1 / 17

How Safe Are We?

How Safe Are We?. Submitted By: Daniel Trifan Samantha Hill Samantha Kanterjian Christina Vitale. How SAFE are WE?.

kendis
Download Presentation

How Safe Are We?

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. How Safe Are We? Submitted By: Daniel Trifan Samantha Hill Samantha Kanterjian Christina Vitale

  2. How SAFE are WE? • It is clear that the internet has endless possibilities and is helpful to us in so many ways on a daily basis. • What seems to be a safe environment, and completely trust worthy, sometimes it is the exact opposite. • The following are examples of different types of harm to our computers, and all computers.

  3. Phishing Phishingis similar to what it sounds like. It is used by criminals to gain access to your information. They use a ‘fishing line’ – an e-mail, ‘bait’ – a business you trust or a seemingly sincere statement, and try to ‘reel’ you into giving out personal or financial information. They could use this information to open bank accounts or credit card accounts in your name and withdraw money or make expensive purchases.

  4. How To Recognize Phishing ∙ Phishing is achieved through e-mails that are sent out in mass amounts. They may seem legitimate because they take logos and information from actual businesses and create websites that appear to be safe. ∙They will try to get you to give out your personal information using techniques within the website and e-mail. It could even be through an actual business you may have an account or customer relationship with that they are posing as.

  5. What To Do With Phishing • Recognize it - An unexpected e-mail from your bank or credit card company that your account will be shut down if you do not verify your account information. • Report it - Contact your bank or credit card company. Report it to the police. They will usually take police reports. • Stop it - Become familiar with your financial institutions or credit card company’s practices. Usually, they do not contact you through e-mail.

  6. Fraud - Shop-at-Home/Catalog Sales • This fraud is all about when people buy items from the internet from websites like ebay, kijii etc. You almost always have to pay the price and shipping fee before you actually get the products you purchased. • Often times you don’t get the  products you purchased therefore  that is fraud  because you don't receive the products you ordered  the  way they said they would  send it  or you don’t receive them at all depending with who you are ordering it with.

  7. It is the same thing on if you are ordering out of catalogue like sears, avon etc. With these catalogues it’s the same thing because people with send the catalogue and items in the mail and they want to receive the money in advance to ensure that they don’t get scammed.  Meanwhile  half time the costumers are the ones who get scammed instead  because they  don’t  receive  there  products  or don’t  receive what  the label  says.

  8. Fraud- Prize/ Sweepstakes and Lotteries • You can tell a prize, sweepstake or lottery is a fraud when you have to pay to win or making a purchase to. Companies are not aloud to make you pay to win. • Paying shipping and handling fees, taxes, or buying a product to receive your "prize" are all promotion scams and is a fraud. Legal sweepstakes will never charge you to win.

  9. How scammers disguise the scams: • Have a prize that will interest the people • Will charge a fee for taxes or service charges for the prize • Have a fake prize (prize will never come) • Some scammers will use names of government agencies or legitimate numbers to hide where they are calling from. • Say that the delivery of the prize is being monitored by the government agency

  10. Questions to ask yourself to make sure it’s not a fraud: • Are the instructions easy to follow? • Does the advertising state that no purchase is necessary? • Are the prizes worth winning? • Is your credit card number and bank account information required?

  11. Viruses • Viruses are a type of code that can infects computers by copying is self into other programs and stores or saving it's self into the computer.

  12. The picture on the previous page is the First Computer virus the info is here below: • Virus Name: Elk ClonerWhen: 1982Created and Distributed on: Apple II computerCreator: Richard Skrenta. 15-years-old boy.Damage: Didn’t do any damage, but displayed only the following message:Elk Cloner: The program with a personalityIt will get on all your disksIt will infiltrate your chipsYes it’s Cloner!It will stick to you like glueIt will modify RAM tooSend in the Cloner!

  13. . • Some viruses are mild and only cause messages to appear on the screen, but others are destructive and can wipe out the computer's memory or cause more severe damage.

  14. In Conclusion.... • It is very important that not only our office but every office, businesses and establishment review the dangers of computer and internet. • It is very simple, and take little effort for protecting you and your computer, keeping you scam free and safe from intruders.

  15. Citations • Sam H.Web sites:Consumer Fraud Reporting. Sweepstakes, Promotion and Prize Scams- How to Recognize Them Retrieved May 28, 2010 from http://www.consumerfraudreporting.org/sweepstakes.phpLooksToGoodToBeTrue.com. Sweepstakes / Prize Scams. Retrieved May 28, 2010 from http://www.lookstoogoodtobetrue.com/fraudtypes/sweepstakes.aspxPicturesLOOKBOTHWAYS Inc. Warning Signs of Fraud. Retrieved May 28, 2010 from http://www.atg.wa.gov/InternetSafety/FraudOnline.aspxCurrent TV. Revolving Door of Abuse: Procurement Fraud. Retrieved May 28,2010 from http://current.com/technology/91476426_revolving-door-of-abuse-procurement-fraud.htm

  16. . • Rebeccasphishing picture(visa) –http://i.ehow.com/images/a05/2b/k9/recognize-protect-against-phishing-emails-200X200.jpgfishing cartoon - http://www.fs.fed.us/r4/dixie/recreation/fishing/Fishing_Cartoon_02tra.gifPublic Safety Canada. Phishing: A New form of identity theft. Retrieved May 28, 2010 from http://www.publicsafety.gc.ca/prg/le/bs/phish-eng.aspx

  17. . • Christina's(web sites{1st Fun Friday, 2nd Elk Cloner and 3rd McAfee } Cyber Net. Funny Friday. Retrieved May 31, 2010 fromhttp://cybernetnews.com/cybernotes-new-computer-virusesbeware/N.Design Studio and MangoOrange. First Ever Computer Virus. Retrieved May 28, 2010 from http://www.youngprogrammer.com/?p=303McAfee. Virus Information. Retrieved May 28, 2010 from http://home.mcafee.com/VirusInfo/Default.aspxPictures sites{1st page, 2nd page, 3rd page } Koltey, Sushant. Computer Virus. Retrieved May 28, 2010 from http://www.facebook.com/l.php?u=http%3A%2F%2Fsushantskoltey.wordpress.com%2F2010%2F03%2F03%2Fcomputer-virus%2F&h=acbfbBates, Mike. Does your computer have a virus. Retrieved May 28, 2010 from http://www.realestatewebmasters.com/blogs/mikey/6293/show/

More Related