Safe Internet Use Mark Wheatley CSI Onsite 952-928-1788

Slides:



Advertisements
Similar presentations
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
Advertisements

Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Phishing Scams use spoofed s and websites as lures to prompt people to voluntarily hand over sensitive information Phishing s may contain.
COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
SECURITY CHECK Protecting Your System and Yourself Source:
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Protect Yourself Against Phishing. The good news: The number of US adult victims of identity fraud decreased from 9.3 million in 2005, to 8.4 million.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
8 Mistakes That Expose You to Online Fraud to Online Fraud.
Bsharah Presentation Threats to Information Security Protecting Your Personal Information from Phishing Scams.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Quiz Review.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Security Issues: Phishing, Pharming, and Spam
Internet safety By Lydia Snowden.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Security for Seniors SeniorNet Help Desk
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Social Engineering Training. Why Social Engineering Training? The Department of Energy (DOE) authorized the Red Team to perform vulnerability assessments.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Stay Safe & Secure Online. Outline Passwords Everyday Security Security Physical Security Protecting Personal Information.
Staying Safe Online Keep your Information Secure.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
IT security By Tilly Gerlack.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Phishing, Spoofing, Spamming and Security How To Protect Yourself Additional Credits: Educause/SonicWall, Hendra Harianto Tuty, Microsoft Corporation,
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Stay Safe Online. Use strong passwords Using the same password for all your accounts makes it easy to remember. However, it also means a hacker needs.

Information Security Sharon Welna Information Security Officer.
BY : MUHAMMAD KHUZAIMI B. ISHAK 4 ADIL PUAN MAZITA INFORMATION AND COMMUNICATION OF TECHNOLOGY.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Internet Safety Internet Safety LPM
What is Spam? d min.
Cyber Safety Jamie Salazar.
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
Any criminal action perpetrated primarily through the use of a computer.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
Tips to Avoid Online Scams. About Several threats are there which spreads on every computer system just to infect each system with their harmful ways.
GUIDE TO INTERNET SAFETY A VISUAL WALKTHROUGH TO SAFE INTERNET BROWSING.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
Unit 4 IT Security.
ISYM 540 Current Topics in Information System Management
Lesson 3 Safe Computing.
Protect Your Computer Against Harmful Attacks!
Practice Safe Computing
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
9 ways to avoid viruses and spyware
What is Phishing? Pronounced “Fishing”
Lesson 2- Protecting Yourself Online
Presentation transcript:

Safe Internet Use Mark Wheatley CSI Onsite

In business for over 15 years Purpose & Values driven Member in good standing with: About Us

Safe Internet Use What can we do to stay ahead? What to watch out for ◦ What is a URL? ◦ What is Phishing / Spoofing? Threat Evolution - Malware Good Practice - 5 rules (CSI Onsite Style)

What to watch out for URLs – Uniform Resource Locator URL is the address to visit a web site Domain name translates to an IP address Can be masked to appear as something different than actual address Web browser ignores symbol in address Besides the look for the first “/” Words to the left of that slash, is actual domain name

What to watch out for Hyperlinks, URLs and Redirects Easy to spoof Underlying address may be different than visible link Domain names that are close to actual ww.mircosoft.com Examples

Examples Fake Link Look for the first “/” after

What to watch out for Phishing Get you to click on link/s with malicious or fraudulent intent Potential for identity theft Fake s from company with whom you do business PayPal / EBay fraud Fake charities Urgent wording Fake links with legitimate appearance

Examples Link is the same as actual, but hoping you’ll only look at first or second line. Look for the “/”. … viewvideopatch.com/

What to watch out for Spoofing appearing to be from someone other than the actual sender Spamming technique Creates concern for recipient Could be sent from infected computer Open relays Many ISPs requiring outbound authentication to keep infected computers from relaying

Examples Spoofed Sender Link that is close to actual Clicked on link Looked identical to PayPal site All links were correct Except one

Examples Received: from blackbed by server1.0traffic.com with local (Exim 4.69) (envelope-from ) id 1S55eO-0007wH-Bd for Tue, 06 Mar :26: To: Subject: Your package is available for pickup From: "FedEx Support"

Threat Evolution What is Malware? Short for Malicious Software Disrupt computer operation, gather information or exploit system or data, without consent Hostile, intrusive or annoying software Delivered to system via: attachment Web site re-direct Infected system, flash drive, software install

Examples Virus Attachment

Threat Evolution Can look like legitimate software Hold your system ransom Lock system down so even skilled technicians may choose to reload computer operating system, or restore from backup rather than try to find or un-do changes Capture credit card information, leading to identity theft

Examples Looks legit and has feel of a Windows app Could make changes to system with AV software installed Entire window, one big “install me now” button Shield in corner looks just like Windows Update All BAD!

Threat Evolution Malicious intent – take down company web presence Organized crime Fraud Financial gain 1% of 1million s = 10,000 X $40 = a lot of money to be had….

What can we do to stay ahead Education, education, education Software can’t always protect you Be suspicious of Internet content Operate computer with lesser privileges Watch for drive-by downloads, or piggy-backing Verify the software you do install, is legitimate and has good intentions settings / spam filters Create regular backups and system restore points

5 Basic Rules Keep your antivirus software installed and definitions up to date Careful where you browse… Be careful when opening s from people you do AND don’t know Microsoft does not typically send updates or patches via and neither do most software manufacturers Check your hyperlinks and URLs before clicking

Questions Or Call: