Internet Security & Safety. What makes up the internet? Protecting and securing your password Protecting your identity What is social networking? Benefits.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
How to protect yourself, your computer, and others on the internet
Tiffany Phillips CIS What is a Social Networking Website? Social networking websites function like an online community of internet users. Depending.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
Social Network Security Issues: Social Engineering and Phishing Attacks Jeffrey Allen, Leon Gomez, Marlon Green, Phillip Ricciardi, Christian Sanabria.
SECURITY CHECK Protecting Your System and Yourself Source:
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
INTERNET SAFETY FOR STUDENTS
Using internet and cell phones safely
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Teach a man (person) to Phish Recognizing scams, spams and other personal security attacks July 17 th, 2013 High Tea at IT, Summer, 2013.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
INTERNET SAFETY FOR STUDENTS
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
How It Applies In A Virtual World
Threats to I.T Internet security By Cameron Mundy.
Internet safety By Lydia Snowden.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Protecting Yourself Online (Information Assurance)
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Cyber Crimes.
Staying Safe Online Keep your Information Secure.
You, Me & Technology. Overview Technology –Our relationship with technology Threats –What, Who, When, Where, Why & How Protection –What we can do to protect.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
IT security By Tilly Gerlack.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
What is Spam? d min.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
Computer Skills and Applications Computer Security.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Technology Safety By: Stefanie Weston. Netiquette Dos and Don’ts for Children  Do  Respect the topic that is being discussed.  Be polite and make friends.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
An Introduction to Phishing and Viruses
Protect Your Computer Against Harmful Attacks!
Lesson 2- Protecting Yourself Online
Cybersecurity Awareness
Risk of the Internet At Home
Internet Safety Vocabulary
HOW DO I KEEP MY COMPUTER SAFE?
CYBERSAFETY & Personal information
Lesson 2- Protecting Yourself Online
Presentation transcript:

Internet Security & Safety

What makes up the internet? Protecting and securing your password Protecting your identity What is social networking? Benefits and risks associated with social networking Overview

Origin of the internet dates back to? 1960’s Network A system containing any combination of computers, computer terminals, printers, audio or visual display devices, or telephones interconnected by telecommunication equipment or cables: used to transmit or receive information. Internet A network of networks that can be used to disperse information throughout the world Internet (1 of 2)

Internet (2 of 2) Approximately ¼ of Earth’s population uses the internet Popular uses include: – –Advertising –Social Networking –Search Engines Accessing the Internet: –Computers –Phones –Game Consoles

Password Protection Why use a password? –Protect personal information –Prove identity –Restrict access When would you use a password? –Accessing programs –Checking –Logging into websites

Los Alamos Weak Computer Security Los Alamos has been under fire for weak computer security –Did not always manage passwords securely on the classified computer network As a result of this weakness, increased risk exists that insiders with malicious intent could guess the passwords of other individuals and use them to gain inappropriate access to classified information. –Users were granted access to more computer files than needed to perform their duties

How to choose a password 8.3 rule –Include letters –Include numbers –Include non-alphanumeric characters Use lower case and upper case letters Different passwords for different sites No such thing as a perfect password

Protecting your identity: Examples FBI: Online Banking Attacks Reach $100 Million Mark –Victims receive a phishing with an infected attachment or malicious link –If the recipient falls for the trick, they end up downloading a key logger that swipes their business or corporate bank account credentials. Stealth Keylogger Used to Invade Victim Bank Accounts –The electronic thefts occurred by infecting the victims’ computers with a key logging program embedded in s and malicious web sites. –key logging software was stealthy and remained inactive until a victim used their computer to contact their bank online. It would record login and password information and send to the computer crime gang.

Protecting your Identity (1 of 2) Https vs. Http websites –Https: Secure –Http: Unsecure What information can be stolen? –SSN, Address, password, DOB, Credit and Banking information –Any information on the internet can be stolen

Protecting your Identity (2 of 2) How is information stolen? –Malware –Keyloggers How to protect your information? –Up to date antivirus, firewall, and spyware –Be careful who you give personal information to –Put as little information as possible on the internet

Social Networking (1 of 2) Defined: –Constructing a public or semi-public profile –Connecting with others based on shared interests, activities, etc… –Viewing your list of connections and those made by others within the system

Social Networking (2 of 2) Sites: –Facebook –MySpace –Twitter

Phony Facebook Facebook Users Targeted By Banking Trojan –Facebook users receive an informing them that Facebook is updating its log-in system to make things more secure. –The then urges them to click on what appears to be an update button embedded in the message –Once users click on the link, they are directed to a bogus Facebook log-in page, then asks for their password to allegedly complete the update. –Then, after "logging in," victims are taken to a page offering them an "update tool," which is, in actuality, the Trojan updatetool.exe. Once victims' click on the tool, their computers become infected with the Zeus Trojan, known for targeting banking accounts and designed to swipe personal and financial information.

Risks Increased visibility Cyberstalking Identity theft Spy ware, malware, viruses

Benefits Easy to make friends Connect with others around the world Learn about new cultures Develop technical skills

Cyberstalkers: Real Example How Cyberstalkers Obtain Your Personal Information-Part 2 –Cyberstalker sent harassing s –Put up fake ads in her name saying she wanted sex –Questioned her legitimacy at her workplace, and endless other torments. –He turned out to be an ex that she had broken up with 14 years earlier.

Social Networking Safety What information is acceptable? –Name? –Address? –Phone number? How can someone else use information? What steps can you take to ensure privacy?

How Pedophiles Think The Internet: A Breeding Ground for Online Pedophiles –Chicken hawk: which refers to an online pedophile who uses chat lines and member profiles to locate potential victims, sometimes posing as another youth to establish a bond –They listen to and empathize with the problems of children. –They will be aware of the latest music, hobbies, and interests of children –Try to gain children’s trust –Many of these offenders ultimately seek to sexually exploit the children they encounter online.

Common Social Networking Rules Never give away personal information Be careful what photos are posted Make sure you only accept people to be friends that you know well Never plan a face-to-face meeting Restrict information on profile page so only friends can see it

References "Los Alamos National Lab again under fire for weak computer security - Nextgov." Nextgov - Federal technology news, best practices, and web 2.0 tools. Web. 10 Nov “Stealth Keylogger Used to Invade Victim Bank Accounts | Shafer Consulting” Small Business Computer Consultants. Web. 17 Nov “FBI: Online Banking Attacks Reach $100 Million” Web. 14 Nov "Facebook Users Targeted By Banking Trojan - Security - IT Channel News by CRN." Channel News, Technology News and Reviews for VARs and Technology Integrators--ChannelWeb. Web. 12 Nov "How Cyberstalkers Obtain Your Personal Information - Part 2." Women's Issues - All About Women's Issues. Web. 12 Nov “The Internet: A Breeding Ground for Online Pedophiles.” Crime Scene Investigator Network. Web. 16 Nov