Kevin Mitnick Home Internet Security Course Today, Internet criminals are going after families. They try to guess your passwords and steal your credit.

Slides:



Advertisements
Similar presentations
Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
Advertisements

How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
What is identity theft, and how can you protect yourself from it?
INTERNET SAFETY FOR STUDENTS
Social media threats. Warning! May contain mild peril.
Jason Rich CIS  The purpose of this project is to inform the audience about the act of phishing. Phishing is when fake websites are created.
Starter for 10 Unit 3: Stay safe online Transform IT SFT03_stay_safe_online.
Internet Security Awareness Presenter: Royce Wilkerson.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
INTERNET SAFETY FOR STUDENTS
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Threats to I.T Internet security By Cameron Mundy.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Are you safe? Alyssa Caputo & Niki Labella Itech 1101 Dr. Nagel.
Protecting Information. Who We Are We are working on our Information Assurance MBA This is part of our curriculum; to present on information security.
Protecting Yourself Online (Information Assurance)
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Have Fun, Be Safe Strategies for Internet and Social Media Safety.
By: Daniel Krueger ITC 525: Computers for Educators Summer II 2010 Click Here to Begin.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
IT Security for Users By Matthew Moody.
Stay Safe & Secure Online. Outline Passwords Everyday Security Security Physical Security Protecting Personal Information.
Scams & Schemes Common Sense Media.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Dangers of the Internet CEL : C O M P U T E R S I N E V E R Y D A Y L I F E CEL 1 Dangers of the Internet Name: ____________________ Class: ________________.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Safe Computing Practices. Why would anyone want to hack me? 1 Krebs, Brian - “The Scrap Value of a Hacked PC, Revisited”, 12 Oct 2012,
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
ITC Summer I Table of Contents Glossary of terms Glossary of terms Safety Tips Quiz Credits Standards Multimedia Connections Multimedia.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
Malware & Phishing By: mackenzie olson. Internet fraudsters send out spam, pop-ups, appealing websites, and desirable downloads.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Internet Safety Internet Safety LPM
Safe Computing Practices. Why would anyone want to hack me? 1 Krebs, Brian - “The Scrap Value of a Hacked PC, Revisited”, 12 Oct 2012,
Protecting Your Identity © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Threats to IT security Jordan pilcher. phishing Phishing is when companies or people from other people who think they can get away with scamming you for.
Cyber Safety Jamie Salazar.
By: Austin Kellogg. What’s the difference Phishing Scam where frauds send pop-up messages to lure personal information.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
 Identity theft: When someone steals another identity, usually to obtain credit or other benefits in that person’s name  Phishing: Attempting to acquire.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Internet safety.. Dangers of the internet: Paedophiles. Cyber bullying. Money theft. Sexual harassment. Identity theft. Hacking of your accounts. Viruses.
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
Click here to begin Internet Safety Keeping Kids Safe On-Line.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
Managing Money Workshop The National Autistic Society AGM
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Lesson 3 Safe Computing.
Presentation transcript:

Kevin Mitnick Home Internet Security Course Today, Internet criminals are going after families. They try to guess your passwords and steal your credit card information. They try to empty out your personal bank accounts or to steal your identity. And some Internet predators are after your children. It is very important to keep your whole family safe on the Internet, and that is why we created this course for you.

Features This is a brand-new, high quality web-based interactive course made in There are 8 sections using real-life examples that show how someone got in trouble using the Internet and what you need to do to stay safe.8 sections Each section has a live Kevin Mitnick video with your security do’s and don’ts, and each section has a fun ‘security check’ quiz at the end.

Topics Passwords Learn the 10 important rules for safer passwords – how long they should be – what a ‘pass-phrase’ is – what type of website gets which password – how often to change passwords. Giving Out Personal Information Learn what exactly personal information is – who not to share with – and how to share it if you have to. Online Banking Learn how to protect your money when you use online banking – get four important tips so you do not get hooked by a phishing attempt. Protecting Children Online Read about 12-year old Emma – how she ran away with a 32-year old man she met online. Learn how to protect both your children and teenagers when they are on the Internet. Protecting Your Identity Find out how fraudsters steal your identity and cause enormous trouble – Learn how you can prevent your identity from being stolen with the S – A – F – E system.

Topics continued Securing Your Computer and Home Network Find out what the six things are you need to do on a regular basis to make sure that hackers do not break into your computer or home network. Spam, Viruses and More Here are 8 important tips that will help you protect your computer from dangerous spam and viruses. Opening up and Attachments Learn about phishing and its evil cousin ‘spear-phishing’ and how the bad guys are trying to trick you into clicking on bad links or open infected attachments – Learn what ‘social engineering’ is, and how to defend against it. BONUS: Social Engineering Red Flags Cheat-sheet with the 22 ways that hackers try to social engineer you into giving them control over your computer system. Security Checklist: All The Important Points All the important points you learned in each section are on a checklist in PDF format at the Resources Tab that is top right on the Main Menu.

Kevin Mitnick Home Internet Security Course Content and pricing based on thorough research of over 1,000 consumers. Demographic: Families with 2 or more kids and income bracket $40- 75K /year. MSRP $49.95 – street price $29.95 for a 5-user pack. The course uses Kevin’s extensive hacking experience – shelf life of several years, tailored for an audience that is not digitally educated. Being created in the new HTML5 format, delivered via the cloud. Simple to rebrand for organizations like Banks, ISP’s etc. Sold via Home Shopping Network starting Feb 2, 2013.