You, Me & Technology. Overview Technology –Our relationship with technology Threats –What, Who, When, Where, Why & How Protection –What we can do to protect.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Internet Safety Rockingham County Public Schools
Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
Internet Safety James Fuller Internet Rules To Remember When asked by friends or strangers, online or offline, never share Account IDs and Passwords.
The Internet.
SECURITY CHECK Protecting Your System and Yourself Source:
INTERNET SAFETY.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Today you will learn about… Cryptology –Encryption and decryption –Secure vs. nonsecure websites Protecting your identity online Internet safety rules.
Social media threats. Warning! May contain mild peril.
UT Wing Civil Air Patrol. Objective Identify network and cyber vulnerabilities and mitigations Social Media/Metadata/Exfil data MITM Attacks Malware Social.
Lecture 16 Secure Social Networking. Overview What is Social Networking? The Good, the Bad and the Ugly How to protect yourself How to protect your children.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Safe Surfing Tips Internet Safety Tips for Teens By: LaQuacious Garrett.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Protecting Information. Who We Are We are working on our Information Assurance MBA This is part of our curriculum; to present on information security.
Protecting Yourself Online (Information Assurance)
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
How to Surf the Web Safely. What is this a picture of?
1 Kids on the Web. Child’s play? September, 2008.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Staying Safe Online Keep your Information Secure.
Impacts of the use of IT -Social network sites This is a site that lets you post messages, upload pictures and stories on your own personal page. You can.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Internet Security & Safety. What makes up the internet? Protecting and securing your password Protecting your identity What is social networking? Benefits.
Everyday Cyber Security April 27 th Why Should You Care? Ensuring your privacy and security Protecting yourself and others Practicing safe internet.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
Personal Online Safety Information Security Systems Community Outreach Program McKinley Middle School April 23, 2013.
Topic 5: Basic Security.
Internet Safety Tips.
What is Spam? d min.
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
Computer Skills and Applications Computer Security.
The social impacts of IT: Spending more time on the computer, laptop, phone, tab etc. than going outside. Negative effect on health. Negative effect on.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
INTRODUCTION & QUESTIONS.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
SECURITY ISSUES. TYPES BLUE JACKING SENDING MESSAGES TO OPEN BLUETOOTH CONNECTION VIRUSES HARMFUL PROGRAMS THAT SPREAD WITHIN DIGITAL DEVICES COOKIES.
Cybersecurity Test Review Introduction to Digital Technology.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Social Networking Practices. Information Security Purpose is to protect your information’s Confidentiality Integrity Availability.
Any criminal action perpetrated primarily through the use of a computer.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Technical Implementation: Security Risks
Cyber Security and Computer Safety
Safety.
IT Security  .
Protect Your Computer Against Harmful Attacks!
Staying safe on the internet
Cyber Security and Computer Safety
Internet Safety Vocabulary
Computer Security.
Presentation transcript:

You, Me & Technology

Overview Technology –Our relationship with technology Threats –What, Who, When, Where, Why & How Protection –What we can do to protect our information

Our Relationship w/ Technology Modern Technology A hyper-connected world—with texting, social networking, , online gaming, chat, music downloading, web surfing, and other forms of wired and wireless communication - Creates a dependency for society - Alienates and takes the “social” out of social interaction - Effects on communication skills

The Internet In simplest terms, it is a large group of millions of computers around the world that are all connected to one another.

Internet In Numbers North America: 273,785,413 people use the internet Asia: 1,076,681,059 people use the internet

Threats: Who? Sex Offenders Stalkers Hackers Fraudsters Terrorists

Threats: Why? Personal Fulfillment Financial Gain Status Fun / Thrill Corporate Espionage Malicious Intent

Threats: What? Malware (Malicious Software) –Types: Viruses : Infection in a computer that spreads from one to another through files. Trojan Horses : Contains itself in programs or files that seem “harmless”. Worms : Infection that spreads unaided. Spyware : Intrudes your privacy without you knowing Phishing : Using s or other forms to take personal data. Spams : s about miracle products, making easy money, etc. It is all spams.

Threats: What? Mobile Attacks –APPs –Network Connection Public Networks –Text Threats –Others Threats

Threats: What? Information Sharing –Personal Information in the wrong hands What is personal information –Social Networks Online Image –Search Engines Your information is sold! –Habits –Audience

How: Social Networking Nothing has changed the Web more than the rise of social networking sites. "With social networks, we're able to visualize the connections between individuals… knowing the connections between individuals helps us better understand them, who they are connected to, and how they are connected to us.” If Stutzman is right, understanding the way these networking sites work will help us understand ourselves and our friends.

Your Online Image How do you portray yourself?? –Pictures, Profiles, Posts, Online image becomes part of your real life image. What does your profile say about you?? What about your ?? Usernames - Beef_Kate, MustyElbows, Spoony, JerkyMyTurkey

Who Views Your Profile? Profile Settings Who views your profile? –Friends –Family –Future Employers –Teachers/Coaches –Neighbors –Stranger Danger (Potential Criminals)

Personal Information What is personal information? –Name –Physical Address – Address –Phone –Bank Information –Social Security –Login Information –Anything that can be used to identify, contact or locate you.

Protecting Yourself Protecting from Malware: 4&feature=plcp Stop and ask yourself –Weariness of social networks, online shopping, etc. Passwords –Create Strong Passwords »Case sensitive, Numbers, Special Characters

MINI CHALLENGE!! Name one threat from using the internet.

MINI CHALLENGE!! Give an example of a bad password.

Games?? -Class teams, open the boxed “ ”, bingo? Supplemental material -Max Butler -Sharing info - e=plcphttp:// e=plcp - e=plcphttp:// e=plcp -ID Theft - =plcphttp:// =plcp