Phishing & Malware By: Alex Metzler. Phishing Hackers trick you into giving personal information Malware Uses viruses/spyware to get personal information.

Slides:



Advertisements
Similar presentations
Primary Threats to Computer Security
Advertisements

How to Keep Your PC Running Like New Bryan Nowak.
SECURITY CHECK Protecting Your System and Yourself Source:
Protecting Your Identity: What to Know, What to Do.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Computer Maintenance & Safety Spring Internet Safety Keeping your computer safe What is a computer virus? A computer program that can copy itself.
Hey check out this cool PHISHING presentation! Benjamin Ross Lyerly.
No.24 Prerawat Denvutivorkarn M.2/2. Definition: "antivirus" is protective software designed to defend your computer against malicious software. Malicious.
Threats to I.T Internet security By Cameron Mundy.
Internet safety By Lydia Snowden.
Over 3,000 computers are affected monthly by Malware and Phishing.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
Phishing And Malware By Joey Pawoll. Major problems for you and your computer Phishing and malware are major problems for your computer This powerpoint.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
IT Security for Users By Matthew Moody.
Computer Security By: MacKenzie Olson. To be safer and more secure online, make these seven practices part of your online routine.
Identity theft: Real or Virtual? By: Alex Metzler.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
PC Maintenance How to keep your computer healthy.
1. Self Awareness You should only access your accounts and private informations from a safe location (only at home as necessary if at all possible) where.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Spyware By: Sydney Langley. Spyware Is software installed on your computer without your consent Spyware monitors or controls your computer use.
Computer Security By Joey Pawoll. Introduction to computer security Have you been wondering how to be safe online? Well look no further! This powerpoint.
Year 9 Autumn Assessment Computer system/Information security-Planning, Communicating, Information. By Louis Smith-Lassey 9k 9Y1.
STAY SAFE!! Don’t fall for the same old tricks !!.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Computer Security By Rachel Gaines. Computers are used for work, play, and everything in between. So here’s how to keep it fun and protected.
Computer Viruses... a big problem with small solutions.
ICT Functional Skills Viruses and other malware. What is malware? software which is specifically designed to disrupt or damage a computer system – Viruses,
Computer security By Shreya Houji. VirusesViruses.
By Demi Gardiner 8P Who’s been on your computer??
SPEAKING ‘Information Technology’ ‘Computers’. Make dialogues on a spot, without preparation. Use active vocabulary from the topics ‘Information Technology’
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
Presented by: Maha, Marina and Aleks Viruses,Wormsand Trojans.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
Malware & Phishing By: mackenzie olson. Internet fraudsters send out spam, pop-ups, appealing websites, and desirable downloads.
PHISHING & MALWARE By Bailey Hoover September 2, 2010.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Computer Safety Sid Holder 8k Viruses Hacking Backing Up.
INTERNET SAFETY FOR KIDS
Computer Security By: Alex Metzler. Table of Contents Protecting Your Personal Info Know Who You’re Dealing With Use Updated Security Software Update.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Computer security By Isabelle Cooper.
By Liam Wright Manga comic group Japan SAFETY on your computer.
Are you a COMPUTER GEEK or a COMPUTER FREAK? By Evie Watkins.
Matthew Glenn AP2 Techno for Tanzania This presentation will cover the different utilities on a computer.
By: Austin Kellogg. What’s the difference Phishing Scam where frauds send pop-up messages to lure personal information.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Onguardonline.gov By Austin Kellogg. Main ideas  Protect your personal information  Know who your dealing with  Use security software that updates.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
COMPUTER VIRUSES By James Robins. THE IMPACT OF VIRUSES By James 2.
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
Managing Money Workshop The National Autistic Society AGM
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
Encryption and Hacking
Presentation transcript:

Phishing & Malware By: Alex Metzler

Phishing Hackers trick you into giving personal information Malware Uses viruses/spyware to get personal information

Table of Contents Phishing –Few FactsFew Facts –Be SmartBe Smart –Report itReport it Malware –Maybe MalwareMaybe Malware –What to DoWhat to Do –Report ItReport It

Few Facts Phishers try to trick you to get information Some put business numbers to call –Use business numbers from contact cards They can steal your identity

Be Smart Never send out personal information Get a anti-virus, anti-spyware, and a firewall –Update them regularly Don’t open unsure attachments in s

Report it Send to If your identity has been stolen: –Go to ftc.gov/idtheft

Maybe Malware If you think you have malware: –Your computer is slow –Computer won’t restart or shut down –Random pop-up messages –Computer does random things on its own

What to Do If you have malware: –Stop doing everything –Check your security Get it up to date –Run a scan and delete all malware –Make sure it never happens again

Report it File a complaint to the FTC –They want to know

Thanks for the Help Onguard Online. 9/9/2009. http. ng.aspx Onguard Online. 9/9/ ware.aspx

KEEPING YOUR COMPUTER SAFE SINCE 1976!!