Internet Safety. Nine (9) Dangers on the Internet 1. Identity theft 2. Phishing & Pharming 3....

31
Internet Safety

Transcript of Internet Safety. Nine (9) Dangers on the Internet 1. Identity theft 2. Phishing & Pharming 3....

Page 1: Internet Safety. Nine (9) Dangers on the Internet 1. Identity theft 2. Phishing & Pharming 3. Hacking 4. Drive by downloads (don’t click on everything)

Internet Safety

Page 2: Internet Safety. Nine (9) Dangers on the Internet 1. Identity theft 2. Phishing & Pharming 3. Hacking 4. Drive by downloads (don’t click on everything)

Nine (9) Dangers on the Internet1. Identity theft

2. Phishing & Pharming

3. Hacking4. Drive by downloads (don’t click on everything)

5. Pop ups (don’t click on everything)

6. Pornography

7. Cyberbullying

8. Predators

9. Posting

Page 3: Internet Safety. Nine (9) Dangers on the Internet 1. Identity theft 2. Phishing & Pharming 3. Hacking 4. Drive by downloads (don’t click on everything)

Dangers on the Internet Defined

Identity theft occurs when someone uses another person's personal information such as name, Social Security number, driver's license number, credit card number, or other identifying information to take on that person's identity in order to commit fraud or other crimes.

Page 4: Internet Safety. Nine (9) Dangers on the Internet 1. Identity theft 2. Phishing & Pharming 3. Hacking 4. Drive by downloads (don’t click on everything)

Dangers on the Internet DefinedPHARMING

Using fake web sites to attempt to gather personal information

PHISHINGUsing fake emails to attempt to gather personal

information

Example: An email from your bank comes claiming there is a security issue with your account. They ask you to complete the form attached and send it to them. The form asks for your name, address, bank account number….Uh oh!

Page 5: Internet Safety. Nine (9) Dangers on the Internet 1. Identity theft 2. Phishing & Pharming 3. Hacking 4. Drive by downloads (don’t click on everything)

Dangers on the Internet Defined

Hacking is using a computer to gain unauthorized access to data in a system

Drive by DownloadsA drive-by download is when a malicious web site you visit downloads

and installs software without your knowledge. The objective of drive-by downloads is usually to install malware to record what you type and what sites you visit, to search your computer for stored passwords, or to open your computer to remote control.  This is currently the most prevalent threat, and one that is hard to guard against.

Page 6: Internet Safety. Nine (9) Dangers on the Internet 1. Identity theft 2. Phishing & Pharming 3. Hacking 4. Drive by downloads (don’t click on everything)

Dangers on the Internet Defined

Pop UpsSmall internet windows that pop up on your screen can be

useful, annoying or dangerous – often used by advertisers to get your attention or by viruses to trick you into clicking on them.

PornographyInternet porn is sexually explicit content made available

online in various formats including images, video files and video games.

Page 7: Internet Safety. Nine (9) Dangers on the Internet 1. Identity theft 2. Phishing & Pharming 3. Hacking 4. Drive by downloads (don’t click on everything)

Dangers on the Internet DefinedCyberbullying: Cyberbullying is the use of

technology to harass, threaten, embarrass, or target another person

Defining Cyberbullying

How do you respond to cyber threats or bullying?1. Ignore, don’t respond

2. Block them

3. Tell someone

Page 8: Internet Safety. Nine (9) Dangers on the Internet 1. Identity theft 2. Phishing & Pharming 3. Hacking 4. Drive by downloads (don’t click on everything)

WWW.STOPCYBERBULLYING.ORG

Page 9: Internet Safety. Nine (9) Dangers on the Internet 1. Identity theft 2. Phishing & Pharming 3. Hacking 4. Drive by downloads (don’t click on everything)

Two Kinds of Cyberbullying

A. Direct attacks

(messages sent to you directly)

B. By proxy

(using others to help cyberbully the victim, either with or without the accomplice’s knowledge)

Page 10: Internet Safety. Nine (9) Dangers on the Internet 1. Identity theft 2. Phishing & Pharming 3. Hacking 4. Drive by downloads (don’t click on everything)

Direct Attack Cyberbullying 1. Instant Messaging/Text Messaging

Harassment

2. Stealing Passwords

3. Blogs

4. Web Sites

Page 11: Internet Safety. Nine (9) Dangers on the Internet 1. Identity theft 2. Phishing & Pharming 3. Hacking 4. Drive by downloads (don’t click on everything)

From STOP BULLYING.ORG

5. Sending Pictures through E-mail and Cell Phones a) There have been cases of teens sending mass e-mails to other users, that include nude or degrading pictures of other teens. Once an e-mail like this is sent, it is passed around to hundreds of other people within hours; there is no way of controlling where it goes.

b) Many of the newer cell phones allow kids to send pictures to each other. The kids receive the pictures directly on their phones, and may send it to everyone in their address books. After viewing the picture at a Web site, some kids have actually posted these often pornographic pictures on Kazaa and other programs for anyone to download.

c) Kids often take a picture of someone in a locker room, bathroom or dressing room and post it online or send it to others on cell phones.

Page 12: Internet Safety. Nine (9) Dangers on the Internet 1. Identity theft 2. Phishing & Pharming 3. Hacking 4. Drive by downloads (don’t click on everything)

6. Internet Polling

7. Interactive Gaming

8. Sending Malicious Code

9. Sending Porn and Other Junk E-Mail and IMs

Page 13: Internet Safety. Nine (9) Dangers on the Internet 1. Identity theft 2. Phishing & Pharming 3. Hacking 4. Drive by downloads (don’t click on everything)

From STOPBULLYING.ORG

10. Impersonation Posing as the victim, the cyberbully can do considerable damage . They may post a provocative message in a hate group's chatroom posing as the victim, inviting an attack against the victim, often giving the name, address and telephone number of the victim to make the hate group's job easier. They often also send a message to someone posing as the victim, saying hateful or threatening things while masquerading as the victim. They may also alter a message really from the victim, making it appear that they have said nasty things or shared secrets with others.

Page 14: Internet Safety. Nine (9) Dangers on the Internet 1. Identity theft 2. Phishing & Pharming 3. Hacking 4. Drive by downloads (don’t click on everything)

Cyberbullying by proxy

Cyberbullying by proxy is when a cyberbully gets someone else to their dirty work.

Most of the time the accomplices don’t know they are being used by a cyberbully

This is the most dangerous type of cyberbullying because it often gets adults involved in the harassment and people who don’t know they are dealing with a kid.

Page 15: Internet Safety. Nine (9) Dangers on the Internet 1. Identity theft 2. Phishing & Pharming 3. Hacking 4. Drive by downloads (don’t click on everything)

Cyberbullying by proxy

Examples: The most typical way a cyberbullying by proxy attack occurs is when the cyberbully

gets control of the victim's account and sends out hateful or rude messages to everyone on their buddy list pretending to be the victim. They may also change the victim's password so they can't get into their own account. The victim's friends get angry with the victim, thinking they had sent the messages without knowing they have been used by the cyberbully. But it's not always this minor. Sometimes the cyberbully tries to get more people involved.

For example...Mary wants to get Jennifer back for not inviting her to her party. She goes online and, posing as Jennifer, posts "I hate Brittany, she is so stupid, ugly and fat!" on buddyprofile.com. Mary may tell Brittany and her friends that she read the post on buddyprofile.com and blames Jennifer for being mean. Brittany and her friends now start attacking Jennifer, and may report her to buddyprofile.com or her school. They are doing Mary's dirty work for her. Mary looks like the "good guy" and Jennifer may be punished by her parents, lose her account with buddyprofile.com and get into trouble at school. And Brittany and her friends may start to cyberbully Jennifer too.

Page 16: Internet Safety. Nine (9) Dangers on the Internet 1. Identity theft 2. Phishing & Pharming 3. Hacking 4. Drive by downloads (don’t click on everything)

Cyberbullying by proxy

Examples: Sometimes it is much more serious than that. When cyberbullies want to get others to do their

dirty work quickly, they often post information about, or pose as, their victim in hate group chat rooms and on their discussion boards. Cyberbullies have even posted this information in child molester chat rooms and discussion boards, advertising their victim for sex. They then sit back and wait for the members of that hate group or child molester group to attack or contact the victim online and, sometimes, offline.

For this to work, the cyberbully needs to post offline or online contact information about the victim. Real information, not the account they used to impersonate the victim (if they are posing as the victim to provoke an attack). For example...Jack is angry that Blake was chosen as captain of the junior varsity basketball team. Blake is black. Jack finds a white supremist group online and posts in their chat room that Blake said nasty things about whites and their group in particular. He then posts Blake's cell phone number and screen name. People from the group start calling and IMing Blake with threats and hateful messages. Jack has no idea how much danger he has placed Blake in, and Blake doesn't know why he in under attack. In cases of cyberbullying by proxy, when hate or child molester groups are involved, the victim is in danger of physical harm and law enforcement must be contacted immediately.

Page 17: Internet Safety. Nine (9) Dangers on the Internet 1. Identity theft 2. Phishing & Pharming 3. Hacking 4. Drive by downloads (don’t click on everything)

Assessing Threats

The only difference between “cyberbullying” and cyber-harassment is the age of both the victim and the perpetrator. Both have to be underage for it to be bullying.

Page 18: Internet Safety. Nine (9) Dangers on the Internet 1. Identity theft 2. Phishing & Pharming 3. Hacking 4. Drive by downloads (don’t click on everything)

Dangers on the Internet continuedPredator: One that victimizes, plunders, or destroys,

especially for one's own gain. The online predator is a criminal who uses the Internet to steal personal information or search for victims. Crimes that involve online predators include identity theft, stalking, kidnapping and child sex abuse.

Promises Julie’s Journey

Survivor Diaries

Page 19: Internet Safety. Nine (9) Dangers on the Internet 1. Identity theft 2. Phishing & Pharming 3. Hacking 4. Drive by downloads (don’t click on everything)

Kacie was a 13 year old little girl that lived in a small rural area Arkansas. Kacie was a 7th grade student where she was an honor student. Kacie lived with her father Rick and one of her brothers, 19 year old Tim.

On December 3, 2002 Kacie was at home alone while her father, a police officer, was at work and her brother had gone to the college library. Tim returned to the home to find Kacie missing.

Kacie’s family knew that Kacie would never leave the home without first contacting them so they expected something to be wrong from the beginning.

Page 20: Internet Safety. Nine (9) Dangers on the Internet 1. Identity theft 2. Phishing & Pharming 3. Hacking 4. Drive by downloads (don’t click on everything)

The family involved law enforcement immediately. A massive investigation involving the Arkansas State Police, FBI, and every law enforcement agency in Faulkner County lead to the fact that Kacie was abducted by an Internet predator. The predator was posing as a 17 year from California but was in fact a 47 year old man.

Law enforcement moved quickly and did everything they could to bring Kacie home safely. In less than 20 hours they had a suspect, a suspect vehicle and had located the predator and Kacie.

Page 21: Internet Safety. Nine (9) Dangers on the Internet 1. Identity theft 2. Phishing & Pharming 3. Hacking 4. Drive by downloads (don’t click on everything)

Kacie was found in a van located inside a mini storage building in Conway Arkansas. Kacie had been shot in the head and her abductor shot himself when law enforcement officers arrived on the scene.

Kacie was abducted and murdered by an internet predator. Someone that Kacie thought was her friend. Internet predators are hiding behind your computer screen right now, waiting for their next victim.

Page 22: Internet Safety. Nine (9) Dangers on the Internet 1. Identity theft 2. Phishing & Pharming 3. Hacking 4. Drive by downloads (don’t click on everything)

Anything you post online, anyone can see

Page 23: Internet Safety. Nine (9) Dangers on the Internet 1. Identity theft 2. Phishing & Pharming 3. Hacking 4. Drive by downloads (don’t click on everything)

Dangers of the Internet

Posting : Sharing information or photos that can be used to track your location (geo-tagging), like where you live, or revealing things that can be made public and you can never make them private again.

personal informationTwo kinds of stupid

Page 24: Internet Safety. Nine (9) Dangers on the Internet 1. Identity theft 2. Phishing & Pharming 3. Hacking 4. Drive by downloads (don’t click on everything)

Teens and Sexting

May of last year, we first brought you news of an emerging trend among young people—the sharing of sexual images and texts through cell phones, commonly known as SEXTING. Due to the widespread availability of mobile technology, the sky-high hormone levels of young people, and the difficulty that they can have understanding the consequences of their decisions, not-so-innocent text messages are being sent from cell phones all over America.

It’s particularly distressing when the consequences of sexting get so out of hand that a teenager feels the only solution is suicide. When Jesse Logan pressed ‘send’ from her cell phone, she did not imagine that an audience beyond her boyfriend would receive her nude pictures. (Sexting article, People Magazine)

Page 25: Internet Safety. Nine (9) Dangers on the Internet 1. Identity theft 2. Phishing & Pharming 3. Hacking 4. Drive by downloads (don’t click on everything)

Sexting continued… THINK ABOUT THE CONSEQUENCES of taking, sending, or forwarding a

sexual picture of someone underage, even if it’s of you. You could get kicked off of sports teams, face humiliation, lose educational opportunities, and even get in trouble with the law.

  NEVER TAKE images of yourself that you wouldn’t want everyone—your

classmates, your teachers, your family, or your employers—to see.   BEFORE HITTING SEND, remember that you can’t control where this

image may travel. What you send to a boyfriend or girlfriend could easily end up with their friends, and their friends, and their friends…

  IF YOU FORWARD a sexual picture of someone underage, you are as

responsible for this image as the original sender. You could face child pornography charges, go to jail, and have to register as a sex offender.   

  REPORT any nude pictures you receive on your cell phone to an adult you

trust. Do not delete the message. Instead, get your parents or guardians, teachers, and school counselors involved immediately

Page 26: Internet Safety. Nine (9) Dangers on the Internet 1. Identity theft 2. Phishing & Pharming 3. Hacking 4. Drive by downloads (don’t click on everything)

Keeping Yourself Safe While Online

1. Safe UsernameWhat makes a username safe? Unsafe?

2. Protect personal informationNever give out your

Social Security Number

Address

School

Phone #

Age or Birthdate

NAME

Page 27: Internet Safety. Nine (9) Dangers on the Internet 1. Identity theft 2. Phishing & Pharming 3. Hacking 4. Drive by downloads (don’t click on everything)

Staying Safe While Online continued

3. Never meet in-person with anyone you have “met” online without discussing it with your parents.Parents agree to the meetingParents go with youMeeting is in a public place

Page 28: Internet Safety. Nine (9) Dangers on the Internet 1. Identity theft 2. Phishing & Pharming 3. Hacking 4. Drive by downloads (don’t click on everything)

Staying Safe continued

4. Use privacy settings for social networking sites like FacebookKeep friends safe too! Don’t chat and include

information that may give out too much of their information

Know that seemingly “safe information” can be piece of a puzzle that helps a predator find you or your friend

Anything you post a “friend” or “friend of a friend” can save on their computer forever

Page 29: Internet Safety. Nine (9) Dangers on the Internet 1. Identity theft 2. Phishing & Pharming 3. Hacking 4. Drive by downloads (don’t click on everything)

Staying Safe continued

5. Ignore online bullies. Report.

6. Chat only with people you know in the physical world

7. Use firewalls and pop-up blockers, etc.

8. Be careful about what you post

9. Create secure PasswordsHow do you create a safe password?

Page 30: Internet Safety. Nine (9) Dangers on the Internet 1. Identity theft 2. Phishing & Pharming 3. Hacking 4. Drive by downloads (don’t click on everything)

Creating a SAFER password

Use letters and numbersMixture of uppercase/lowercase lettersInclude symbols (shift key)Make it a minimum of 8-12 characters – no maxDo not use your favorite hobby, like Chess143,

pet’s name, or other things that might be easily guessed

Change your password oftenDon’t share your password or write it down

Page 31: Internet Safety. Nine (9) Dangers on the Internet 1. Identity theft 2. Phishing & Pharming 3. Hacking 4. Drive by downloads (don’t click on everything)

STAY SAFE!

Review

Now, you tell me –

What are the basics of staying safe while using technology like

computers, cell phones, gaming devices??