Cybersecurity Test Review Introduction to Digital Technology.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Are you Safe at Work? A look into Safety at the Workplace and Internet Security Presented by Sheila Gee.
Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
SECURITY CHECK Protecting Your System and Yourself Source:
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Unit 6 Digital Literacy Study S3 Obj 2-2
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
INFORMATION SECURITY AWARENESS PRESENTED BY KAMRON NELSON AND ROYCE WILKERSON.
Quiz Review.
Security Advice Georgie Pepper Campsmount Acadamy.
Threats to I.T Internet security By Cameron Mundy.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Chapter 11 Security and Privacy: Computers and the Internet.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
Safe computing and Malware Presentation done by Tylor Hardwick, Alex Gilsdorf, Code Forrester, Xander Winans.
Cyber Crimes.
Security Chapter What Should I Ask Santa Claus For? spoofing: fraudulent activity in which the sender address and other parts of the.
UNIT 4 ASSIGNMENT VIRUSES & DESTRUCTIVE PROGRAMS.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Staying Safe Online Keep your Information Secure.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Viruses & Destructive Programs
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Dimeji Ogunshola 10b  There are many threats to your computer system. The computer threats can be mainly transferred through unknown s or accidental.
Information Security Sharon Welna Information Security Officer.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
What is Spam? d min.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
INTRODUCTION & QUESTIONS.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Vocabulary Cassandra Peoples. Pharming the practice of redirecting computer users from legitimate websites to fraudulent ones for the purposes of extracting.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Issues for Computer Users, Electronic Devices, Computer and Safety.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Computer Security Keeping you and your computer safe in the digital world.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Cyber security. Malicious Code Social Engineering Detect and prevent.
Security Risks Todays Lesson Security Risks Security Precautions
An Introduction to Phishing and Viruses
IT Security  .
Lesson 3 Safe Computing.
Network security threats
Risk of the Internet At Home
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Presentation transcript:

Cybersecurity Test Review Introduction to Digital Technology

Cybersecurity Malware: Software designed specifically to disrupt or damage a system Virus: A program or piece of code that attacks a computer or network through contaminated data

Cybersecurity Trojan: A destructive program that masquerades as a harmless application Spyware: Software that secretly gathers information through the user’s Internet connection without his or her knowledge

Cybersecurity Adware: Software that is given to the user with advertisements hidden in the application Phishing: An that claims to be a legitimate enterprise in an attempt to scam the user into surrendering private information to be used for identity theft

Cybersecurity Identity theft: Obtaining personal information about someone else illegally Antivirus software: Computer programs that can block, detect and remove viruses and other malware

Cybersecurity Encryption: The process of using codes to make readable information unreadable Spam: unsolicited s sent to many addresses

Cybersecurity Describe the Nigerian scam. Involves offering you a share in a large sum of money on thecondition that you help them transfer it out of their country

Cybersecurity List 4 tips on how you can avoid becoming a victim of identity theft. Shop only secure sites Protect your personal info Check your credit report Protect PINs and passwords Use an alternate identity for web surfing Use cash or credit

Cybersecurity Why is it important to use software that is updated automatically? The bad guys constantly develop new ways to attack your computer.

Cybersecurity Why is it important to back up your files to an external location? No system is completely secure. If you back up your files to an external location, if your computer is compromised, you'll still have access to your drive.

Cybersecurity How can downloading apps compromise your computer or electronic device’s security? Downloading may give developers access to personal information that's not related to the purpose of the app. The developers may share the information they collect with marketers and other companies.

Cybersecurity How does a captcha work? You have to type in the distorted letters and numbers as a security measure. This is difficult to impossible for a computer to do. The test helps identify which users are real human beings and which ones are computer programs.

Cybersecurity Why are newer cars, but not older cars, vulnerable to hacking? Modern cars are highly dependent on computers. Computers control many parts of new cars.

Cybersecurity Name four parts of a car that are controlled by a computer. Engine Lights BrakesPhone systems SteeringGPS Door locks

Cybersecurity List 2 tips on how to keep a “clean machine”. Latest security software Latest web browser Latest operating system When in doubt, throw it out Plug and scan devices such as flash drives

Cybersecurity How can you protect personal information on your phone? Keep security software current Protect all devices that connect to the Internet Use strong passwords to lock your phone Think before you app Learn how to disable the geotagging feature on your phone Only give your number out to people you can trust

Cybersecurity What happens to the data that is “harvested” by botnets? Criminals use it for identity theft, credit card fraud, spamming, website attacks and malware distribution