Yessenia Rico Amy Cahill Greta Leos Jacob Cordova.

Slides:



Advertisements
Similar presentations
Internet Safety Rockingham County Public Schools
Advertisements

The Internet: Educates Us Entertains Us Connects us False information
How to protect yourself, your computer, and others on the internet
Polling Stations There are four questions posted in the classroom Indicate a “yes” response by placing a tally mark on the white board The results of the.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Breaking Trust On The Internet
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
INTERNET SAFETY.
What is identity theft, and how can you protect yourself from it?
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Emily Snyder, William Darras, Stephanie Berger.  40Y 40Y.
Instructions for Weds. Jan Get your Century 21 Jr. textbook 2.Log in to the computers 3.On page 80, read the Objectives listed under “Lesson 13:
Cyber-bullying & Cyber Security UNM Anderson School of Management For Jefferson Middle School’s 8 th Grade InfoTech Class.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Internet Fraud By: Noelle Woodman.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
INTERNET SAFETY FOR STUDENTS
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
COMM 1010 Presentation By: Gina Haws Information for the presentation obtained from EVERYTHING YOU SAY, POST OR DO ON THE INTERNET CAN PUT YOU AT RISK.
Being Good Digital Citizens with Today’s Technologies.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
INTERNET SAFETY. There are basically two dangers associated with visiting WEB SITES! You may come across material that is sexual, hateful, violent, or.
How can you protect yourself from online identity theft?
Staying Safe Online Keep your Information Secure.
Scams & Schemes Common Sense Media.
IT security By Tilly Gerlack.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
ITC Summer I Table of Contents Glossary of terms Glossary of terms Safety Tips Quiz Credits Standards Multimedia Connections Multimedia.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
INTERNET: The Good, The Bad and The Ugly
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Internet Safety Mr. Richard Orr Technology Teacher Murphy Jr. High School.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Internet Survival Tips for Kids and Teens
By: Asfa Khan and Huda Mukhtar
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
RESPONSIBLE DIGITAL CITIZENSHIP At the Safety Booth.
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
By John Williams. Why Secure Passwords Matter Passwords protect everything about you online. Once those passwords are discovered and used by someone else.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Digital access is the equal chance for every country to be able access digital technology. Every person in the world should be able to have access to.
Internet safety.. Dangers of the internet: Paedophiles. Cyber bullying. Money theft. Sexual harassment. Identity theft. Hacking of your accounts. Viruses.
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
“Doing the Right thing online” Online Safety. Socializing Communicating Creating Playing Exploring Learning.
Technological Awareness for Teens and Young Adults.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Internet Safety.
The Internet TEACHERS PARENTS PREDATORS YOU LAW ENFORCEMENT.
As modern children, we have a huge number of electronic devices available to us. We might use computers, tablets, mobile phones or games consoles; for.
Done by… Hanoof Al-Khaldi Information Assurance
Appropriate Use of Technology
Rules To Help You Navigate the Internet Safely
Presentation transcript:

Yessenia Rico Amy Cahill Greta Leos Jacob Cordova

Computer crimes encompass unauthorized or illegal activities perpetrated via computer as well as the theft of computers and other technological hardware.

Popular Computer Crimes Identity Theft Spam Fraud Craig's List MySpace Pedophiles

 Involves a person that is pretending to be someone else in order to steal information, money, or anything that they could want from that individual  Statistics  data breach incidents  2008 First 9 months-516 data breach incidents  80% of these incidents are related to or involve digital records  Two-thirds of identity theft begins with solicitations

 Spamming is the sending of unsolicitated electronic messages  Most spam mail originates from advertisers looking to push their products further  Spamming contributes to other problems also  Identity theft  Viruses

 Myspace is a computer crime because you can give false identity. Myspace can also generates controversy ranging from rape and murder to child predators and drug dealers.  Myspace is positive in ways as in you can chat with family, Friends who have move away.

As a medical diagnosis, it is defined as a psychological disorder in which an adult or older adolescent experiences a sexual preference for prepubescent children. The Internet Allows Pedophiles: Instant access to other predators worldwide; Open discussion of their sexual desires; Shared ideas about ways to lure victims; Mutual support of their adult-child sex philosophies; Instant access to potential child victims worldwide; Disguised identities for approaching children, even to the point of presenting as a member of teen groups; Ready access to "teen chat rooms" to find out how and who to target as potential victims; Means to identify and track down home contact information; Ability to build a long-term "Internet" relationship with a potential victim, prior to attempting to engage the child in physical contact.

 Passwords Select a GOOD password, try to mix up a combination of characters in a password of only 1,2,3, or 4 characters. Avoid obvious passwords…example (your name, date of birth, and your nickname).  Personal Information Don’t give out banking account information unless you know it’s a secured site!! Never give out your Social Security Number. Make sure to logout of everything after your done using your computer, that way if someone else uses it they can’t get a hold of your personal info.

 Anti-Virus Protection Don’t bring disks in from outside sources. Scan demo disks and downloaded files for viruses.

There is an unfortunate percent that will be victims but you can prevent it from happening by being aware of your actions on the internet.

matters.com/index.php?option=com_cont ent&view=article&id=519 hile.htm /CPSG-6.htm