Staying Safe How to Identify and Avoid Bad Things.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
SECURITY CHECK Protecting Your System and Yourself Source:
7 Effective Habits when using the Internet Philip O’Kane 1.
What is identity theft, and how can you protect yourself from it?
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Facebook Security and Privacy Issues Brian Allen Network Security Analyst Washington University December 2, 2010 Alumni House.
UT Wing Civil Air Patrol. Objective Identify network and cyber vulnerabilities and mitigations Social Media/Metadata/Exfil data MITM Attacks Malware Social.
How to avoid Viruses and Malware on your Computer Use a firewall Using a firewall is like locking the front door to your house—it helps keep intruders.
Trojan Horse Program Presented by : Lori Agrawal.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
Spyware! THE BAD, THE WORSE, AND THE Ugly … ARE ALL INDICATIONS THAT SPYWARE MAY BE TAKING OVER YOUR COMPUTER!
What is spyware? Supervisor dr. lo’ay tawalbeh Search By Mahmoud al-ashram Soufyan al-qblawe.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Teach a man (person) to Phish Recognizing scams, spams and other personal security attacks July 17 th, 2013 High Tea at IT, Summer, 2013.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
PASSWORD MANAGEMENT MADE EASY A Project Play Date - September 26, 2008 Beth Carpenter, Library Services Manager, Outagamie Waupaca Library System.
Internet safety By Lydia Snowden.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Over 3,000 computers are affected monthly by Malware and Phishing.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.
Safe Internet Use Mark Wheatley CSI Onsite
Stay Safe & Secure Online. Outline Passwords Everyday Security Security Physical Security Protecting Personal Information.
Staying Safe Online Keep your Information Secure.
Reliability & Desirability of Data
Web Browser Security Prepared By Mohammed EL-Batta Mohammed Soubih Supervised By Eng. Eman alajrami Explain Date 10. may University of Palestine.
IT security By Tilly Gerlack.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
Safer Online Shopping and Practices Presenter: Brian Moats Students Active In Leadership.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Information Security Sharon Welna Information Security Officer.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
What is Spam? d min.
Cyber Security and Staying Safe Online Mark D. Riley College of Health Sciences and Professions.
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
By: Austin Kellogg. What’s the difference Phishing Scam where frauds send pop-up messages to lure personal information.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Onguardonline.gov By Austin Kellogg. Main ideas  Protect your personal information  Know who your dealing with  Use security software that updates.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
Any criminal action perpetrated primarily through the use of a computer.
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Computer Security Keeping you and your computer safe in the digital world.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Privacy, Security, & Scam Defense When using Social Media, The Web, and even .
Internet Safety.
Cyber Info Gathering Techniques
Class Name: Online Safety & Privacy Basics
ISYM 540 Current Topics in Information System Management
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
Lesson 3 Safe Computing.
HOW TO MAKE YOUR GMAIL ACCOUNT SECURE…. At Google, we take account security very seriously. To protect your account, we strongly recommend following the.
Staying safe on the internet
Internet Safety – Social Media
Presentation transcript:

Staying Safe How to Identify and Avoid Bad Things

Bad Things to Avoid Malware: Spyware, Virus, etc. Fake web sites that want to steal your info Useless software: Bloatware, Crapware Phishing s SPAM: Different Types of SPAM and what to do about it

Bad Things to Avoid Malware: Spyware, Virus, etc. Fake web sites that want to steal your info Useless software: Bloatware, Crapware Phishing s SPAM: Different Types of SPAM and what to do about it

Malware is… Any program that downloads without your knowledge. Corrupts and interferes with using your computer. May ask or demand money, but not always.

Types of Malware Fake security products Ransomware that locks up and hijacks your computer. RAT: Remote Access Tool

Fake Security Product

Ransomware

RAT: The Invisible Malware Adds your computer to the hacker’s “Bot Net”. Causes your computer to crank out SPAM. Makes your computer participate in targeted and coordinated DDoS attacks on web sites. Runs a hidden web server, such as a fake PayPal site, designed to scam other people. Runs totally invisibly, doesn’t demand money.

How is Malware Installed? Googling for free stuff, employment, song lyrics, celebrity gossip, gambling, pornography. Downloading software such as Screen savers, Wallpaper, Games from untrusted sources. Attachments in , regardless of type. Picture, Video, Programs, etc.

How to Avoid Malware Make sure Windows Update runs every night. Remove any and all software you don’t need. Keep your web browser updated. Keep add-ons updated: Java, Flash, Reader, Media Player, Quicktime, Shockwave, etc.

How to Avoid Malware Keep your anti-virus program current. Don’t let kids, especially teens, use your computer. They should have their own. Use “sandboxing” software to isolate your web browser, especially for risky online behavior.

Bad Things to Avoid Malware: Spyware, Virus, etc. Fake web sites that want to steal your info Useless software: Bloatware, Crapware Phishing s SPAM: Different Types of SPAM and what to do about it

Fake Web Sites What are fake web site login pages? Facebook, Gmail, FacebookGmail HTTPS vs HTTP: What does that really mean? Web sites with IP address only, such as Closely misspelled domain names: ebau instead of ebay, etc. Web address displayed on status line doesn’t match link shown on main page body.

Bad Things to Avoid Malware: Spyware, Virus, etc. Fake web sites that want to steal your info Useless software: Bloatware, Crapware Phishing s SPAM: Different Types of SPAM and what to do about it

Useless Software Crapware that installs automatically while you are installing or updating something else. Anything with “toolbar” in it’s name. Tune-up, speed-up, registry cleaners, we-care, coupon printers, weather, etc. JavaReaderFlash Shockwave

Java offering the Ask Toolbar

Bad Things to Avoid Malware: Spyware, Virus, etc. Fake web sites that want to steal your info Useless software: Bloatware, Crapware Phishing s SPAM: Different Types of SPAM and what to do about it

“Phone” already begins with PH. “Phreaking” is spelled with a PH instead of an F to lend it a hacker cachet. And it fits with the PH in PHone, making a nice two-letter alliteration. It’s the same with PHishing, a hacker version of FISHING

Tools of the Hackers Trade Blue Boxing at Work

From: FedEx Shipping Notification Subject: Ship Notification Date: June 17, 2013 Dear Client, Your parcel has arrived at June 02. Courier was unable to deliver the parcel to you. To receive your parcel, print this label and go to the nearest office. Click Here to Print Shipment Label Customer Service Team FRAUD

How to Avoid Phishing s NEVER click a link in an that involves your bank, broker, PayPal, or any other financial institution. NEVER click on a link in an from a friend that seems out of character for that person. ALWAYS open a separate browser window, go to the web site in question using a bookmark or by Googling the name, then clicking on legitimate links.

Phone Scammer Caller says he’s from … It doesn’t matter. Just hang up!

Bad Things to Avoid Malware: Spyware, Virus, etc. Fake web sites that want to steal your info Useless software: Bloatware, Crapware Phishing s SPAM: Different Types of SPAM and what to do about it

Types of Spam Fake Rolexs, Prescriptions, Mortgage offers, Wives from Russia, Stock tips, Male enhancements, etc. from legitimate retailers like Home Depot, Amazon.com, etc. Fraud Promo

with Proper Unsubscribe

Bad Things to Avoid Malware: Spyware, Virus, etc. Fake web sites that want to steal your info Useless software: Bloatware, Crapware Phishing s SPAM: Different Types of SPAM and what to do …