Tech Vocab Slideshow Quarter 4 By: Jordan McCamman.

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Breaking Trust On The Internet
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
INTERNET SAFETY.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Internet Safety/Cyber Ethics
Important Facts you should know about the Net
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Define and identify unethical practices such as hacking, phone fraud, online piracy, cyberstalking, and data vandalism. Use of employer’s computers for.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
INTERNET SAFETY FOR STUDENTS
Threats to I.T Internet security By Cameron Mundy.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
What it is About  This poster is about The Nine Elements of Digital Citizenship.  It also has a lot of information about Cyber bullying.  There were.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Digital Citizenship Project.  The etiquette guidelines that govern behavior when communicating on the internet have become known as netiquette.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
BY: CHASIDY TUCKER Digital Citizenship Project. Plagiarism Pass off ideas of others without crediting the source.
Computer viruses The effects of a virus are…  Slow loadings  Crashing  Not having control over the computer  Deleting documents.
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
INTERNET: The Good, The Bad and The Ugly
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
What is Spam? d min.
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Digital Citizen Project By: Frances Murphey Technology and Education.
Computer crimes.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
Business Technology Applications What is Malware.
INTRODUCTION & QUESTIONS.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
Vocabulary Cassandra Peoples. Pharming the practice of redirecting computer users from legitimate websites to fraudulent ones for the purposes of extracting.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Responsible digital citizenship By: Aiden. What is responsible digital citizenship? Responsible digital citizenship is many things. The topics I am covering.
Digital Citizenship Project Submitted by: Etta Pope Instructor: Laurie Fowler.
Technical Implementation: Security Risks
Safety.
CYBER SECURITY...
IT Security  .
Online Safety! By: Michelle Deng.
Freedom Independence Transition
Cyber Security By: Pratik Gandhi.
Protect Your Computer Against Harmful Attacks!
COMPUTER CRIME.
Internet Safety Vocabulary
Computer Security.
Social Issues in Computing
Social Issues in Computing
Security in mobile technologies
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Tech Vocab Slideshow Quarter 4 By: Jordan McCamman

Identity Theft Identity theft - Stealing someone’s identity Identity theft - Stealing someone’s identity Identity theft is wrong and you can go to jail for it Identity theft is wrong and you can go to jail for it

Cyber Stalking Cyber Stalking- Sending multiple messages like via to annoy, embarrass, threaten, or intimidate the person Cyber Stalking- Sending multiple messages like via to annoy, embarrass, threaten, or intimidate the person It can be very scary if someone was cyber stalking you and not leaving you alone. It can be very scary if someone was cyber stalking you and not leaving you alone.

Spam Spam- A type of commercial message that people can get through pop-ups and , almost everyone gets spam If you are going to your e mail account there is a section labeled spam

Child Pornography  Child Pornography- pornography or pictures of people under the age of 18  Child pornography is illegal and is against cyber laws  Because of the sensitive nature of this vocabulary word I am not going to put a picture in this slide

Cyber Bullying Cyber Bullying- the use of the internet and other technology devices to harm people mentally( includes but not limited to name calling, threats and harassment) Many states have laws against cyber bullying but there's no way to actually stop it from happening

Hacking Hacking-Modifying a computer hardware and software to accomplish a goal and it is illegal Unlike the rest of the hackers who get caught, a good hacker doesn’t get caught.

Spyware Spyware – Computer software that obtains information without the computer owners knowledge or permission Spyware – Computer software that obtains information without the computer owners knowledge or permission One way to know if theres spyware on your computer is by running computer scans with your ant- spyware software One way to know if theres spyware on your computer is by running computer scans with your ant- spyware software

Malware Malware- Designed programs to infiltrate a computer without the owners acceptance Malware- Designed programs to infiltrate a computer without the owners acceptance Malware is Malicious Software. Malware is Malicious Software.

Sexting Sexting- Sending naked pictures via text message Sexting is illegal and to do it with a minor is also child pornography

Pharming  Pharming – A way hackers attempt to penetrate your computer  To protect yourself from pharming you need a top of the line firewall

Phishing ► Phishing- captures peoples information by having people visit fake websites and such ► You can be loosing your personal information when visiting websites and you will have no idea that its happening

Computer Fraud  Computer Fraud- stealing someone's personal information and using it  Computer fraud is illegal and is very wrong

Geotags Geotags- A way to ad geographical data to photos, RSS feeds, and websites Geotags- A way to ad geographical data to photos, RSS feeds, and websites I added a geotag to a picture on facebook I added a geotag to a picture on facebook

Virus Virus-A virus is a treat on your computer that can do varius harm to your computer Virus-A virus is a treat on your computer that can do varius harm to your computer A type of bad virus is the Trojan Horse because in order to get rid of it you must to reformat your computer loosing all the information A type of bad virus is the Trojan Horse because in order to get rid of it you must to reformat your computer loosing all the information

Cyber Terrorism Cyber Terrorism – The use of internet based attacks in terrorism activities Washington says the China has invested in cyber terrorism

The End By: Jordan McCamman Thanks to help from the best search engine ever