What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Primary Threats to Computer Security
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Protecting Your Identity: What to Know, What to Do.
Protect Yourself Against Phishing. The good news: The number of US adult victims of identity fraud decreased from 9.3 million in 2005, to 8.4 million.
What is identity theft, and how can you protect yourself from it?
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Malicious Attacks By Chris Berg-Jones, Ethan Ungchusri, and Angela Wang.
Malicious Attacks Angela Ku Adeline Li Jiyoung You Selena Yuen.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Alisha horsfield.  Computer virus is something that copies itself to computer software.  Virus can delete the hosts important documents which includes.
Threats to I.T Internet security By Cameron Mundy.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Issues Raised by ICT.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Protecting Information. Who We Are We are working on our Information Assurance MBA This is part of our curriculum; to present on information security.
Alisha Horsfield INTERNET SAFETY. firewall Firewall- a system made to stop unauthorised access to or from a private network Firewalls also protects your.
Your Trusted Partner In All Things IT. 20 Years of IT Experience University Automotive Food Service Banking Insurance Legal Medical Dental Software Development.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Cyber Crimes.
SACHIN DEDHIA Cyber Crime Investigator Cert. Ethical Hacker(USA)
Cyber crime & Security Prepared by : Rughani Zarana.
Scams & Schemes Common Sense Media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
What is Identity Theft? How is it accomplished? How might it impact the victim? What can I do to protect myself? What is phishing? By Ellen Justice.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Types of Electronic Infection
Company LOGO Malicious Attacks Brian Duff Nidhi Doshi Timmy Choi Dustin Hellstern.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
We are here to help you… Fight something like this Brownies !
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
CYBER CRIME AND SECURITY If we can defeat them sitting at home……who needs to fight with tanks and guns!!!! Presented By Lipsita Behera. B.Sc IST, 3 rd.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
What is Spam? d min.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Security Risks Viruses, worms, Trojans Hacking Spyware, phishing Keylogging Online fraud Identity theft DOS (Denial of Service attacks.
Internet safety By Suman Nazir
Cyber Safety Jamie Salazar.
Computer crimes.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
5 different ways to get tricked on the internet. 1. Viruses A virus is a computer malware program that copies it’s files to the computer. This may allow.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Cyber crime and security issues
Cyber security. Malicious Code Social Engineering Detect and prevent.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
An Introduction to Phishing and Viruses
Unit 4 IT Security.
Cyber Security Awareness Workshop
Computer Security.
Presentation transcript:

What are they? What do they have to with me?

Introduction  You may not know exactly what it is, but chances are you have encountered one at some point on the internet  Ever get a pop-up that tells you that you just won a free iPhone? Ever been asked to click on a link to redeem your prize or “find out who has a crush on you”? Then you have encountered an attempted malicious attack.

So what is it?  A malicious attack is anything that attempts to spread damaging viruses or “phishing”  What is phishing? It’s a criminal attempt at stealing your private information such as your credit card details, passwords, or bank account number using electronic mediums.  Also, it’s important to remember that dumpster diving is another form of phishing.

How do I know if I’m a victim?  Viruses are usually spread through s and pop up windows. You may be infected by simply opening an e- mail or you may be presented with a link that will direct you to a false website that will contaminate your system.  Phishing is done by fooling you into thinking you are entering a trustworthy electronic communication. For instance, sending you an informing you that there is a complication with your bank account and presenting you with a link to a page that is designed to make you believe that it is your bank’s official website. Once you are on the false site you will usually be asked to give your personal information and you do so without any idea that you have been made a victim.

Background (Evolution)  Malicious attacks are considered cyber crimes.  Cyber crime = crimes that target computers directly or crimes facilitated by use of computer.  1820 – first recorded cyber crime.  1970 – developments in networking technology ( ).  1990 – birth of internet.

Some important milestones  Wild virus, experimental virus  Robert Morris’s Worm  AIDS Trojan  First Macro Virus, Hackers  Windows 98  Denial of Service (DoS)

Steps towards lessening the problem.  Keep your antivirus up to date  Use anti-spam software  Use back-up systems  Don’t enter sensitive or financial information into pop-up windows  Use a Firewall  Don’t open hyperlinks in an  Get educated (especially on phishing and hacking)

Criticisms  Things like encryption and copy protection mechanisms do not fully solve the issue. Encryption usually protects the data only on the transport channel, and as soon as the data is decrypted for display or playback, it can be copied.  Copy protection mechanisms are difficult to realize in open systems. Even in proprietary systems they are often circumvented sooner or later.  Thus, both encryption and copy protection offer only limited security.  Currently, heavy firewalls and watermarking are really the best options.

In our personal opinion…  We do not recommend malicious attacks of any kind.  Malicious Attacks such as phishing ( , IM, Phone calls, and Dumpster Diving.)  Once again…  Keep your antivirus up to date  Use anti-spam software  Use back-up systems  Don’t enter sensitive or financial information into pop-up windows  Use a Firewall  Don’t open hyperlinks in an  get educated (especially on phishing and hacking)  Contact the Information Security Office  (412) 