dark side presentation lwhippedtc515

14

Upload: lisawhipp

Post on 13-May-2015

3.523 views

Category:

Education


1 download

DESCRIPTION

Dark Side Powerpoint project for APU EDTC 515

TRANSCRIPT

Page 1: Dark side presentation lwhippedtc515
Page 2: Dark side presentation lwhippedtc515

THE GOOD, THE BAD, AND THE UGLY

What you should know about

the internet.By Lisa Whipp Azusa Pacific University EDTC 515

Page 3: Dark side presentation lwhippedtc515

WHAT DO YOU KNOW?

Viruses

Trojon Horses

Phishing

Identity Theft

Spyware

Malware

Adware

Child predatorsHackers

Antivirus

Firewall

Antispyware

Back ups

https

Cyber attacks

Page 4: Dark side presentation lwhippedtc515

THE GOOD

Always run up to date definitions for your antivirus and

spyware software.

Always turn off your computer at the end of the night.

Use safe and secure passwords and usernames. Do not give out birthday, name, and other personal information on the internet.

Use safe and secure sites when making online purchases. Look for the https compared to just http. The s at the end provides some security.

Make sure your Firewall is turned on. Consider purchasing a Firewall protection at the router too.

Page 5: Dark side presentation lwhippedtc515

THE BAD

According to Wikipedia on electronic spam, “In the

year 2011, the estimated figure for spam messages

is around seven trillion. The costs, such as lost

productivity and fraud, are borne by the public and

by Internet service providers, which have been

forced to add extra capacity to cope with the deluge.

Spamming has been the subject of legislation in

many jurisdictions.”[1]9 (wikipedia, 2011)

http://en.wikipedia.org/wiki/Spam_%28electronic%

29

Page 6: Dark side presentation lwhippedtc515

THE BAD

Fox News.com said “BOSTON - Spanish police have arrested three men

accused of masterminding one of the biggest computer crimes to date --

infecting more than 13 million PCs with a virus that stole credit card

numbers and other data.”(Reuters, 2010)

“Mariposa was programed to secretly take control of infected machines,

recruiting them as "slaves" in an army known as a "botnet." It would steal

login credentials and record every key stroke on an infected computer and

send the data to a "command and control center," where the ringleaders

stored it.”(Reuters, 2010)

http://www.fo

xnews.com/scitech/2010/03/03/masterminds-worlds-largest-virus-networ

k-arrested/ Click on this link to read more.

Page 7: Dark side presentation lwhippedtc515

THE BAD

Tech Faq says “The most important difference between a trojan virus/trojan horse and a virus is that trojans don’t spread themselves. Trojan horses disguise themselves as valuable and useful software available for download on the internet. Most people are fooled by this ploy and end up dowloading the virus disguised as some other application. The name comes from the mythical “Trojan Horse” that the Ancient Greeks set upon the city of Troy.” (TECH FAQ,2011)

http://www.tech-faq.com/trojan-virus.html

Malicious software is a common variation of a virus also known as Malware. There are two types of Malware, worms and Trojan horses. The most notorious worm was Melissa which quickly spread and caused serious harm to millions of computers.

Page 8: Dark side presentation lwhippedtc515

THE BAD

Protect yourself from the bad things such as spam,

viruses, and malware by…….. Always scan any attachments, downloads, and

software. Never open email attachments from unknown sources. Turn off your email preview.

Never start your computer with removable media in the drives.

Back up your files and set your antivirus program to scan automatically.

Install a personal firewall program and consider a firewall at the router too.

Page 9: Dark side presentation lwhippedtc515

THE UGLY

Phishing is a term used when someone is attempting to acquire

your private information such as social security number, bank

account number, …etc to conduct fraud. Many times the attempts

appear through an email acting like they are your bank or credit

card company asking you to verify your information because it

might have been compromised. Sometimes these phishing

solicitations are over the phone.

Never give out any private information via email or over the phone.

Page 10: Dark side presentation lwhippedtc515

THE UGLY

To protect yourself from Spyware you should not only have antispyware on your computer, but you should get a credit report once a year to monitor possible identity theft.

Employers are legally allowed to “record” your internet activities. They can see what web site you visited, get copies of emails, and every keystroke.

Spy software known as Spyware is deadly. Spyware can come in different forms from hackers being able to hack and see your desktop to them recording your every key stroke.

Page 11: Dark side presentation lwhippedtc515

THE UGLY

Page 12: Dark side presentation lwhippedtc515

PROTECT YOURSELF

Page 13: Dark side presentation lwhippedtc515

REFERENCES

G.Wolfgang. (n.d.). Clint Eastwood [picture]. Retrieved May 14, 2011, from

GoneMovie.com:

http://www.gonemovies.com/WWW/XsFilms/SnelPlaatjes/GoodBlondie2.asp

History Channel Cyber Security Greg Evan Talks Spyware [video]. (n.d.).

Retrieved May 14, 2011, from YouTube: http://www.youtube.com/watch?v=aH-

5kcx_J3A

ICA. (n.d.). Retrieved May 15, 2011, from Clint Eastwood [picture]:

http://www.ica.org.uk/18793/Film/The-Good-The-Bad-The-Ugly.html

Reuters. (2010, March 3). Accused Masterminds of world's Largest Computer

Virus Network Arrested. Retrieved May 14, 2011, from Fox News.com:

http://www.foxnews.com/scitech/2010/03/03/masterminds-worlds-largest-virus-

network-arrested/

Page 14: Dark side presentation lwhippedtc515

REFERENCES

Shelly, G.&.(2010). Security Issues, Ethics, and Emerging

Technologies in Education. In G.&. Shelly, Integrating Technology and

Digital Media in the Classroom (pp.469-516). Boston: Course

Technology, Cengage Learning.

Spam (electronic). (n.d.). Retrieved May 14, 2011, from Wikipedia:

http://en.wikipedia.org/wiki/Spam_%28electronic%29

The Good, The Bad & The Ugly [sound clip]. (n.d.). Retrieved May 14,

2011, from YouTube: http://www.youtube.com/watch?v=1hYV-JSjpyU

Trojan Virus. (n.d.). Retrieved May 15, 2011, from TECH FAQ:

http://www.tech-faq.com/trojan-virus.html