Protecting Yourself Online (Information Assurance)

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
SECURITY CHECK Protecting Your System and Yourself Source:
What is identity theft, and how can you protect yourself from it?
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Social media threats. Warning! May contain mild peril.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Quiz Review.
Threats to I.T Internet security By Cameron Mundy.
Security Issues: Phishing, Pharming, and Spam
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Online Safety Workshop Stephanie Rojas, IMG Krystle Donnelly, IMG Cyndi Backstrom, UNLV OIT.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Keeping Information Safe Task 4. Basic security measures Passwords Change password on regular basis Do not use names or words easily linked to yourself.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Scams & Schemes Common Sense Media.
Online Safety and Awareness. Introductions We are students at UNM We are taking an Information Security course this semester. It is our mission to teach.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Personal Online Safety Information Security Systems Community Outreach Program McKinley Middle School April 23, 2013.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
What is Spam? d min.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Social Networking Practices. Information Security Purpose is to protect your information’s Confidentiality Integrity Availability.
Any criminal action perpetrated primarily through the use of a computer.
What Would You Do? The Risks of Behavior on the Internet.
Safe Computing Practices. Outline Objective Safe Computing Defined Safe Computing Methods Summary List of References.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
Internet Safety.
How to stay safe using the internet & App’s
Mrs. Esman Computer Special
An Introduction to Phishing and Viruses
Class Name: Online Safety & Privacy Basics
How to use the internet safely and How to protect my personal data?
How to use the internet safely and How to protect my personal data?
Lesson 2- Protecting Yourself Online
Risk of the Internet At Home
HOW DO I KEEP MY COMPUTER SAFE?
Online Safety! Created by Educational Technology Network
Internet Safety – Social Media
Lesson 2- Protecting Yourself Online
Security in mobile technologies
What devices use the internet?
Presentation transcript:

Protecting Yourself Online (Information Assurance)

Information Assurance Definition (IA): The practice of assuring information and managing risks related to the use, processing, storage, and transmission of information or data and the systems and processes used for those purposes. Assurance – a positive declaration designed to give confidence Accounting – Profession in auditing is about assuring financial information of companies.

Internet Safety What is internet safety? –“is the knowledge of maximizing the user's personal safety and security risks on private information and property associated with using the internet.”

Internet Safety Creating personal safety through knowledge on –Social Media Facebook, Twitter, Instagram, etc.. –Internet Use Public Wi-Fi networks –Passwords Strength of password, Vulnerabilities –Internet Links Untrusted, Unsure? – Spam Attachments, Viruses

Trouble on Social Media Headline: Superintendent tweets farm animal noises about top state official

Social Media How many students actively use Facebook, Twitter, Instagram, or any other social network? What kind of information are you putting on these sites? –Name –Address –Phone Number – –Job –Family Members –Birthdate

Facebook How can Facebook help protect you from theft or scams?

Think You’re Still Safe? Who posts pictures from a smartphone?

Free Wi-Fi! What are you really connecting to? –

FREE Wi-Fi! Are you putting yourself at risk by using free Wi-Fi at places that offer it? What’s wrong with free Wi-Fi? –Wireshark –Stealing your information through an unsecured wireless network 95% of Wi-Fi traffic data is unencrypted

Wireshark What is Wireshark? –“is a network packet analyzer. A network packet analyzer will try to capture network packets and tries to display that packet data as detailed as possible.”

Passwords Recognize any of these? An 18 year old boy gained access to a Twitter Staff members account allowing him special administrative access.

Passwords What is a good password? –Use the internet to help determine strength. –Who thinks they have a good password? –Tips Try not to use simple words Use combination of characters Use a saying and create an acronym Try to use more than one password

Untrusted Links IF YOU AREN’T SURE DON’T CLICK –MacKeeper

Spam Spam is unwanted sent by an automatic messaging software on the internet. What happens if you click on the links? –You can be sent to a phishing website that is hosting malware –Malware can be installed on your computer without your knowledge If either of the above occur, your computer has a high chance of being infected with a virus Your information can be stolen if it’s not properly protected

Mobile Spam Spam has been increasingly growing through text messages and mobile phones –The messages claim you have won a prize and you just need to click the link –Sometimes the messages have no clear message at all

Viruses You Can Obtain Malware AdWare Trojan Worms Denial of Service

Unseen Dangers nfc-chips-preview-and-authorize-should-be-default/

Questions?