consequences are, and how to prevent it. Drill: What statement is this cartoon.
GRAPES REACTION PAPER 20 Points Due Every Three Weeks on Thursday.
Advertising and Sales Promotion ©2013 Cengage Learning. All Rights Reserved. Chapter 13.
Section 15.1.
ECONOMIC EDUCATION FOR CONSUMERS ○ Chapter 1 LESSON 1.5 Advertising and Consumer Decisions GOALS ► Describe different types of advertising. ► Explain how.
L-1 Scenario Compilation. L-2 Peace Keeping (Zaire) U.N. Secretary General asks Balteria for 100 soldiers to join multinational force in Eastern Zaire/Rwanda.
3.03 Remember environmental and energy law.
Novel Information Attacks From “Carpet Bombings” to “Smart Bombs”
Laws and Agencies that Provide Financial Safeguards Consumer Protection.
DuWayne Aikins Information Security Forum May 21, 2015 Cyber, A Militarized Domain: What is Means to Texas.
Lesson 5: Avoiding Fraud and Scams Module 10: Small Steps to Health and Wealth TM for Older Adults.
North Korea and a “PEACEFUL” Nuclear Program The Six-Nation Talks Resumed.
Network neutrality is the idea that all internet traffic should be treated equally. It does not matter who is downloading and what is being downloaded.
Irwin/McGraw-Hill Copyright © 2001 by The McGraw-Hill Companies, Inc. All rights reserved. 1-1.
Medical Marijuana: A Brief History Medical Marijuana first legalized On November 5, 1996 California became first state ever to legalize medical marijuana.
When you have completed your study of this chapter, you will be able to C H A P T E R C H E C K L I S T Explain the effects of regulation of natural monopoly.
Limitations and Constraints on Marketing (1)
Sales and Consumer Issues Objective Interpret sales contracts and warranties within the rights and law of consumers. REGULATION OF SALES.
CONSUMER PROTECTION AND LITIGATION: CONSUMER PROTECTION AND LITIGATION: Ryan Mehm Attorney Bureau of Consumer Protection Federal Trade Commission The views.
Presentation of Group A Self-Paced Training University of Phoenix EDTC 560 Carolyn Edmonds, Keith Gray, Lisa Moore, Brian Walker and Gloria Washington.
Instilling rigor and imagination in analysis Countering the Iranian Nuclear Threat Stuxnet and its Broader Implications Randolph H. Pherson Mary C. Boardman.
Iranian Nuclear Program Seth Prisament Alex Wilson.
Viruses.
1 C H A P T E R 14 1 © 2001 Prentice Hall Business PublishingEconomics: Principles and Tools, 2/eO’Sullivan & Sheffrin Market Power and Public Policy:
Government Regulatory Agencies. FDA Food and Drug Administration –Enforces laws to ensure purity, effectiveness, and truthful labeling of food,
REGULATION One of the Ways Government and Businesses interact in a Mixed Economy Reference 9.1/9.2.
When you have completed your study of this chapter, you will be able to C H A P T E R C H E C K L I S T Explain the effects of regulation of natural monopoly.
Mobile Technology and Cyber Threats Deon Woods Bell Office of International Affairs The Fifth Annual African Consumer Protection Dialogue Conference Livingstone,
Iran Iran so far away…. Iran used to be Persia Until 1935 Became an Islamic Republic in 1979.
Ethics and Social Responsibility
For use only with Perreault and McCarthy texts. © The McGraw-Hill Companies, Inc., 1999 Irwin/McGraw-Hill Chapter 4: Evaluating Opportunities in the Changing.
Read the caption to Figure 11-1 on page 244 and the introduction on page 245 Internationalism and Nationalism Review the bulleted questions on page 245.
Trade in the Global Economy Readings: Chapter 1 1 International Trade 2 Migration and Foreign Direct 3 Conclusion 1.
MALWARE : STUXNET CPSC 420 : COMPUTER SECURITY PRINCIPLES Somya Verma Sharad Sharma Somya Verma Sharad Sharma.
Iran v. Israel.  Israel:  Prime Minister Benjamin Netanyahu  joined the Israeli Defense Forces during the 1967 Six-Day War  He fought on the front.
South Korea Cyber-Attacked. Facts  When: March 20, 2013  Three major banks Shinhan Bank NongHyup Bank Jeju Bank  Two largest broadcasters Korean Broadcasting.
News Media and Politics Reading Unit 4. For this unit, when we discuss the Media, we do so in terms of Politics. The big question that we must answer.
BELLWORK Caption Question on page 477. Homework for this week Chapter 17 Assessment: 1-16, Pages Due Friday.
Iran Iran. Iran History Iran History Iran nuclear weapons program a: 1950s-1960s b: 1970s c: 1979 revolution d: e: current situation.
Suspicion, Access, and Denial. Iran Says It May Open Military Site to Visit The Associated Press TEHRAN, Iran Iran may allow representatives from nonaligned.
Ethical Standards for Media Max Griffith. FCC-Rules on Candidate Appearance & Advertising A station’s license may be revoked if they don’t allow reasonable.
Political and Legal Environment of Marketing. Consumer Legislation The Clayton Act –Law established in 1914 on the subject of antitrust and price discrimination.
Federal Agencies and Laws for Consumer Rights
Recognizing Deception and Fraud
Homework for Wed’s topic: Threats to E-Commerce 1. Review Chapter 5 in Laudon textbook 2. “Facebook's Top Cop”— Joe Sullivan and a staff of 50 people Fortune.
For use only with Perreault and McCarthy texts. © The McGraw-Hill Companies, Inc., 1999 Irwin/McGraw-Hill Chapter 4: Evaluating Opportunities in the Changing.
Understanding Business and Personal Law Consumer Protection Section 15.1 Consumer Protection and Product Liability Years ago, caveat emptor, which means.
Marvelous Monday December 7 D71 This week on the Web…
The Crusades WORLD HISTORY. Stinger  How can warfare bring people from different cultures and backgrounds into contact with each other?  How might warfare.
14.1 Chapter 14 Internet Regulation © 2003 by West Legal Studies in Business/A Division of Thomson Learning.
Employee Expectations Career Pathway Experience. Payments You can expect your employer to pay you for the work you do! –Employer should deduct income.
Iranians view life after nuclear pact with blend of skepticism and hope.
© 2011 wheresjenny.com Iran’s nuclear program. © 2011 wheresjenny.com Ahmadinejad defends Iran's nuclear programme  Iranian President Mahmoud Ahmadinejad.
Šarūnas Končius Technology Strategist of Microsoft Microsoft Lithuania.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Communicating Customer Value: Integrated Marketing Communications Strategy A Global Perspective 14 Philip Kotler Gary Armstrong Swee Hoon Ang Siew Meng.
Iran has rejected a proposal to have much of its low-enriched uranium converted into fuel abroad and has suggested an alternative. Countries want Iran.
International Conflict & Cyber Security
STUXNET A Worm With A Purpose.
CONSUMER PROTECTION LAWS
Federal Agencies and Laws for Consumer Rights
Chapter 37 Antitrust Law.
Advertising and Social Responsibility
THE GOVERNMENT AND THE ECONOMY
Government & the Economy
Chapter 13 Antitrust and Regulation
Chapter 10 Consumer Power. Chapter 10 Consumer Power.
Chapter 10 Consumer Power. Chapter 10 Consumer Power.
Presentation transcript:

Week 7 Oct

Virus in the news charges-firms-with-tech-support-scams phphttp:// charges-firms-with-tech-support-scams php says-it-blocks-cyberattack-on-oil-platforms php

trick consumers into thinking their computers were plagued by viruses WASHINGTON - Federal regulators have charged 14 firms and 17 people with impersonating major companies to trick consumers into thinking their computers were plagued by viruses so they could charge hundreds to fix the problems. The Federal Trade Commission said last week the action was part of a new international crackdown on such tech-support scams. The agency says a federal judge in New York City has issued an order halting six alleged scams and freezing their assets.Federal Trade Commission The FTC says the telemarketing schemes mostly operate from India and target English-speaking consumers in the U.S., Britain and other countries. The agency says the telemarketers claimed they worked for companies such as Microsoft and Dell, saying they had detected a virus or malware. They offered to fix the problems remotely for $49 to $450. The FTC alleged in lawsuits that the companies and individuals violated a federal law prohibiting unfair and deceptive practices, and the agency's telemarketing sales rule. It is seeking unspecified restitution for the affected consumers.

cyberattack on the computer network of its offshore drilling platforms TEHRAN, Iran (AP) — Iran says it has successfully blocked a cyberattack on the computer network of its offshore drilling platforms, a semiofficial news agency reported Monday. The report by ISNA quoted Mohammad Reza Golshani, IT head of Iran's state offshore oil company, as blaming Israel for having planned the attack.Mohammad Reza Golshani Iran periodically reports the discovery of viruses and other malicious programs in government, nuclear, oil and industrial networks, blaming Israel and the United States. In May, Iran shut down part of its oil facilities because of another such cyberattack. Israel has done little to deflect suspicion that it uses viruses against Iran. In this case, Golshani said, the attack occurred over the past two weeks, was routed through China, and affected only the communications systems of the network. He said the main network was safe since it was isolated from the Internet, and was back to normal operations. Iran announced that it had temporarily disconnected its oil ministry and its main crude export terminal from the Internet after the May attack. Iran earns up to 80 percent of its foreign revenue from the export of crude. Iran is odds with the West over its nuclear program. The West suspects the program is aimed at developing weapons. Tehran denies the charge, saying its nuclear program is geared toward peaceful purposes like power generation and cancer treatment. A computer worm known as Stuxnet briefly brought Iran's uranium enrichment activity to a halt in 2010.

Lesson 3 Project Name the Candidate Barack Hussain Obama Willard Mitt Romney

Lesson 4 Project Lesson 4 from Blue Pelican Text

AP Presentation 3 Due Tuesday Oct 16 th Presentation 3 Summarize the Wikipedia article on computer networks Recommended resources: – Lesson 1 “Fundamentals of Java” textbook Primer: Intro To Cellular Networks AP instructions Focus on the Big Ideas: For example; you should be able to answer questions shed light on ideas like the following from your work What is a network? Why are networks important? These kind of networks - Personal Campus Cellular Business and the Internet These technologies TCP/IP Ethernet Fiber Optics wifi Due Dates: Rough Draft Friday ( ) Can be outline or a rough PPT Presentation Tuesday Oct 16 th

PAP Presentation 3 Due Tuesday Oct 16 th Presentation 3 Summarize the Wikipedia article on computer networks Recommended resources: – Lesson 1 “Fundamentals of Java” textbook Primer: Intro To Cellular Networks PAP instructions Focus on the Big Ideas: For example; you should be able to answer questions shed light on ideas like the following from your work What is a network? Why are networks important? These kind of networks - Personal Cellular the Internet These technologies Ethernet wifi Due Dates: Rough Draft Friday ( ) Can be hand written, outline, or a rough PPT Presentation Tuesday Oct 16 th