1 / 13

Polling Stations

Polling Stations. There are four questions posted in the classroom Indicate a “yes” response by placing a tally mark on the white board The results of the polls will be tallied. Privacy and Security Issues. BTT 1OE. Agenda. Cybercrime – What is it? Credit Card Info Cookies Identity Theft

giulio
Download Presentation

Polling Stations

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Polling Stations • There are four questions posted in the classroom • Indicate a “yes” response by placing a tally mark on the white board • The results of the polls will be tallied

  2. Privacy and Security Issues BTT 1OE

  3. Agenda • Cybercrime – What is it? • Credit Card Info • Cookies • Identity Theft • Spyware • Cyberstalking • Role Play • Need to keep information secure

  4. Cybercrime How do criminals get our credit card information on the Internet? • Phishing – e-mails requesting credit card information • Hacking – individuals gain illegal entry into your computer • Pop-Ups – another type of spam that encourages your to enter personal information

  5. Cybercrime What are cookies? • Are a small text file that is placed in your computer’s hard drive by websites you visit • It is not a virus, but rather a footprint of the sites you have visited and allow for easy navigation (do not have to re-enter information every on every visit)

  6. Cybercrime What’s the big deal? • Problems arise when banner advertisers are on these sites, they too place a cookie on your hard drive • These ad networks track all the information and activity you perform online • Some may use it irresponsibly

  7. Cybercrime Identity Theft • Occurs when someone steals personal information about someone else for the purpose of impersonating him/her • Usually with monetary motives • Criminals will get your personal information by stealing credit card applications, bank statements, or checks from your trash or mail • Same type of theft can occur online

  8. Cybercrime Signs of Identity Theft • Bills or statements not arriving • Calls from collection agencies when you have no debt • Withdrawals on your account you did not make • Receive credit card statements for accounts you do not have • Receive a poor credit rating on an application

  9. Cybercrime Cyberstalking– What is it? • Individuals who stalk others on line • Starts with gathering info, beginning contact, then threats or intimidation • Engage in live chat harassment or flaming (online verbal abuse/defamation) • Trace individuals internet activity and are also involved in identity theft

  10. Cybercrime Cyberstalking • A very dangerous type of cyberstalker are sexual predators • Stalk their victims to lure them • Often pedophiles who target children and teens • 25% people on Internet have been asked to meet face to face

  11. Cybercrime

  12. Moving into groups of four, you are to perform a role play based on the privacy and security issues learned in the lesson.

  13. Use common sense when a site asks for information • Check for privacy policies • Keep separate email accounts for business and pleasure • Clear your cache after browsing • Encrypt whatever you can (https://) • Use anonymous web-surfing programs • Check your system for leaks (Web security) • Say no to information sharing (other org’s) • Use personal Internet security programs

More Related