emily jamin rachel sarah cyber safety by. identity theft by emily
Post on 19-Dec-2015
218 views
TRANSCRIPT
Emily JaminRachelSarah
Cyber Safety By
Identity Theft By Emily
What is ID Theft?
•ID Theft occurs when someone steals your personal information, such as: credit card number, Social Security number, ect.
•It can cost you alot of money and time.
•It has the ability to destroy your credit and your reputation.
What info do ID thieves steal?
•ATM cards
•Your name,birthdate, address.
•Telephone calling cards.
•Social Security Number
How ID Theft Happens.
•ID Theives might go through your trash to find personal info.
•They might use “Phishing” to get you to give your personal info to them.
•They could even steal your purse or wallet!
How to Prevent ID Theft.
•You should shred financial documents before you discard them.
•Don’t give anyone your personal information, unless you know who you are dealing with.
•Keep your passwords hard to guess but easy for you to memorize.
“Crackers”
•ID Thieves will sometimes try to gain access to your hard drive remotely over the internet.
•You can prevent “crackers” by installing a firewall, and using a dynamic IP address.
The “Phishing” Scam.
•You get an email from your bank saying they need your credit card number and personal info!
•Don’t be fooled by these fake emails, they are hackers who want to steal your identity!
How to identify “Fake” Email
address.•This is what a “fake” email looks
like. “www.23.345.567.87.Citybank.com” (notice the numbers before the words)
•The numbers before the words are how you can identify fake I.P. adresses.
True ID Theft Stories
• An IRS agent used the IRS database to locate the social security number of a stranger with good credit. She used this SSN to obtain three credit cards and a car lease in that person's name. Since the IRS agent paid the bills on time, the victim had no idea fraudulent accounts had been opened in her name until she pulled her credit report one day and discovered them.
ID Theft Statistics in the U.S.
•ID theft is the number one fraud complaint received by the government.
•5.5% of Americans have already been ID theft victims.
•There were 10 million victims of ID theft in 2003, $53 billion was the total loss from these victims.
Where you can go to Report ID Theft.
•Equifax - www.equifax.com
•Experian - www.experian.com
•Trans Union - www.transunion.com
•www.consumer.gov/idtheft
Thank You!!
Illegal Internet Illegal Internet ActivitiesActivities
•Most illegal activities require no great Most illegal activities require no great expertise with computers such as:expertise with computers such as:
•Software piracySoftware piracy
•Unauthorized distribution of copyrighted Unauthorized distribution of copyrighted materialsmaterials
•Chain letters for profit (Pyramid schemes)Chain letters for profit (Pyramid schemes)
•Fraudulent advertising or business Fraudulent advertising or business practicespractices
•Threatened acts of violenceThreatened acts of violence
Doing Illegal Stuff Is EASY...and
DANGEROUS
•Intellectual property, in the form or text, Intellectual property, in the form or text, images, and audio, is protected under images, and audio, is protected under copyrightcopyright
•Downloading MP3’s, for example, unless Downloading MP3’s, for example, unless they have been explicitly made public by they have been explicitly made public by the artist, is illegalthe artist, is illegal
•Universities are starting to protect Universities are starting to protect themselves by cracking down on themselves by cracking down on students who violate copyrightsstudents who violate copyrights
•Some have also been prosecutedSome have also been prosecuted
Mp3’s, Photos, Videos are Protected By Copyright
•The Internet has provided opportunities The Internet has provided opportunities for data collection that go far beyond a for data collection that go far beyond a marketer’s wildest dreamsmarketer’s wildest dreams
•Your browser contains information about Your browser contains information about you, including the types of sites you visityou, including the types of sites you visit
•Web pages can also be programmed to Web pages can also be programmed to collect information about you, such as collect information about you, such as when you visited the sitewhen you visited the site
•The Online Personal Privacy Act (2002) The Online Personal Privacy Act (2002) limits the kinds of information that is limits the kinds of information that is collectedcollected
Your Info Is on the Internet
•Violations of copyright law occur when Violations of copyright law occur when you reproduce and distribute someone you reproduce and distribute someone else’s writing, photograph, or artwork else’s writing, photograph, or artwork without permission of the copyright without permission of the copyright holder.holder.
•As a basic rule of thumb, you can save As a basic rule of thumb, you can save one copy and print out one copy of one copy and print out one copy of anything you find online on your anything you find online on your personal computer if it is for your personal computer if it is for your personal use only. personal use only.
•All computer accounts are subject to an All computer accounts are subject to an Acceptable Use Policy (AUP)Acceptable Use Policy (AUP)
•When you sign up for service, you also agree to When you sign up for service, you also agree to the terms of the AUPthe terms of the AUP
•Common university AUP’s prohibit the use of the Common university AUP’s prohibit the use of the school’s resources for:school’s resources for:
•Commercial activityCommercial activity
•Academic dishonestyAcademic dishonesty
•HarassmentHarassment
•Use of specific internet sights (ex: music Use of specific internet sights (ex: music sharing sites)sharing sites)
OBEY THE AUP!!
•Do not provide personal information Do not provide personal information such as: phone number, home address such as: phone number, home address etc.etc.
•Do not provide your Social Security Do not provide your Social Security Number or other sensitive informationNumber or other sensitive information
•Two federal laws exist to protect privacy:Two federal laws exist to protect privacy:
•Children’s Online Privacy Protection Children’s Online Privacy Protection Act of 1998 – for children under 13 Act of 1998 – for children under 13 years oldyears old
•Online Personal Privacy Act of 2002 - Online Personal Privacy Act of 2002 - everyoneeveryone
To Protect Your Privacy:
•Send unsolicited email (junk mail)Send unsolicited email (junk mail)
•Forge an email message or Forge an email message or misrepresent your true identitymisrepresent your true identity
•Initiate an electronic chain letter of any Initiate an electronic chain letter of any kindkind
•Misuse broadcast email for Misuse broadcast email for innappropriate announcementsinnappropriate announcements
It Is Inappropriate To:
•Online stalking and hate mail incidents Online stalking and hate mail incidents also need to be taken seriouslyalso need to be taken seriously
•Laws exist that make issuing threats Laws exist that make issuing threats illegalillegal
•This includes kidnapping or bodily harmThis includes kidnapping or bodily harm
•Threats against the President are Threats against the President are investigated by the Secret Serviceinvestigated by the Secret Service
Our Society Takes Threats VERY
Seriously
•Remember –Remember –
•Ignorance of the law and Ignorance of the law and good intentions are poor good intentions are poor defenses if you’re unlucky defenses if you’re unlucky enough to be in the wrong enough to be in the wrong place at the wrong time.place at the wrong time.
•Think before you leap!!Think before you leap!!
END.
Inappropriate Content
Rachel
What Is Considered
Inappropriate?•Pornography
•Hate Groups
•Violence
What Is Considered Inappropriate?
•Illegal Activity
•Extremist Groups and Cults
•Online Advertising
Places Your Child Could Encounter Inappropriate
Content
•THE INTERNET
•Chat sites
Chat Sites
•
Places Your Child Could Encounter Inappropriate
Content•Google- search and images
•Pop Ups
•Adult Websites
Monitor Your Young Children
•DO YOU HONESTLY WANT YOUR CHILDREN TO WATCH OR BE DOING ANY OF THIS?
Cyber Safety Tips
•Do not get into conversations with people you don’t know!
•Don’t add people to your Myspace, Facebook, or anything you have without knowing the person. You have no idea what this person could have on their profile.
True Story!
• Chloe Michaels was only 11 years old when she was lured into a relationship by a man through Internet chat. After months of exchanging messages in an Internet chat room he finally managed to meet and court her.
Chloe first started going into Internet chat rooms after her mother
Cathy, a teacher, bought a computer to help with her homework. Each evening when she'd finished her schoolwork, she would then log on to chat. Eventually their relationship
came to a boil; he dumped her, terrified, distraught, and pregnant.
Meet Your Child’s Internet Friends
!PARENTS!
• WATCH what your children are doing.
•See ALL of the websites that they visit!
•Talk to them and warn them about all of the inappropriate content and bad things online.
YOU
•should be your child’s internet babysitter
CyberBullyingCyber
Bullying
What is Cyberbullying?
•Cyberbullying involves the use of information and communication technologies such as email, cell phone and pager text messages, instant messaging (IM), defamatory personal web sites, and defamatory online personal polling web sites, to support deliberate, repeated, and hostile behavior by an individual or group, that is intended to harm others (Keith & Martin, 2004).
DIFFERENCESBULLYING
• DIRECT
• Occurs on school property
• Poor relationships with teachers
• Fear retributionPhysical: Hitting, Punching & ShovingVerbal: Teasing, Name calling & GossipNonverbal: Use of gestures & Exclusion
www.stopbullyingnow.hrsa.gov
CYBERBULLYING
• ANONYMOUS
• Occurs offschool property
• Good relationships with teachers
• Fear loss of technology privileges
• Further under the radar than bullying
• Emotional reactions cannot be determined
{McKenna & Bargh, 2004; Ybarra & Mitchell, 2004}
From ‘Demystifying and Deescalating Cyber Bullying’ by Barbara Trolley, Ph.D. CRC, Connie Hanel, M.S.E.d & Linda Shields, M.S.E.d. http://www.nyssca.org/CYBERBULLYING-pp-BT28th.ppt
iSafe Survey
•58% of kids admit someone has said mean or hurtful things to them online
•53% of kids admit having said something mean or hurtful things to another online
•42% of kids have been bullied while online
•34% were threatened
CYBER BULLYING PREVALENCE
• Aftab’s statistics:90% of middle school students they polled had their
feelings hurt online65% of their students between 8-14 have been
involved directly or indirectly in a cyber bullying incident as the cyber bully, victim or friend
50% had seen or heard of a website bashing of another student
75% had visited a website bashing40% had their password stolen and changed by a
bully (locking them out of their own account) or sent communications posing as them
Problems in studies: not assessing the ‘real thing’i.e. Only 15% of parent polled knew what cyber bullying was
http://www.aftab.com/
CYBER BULLYING PREVALENCE
• Cyber bullying typically starts at about 9 years of age and usually ends after 14 years of age; after 14, it becomes cyber or sexual harassment due to nature of acts and age of actors (Aftab)
• Affects 65-85% of kids in the core group directly or indirectly through close friends (Aftab)
http://www.aftab.com/
Why Use Technology to Bully?
•Anonymity
•Rapid deployment and dissemination
•Immediate
•Rich medium
•Natural
How Do PeopleCyberbully Others?
•Exclusion
•Outing
•Polling
•Stalking
•Libel
•Blackmail
• Flaming• E-mail• Websites• “Piling” via IM• Impersonation
What is the Impact of Cyberbullying?
•Psychological, physical, and emotional
•depression, anxiety, anger,
•school failure, school avoidance, suicide, and school violence
•Role modeling for others which increases likelihood of increased bullying
What is the Impact of Cyberbullying?
•Legal consequences for school and families (slander, defamation, terroristic threats, sexual exploitation, etc.)
•Family Complications
•Very difficult to take back once it begins.
•Antithetical to the overall school mission
Advantages of using Advantages of using PeersPeers
•power of peer influencepower of peer influence
• legitimizing the issue of harassmentlegitimizing the issue of harassment
• less hampered by institutional concernsless hampered by institutional concerns
•mobilize other studentsmobilize other students
QuickTime™ and aDV/DVCPRO - NTSC decompressor
are needed to see this picture.
Resources
•Ctap4.org
•Google images
•Wikepediea.org
•Aftab.com
•Icanhazcheezberger.com