Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice e-mail safety Learn how to protect yourself against common e-mail attacks.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Cyber Safety Assessment Review
Primary Threats to Computer Security
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Victoria ISD Common Sense Media Grade 6: Scams and schemes
COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
SECURITY CHECK Protecting Your System and Yourself Source:
1 Identity Theft and Phishing: What You Need to Know.
What is identity theft, and how can you protect yourself from it?
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Security Issues: Phishing, Pharming, and Spam
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
SAFETY What to be aware of and how to avoid problems. **This is not meant to make you fearful of . The goal of this discussion is to make sure.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Staying Safe Online Keep your Information Secure.
Reliability & Desirability of Data
Scams & Schemes Common Sense Media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
What is Spam? d min.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
Cyber Safety Jamie Salazar.
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
INTRODUCTION & QUESTIONS.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Any criminal action perpetrated primarily through the use of a computer.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
A Quick and Easy Crash Course Internet Safety for Everyone.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Fall Phishing - attempt to acquire sensitive information, like bank account information or an account password, by posing as a legitimate entity.
Learn how to protect yourself against common attacks
Unit 4 IT Security.
Lesson 3 Safe Computing.
What to be aware of and how to avoid problems.
Protect Your Computer Against Harmful Attacks!
Computer Security.
What is Phishing? Pronounced “Fishing”
Lesson 2- Protecting Yourself Online
Presentation transcript:

Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks

Copyright ©2005 CNET Networks, Inc. All rights reserved. Preventing problems Many malicious acts, such as identity theft, viruses, and scams, are perpetrated through . The best protection from these schemes is knowing what to look for.

Copyright ©2005 CNET Networks, Inc. All rights reserved. Why ? There are currently over 500 million users worldwide. Currently, there are 50 billion s sent every day. This is a huge potential market for people trying to sell, steal, or simply harm others.

Copyright ©2005 CNET Networks, Inc. All rights reserved. A huge amount of bad According to a Canadian study, 73% of all sent in 2004 was SPAM. America Online currently blocks over 3 billion SPAM s per day. With this many s floating around, everyone needs to be aware of what to look for in .

Copyright ©2005 CNET Networks, Inc. All rights reserved. Types of bad s Viruses and worms Phishing scams SPAM Chain letters

Copyright ©2005 CNET Networks, Inc. All rights reserved. Viruses and worms Many types of computer viruses are spread through . However, there are some steps that users can take to help prevent becoming infected.

Copyright ©2005 CNET Networks, Inc. All rights reserved. Attachment safety Never open attachments from someone you do not know. If you think the attachment may be legitimate, send an to the person who sent it, and confirm that they indeed did send it. Always make sure your antivirus software is up to date. Your antivirus software will combat many bad attachments that could lead to a virus infecting your system.

Copyright ©2005 CNET Networks, Inc. All rights reserved. Opening s If you think something seems wrong with an e- mail, delete it immediately If you get a window asking you to install something when you open an , click “No” or simply exit, and then delete the If an directs you to a Web site that asks you to install something, click “No” or exit, and then delete the

Copyright ©2005 CNET Networks, Inc. All rights reserved. Phishing Phishing is a way of fraudulently acquiring sensitive information, such as credit card or bank account information by tricking users with official-looking messages

Copyright ©2005 CNET Networks, Inc. All rights reserved. Types of phishing scams Phishing s can appear to come from legitimate institutions such as your bank, eBay, Visa, etc., but they really come from a criminal trying to steal information Instant Messenging (IM) With IM phishing, you will get an IM from someone claiming to be support for your IM provider, asking you for account information

Copyright ©2005 CNET Networks, Inc. All rights reserved. How to not become a phishy Never send sensitive account information in an message Never go to a sensitive site through an link; always type the site name in your browser (such as Never give any password out to anyone. If your bank requires verification, do it over the phone or in person. Verify any person who contacts you unsolicited, claiming to be customer support

Copyright ©2005 CNET Networks, Inc. All rights reserved. The SPAM problem SPAM is unsolicited commercial e- mail. SPAM s are sent en mass, to thousands of people in an attempt to get them to purchase a product ranging from night lights to prescription medications. SPAM messages account for over 36 billion messages per day.

Copyright ©2005 CNET Networks, Inc. All rights reserved. Ways to combat SPAM Never buy anything from a SPAM ; SPAM continues to exist because it works Take advantage of SPAM filtering in your client (such as Microsoft Outlook 2003) Do not use your address to sign up for things on the Internet without reading the company’s privacy policy (make sure they won’t sell your address to other companies).

Copyright ©2005 CNET Networks, Inc. All rights reserved. Chain letters Chain letters cover any variety of topics, anything from spiders in the toilet to free gift certificates or even getting paid to forward the . They are all hoaxes, and should be avoided.

Copyright ©2005 CNET Networks, Inc. All rights reserved. Break the chain The problem with chain letters is the sheer volume of mail they create. If one person forwards 1 message to 10 people, and each of them forwards it to 10 people, by the sixth generation you have over 1 million messages. If you figure in the cost of each of those people reading the chain letter, you end up with a huge cost. This does not include the cost associated with the mail servers storing and sending all those messages, or slowing down because of the extra load.

Copyright ©2005 CNET Networks, Inc. All rights reserved. Go forth and be safe …