Sei sulla pagina 1di 26

Privacy and Security

By: Albert Spencer Jenny

Computer Virus

A computer virus is a program that spreads malicious code by coping itself and infecting host computers.

Computer Virus A computer virus is a program that spreads malicious code by coping itself and

Spyware

Spyware is a type of malware that is installed on a computer without the knowledge of the owner in order to collect the owner's private information.

is installed on a computer without the knowledge of the owner in order to collect the

What kind of damage did viruses do?

The virus need to use internet to attack other computer, who connect the computer either.

kind of damage did viruses do? The virus need to use internet to attack other computer,

Computer infected for a virus

- Accepting without reading

- Downloading any infected software

- Opening e-mail attachments

- Inserting or connecting an infected disk,disc or drive

- Not running the latest updates

- Pirating software,music,or movies

- No antivirus spyware scanner

disk,disc or drive - Not running the latest updates - Pirating software,music,or movies - No antivirus

Protect computer

- Install Anti-Virus Soft ware

- Update All Software

- Install only Trusted Software

- Avoid P2P File Sharing Software

- Delete Unknown Emails

- Do not click on Ads

- Run Virus Scans Regularly

- Be careful what you attach to your computer

- Avoid Shady Web Sites

- Turn On Install a Firewall

- Secure Your Wireless Network

- Use a complex Password for login

- Avoid Shady Web Sites - Turn On Install a Firewall - Secure Your Wireless Network
- Avoid Shady Web Sites - Turn On Install a Firewall - Secure Your Wireless Network

Why it is important

1. They infect your file allocation tables causing corruption

2. they spread from one file to another and at

times mutate into more evil and malicious viruses

3. cause excess CPU usage

4. destroy your registry

to another and at times mutate into more evil and malicious viruses 3. cause excess CPU

5. cause programs to stop working (like firewalls,

and virus scanners)

to stop working (like firewalls, and virus scanners) 6. Damage memory 7. Damage hard drives 8.

6. Damage memory

7. Damage hard drives

8. Change your security settings.

9. Make Great cover for hackers and lurkers

PHISHING

When internet fraudsters impersonate a business to trick you into giving out your personal information, it’s called phishing.

internet fraudsters impersonate a business to trick you into giving out your personal information, it’s called

INDENTITY THEFT

Identity theft is a crime in which an imposter obtains key pieces of personal information

Such as Social Security or driver's license numbers, in order to impersonate someone else.

In addition to running up debt, an imposter might provide false identif ication to police, creating a criminal record or leaving outstanding arrest warrants for the person whose identity has been stolen.

police, creating a criminal record or leaving outstanding arrest warrants for the person whose identity has

HOW TO PROTECT?

1. Destroy private records and statements. Tear up credit cards statements and other documents that contain private financial information.

other documents that contain private financial information. 2. Secure your mail. Empty you mailbox quickly, lock

2. Secure your mail. Empty you mailbox

information. 2. Secure your mail. Empty you mailbox quickly, lock it so criminals don’t have a

quickly, lock it so criminals don’t have a chance to snatch credit card pitches.

3. Safeguard your Social Security

number. Don’t put your number on your

checks.

4. Don’t leave a paper trail. Never leave ATM, credit card or gas station receipts
4. Don’t leave a paper trail.
Never leave ATM, credit card or gas
station receipts behind.
5. Know who you’re dealing with.
Whenever anyone ask you for identity or
personal information, make sure that you
know the reason and who they are.
6. Review your credit cards statements
carefully.
information, make sure that you know the reason and who they are. 6. Review your credit
information, make sure that you know the reason and who they are. 6. Review your credit
information, make sure that you know the reason and who they are. 6. Review your credit

Rules to create passwords

1. Has 12 Characters :

You need to choose a password that's long enough.

2. Includes Numbers, Symbols, Capital Letters, and Lower-Case Letters :

Use a mix of different types of characters to make the password harder to crack

3. Doesn't Rely on Obvious Substitutions :

Don't use common substitutions, either — for example, “H0use” isn't strong just because you've replaced an o with a 0. That's just obvious.

— for example, “H0use” isn't strong just because you've replaced an o with a 0. That's

Tips for shopping online

– Don’t store your card information on the website. You don't want

hackers to get your information and use it without your permission.

– Avoid using debit cards online.

– Buy From Sites You Trust.

– Don’t Use Open WiFi Networks. Public WiFi hotspots are especially vulnerable, so buy something you want until you’re on a secure network .

Networks. Public WiFi hotspots are especially vulnerable, so buy something you want until you’re on a

Prevent identity theft

● Prevent identity theft ● To prevent the loss of money Why it is important? ●
● Prevent identity theft ● To prevent the loss of money Why it is important? ●
● Prevent identity theft ● To prevent the loss of money Why it is important? ●
● Prevent identity theft ● To prevent the loss of money Why it is important? ●

To prevent the loss of money

● Prevent identity theft ● To prevent the loss of money Why it is important? ●
● Prevent identity theft ● To prevent the loss of money Why it is important? ●
Why it is important?
Why it is important?
theft ● To prevent the loss of money Why it is important? ● Internet is convenient
theft ● To prevent the loss of money Why it is important? ● Internet is convenient

Internet is convenient for attackers, giving them multiple ways to access the personal and financial information of unsuspecting shoppers.

for attackers, giving them multiple ways to access the personal and financial information of unsuspecting shoppers.

Encryption

Encrypt

change electronic information or signals into a secret code

people cannot understand or use on normal equipment

● people cannot understand or use on normal equipment Encryption ● the translation of data into
● people cannot understand or use on normal equipment Encryption ● the translation of data into

Encryption

the translation of data into a secret code

access to a secret key or password that enables you to decrypt it

History

History
History
History

the most effective form of data security

few people know how to approach.

Importance

effective method of protecting your corporate data

preventing trespassers

lucrative prospect for a potential hacker

protection against hacking

Once hackers learn that your data is unencrypted, it

becomes an easy target.

hacker ● protection against hacking ⚠ Once hackers learn that your data is unencrypted, it becomes
hacker ● protection against hacking ⚠ Once hackers learn that your data is unencrypted, it becomes

Cyberstalking

- the use of the Internet or other electronic - to stalk or harass an individual, a group, or an organization.

stalk or harass an individual, a group, or an organization. ● False accusations ● Defamation ●

False accusations

Defamation

Slander

Libel

Monitoring

Identity theft

Threats

Vandalism

Solicitation for sex

Gathering information that may be used to threaten or harass.

Serious

Serious  accompanied by realtime or offline stalking  criminal offenses  control, intimidate or influence

accompanied by realtime or offline stalking

criminal offenses

control, intimidate or influence a victim

keeping tabs on an individual’s daily life

Destroy Victim

Friendships

Credit

Careers

Self-image

Confidence

Mental ans physical danger

‪Victim of cyberstalker lives in fear

‪Victim of cyberstalker lives in fear

What should I do??

The National Center for Victims of Crime (NCVC) suggests:

Inform a trusted adult(parents)

File a complaint with the cyberstalker's Internet service provider

Collect evidence, document instances and create a log of attempts

evidence, document instances and create a log of attempts ● Present documentation to law enforcement and
evidence, document instances and create a log of attempts ● Present documentation to law enforcement and

Present documentation to law enforcement and explore legal avenues

Get a new email address and increase privacy settings on public sites

Purchase privacy protection software

Request removal from online directories

Help Them

Talk with the victim

Contact the police

Help Them Talk with the victim Contact the police Increase personal protection Collect evidence Do what

Increase personal protection Collect evidence Do what NCVC suggests

Help Them Talk with the victim Contact the police Increase personal protection Collect evidence Do what
Help Them Talk with the victim Contact the police Increase personal protection Collect evidence Do what

Sources

Cambridge University Press. (May 18, 2016). Encrypt. Retrieved from http://dictionary.cambridge.org/search/english/direct/?q=encryption Packetworks Blog Editor. (May 25, 2015). Importance of Encryption for Corporate Data Security. Retrieved from http://www.packetworks.net/blog/encryption.htm (April 17, 2016). Cyberstalking. Retrieved from https://en.wikipedia.org/wiki/Cyberstalking Techopedia. (May 18, 2016). Cyberstalking. Retrieved from https://www.techopedia.com/definition/14326/cyberstalking Duhaime, Lloyd. (October 31, 2011). Stalking. Retrieved from http://www.duhaime.org/LegalResources/CriminalLaw/LawArticle-

95/Stalking.aspx