Jason Rich CIS - 158 1.  The purpose of this project is to inform the audience about the act of phishing. Phishing is when fake websites are created.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Phishing Scams use spoofed s and websites as lures to prompt people to voluntarily hand over sensitive information Phishing s may contain.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
How It Applies In A Virtual World. Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently.
Starter for 10 Unit 3: Stay safe online Transform IT SFT03_stay_safe_online.
Cryptography: Keeping Your Information Safe. Information Assurance/Information Systems –What do we do? Keep information Safe Keep computers Safe –What.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
How To Protect Your Privacy and Avoid Identity Theft Online.
New School Websites Teacher Pages. Visit the SCUSD Website for videos tutorials: For more information.
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
Threats to I.T Internet security By Cameron Mundy.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
How To Protect Your Privacy and Avoid Identity Theft Online.
E safety. Ads It’s always best to not click on ads when you see them, and it’s always a good idea to ignore them, but if there are too many you can always.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
The Princeton Manor Website Access – For New and Existing Users Use – Organization of the website Content – Features, Fun and Useful Information.
STAY SAFE ONLINE. STAY SAFE ONLINE! PLEASE MAKE SURE YOU LOGIN AT THE CORRECT BANK URL / ADDRESS 1.NEVER LOGIN VIA LINKS 2.NEVER REVEAL YOUR PIN.
1 Hacking techniques by John Schmidt, BYU-I Linux/Unix Society June 19, 2008.
How to create an account on. Open a web browser (e.g. Mozilla Firefox or Internet Explorer) and type in the address bar, then press.
Day 3 Cybersafety Presented by FJUHSD Teacher Librarian.
WEB SPOOFING by Miguel and Ngan. Content Web Spoofing Demo What is Web Spoofing How the attack works Different types of web spoofing How to spot a spoofed.
Reliability & Desirability of Data
IT security By Tilly Gerlack.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Log on to Digital Locker Website You should be able to log on using Internet Explorer browser at the campus. You may need to log in using Mozilla FireFox.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
SURFING THE WEB PRIVACY, SAFETY, AND RELIABLE SOURCES.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Identity Theft Since 2005, there has been a dramatic increase in the occurrence of identity theft among students online.
CCT355H5 F Presentation: Phishing November Jennifer Li.
BY : MUHAMMAD KHUZAIMI B. ISHAK 4 ADIL PUAN MAZITA INFORMATION AND COMMUNICATION OF TECHNOLOGY.
Phishing A practical case study. What is phishing? Phishing involves fraudulently acquiring sensitive information (e.g. passwords, credit card details.
The spoofed . The spoofing The link appears as (i.e NOODLEBANK.com) But actually it links to
A Matter of Your Personal Security Phishing. Beware of Phishing s Several employees received an that looked legitimate, as if it was being.
Phishing Dennis Schmidt, CISSP Director, Office of Information Systems HIPAA Security Officer UNC School of Medicine UNC School of Medicine.
My Good Deed for Safer Internet Day Calum - 4W My good deed for Safer Internet Day 2015 is: Always try to help others and teach your parents or.
Internet 1) John R. Levine, Margaret Levine Young, The Internet for Dummies. Wiley Publishing, 12 th Edition, 2010.
A Matter of Your Personal Security Phishing Revised 11/30/15.
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
Phishing and online fraud What parents need to know.
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
Patient Portal Website Patient Training Powered by the.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
How to Use Khan Academy Nicole Kutsmeda Wilkes University Spring 2016.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Fall Phishing - attempt to acquire sensitive information, like bank account information or an account password, by posing as a legitimate entity.
How to Use Safe Money in Kaspersky? Help Desk Number.
Important Information Provided by Information Technology Center
An Introduction to Phishing and Viruses
Phishing, identity theft, and more
Done by… Hanoof Al-Khaldi Information Assurance
Class 2 - Transitional Internet Basics
Don’t get phished!, recognize the bait
Lesson 3 Safe Computing.
Information Security 101 Richard Davis, Rob Laltrello.
Phishing is a form of social engineering that attempts to steal sensitive information.
Check the buttons at the bottom of your Alert
Computer Security.
Social Engineering Humans are often the weakest point in security
What is Phishing? Pronounced “Fishing”
Google Drive Use personal google account IF you actually know the password. Log on with school credentials if not: User:
Internet Vocabulary Beth Felton McKelvey.
Presentation transcript:

Jason Rich CIS

 The purpose of this project is to inform the audience about the act of phishing. Phishing is when fake websites are created to look like legitimate websites in order to obtain your personal information. This presentation informs internet users what to look for and how to prevent phishing. Embedded are two YouTube videos that was not explained in the Sam2010 program. The presentation was then saved within PowerPoint as a PDF and the play button was made into a clickable link that brings you to the video’s YouTube webpage. 2

A computer term for people to steal…  Username  Password  Banking Information (routing #, account #)  Credit Card Information  Social Security Number  Any other private information 3

4 The user will click on a link that will bring them to a fake website. This website will ask them to log in or enter information. The website will then send the information to the hacker. Common sites are…  Facebook  Twitter  Ebay  Bank Websites  Paypal

Websites s  Check the URL and see if the website is spelled correctly.  Look for browser warning messages.  Look for the ‘lock’ on the bottom of the browser.  Check to see who sent it.  If the address doesn’t make sense – its fake  Hover over the links.  If there are spelling and grammar mistakes. 5

6

7

 Older Adults  Young Kids  Social Website Users  Bank Users 8 Everyone

9

The User The Computer  Never enter your personal information  Look for the ‘lock’  Check the URL, sender  Have up to date virus protection  Use a supported browser that has phishing protection  Mozilla Firefox  Google Chrome  Internet Explorer 10

11