Threats to IT security Jordan pilcher. phishing Phishing is when companies or people from other people who think they can get away with scamming you for.

Slides:



Advertisements
Similar presentations
Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
Advertisements

SECURITY CHECK Protecting Your System and Yourself Source:
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
What is identity theft, and how can you protect yourself from it?
Network and Internet Security and Privacy.  Explain network and Internet security concerns  Identify online threats.
David Abarca, Instructor Del Mar College Computer Corner Phishing, Pharming, Spear-Phishing, and now…. Vishing.
8 Mistakes That Expose You to Online Fraud to Online Fraud.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Instructions for Weds. Jan Get your Century 21 Jr. textbook 2.Log in to the computers 3.On page 80, read the Objectives listed under “Lesson 13:
Wonga example Register Question- What risks do you think businesses face due to IT developments?
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Alisha horsfield.  Computer virus is something that copies itself to computer software.  Virus can delete the hosts important documents which includes.
Threats to I.T Internet security By Cameron Mundy.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Protecting Information. Who We Are We are working on our Information Assurance MBA This is part of our curriculum; to present on information security.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
By: Mrs. McGinnis Sept,  Fradulent online shops  Sites that distruibute pirated music, videos and software  Bogus charity websites  Sites that.
Computer Security By Charlotte Foster 8P Computer viruses are small software programs that are designed to spread from one computer to another and to.
Scams & Schemes Common Sense Media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Viruses By amrisa hussain Internet safety. viruses Viruses- a virus is a file or a piece of code which is capable of copying itself and typically has.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
OBJECTIVE 3 ELECTRONIC COMMUNICATIONS. USES OF COMPUTING Pros Made tasks such as clerical work and computing easier and faster Buying, banking, and paying.
Made by Kristóf Somorjai.  The Internet is a global computer network that connects billions of users by using Internet protocol. Briefly about the Internet.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Topic 5: Basic Security.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
Security Risks Viruses, worms, Trojans Hacking Spyware, phishing Keylogging Online fraud Identity theft DOS (Denial of Service attacks.
By Liam Wright Manga comic group Japan SAFETY on your computer.
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
INTRODUCTION & QUESTIONS.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
5 different ways to get tricked on the internet. 1. Viruses A virus is a computer malware program that copies it’s files to the computer. This may allow.
Investigating Methods for Reducing Spam By: Steven Siggers Instructor: Marko Puljic.
Internet safety.. Dangers of the internet: Paedophiles. Cyber bullying. Money theft. Sexual harassment. Identity theft. Hacking of your accounts. Viruses.
DoS Attacks Phishing Keylogging Computer Laws/Acts.
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Identity Theft SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Phishing, identity theft, and more
Unit 4 IT Security.
Lesson 3 Safe Computing.
Network security threats
Norton technical support Norton.com/Setup | Norton Setup and Install with Product Key Norton Antvirus Activation For protection against.
HOW DO I KEEP MY COMPUTER SAFE?
Unit 4 IT Security Kerris Davies.
Lesson 2- Protecting Yourself Online
Presentation transcript:

Threats to IT security Jordan pilcher

phishing Phishing is when companies or people from other people who think they can get away with scamming you for money.

precautions Phishing -the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers, online.

viruses a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data. Viruses only work on the specific design of operating systems as the code is different Example… windows viruses may not work on IOS

hacking Hacking is someone who is trying to hack into your account or someone who is trying to enter a network of accounts or information (etc a bank)

access “dark net” is a perfect example of VIP access. There are many ways of accessing something on the internet.

Secure passwords G3r!4ck420wrektm8 GERLACK2000 Gerlack

Firewall Firewall is a protection scheme to viruses for a network or system or unauthorized access with a firewall

Spam Is an that is sent without the receivers permission. it can be linked to a phishing

Public Wi-Fi You might think public wifi is free but its not. It is dangerous to your phone. Public wifi pics up data from your phone if you enter a building or even if you just walk past. They can access your bank accounts with out you even knowing