1 / 0

Privacy and Security Issues

Privacy and Security Issues. BTT 1O. Agenda. Cybercrime – What is it? Credit Card Info Cookies Identity Theft Spyware Cyberstalking Role Play Need to keep information secure. Cybercrime. How do criminals get our credit card information on the Internet?.

lindsey
Download Presentation

Privacy and Security Issues

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Privacy and Security Issues

    BTT 1O
  2. Agenda Cybercrime – What is it? Credit Card Info Cookies Identity Theft Spyware Cyberstalking Role Play Need to keep information secure
  3. Cybercrime How do criminals get our credit card information on the Internet? Phishing – e-mails requesting credit card information Hacking – individuals gain illegal entry into your computer Pop-Ups – another type of spam that encourages you to enter personal information
  4. Cybercrime What are cookies? Are a small text file that is placed in your computer’s hard drive by websites you visit It is not a virus, but rather a footprint of the sites you have visited and allow for easy navigation (do not have to re-enter information every on every visit)
  5. Cybercrime What’s the big deal? Problems arise when banner advertisers are on these sites, they too place a cookie on your hard drive These ad networks track all the information and activity you perform online Some may use it irresponsibly
  6. Cybercrime Identity Theft Occurs when someone steals personal information about someone else for the purpose of impersonating him/her Usually with monetary motives Criminals will get your personal information by stealing credit card applications, bank statements, or checks from your trash or mail Same type of theft can occur online
  7. Cybercrime Signs of Identity Theft Bills or statements not arriving Calls from collection agencies when you have no debt Withdrawals on your account you did not make Receive credit card statements for accounts you do not have Receive a poor credit rating on an application
  8. Cybercrime Cyberstalking – What is it? Individuals who stalk others on line Starts with gathering info, beginning contact, then threats or intimidation Engage in live chat harassment or flaming (online verbal abuse/defamation) Trace individuals internet activity and are also involved in identity theft
  9. Cybercrime Cyberstalking A very dangerous type of cyberstalker are sexual predators Stalk their victims to lure them Often pedophiles who target children and teens 25% people on Internet have been asked to meet face to face
  10. Cybercrime
  11. Use common sense when a site asks for information Check for privacy policies Keep separate email accounts for business and pleasure Clear your cache after browsing Encrypt whatever you can (https://) Use anonymous web-surfing programs Check your system for leaks (Web security) Say no to information sharing Use personal Internet security programs
  12. Moving into groups of four, you are to perform a role play based on the privacy and security issues learned in the lesson.
More Related