PREPARED BY: SYAIDATUL SYAZANA BT PAUZI INTRODUCTION What is the definition of Phishing Hacking.

Slides:



Advertisements
Similar presentations
Internet Safety Rockingham County Public Schools
Advertisements

How to protect yourself, your computer, and others on the internet
Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access and attacks delivered.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
OVER VIEW OF BANKING FRAUDS
How It Applies In A Virtual World. Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Network Security aka CyberSecurity Monitor and manage security risks at the network level for the entire Johns Hopkins Network.
Ethical Hacking by Shivam.
Security Warnings TROPE: Teachers’ Resources for Online Privacy Education 1.
How To Protect Your Privacy and Avoid Identity Theft Online.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
How It Applies In A Virtual World
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Dr. John P. Abraham Professor UTPA.  Particularly attacks university computers  Primarily originating from Korea, China, India, Japan, Iran and Taiwan.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Phishing Rising to the challenge Amy Marasco Microsoft.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Day 3 Cybersafety Presented by FJUHSD Teacher Librarian.
P HI SH I NG !. WHAT IS PHISHING ? In computer security phishing is trying to acquire important information such as; passwords, usernames and credit card.
Ashley Chambliss ED 505 Fall 2. “Digital Citizenship is a way for teachers to prepare you for a world full of technology.” (Ribble, ) “A means.
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
Being Ecommerce Sophon Thanasrivilai #100485
Reliability & Desirability of Data
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
IT Banking Advantages and Disadvantages. Advantages IT banking is faster and more convenient for the user as they no longer are required to be at the.
Digital Citizenship Project By Allen Naylor Ed 505.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Dale Smith COSC 4010 Computer Security Authentication & Security in the.NET environment.
Presentation.  Suppression of speech or public communication.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
Information Security Sharon Welna Information Security Officer.
McLean HIGHER COMPUTER NETWORKING Lesson 8 E-Commerce Explanation of ISP Description of E-commerce Description of E-sales.
Issues and Problems Concerning the Internet Copyright ◦ Users pass off as others work and post it as their own work without giving credit to the source.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
Internet safety By Kenan.  Viruses are written by malicious programmers who wish to cause problems for other computer users.  The primary source of.
Internet safety By Suman Nazir
Cyber Safety Jamie Salazar.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Review Internet Safety. Definition Phishing is fishing for personal and financial information disguised at legitimate business .
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
PHISHING PRESENTED BY: ARQAM PASHA. AGENDA What is Phishing? Phishing Statistics Phishing Techniques Recent Examples Damages Caused by Phishing How to.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Cyber security. Malicious Code Social Engineering Detect and prevent.
Why Does The Site Need an SSL Certification?. Security should always be a high concern for your website, but do you need an SSL certificate? A secure.
PUBLIC COMPUTER SAFETY
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Done by… Hanoof Al-Khaldi Information Assurance
Cyber Security Awareness Workshop
Information Technology Services Education and Awareness Team
Information Technology Services Education and Awareness Team
Security in mobile technologies
Wireless Spoofing Attacks on Mobile Devices
Networks, Legal and Ethical Behaviors BSU CS4MS - 4/9/19
Presentation transcript:

PREPARED BY: SYAIDATUL SYAZANA BT PAUZI

INTRODUCTION What is the definition of Phishing Hacking

An attempt to acquire information such as: Username Password Credit Cards details Communication purporting to be from popular social web sites, for example: Online Booking Ticket Flight

Is a form of illegal intrusion into computer systems Modifying computer software or data to accomplish a goal outside of the creator’s original purpose People involved are known as hackers

Ways To Stop Computer Phishing and Hacking Good Password Selection Different accounts, different passwords Complex password Use Multiple or layered identity level of security 1 level id and password to access low security account and information Stronger authentication for higher risk account or information Use callback systems Dial the server’s telephone number; the modem can help to connect 1 computer to another. Use ‘’Know & Have’’ authentication Token Smartcard Biometric authentication

Phishing and unethical hacking are irresponsible acts. Always take safety precautions to avoid from becoming the victim in phishing and hacking activities. Never respond to an unknown asking for our private information. Only make transactions via secure websites that have ‘https’ or the padlock icon. CONCLUSION

CREDITS Hacking Image: I/AAAAAAAAArc/FhGmGFaXnXk/s400/hacking_big.jpgHacking Image: I/AAAAAAAAArc/FhGmGFaXnXk/s400/hacking_big.jpg Phishing Image: content/uploads/2011/08/protect-yourself-from-phishing.jpg Thinking Image: content/uploads/Thinking.jpg Information taken from: taken from:

CREDITS Background Music: "The Long Goodbye" by John Pazdan is licensed under a Creative Commons license: