• Like
Dark side presentation lwhippedtc515
Upcoming SlideShare
Loading in...5
×

Dark side presentation lwhippedtc515

  • 3,394 views
Uploaded on

Dark Side Powerpoint project for APU EDTC 515

Dark Side Powerpoint project for APU EDTC 515

More in: Education
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
3,394
On Slideshare
0
From Embeds
0
Number of Embeds
3

Actions

Shares
Downloads
7
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1.
  • 2. The Good, The Bad, and The Ugly
    What you should know about the internet.
    By Lisa Whipp
    Azusa Pacific University EDTC 515
  • 3. What do you know?
    Viruses
  • The good
    Always run up to date definitions for your antivirus and spyware software.
    • Make sure your Firewall is turned on. Consider purchasing a Firewall protection at the router too.
    • 17. Use safe and secure sites when making online purchases. Look for the https compared to just http. The s at the end provides some security.
    • 18. Use safe and secure passwords and usernames. Do not give out birthday, name, and other personal information on the internet.
    • 19. Always turn off your computer at the end of the night.
  • The Bad
    According to Wikipedia on electronic spam, “In the year 2011, the estimated figure for spam messages is around seven trillion. The costs, such as lost productivity and fraud, are borne by the public and by Internet service providers, which have been forced to add extra capacity to cope with the deluge. Spamming has been the subject of legislation in many jurisdictions.”[1]9 (wikipedia, 2011)
    http://en.wikipedia.org/wiki/Spam_%28electronic%29
  • 20. The Bad
    Fox News.com said “BOSTON - Spanish police have arrested three men accused of masterminding one of the biggest computer crimes to date -- infecting more than 13 million PCs with a virus that stole credit card numbers and other data.”(Reuters, 2010)
    “Mariposa was programed to secretly take control of infected machines, recruiting them as "slaves" in an army known as a "botnet." It would steal login credentials and record every key stroke on an infected computer and send the data to a "command and control center," where the ringleaders stored it.”(Reuters, 2010)
    http://www.foxnews.com/scitech/2010/03/03/masterminds-worlds-largest-virus-network-arrested/ Click on this link to read more.
  • 21. The Bad
    • Malicious software is a common variation of a virus also known as Malware. There are two types of Malware, worms and Trojan horses. The most notorious worm was Melissa which quickly spread and caused serious harm to millions of computers.
    • 22. Tech Faq says “The most important difference between a trojan virus/trojan horse and a virus is that trojans don’t spread themselves. Trojan horses disguise themselves as valuable and useful software available for download on the internet. Most people are fooled by this ploy and end up dowloading the virus disguised as some other application. The name comes from the mythical “Trojan Horse” that the Ancient Greeks set upon the city of Troy.” (TECH FAQ,2011)
    • 23. http://www.tech-faq.com/trojan-virus.html
  • The bad
    Protect yourself from the bad things such as spam, viruses, and malware by……..
    • Always scan any attachments, downloads, and software. Never open email attachments from unknown sources.
    • 24. Turn off your email preview.
    • 25. Never start your computer with removable media in the drives.
    • 26. Install a personal firewall program and consider a firewall at the router too.
    • 27. Back up your files and set your antivirus program to scan automatically.
  • The Ugly
    Phishing is a term used when someone is attempting to acquire your private information such as social security number, bank account number, …etc to conduct fraud. Many times the attempts appear through an email acting like they are your bank or credit card company asking you to verify your information because it might have been compromised. Sometimes these phishing solicitations are over the phone.
    • Never give out any private information via email or over the phone.
  • The Ugly
    • Spy software known as Spyware is deadly. Spyware can come in different forms from hackers being able to hack and see your desktop to them recording your every key stroke.
    • 28. Employers are legally allowed to “record” your internet activities. They can see what web site you visited, get copies of emails, and every keystroke.
    • 29. To protect yourself from Spyware you should not only have antispyware on your computer, but you should get a credit report once a year to monitor possible identity theft.
  • The Ugly
  • 30. Protect yourself
  • 31. ReFeRENCES
    G.Wolfgang. (n.d.). Clint Eastwood [picture]. Retrieved May 14, 2011, from GoneMovie.com: http://www.gonemovies.com/WWW/XsFilms/SnelPlaatjes/GoodBlondie2.asp
    History Channel Cyber Security Greg Evan Talks Spyware [video]. (n.d.). Retrieved May 14, 2011, from YouTube: http://www.youtube.com/watch?v=aH-5kcx_J3A
    ICA. (n.d.). Retrieved May 15, 2011, from Clint Eastwood [picture]: http://www.ica.org.uk/18793/Film/The-Good-The-Bad-The-Ugly.html
    Reuters. (2010, March 3). Accused Masterminds of world's Largest Computer Virus Network Arrested. Retrieved May 14, 2011, from Fox News.com: http://www.foxnews.com/scitech/2010/03/03/masterminds-worlds-largest-virus-network-arrested/
  • 32. References
    Shelly, G.&.(2010). Security Issues, Ethics, and Emerging Technologies in Education. In G.&. Shelly, Integrating Technology and Digital Media in the Classroom (pp.469-516). Boston: Course Technology, Cengage Learning.
    Spam (electronic). (n.d.). Retrieved May 14, 2011, from Wikipedia: http://en.wikipedia.org/wiki/Spam_%28electronic%29
    The Good, The Bad & The Ugly [sound clip]. (n.d.). Retrieved May 14, 2011, from YouTube: http://www.youtube.com/watch?v=1hYV-JSjpyU
    Trojan Virus. (n.d.). Retrieved May 15, 2011, from TECH FAQ: http://www.tech-faq.com/trojan-virus.html