Computer Applications I Competency 1 Discuss business communication hazards, techniques, system maintenance and navigation.



Similar documents
Information carelessly discarded into the trash can be stolen when a thief digs through the garbage.

I dentity theft occurs

According to the Federal Trade Commission (FTC): The FTC is a government agency that promotes consumer protection

THINGS YOU SHOULD KNOW ABOUT IDENTITY THEFT

Identity Theft Protection

Learn to protect yourself from Identity Theft. First National Bank can help.

Armstrong State University Fall Staff Assembly. Chief Wayne Willcox, MSCJ, CLEE

When Fraud Comes Knocking

Coping with Identity Theft

Identity Theft, Fraud & You. Prepare. Protect. Prevent.

Payment Systems Department

What is Identity Theft?

Preventing identity theft

Identity Theft Protection

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

Intercepting your mail. They can complete change of address forms and receive mail that s intended for you.

Retail/Consumer Client. Internet Banking Awareness and Education Program

FTC Fact Sheet Identify Yourself

Protection from Fraud and Identity Theft

Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity

1. Any requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

Protect Yourself From Identity Theft

Protecting Yourself from Identity Theft

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

PREVENTING HIGH-TECH IDENTITY THEFT

How Identity Theft Works Article and additional information can be found at:

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

Customer Awareness for Security and Fraud Prevention

Fraud and Identity Theft. Megan Stearns, Credit Counselor

IdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT

Client Education. Learn About Identity Theft

Advice about online security

It Could Happen To You! Attorney General Tom Reilly s. Guide to Protecting Yourself and Your Credit

Identity Theft Simple ways to keep your sensitive information safe.

NORWALK STATION Civic Center Dr. Norwalk, CA Phone: (562) News Release

& INTERNET FRAUD

Identity Theft. Officer Rob Romey IPD Crime Prevention Officer.

Guide to credit card security

PROTECT YOURSELF AND YOUR IDENTITY CHASE IDENTITY THEFT TOOL KIT

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.

Identity Theft: It CAN Happen to You

Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer?

Protecting Yourself Against Identity Theft. Identity theft is a serious. What is Identity Theft?

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Refuse to be a target of identity crime.

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

Identity Theft. Prevention and Recovery Information Kit

7 PRACTICES FOR SAFER COMPUTING

Protecting your business from some of the current fraud threats

Identity Theft PROTECT YOUR INFORMATION AND YOUR IDENTITY HIGHLIGHTS

BE SAFE ONLINE: Lesson Plan

N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Virus Definition and Adware

PROTECT YOURSELF AND YOUR IDENTITY. Chase Identity Theft Tool Kit

Introduction to Computer Security Table of Contents

Many of these tips are just common sense and others are tips to keep in mind when doing a transaction, at ATMs, restaurants and merchants.

Privacy, Please! IDENTITY THEFT How Thieves Work AND NOW THE NIGHTMARE BEGINS IF YOU RE A VICTIM. Should I Be Listening? Keep It Safe!

Malware & Botnets. Botnets

Network Security. Demo: Web browser

Fraud Prevention Tips

How To Get Help From The Police Department

Preventing identity theft

Keeping your financial and personal information secure is one of our most important responsibilities.

8/13/2014. Types of Identity Theft HOW IS IDENTITY THEFT DISCOVERED? Identity Theft. Run up existing accounts. Create new accounts.

Avoid completing forms in messages that ask for personal financial information.

IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION

Plastic Fraud. Debit Cards Debit cards, unlike credit cards, automatically withdraw funds from your account at the time you make a transaction.

STOP THINK CLICK Seven Practices for Safer Computing

What to Know, What to Do

IRS Criminal Investigation. Detroit Field Office

IDENTITY THEFT: MINIMIZING YOUR RISK

Computer Security Maintenance Information and Self-Check Activities

Identity Theft. Presented By: Information Technology. James Blackwood, Michael Fouts, & Tiffany Mixon

How to protect your identity. Identity fraud explained

Protecting Yourself from Identity Theft

It is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes.

Guideline for Prevention of Spyware and other Potentially Unwanted Software

Protecting your business against External Fraud

Different Types of Adware and Services

General Security Best Practices

Awareness, Deterrence and

Fraud Guide Fraud Protection

7 PRACTICES FOR SAFER COMPUTING

FILTERING FAQ

IDENTITY THEFT BROCHURE 2 6/3/05 3:07 PM Page 1 IDENTITY THEFT PROTECT YOUR IDENTITY IT S POSSIBLE@ LEARN HOW TO PROTECT YOUR PRIVATE INFORMATION

Understand What s Going On

Identity Theft Protection

Credit Card Fraud Training

INTERNET & COMPUTER SECURITY March 20, Scoville Library. ccayne@biblio.org

Client Resources SAFEGUARDING YOUR IDENTITY. Your personal and financial information is precious. Protect it by being savvy about identity theft.

Contents Security Centre

Identity Theft Grade Level 10-12

Fraud Prevention Guide

Minimizing the Risk of Identity Theft. John and Kris Clagett Q4 Wealth Management, Inc.

Online Banking Customer Awareness and Education Program

Information to Protect Our Customers From Identity Theft

IDENTITY THEFT. A. What Do I Do First? Take the following steps as soon as you discover you have been a victim of identity theft.

Transcription:

Objective 1.01 - Identify digital communication hazards. Spyware and browser hijacking -Definitions and implications What is spyware? Spyware is a category of that attach themselves to the computer s operating system in various ways. It can drain the life out of your computer's power. It is designed to track users and nag them with unwanted or generate traffic for the Web site. What is browser hijacking? The most generally accepted description of browser hijacking software is that changes your. Generally the will be changed and new will be added that point to sites of content. In most cases, the hijacker will make changes to the system, causing the to revert back to the unwanted destination even if it is changed manually. A browser hijacker may also disallow to certain web pages, for example the site of an anti-spyware software manufacturer like Lavasoft. These programs have also been known to disable and anti-spyware software. Characteristics of browser hijackers They take advantage of Internet Explorer's (IE) ability to run scripts straight from a web page. Generally, these programs will request permission to themselves via a popup that loads when visiting a certain site. If the user accidentally gives permission to install, IE will execute the program on your computer and change your settings. Use within Internet Explorer to install themselves automatically without any user at all. These can be launched from windows which the user has not even intended to view. Make entries to the file on your system. This special file directly maps (web URLs) to IP addresses, so that every time you type a you are redirected to the IP address of a sponsored search or porn site. Some browser hijackers may also install themselves onto your computer system as programs, leaving an entry in the 'add-remove programs' list in the panel. There are many faces of browser hijacking, and to combat the situation, you have to be aware of all tricks and loopholes that make this scourge possible. Browser hijacking isn't necessarily a virus, and isn't necessarily adware, so stopping it isn't necessarily best left to software monitoring programs. 1

Antivirus software How to protect yourself Purchasing guidelines Antivirus software definition Antivirus programs and all of the different replicating viral signatures that are already out there (40,000 to date), and then compare the binary signatures of incoming files against those already-known viral signatures to see if anything is lurking on your computer. The software typically is kept running in the to check files and e- mail messages as they are. A virus signature is a section of that can be used to identify a known virus. Virus protection Install software and keep it in the background. Before a file, make sure the source is. When you receive a disk, it with software before using it. Never open an unless the sender is. Watch for information about the virus. Keep your program up-to-date. Purchasing guidelines Use software that provides free weekly. Use software that provides the coverage necessary to maintain the computer s. The two most popular brands: Symantec McAfee 2

Firewalls What are firewalls? Packet filtering Circuit level gateways Application level gateways Stateful inspection What are firewalls? A firewall is either a piece of or a program that data as it passes into your or and discards it if it does not meet certain. Depending on the type of firewall used, this operation may take place at different points in the path between the of the data and the in your computer. Different will be used to examine the data, but the basic operation remains the same for all firewalls. Packet filtering firewalls Packet filtering firewalls work by examining as they attempt to pass through the firewall. They compare them to a of based on the source of the data, its intended, and the connection between the target and source data. Circuit level gateways The firewall keeps a of requests for data that go out, and only allows data in that that request. An advantage of this type of firewall is that since it acts as the gateway to the network it is protecting, anyone the network from will see only the of the firewall and not the rest of its protected network. Application level gateways Application level gateways, also known as proxies, are outwardly similar in operation to circuit level gateways in that they act as the only into or out of a network and all non-requested data from outside. The major difference is in the way they handle information. A firewall using this method runs applications to view common types of data before it is through the firewall. 3

Stateful inspection Stateful inspection is a of packet filtering with some elements of the methods. Essentially, it is a packet filter firewall that examines just the addresses and information of the data. Without using proxies, it can imitate some of the features of an application gateway by viewing the application specific data sent in each packet. Secure websites Security confirmation What is a secure website? A secure website is one that uses to protect all information. How can you tell a site is secure? There are three ways to confirm that a website is secure: Click the VeriSign to verify that the is valid. A secure page should include a small symbol displayed on the bottom line of your browser. On a secure page, in the browser address box, the URL will begin with an : prefix rather than the standard http: prefix. The s means that the page is. Identity theft Types of identity theft Examples of identity theft Protect against identity theft Definition Any instance where a person uses someone else's or other identifiers in order to impersonate that person. It into many areas of people s daily lives. 4

Types of identity theft Financial fraud - includes fraud, fraud, computer and fraud, social program fraud, refund fraud, fraud, and several more. Criminal activities - involves taking on someone else's in order to commit a, enter a country, obtain special permits, hide one's own identity, or commit acts of. Credit card fraud is identity theft in its most simple and form. It can be accomplished either by a thief who steals your or when your pre-approved credit card fall into the wrong hands. Examples of identity theft Common modes of identity theft: Dumpster diving - Dug out of trash cans and Memorized or by sales clerks and waiters Removed from in the form of tax notices, financial account statements, and other bills Removed from your files, either secretly or with the help of an inside accomplice Removed from records, usually with the help of an inside accomplice Removed from your financial files Removed from your files Purchased (or found free) in online (or offline) Collected from " " Web sites - someone may recreate a legitimate merchant Web site in order to capture your personal information and credit card information when you place an order. Stolen from a merchant database through computer (not as simple as other forms of theft) Snatched using that mirrors to capture credit card account information Ways to protect yourself DON'T give out your number unless it s critical. DESTROY any unwanted credit card. ONLY include your name and address on. SHRED (cross-cut) any documents before. DON'T carry your Social Security card, passport, or in your wallet or purse. REVIEW your credit to verify its accuracy. 5

NEVER give out information on the phone to someone you don't and who initiated the call. REVIEW your credit card each month to make sure there are no unauthorized charges. DON'T mail bills or documents that contain personal data (like tax forms or checks) from your mail box. If you're ever credit, FIND OUT WHY. REACT QUICKLY if a calls about charges you didn't make. GUARD slips as closely as you do checks. Netiquette Common Rules What is Netiquette? "Netiquette" is, the do's and don'ts of online communication. Netiquette includes both common online and the informal "rules of the road" of. In other words, Netiquette is a set of for behaving properly. Core Rules of Netiquette Rule 1: Remember the Rule 2: Adhere to the same standards of behavior online that you follow in Rule 3: Know where you are in Rule 4: Respect other people's and Rule 5: Make yourself look good Rule 6: Share expert Rule 7: Help keep under control Rule 8: Respect other people's Rule 9: Don't abuse your Rule 10: Be of other people's mistakes http://www.albion.com/netiquette/corerules.html 6