PHISHING & MALWARE By Bailey Hoover September 2, 2010.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Primary Threats to Computer Security
Don’t Be Tricked Beware of Zombies. Malicious zombie code infects computer Internet.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Protect Yourself Against Phishing. The good news: The number of US adult victims of identity fraud decreased from 9.3 million in 2005, to 8.4 million.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Phishing on the Internet? Presented by Naveed Farooq Naveed Farooq Admin Nidokidos Network Make Money Online | Join Nidokidos Forum |
Protecting Our Personal Space Security in a Virtual World.
Threats to I.T Internet security By Cameron Mundy.
Protecting Our Personal Space Security in a Virtual World by David Hines - Information Security Officer
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Over 3,000 computers are affected monthly by Malware and Phishing.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Have You Lost Your Identity? By Sierra Bowland. Deter Detect Defend.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
D IGITAL C ITIZENSHIP. Definition: The informal rules of behavior to be followed when using the Internet N ETIQUETTE.
Who Is This?! By Bailey Hoover. Foreword Deter Detect Defend Deter, Detect, Defend Brochure ID Theft: What It’s All About.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
Phishing And Malware By Joey Pawoll. Major problems for you and your computer Phishing and malware are major problems for your computer This powerpoint.
1 Kids on the Web. Child’s play? September, 2008.
Have Fun, Be Safe Strategies for Internet and Social Media Safety.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Scams & Schemes Common Sense Media.
Computer Security By: MacKenzie Olson. To be safer and more secure online, make these seven practices part of your online routine.
C OMPUTER C ONCEPTS Unit 1 Concept 3 – Solving Technological Problems.
Computer Technology Timpview High School.  is inexpensive and easy to use and track  Spam – s sent in bulk to many people’s .
A beginner’s guide to Webmail. What do you need? A computer, or a smartphone An internet connection An account with an service provider.
Be Cautious of Identity Theft By: Sydney Langley.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
Spyware By: Sydney Langley. Spyware Is software installed on your computer without your consent Spyware monitors or controls your computer use.
Computer Security By Joey Pawoll. Introduction to computer security Have you been wondering how to be safe online? Well look no further! This powerpoint.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Computer Security By Rachel Gaines. Computers are used for work, play, and everything in between. So here’s how to keep it fun and protected.
Computer Security! By Bailey Hoover. Opening: “Computer viruses are an urban legend.” -Peter Norton Actually: Virus: software reproduces itself; causes.
ICT Functional Skills Viruses and other malware. What is malware? software which is specifically designed to disrupt or damage a computer system – Viruses,
Information Security Sharon Welna Information Security Officer.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
Malware & Phishing By: mackenzie olson. Internet fraudsters send out spam, pop-ups, appealing websites, and desirable downloads.
Computer Security By Sierra Monif. “Access to information and entertainment, credit and financial services, products from every corner of the world —
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Computer Security By: Alex Metzler. Table of Contents Protecting Your Personal Info Know Who You’re Dealing With Use Updated Security Software Update.
safety Bailey mullan. dangers ing has become on of the main sources for communicating. When using it is more likely for someone.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
What is Spam? d min.
Protecting Your Computer By: Victoria Tuttle. There’s never enough you can do to protect your computer.
Introduction to Desktop Security Protecting your computer and your data.
Internet safety By Suman Nazir
Software for Cyber Hygiene © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
By: Austin Kellogg. What’s the difference Phishing Scam where frauds send pop-up messages to lure personal information.
Onguardonline.gov By Austin Kellogg. Main ideas  Protect your personal information  Know who your dealing with  Use security software that updates.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Phishing & Malware By: Alex Metzler. Phishing Hackers trick you into giving personal information Malware Uses viruses/spyware to get personal information.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
SPYWARE By Bailey Hoover. HEADINGS What Is This? How to Protect Your Computer Steps If You Think You Have It Spyware Questions?
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
What it is and how to stop it.  What spam is.  Why it can be dangerous.  How to handle it.
Protect Your Computer Against Harmful Attacks!
What is it? Why do I keep getting from Barracuda? SPAM.
Presentation transcript:

PHISHING & MALWARE By Bailey Hoover September 2, 2010

WHAT ARE THESE?  Phishing: frauds send spam for personal information Phishing  Malware: viruses/spyware to steal personal information Malware

PHISHING HEADINGS  How to Avoid Phishing How to Avoid Phishing  If You Think You Have Phishing If You Think You Have Phishing  How to Report It How to Report It

MALWARE HEADINGS  How to Avoid Malware How to Avoid Malware  If You Think You Have Malware If You Think You Have Malware  How to Report It How to Report It

HOW TO AVOID PHISHING  Don’t reply message asking for information  Use anti-virus & anti-spyware software  Don’t personal information

HOW TO AVOID PHISHING (Cont.)  Review credit cards/ bank statements  Be cautious opening attachments  Forward phishing s to

IF YOU THINK YOU HAVE PHISHING...  Area codes mislead: uses Voice Over Internet Protocol Technology  Update anti-spyware, anti-virus, firewalls  File complaints

HOW TO REPORT IT  Forward phishing s:  File complaints:  Other phishing s: antiphishing.org

HOW TO AVOID MALWARE  Don’t click links that are unknown  Don’t download/install software that are unknown  Talk about safe computing

IF YOU THINK YOU HAVE MALWARE...  Stop shopping/banking involving user names/passwords  Confirm a security software  Scan your software once up-to-date  Run a second anti-virus/anti-spyware program

HOW TO REPORT IT  File a complaint with the FTC: 

CHECK OUT YOUR COMPUTER!  If you even suspect something on your computer, seek professional help!

WORKS CITED OnGuard. ‘Phishing,’ September 2009 OnGuard. ‘Malware,’ September 2009