Newsgroups, Listservs, Chats & Phishing Electronic Writing & Publishing.

Slides:



Advertisements
Similar presentations
Newsgroups, Mailing Lists, Chat. Interacting with the Net Community Newsgroups Mailing Lists, Listservs Chat (Internet Relay Chat, Web-based Chat, Instant.
Advertisements

Chapter 10 Mass Communication Tools. Copyright © 2006 Pearson Addison-Wesley. All rights reserved Mass Communication One person or agency communicating.
Unit 1: Module 1 Objective 10 identify tools used in the entry, retrieval, processing, storage, presentation, transmission and dissemination of information;
An ACEware Presentation Featuring our Special Guest.. Jason Allen.
How It Applies In A Virtual World. Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently.
Phishing and Pharming New Identity Theft Threats Presentation by Jason Guthrie.
Jason Rich CIS  The purpose of this project is to inform the audience about the act of phishing. Phishing is when fake websites are created.
Mailing Lists and Newsgroups CSCI170 Internet Resources.
Malicious Attacks By Chris Berg-Jones, Ethan Ungchusri, and Angela Wang.
What is the Internet? Internet: The Internet, in simplest terms, is the large group of millions of computers around the world that are all connected to.
Threats To A Computer Network
1 University of York Department of Health Sciences Computers & Communication By Ian Cole Lecturer in C&IT Last updated 6/4/04.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Computers Going Online Internet Resources and Applications Finding information on the Web browsing: just looking around searching: trying to find specific.
WELCOME TO THE AHIA CONNECTED COMMUNITY! HEALTHCARE INTERNAL AUDIT'S PROFESSIONAL THOUGHT LEADERSHIP COMMUNITY.
Newsgroups, Listservs, Newsletters, Chats & Phishing
Instant Messaging Security Flaws By: Shadow404 Southern Poly University.
How It Applies In A Virtual World
Effectively Using Internet Technology Brian Cordeau University of Texas – San Antonio.
IMonitor Software About IMonitorSoft Since the year of 2002, coming with EAM Security Series born, IMonitor Security Company stepped into the field of.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
The internet is a worldwide public network of computers on which people can join and use multiple services such as sharing of information. OR The Internet,
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
Logo Name of Company Search My Account, Contact, Log in HomeLiquorWineBeer Wine Copyright Google Map Location Advertisement WhiskeyBeerBrandy RumVodka.
© Anthony J. Nowakowski, Ph.D. Communications © Anthony J. Nowakowski, Ph.D. EDC 601 Instructional Technologies .
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Copyright © 2003 Pearson Education, Inc. Slide 7-1.
Reliability & Desirability of Data
Mass Communication WeeSan Lee
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
Instant Messaging Alan Parker Robert Callow Brian Kearney Fortunato Macari Daniel Harrington Chang Gong Wang.
How did the internet develop?. What is Internet? The internet is a network of computers linking many different types of computers all over the world.
U SING THE COMPUTER IN YOUR RESEARCH Applied English 4 Group A Joshua A Zoe A Jessie A Shelly A Daniel A Peter.
Copyright © 2003 Pearson Education, Inc. Slide 7-1.
8 1 ADVANCED COMMUNICATION TOOLS Using Chat, Virtual Worlds, and Newsgroups New Perspectives on THE INTERNET.
Communication Tools Prof.S.G.Isave, Tilak College of Education, Pune-India.
Website Workshop Emma Castro, Contents Questionnaire Results Handouts New Ideas.
An Overview of the Internet: The Internet: Then and Now How the Internet Works Major Features of the Internet.
Introduction to Internet Communications Pn. Jamilah Binti Yusof.
Internet Research Tips Daniel Fack. Internet Research Tips The internet is a self publishing medium. It must be be analyzed for appropriateness of research.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
CCT355H5 F Presentation: Phishing November Jennifer Li.
The Internet CSC September 30, History of the Internet Developed for secure military communications Evolved from Advanced Research Projects.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
BY : MUHAMMAD KHUZAIMI B. ISHAK 4 ADIL PUAN MAZITA INFORMATION AND COMMUNICATION OF TECHNOLOGY.
How Phishing Works Prof. Vipul Chudasama.
How to Read Outlook . Make sure the computer is on.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Phishing Dennis Schmidt, CISSP Director, Office of Information Systems HIPAA Security Officer UNC School of Medicine UNC School of Medicine.
Internet 1) John R. Levine, Margaret Levine Young, The Internet for Dummies. Wiley Publishing, 12 th Edition, 2010.
THE INTERNET. TABLE OF CONTENT CONNECTING TO THE INTERNET ELECTRONIC MAIL WORLD WIDE WEB INTERNET SERVICES.
 (electronic mail) is the transmission of e  addresses are unique and consist of two parts separated by (‘at’) symbol in the form.
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
INTERNET AND . WHAT IS INTERNET The Internet can be defined as the wired or wireless mode of communication through which one can receive, transmit.
Electronic mail News File transfer protocol Chat Instant messaging Online services Online shopping.
& Google Gmail.
Listserv and Newsgroups
Listserv and Newsgroups
Phishing, what you should know
Phishing is a form of social engineering that attempts to steal sensitive information.
McGraw-Hill Technology Education
The methods of phishing By EverTokki Lee
Phishing Don’t fall for fake
INFORMATION TECHNOLOGY
EDUCATION ON THE INTERNET
McGraw-Hill Technology Education
What is Phishing? Pronounced “Fishing”
Phishing “In computing, phishing (also known as carding and spoofing) is a form of social engineering, characterized by attempts to fraudulently acquire.
Presentation transcript:

Newsgroups, Listservs, Chats & Phishing Electronic Writing & Publishing

What is a Newsgroup? Traditionally: part of the usenet news system Now: –Article-based electronic “newsletter” or –A topic-based discussion forum or –Still part of the usenet news system, with hierarchies based on topic (soc, alt, comp, talk) –Accessed/received via , website (often requiring login), or a newsreader –Topics can be almost anything

Where can I find Newsgroups? Goggle Groups search: beta.google.com/ beta.google.com/ Newzbot: FAQ on usenet newsgroups: Brief intro to newsgroups with a selection of newsgroups:

What is a Listserv? An electronic mailing list for discussion –often topic based A public forum or community Requires a subscription (usually easy to obtain by sending an to the listserv address) Messages sent to all members Available: sent to inbox, digest form, online

How a Listserv works Image from Tri-Service Toxicology Consortium

Where can I find Listservs? Catalogue of listservs with a search: Use a search engine (google, yahoo,…) and search for your topic and listserv [Example search: cats listserv] Look up professional organizations in your field. Many should have listserv For more info, including how to join & hints of being part of a listserv: – – stserv.htmhttp:// stserv.htm

What is Chat? Synchronous online communication Usually between just two people & fairly short Various “types” –Instant messaging (IM) –AOL Instant Messenger (AOL IM) –ICQ (“I seek you”) –Yahoo Chat (Y!) –IRC: not owned by a company, requires client program Universal clients available that allow you access several chat types at the same time (Trillian, Zango,…)

Examples of Chat Interfaces Example chat window Example interface

Phishing “crackers” send fraudulent s “from” a trustworthy source to lure victims to give up sensitive info (such as passwords, account numbers, credit card numbers, and the such), often require people to log in at fake sites and in the process giving the info to the phishers, often use scare tactics to get people “hooked” –Examples: s from a bank asking for account info, from ebay wanting info –Started on AOL –DO NoT follow the –DO NOT use the url in the –if unsure go to the real website type in the URL yourself orcall the company Most companies want you to send any phishing your received “from” them to them

Phishing Example

The End