By: Austin Kellogg. What’s the difference Phishing Scam where frauds send pop-up messages to lure personal information.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
SECURITY CHECK Protecting Your System and Yourself Source:
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Internet Security and Identity Theft Brad Weaver January 17, 2007.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Computer Basics. Computers & Peripherals Safety on the Web Security Software Firewall Antivirus Software Norton Antivirus McAffee Antivirus Security.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
How It Applies In A Virtual World
Threats to I.T Internet security By Cameron Mundy.
Issues Raised by ICT.
Security Issues: Phishing, Pharming, and Spam
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Over 3,000 computers are affected monthly by Malware and Phishing.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Phishing And Malware By Joey Pawoll. Major problems for you and your computer Phishing and malware are major problems for your computer This powerpoint.
1 Kids on the Web. Child’s play? September, 2008.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Stay Safe & Secure Online. Outline Passwords Everyday Security Security Physical Security Protecting Personal Information.
Scams & Schemes Common Sense Media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
IT security By Tilly Gerlack.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Dawes Intermediate miDevice Student Guidelines & Internet Safety Procedures Revised from the iSafe program at
What is Identity Theft? How is it accomplished? How might it impact the victim? What can I do to protect myself? What is phishing? By Ellen Justice.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Get to Know ASU Jeopardy! Information Security Online Resources My ASUPotpourri 20 Play Final.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
ICT Functional Skills Viruses and other malware. What is malware? software which is specifically designed to disrupt or damage a computer system – Viruses,
Computer viruses The effects of a virus are…  Slow loadings  Crashing  Not having control over the computer  Deleting documents.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
Malware & Phishing By: mackenzie olson. Internet fraudsters send out spam, pop-ups, appealing websites, and desirable downloads.
PHISHING & MALWARE By Bailey Hoover September 2, 2010.
How to Read Outlook . Make sure the computer is on.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
safety Bailey mullan. dangers ing has become on of the main sources for communicating. When using it is more likely for someone.
HOW TO PREVENT IDENTITY THEFT ONLINE TIPS 1.WATCH OUT FOR PHISHING WEBSITES.
By Austin Kellogg DeterDetectDefend 1.RealReal 2.VirtualVirtual 3.FTCFTC.
BY JESSICA SCHOLEY p1. Id Fraud Is When Someone Pretends To Be Someone Else Using There Address, Birthday And Other Information. People Also Use Id Fraud.
Internet safety By Suman Nazir
Cyber Safety Jamie Salazar.
Things Every Computer User Should Know… Jessica Johnsey ED 505- Technology and Education.
Onguardonline.gov By Austin Kellogg. Main ideas  Protect your personal information  Know who your dealing with  Use security software that updates.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Phishing & Malware By: Alex Metzler. Phishing Hackers trick you into giving personal information Malware Uses viruses/spyware to get personal information.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
Writing an message Finish off your slide on recommendations of how to write an .
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
COMPUTER VIRUSES By James Robins. THE IMPACT OF VIRUSES By James 2.
Internet Safety for Elementary Students Revised from the iSafe program at
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Unit 4 IT Security.
Lesson 3 Safe Computing.
Scams, Identity Theft, and Viruses Kelly & Caitlin
Computer Security.
Presentation transcript:

By: Austin Kellogg

What’s the difference Phishing Scam where frauds send pop-up messages to lure personal information

What’s the difference Malware Includes viruses to steal personal info, send spam, and commit fraud

Main topics If suspecting one of these programs Effects of both How to prevent

If suspecting one of these programs -Malware 1.Have an anti-virus software running 2.Stop banking and shopping online 3.Call a professional for help

If suspecting one of these programs -Phishing 1. do not anyone 2. use an anti-virus software 3. don’t open any pop-ups Also don’t open any s

Effects -Malware A lot of pop-ups appear Slows down computer Displays programs you didn’t want to use

Effects -Phishing Identity theft Slow computer Credit card numbers stolen Many pop-ups

How to prevent -Malware Use anti-virus software Don’t open junk mail Be captious of downloading files

How to prevent Phishing Make sure all s are legit Use anti-virus software Only download important files

That’s a wrap Hope you liked these tips Be sure to use them to stay safe

citation Information from Pictures howstuffworks.com cybermaventechnology.net itp.net seo.mhvt.net End show Back to giant