Download presentation
Presentation is loading. Please wait.
Published byAugust Gardner Modified over 9 years ago
2
Safe Surfing An Introduction to the Internet BOLLI Spring 2008 Lesson 8: Is it Safe? 4/23/2008
3
Where Are We Going Today? 1. What's in the News? 2. Class Q & A …. 3. Homework Assignment #7 4. Is it Safe? 5. Open Q&A
4
What’s In The News? Class: ?Class: ? You Tube: http://www.youtube.com/watch?v=zBheC5afBfcYou Tube: http://www.youtube.com/watch?v=zBheC5afBfc http://www.youtube.com/watch?v=zBheC5afBfc
5
Homework Assignment - Week 7
6
“Think your PC is safe? Think again. A new study indicates your home computer is likely bogged down with spyware, viruses and other scourges wrought by hackers and PC pranksters. Ignorance may be bliss for some people, but for computer users, not knowing may be costly and inefficient.” Cynthia L. Webb WASHINGTON POST Is it Safe?
7
Subject: Norton Antivirus detected and quarantined a virus in a message you sent. Recipient of the infected attachment: AAEXCH, First Storage Group, info/Inbox Subject of the message: 0i09u5rug08r89589gjrg One or more attachments were quarantined Attachment id43342.zip was quarantined for the following reasons: VirusW32.Netsky.P@mm was foundVirusW32.Netsky.P@mm
8
HAZARDS Security Security Viruses Viruses Phishing Phishing Identity Theft Identity Theft Hoaxes Hoaxes (Spyware/Adware) (Spyware/Adware) (Spam) (Spam)
9
HAZARDS, cont’d. What are they?What are they? What can you do to survive them?What can you do to survive them?
10
SECURITY Protect yourself by establishing barriers to entry to your computer and its files.Protect yourself by establishing barriers to entry to your computer and its files. A basic step is to use effective passwords:A basic step is to use effective passwords: Difficult to guessDifficult to guess 6+ characters, with letters & numbers6+ characters, with letters & numbers Change periodically.Change periodically.
11
SECURITY, cont’d. Firewalls can block harmful applications and information from being transferred between the Internet and your computerFirewalls can block harmful applications and information from being transferred between the Internet and your computer You can use:You can use: Software firewallsSoftware firewalls Hardware routersHardware routers Wireless routers.Wireless routers.
12
SECURITY, cont’d.
13
VIRUSES A virus is a program or piece of code that is loaded onto your computer without your knowledge and acts against your interests (usually arrives as attachment).
14
VIRUSES, cont’d Viruses can: Transmit themselves across networks and bypass security systems Make copies of themselves Take over computers. Avoid viruses by: Not opening suspect attachments Installing and updating anti-virus software.
15
PHISHING 12/17/2007 Gartner Survey:12/17/2007 Gartner Survey: More t han $3 Billion LostMore t han $3 Billion Lost Debit Cards Targeted Most by FraudstersDebit Cards Targeted Most by Fraudsters 3.6 million adults lost money 2007 compared with the 2.3 million in 20063.6 million adults lost money 2007 compared with the 2.3 million in 2006 Avg. Loss 2007 = $886 ($1,244 in 2006)Avg. Loss 2007 = $886 ($1,244 in 2006) New Improved Phish - drops malware that steals user credentials & sensitive dataNew Improved Phish - drops malware that steals user credentials & sensitive data Pay Pal, eBay, electronic greeting cards, charities and foreign businesses. Pay Pal, eBay, electronic greeting cards, charities and foreign businesses.
16
IDENTITY THEFT Identity theft involves someone using another person’s social security number, signature, credit card, bank account or other information on the computer or personally.Identity theft involves someone using another person’s social security number, signature, credit card, bank account or other information on the computer or personally. Identity theft is prevalent - million or more cases in U.S. each year.Identity theft is prevalent - million or more cases in U.S. each year.
17
IDENTITY THEFT, cont’d Try to avoid Identity Theft by:Try to avoid Identity Theft by: Not giving out information in response to unsolicited emails (or phone calls)Not giving out information in response to unsolicited emails (or phone calls) Not downloading unexpected files, even from people you knowNot downloading unexpected files, even from people you know Controlling access to your computer filesControlling access to your computer files Using “temporary” account numbers.Using “temporary” account numbers. Limit effects by:Limit effects by: Obtaining insuranceObtaining insurance Monitoring bank and credit card records.Monitoring bank and credit card records. If you’re victimized: ITAC - Identity Theft Assistance CenterIf you’re victimized: ITAC - Identity Theft Assistance Center http://www.identitytheftassistance.org/http://www.identitytheftassistance.org/http://www.identitytheftassistance.org/
18
ID Theft - Citibank
19
ID Theft Example - Citibank
20
ID Theft Example – Citizens Bank
21
ID Theft Example – Smith Barney
22
ID Theft Example – Regions
23
ID Theft Example – So what if you’re not a member..
24
HOAXES Hoaxes are come-ons involving scams, chain letters, or sob stories.Hoaxes are come-ons involving scams, chain letters, or sob stories. Hoaxes are received from friends and relatives, not just from strangers and organizations.Hoaxes are received from friends and relatives, not just from strangers and organizations. Be wary of email previously sent to many people.Be wary of email previously sent to many people.
25
HOAXES, cont’d. Check out requests to provide personal or financial information, forward the email to others. Check out requests to provide personal or financial information, forward the email to others. Use Internet sites, such as:Use Internet sites, such as: www.hoaxbusters.ciac.org/www.hoaxbusters.ciac.org/www.hoaxbusters.ciac.org/ www.aarp.org/computers-howto/www.aarp.org/computers-howto/www.aarp.org/computers-howto/ www.linuxsecurity.com/general_article-9323.htmlwww.linuxsecurity.com/general_article-9323.htmlwww.linuxsecurity.com/general_article-9323.html
26
Scam Example – Big $$$$$$
27
Scam Example – Easy $$$$
28
Scam Example – You Lucky Guy!
29
Scam Example – You Lucky Gal!
30
Scam Example – “Hello dear,”
31
RECAP Use of the Internet is not inherently safe.Use of the Internet is not inherently safe. You must be constantly aware and take steps to avoid hazards to your computer and to correct problems that arise.You must be constantly aware and take steps to avoid hazards to your computer and to correct problems that arise.
32
Bibliography Lots of great tools and information: Federal Trade Commission http://www.consumer.gov/idtheft/ Department of Justice http://www.usdoj.gov/criminal/fraud/idtheft.html Federal Reserve Bank of Boston http://www.bos.frb.org/consumer/identity/idtheft.htm http://www.bos.frb.org/consumer/identity/idtheft.htm
33
Should I spend $30* FOR A $5 Flash Memory? * originally $40 Or $20.00 for Protection Or $0.00 for Protection** ** Watch the ADs
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.