dark side presentation lwhippedtc515
DESCRIPTION
Dark Side Powerpoint project for APU EDTC 515TRANSCRIPT
THE GOOD, THE BAD, AND THE UGLY
What you should know about
the internet.By Lisa Whipp Azusa Pacific University EDTC 515
WHAT DO YOU KNOW?
Viruses
Trojon Horses
Phishing
Identity Theft
Spyware
Malware
Adware
Child predatorsHackers
Antivirus
Firewall
Antispyware
Back ups
https
Cyber attacks
THE GOOD
Always run up to date definitions for your antivirus and
spyware software.
Always turn off your computer at the end of the night.
Use safe and secure passwords and usernames. Do not give out birthday, name, and other personal information on the internet.
Use safe and secure sites when making online purchases. Look for the https compared to just http. The s at the end provides some security.
Make sure your Firewall is turned on. Consider purchasing a Firewall protection at the router too.
THE BAD
According to Wikipedia on electronic spam, “In the
year 2011, the estimated figure for spam messages
is around seven trillion. The costs, such as lost
productivity and fraud, are borne by the public and
by Internet service providers, which have been
forced to add extra capacity to cope with the deluge.
Spamming has been the subject of legislation in
many jurisdictions.”[1]9 (wikipedia, 2011)
http://en.wikipedia.org/wiki/Spam_%28electronic%
29
THE BAD
Fox News.com said “BOSTON - Spanish police have arrested three men
accused of masterminding one of the biggest computer crimes to date --
infecting more than 13 million PCs with a virus that stole credit card
numbers and other data.”(Reuters, 2010)
“Mariposa was programed to secretly take control of infected machines,
recruiting them as "slaves" in an army known as a "botnet." It would steal
login credentials and record every key stroke on an infected computer and
send the data to a "command and control center," where the ringleaders
stored it.”(Reuters, 2010)
http://www.fo
xnews.com/scitech/2010/03/03/masterminds-worlds-largest-virus-networ
k-arrested/ Click on this link to read more.
THE BAD
Tech Faq says “The most important difference between a trojan virus/trojan horse and a virus is that trojans don’t spread themselves. Trojan horses disguise themselves as valuable and useful software available for download on the internet. Most people are fooled by this ploy and end up dowloading the virus disguised as some other application. The name comes from the mythical “Trojan Horse” that the Ancient Greeks set upon the city of Troy.” (TECH FAQ,2011)
http://www.tech-faq.com/trojan-virus.html
Malicious software is a common variation of a virus also known as Malware. There are two types of Malware, worms and Trojan horses. The most notorious worm was Melissa which quickly spread and caused serious harm to millions of computers.
THE BAD
Protect yourself from the bad things such as spam,
viruses, and malware by…….. Always scan any attachments, downloads, and
software. Never open email attachments from unknown sources. Turn off your email preview.
Never start your computer with removable media in the drives.
Back up your files and set your antivirus program to scan automatically.
Install a personal firewall program and consider a firewall at the router too.
THE UGLY
Phishing is a term used when someone is attempting to acquire
your private information such as social security number, bank
account number, …etc to conduct fraud. Many times the attempts
appear through an email acting like they are your bank or credit
card company asking you to verify your information because it
might have been compromised. Sometimes these phishing
solicitations are over the phone.
Never give out any private information via email or over the phone.
THE UGLY
To protect yourself from Spyware you should not only have antispyware on your computer, but you should get a credit report once a year to monitor possible identity theft.
Employers are legally allowed to “record” your internet activities. They can see what web site you visited, get copies of emails, and every keystroke.
Spy software known as Spyware is deadly. Spyware can come in different forms from hackers being able to hack and see your desktop to them recording your every key stroke.
THE UGLY
PROTECT YOURSELF
REFERENCES
G.Wolfgang. (n.d.). Clint Eastwood [picture]. Retrieved May 14, 2011, from
GoneMovie.com:
http://www.gonemovies.com/WWW/XsFilms/SnelPlaatjes/GoodBlondie2.asp
History Channel Cyber Security Greg Evan Talks Spyware [video]. (n.d.).
Retrieved May 14, 2011, from YouTube: http://www.youtube.com/watch?v=aH-
5kcx_J3A
ICA. (n.d.). Retrieved May 15, 2011, from Clint Eastwood [picture]:
http://www.ica.org.uk/18793/Film/The-Good-The-Bad-The-Ugly.html
Reuters. (2010, March 3). Accused Masterminds of world's Largest Computer
Virus Network Arrested. Retrieved May 14, 2011, from Fox News.com:
http://www.foxnews.com/scitech/2010/03/03/masterminds-worlds-largest-virus-
network-arrested/
REFERENCES
Shelly, G.&.(2010). Security Issues, Ethics, and Emerging
Technologies in Education. In G.&. Shelly, Integrating Technology and
Digital Media in the Classroom (pp.469-516). Boston: Course
Technology, Cengage Learning.
Spam (electronic). (n.d.). Retrieved May 14, 2011, from Wikipedia:
http://en.wikipedia.org/wiki/Spam_%28electronic%29
The Good, The Bad & The Ugly [sound clip]. (n.d.). Retrieved May 14,
2011, from YouTube: http://www.youtube.com/watch?v=1hYV-JSjpyU
Trojan Virus. (n.d.). Retrieved May 15, 2011, from TECH FAQ:
http://www.tech-faq.com/trojan-virus.html