CptS 401 Adam Carter. Change in schedule  Updated online copy  Tomorrow: read 5.4-5.6.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Primary Threats to Computer Security
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
How It Applies In A Virtual World. Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently.
What is identity theft, and how can you protect yourself from it?
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
CptS 401, Spring2011 3/24/11 Chapter 5: Crime See Dilbert cartoons about crime:
Phishing – Read Behind The Lines Veljko Pejović
Instructions for Weds. Jan Get your Century 21 Jr. textbook 2.Log in to the computers 3.On page 80, read the Objectives listed under “Lesson 13:
Phishing, Pharming, and Spam Margaret StewartTuesday, Oct. 21, 2006.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
How It Applies In A Virtual World
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
GONE PHISHING ECE 4112 Final Lab Project Group #19 Enid Brown & Linda Larmore.
Washington State Department of Financial Institutions “Regulating financial services to protect and educate the public and promote economic vitality.”
WEB SPOOFING by Miguel and Ngan. Content Web Spoofing Demo What is Web Spoofing How the attack works Different types of web spoofing How to spot a spoofed.
Scams & Schemes Common Sense Media.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Drive-by pharming is an interesting type of networking attack that combines multiple networking vulnerabilities and average user laziness to create an.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Biometrics.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Internet Safety Internet Safety LPM
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
ICT & Crime Identity theft & fraud. Homework Worksheet – due back on Monday.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
Security Risks Viruses, worms, Trojans Hacking Spyware, phishing Keylogging Online fraud Identity theft DOS (Denial of Service attacks.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
ICT & Crime Introduction. Homework read THREE stories from ict.com/news/news_stories/news_crime.htm & produce a 3-fold leaflet describing/discussing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Phishing & Pharming Methods and Safeguards Baber Aslam and Lei Wu.
5.6- Demonstrate how to be a responsible consumer in the 21 st century Roll Call Question: Something that you learned in this unit.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Computer Security Set of slides 8 Dr Alexei Vernitski.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Identity Thefts: Opinion of the Lithuanian Population Dr. Zita Čeponytė 1.
Cyber security. Malicious Code Social Engineering Detect and prevent.
Antisocial use of ICT and Computer Fraud
Done by… Hanoof Al-Khaldi Information Assurance
To Know what Cyber crime is
Network security threats
Phishing is a form of social engineering that attempts to steal sensitive information.
The Best Way To Secure U R Self
Protect Your Computer Against Harmful Attacks!
Teaching Computing to GCSE
Lesson 2- Protecting Yourself Online
Starter What is identity theft?
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Unit 1 Fundamentals of IT
What is Phishing? Pronounced “Fishing”
Lesson 2- Protecting Yourself Online
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

CptS 401 Adam Carter

Change in schedule  Updated online copy  Tomorrow: read

Question  The term “phishing” describes what activity:  Stealing information through the mail  Impersonating an online entity in order to obtain personal information  Collecting credit card information from portable scanners  A high-tech way to catch fish

Answer  B (274)

Quiz Question In this identity theft scheme, false IP addresses are planted in DNS tables, causing users to be unknowingly directed to fake sites: A. Phishing B. Pharming C. Spyware D. All of the above E. None of the above 5

Answer B. Pharming See pp What is a DNS? Is Pharming easier than Phishing? 6

Quiz Question Biometrics are A. the unique biological characteristics of a specific group of people, such as blood type or hair color B. the unique biological characteristics of a specific individual, such as fingerprint, eye patterns, or DNA. C. the unique measurements of an individual, such as height, weight, or arm length. D. All of the above E. None of the above 7

Answer B. Can biometric scanning devices be tricked? Why or why not? 8

Quiz Question  The most common victims of identity theft are in what age range? A. >18 B C D E. 50+

Answer  B (273)

Question  Which of the following *WAS NOT* mentioned as a way to protect against identity theft? A. Using a service to flag safe websites B. Displaying a safety image prior to login C. Using fingerprints to log into computers D. Sending confirmation messages whenever an information request is made E. Requiring people to use “strong passwords”

Answer  (E). While using strong passwords is a very good practice, it was not discussed in section 5.3.

Discussion  Consider the development of a “.bank” domain name. Would this help prevent identity theft? Is this a good idea?

Discussion  Should we use biometric data for identity protection? A. Yes B. No

Class discussion  Discuss personal experiences with spyware

Class discussion  What should we expect from companies that get hacked?  Should they be held liable?  Should they be made to pay restitution to the victims?