140 likes | 298 Vues
Polling Stations. There are four questions posted in the classroom Indicate a “yes” response by placing a tally mark on the white board The results of the polls will be tallied. Privacy and Security Issues. BTT 1OE. Agenda. Cybercrime – What is it? Credit Card Info Cookies Identity Theft
E N D
Polling Stations • There are four questions posted in the classroom • Indicate a “yes” response by placing a tally mark on the white board • The results of the polls will be tallied
Privacy and Security Issues BTT 1OE
Agenda • Cybercrime – What is it? • Credit Card Info • Cookies • Identity Theft • Spyware • Cyberstalking • Role Play • Need to keep information secure
Cybercrime How do criminals get our credit card information on the Internet? • Phishing – e-mails requesting credit card information • Hacking – individuals gain illegal entry into your computer • Pop-Ups – another type of spam that encourages your to enter personal information
Cybercrime What are cookies? • Are a small text file that is placed in your computer’s hard drive by websites you visit • It is not a virus, but rather a footprint of the sites you have visited and allow for easy navigation (do not have to re-enter information every on every visit)
Cybercrime What’s the big deal? • Problems arise when banner advertisers are on these sites, they too place a cookie on your hard drive • These ad networks track all the information and activity you perform online • Some may use it irresponsibly
Cybercrime Identity Theft • Occurs when someone steals personal information about someone else for the purpose of impersonating him/her • Usually with monetary motives • Criminals will get your personal information by stealing credit card applications, bank statements, or checks from your trash or mail • Same type of theft can occur online
Cybercrime Signs of Identity Theft • Bills or statements not arriving • Calls from collection agencies when you have no debt • Withdrawals on your account you did not make • Receive credit card statements for accounts you do not have • Receive a poor credit rating on an application
Cybercrime Cyberstalking– What is it? • Individuals who stalk others on line • Starts with gathering info, beginning contact, then threats or intimidation • Engage in live chat harassment or flaming (online verbal abuse/defamation) • Trace individuals internet activity and are also involved in identity theft
Cybercrime Cyberstalking • A very dangerous type of cyberstalker are sexual predators • Stalk their victims to lure them • Often pedophiles who target children and teens • 25% people on Internet have been asked to meet face to face
Moving into groups of four, you are to perform a role play based on the privacy and security issues learned in the lesson.
Use common sense when a site asks for information • Check for privacy policies • Keep separate email accounts for business and pleasure • Clear your cache after browsing • Encrypt whatever you can (https://) • Use anonymous web-surfing programs • Check your system for leaks (Web security) • Say no to information sharing (other org’s) • Use personal Internet security programs