are you safe? alyssa caputo & niki labella itech 1101 dr. nagel
Post on 11-Jan-2016
216 Views
Preview:
TRANSCRIPT
Are you safe?
Alyssa Caputo & Niki LabellaItech 1101Dr. Nagel
State of the Art Technology
•A barrier to keep destructive forces away from your property.
• physical firewall
•Protects computers from Spam, viruses, or bugs.
•Customizable to fit the needs of the user.
•Identifies and eliminates harmful software
• Phishing, worms, viruses…
•Scans files located on PC
•Popular programs include Norton and McAfee
Anti Virus ProgramsFirewalls
History of Cyber Crime
Hacking has been around since 1970's
1980: Hacking groups emerged 1986: Computer Fraud and Abuse
Act 1988: Robert Morris 1994: Hacking websites emerged 2000: "Denial of Service" aka DoS
Basi
c Term
s
Protects Against:
Spyware
Internet SecurityMany would say:
None
Issues dealing with Internet Security
Child abuse/abduction: Children are an easy target for online predators and sex offenders
[Myspace, Facebook, Instant Messaging or Chat Rooms] State authorities now pose as children
Fraud: Identity theft : Credit Cards or Driver’s Licenses stolen
○ Social Security numbers , loans… Internet fraud: Using email to ask for money to help transport items ATM fraud: Intertwine the magnetic strip on a user's card and the PIN
number. ○ In '99, there were 251 reported cases in the US.○ Fake ATMs.
File sharing and piracy:○ Napster (mp3) File Sharing (LimeWire)
Top 5 Ways to Keep Safe Online
1) Don't leave the telecommunications cable connected to your home computer when the internet is not in use.
2) Protect, watch, and supervise children.
3) Never open an attachment from an unfamiliar sender scan suspicious attachments
with a trusted virus scanner before opening.
4) Use firewalls, anti-virus, and spyware detection software on a regular basis updates
5) Protect your personal information and identity.
(from Internet Safety Family Guide [ISBN 1411666631 &1411666690] by Victoria Roddel)
Resources Cashman, Thomas J., Gary B. Shelly, and Misty E. Vermaat. Discovering Computers: Fundamentals
Fourth Edition.Boston: Thomson Course Technology, 2008.
Cybercrime: protect your computer. Roddel, Victoria. 8 February 2006. Computer Crime Research Center. 16 April 2008. <http://www.crime-research.org/news/08.02.2006/cybercrime-protect-your-computer/>.
Cybercrime: Piercing the darkness. October 2004. Cybercrime. 18 April 2008. <http://library.thinkquest.org/04oct/00460/hackingHistory.html>.
"cybercrime." Encyclopædia Britannica. 2008. Encyclopædia Britannica Online. 22 Apr. 2008 <http://www.britannica.com/eb/article-235700>.
YouTube: What role does the Internet play in crime?. 10 May 2007. YouTube. 23 April 2008. <http://youtube.com/watch?v=xdDMfpcAjtM>.
30 Ways to Stay Safe Online. 23 September 1998. Microsoft Corporation. 23 April 2008. <http://www.chaminade.org/MIS/WebSafety/30ways.htm>.
Cybercrime: A Revolution in Terrorism and Criminal Behavior Creates Change in the Criminal Just. 21 July 2006. Associated Content, Inc. 23 April 2008. <http://www.associatedcontent.com/article/44605/cybercrime_a_revolution_in_terrorism.html>.
Common Fraud Types. October 2004. Risk Management. 23 April 2008. <http://www.tecbrand.com/eyrisk/newsletter1004/fraud_warning.htm>
top related