SlideShare a Scribd company logo
1 of 1
Download to read offline
Viruses, Pop-ups and Spam
Viruses, Pop-ups and Spam – Oh My. Just like Dorothy and her companions in the Wizard of Oz, we are venturing
out daily on our own yellow brick roads with dangers at every corner. No, not Lions and Tigers and Bears but threats
that can ruin our computers, make us victims of fraud, cause us to lose our identities, and make us the target of
predators and scam artists.
You are the new “Wizards” in this Oz of computer technologies and Internet. You probably have more computer
experience than most people twice and three times your age. But do you practice Cyber Safety and do you keep up to
new developments when it comes to Viruses, Pop-ups, Spam, Hoaxes, etc.? Do you know what Phishing, Cookies
and image-based spam are? Do you know how to protect yourself and your family against these types of threats?

Here is how you can help.
You each will be given 15 minutes to research your topic. Then we will group students by their topic and give the
groups 5 minutes to share what they learned. Then we will divide into another group. Each group will have one
“expert” for each topic and the each student will share what they know.

As you work your way through the web sites in the explore section, you should be collecting specific information
about the following:

Viruses                                    Hoaxes                                     Cookies
Pop-ups                                    Scams/Fraud                                Phishing
Spam                                       Identity theft

For each of the topic areas above, you should find out what it is, what types or variations there are, how does it affect
and infect your computer and how can you protect yourself against it. You will no doubt find other areas and are
welcome to propose your own investigation of a topic to your teacher.

Try to find as much information as you can about these cyber intrusions. The following are suggestions but you
should add to our classroom resource of materials. Review the Explain section to provide additional focus to your
work. Your goal is inform others about this very important topic. You must record your findings.

Highly recommended as a starting point for you. Nortel LearniT: Online Safety and Digital Ethics
http://www.NortelLearniT.org
Includes good information about spam, popups, online purchasing
http://www.atg.wa.gov/safetynet/consumers.shtml
Excellent source for ways to protect your self, firewalls, viruses etc.
http://www.aarp.org/states/wa/wa-news/stay_safer_on_the_internet.html
Some great information for kids and parents – categorized by age
http://www.bewebaware.ca/english/default.aspx
Very good site for many topics
http://www.wiredsafety.org
Pop-ups
http://www.wiredsafety.org/safety/personal_information_safety/pop_ups/index.html
Spam
http://www.wiredsafety.org/safety/email_safety/spam/index.html
Viruses
http://www.wiredsafety.org/internet101/viruses.html
Hoaxes
http://www.wiredsafety.org/internet101/hoaxes.html
http://hoaxbusters.ciac.org/
Good information – 8 excellent tips for Cyber security
http://www.staysafeonline.info/
Good overview and information all of our topics
http://www.getsafeonline.org/nqcontent.cfm?a_id=1168
Wired Safety - Cookies http://www.wiredsafety.org/law/kids/cookies.html
	
  

More Related Content

What's hot

Safety in the Net
Safety in the NetSafety in the Net
Safety in the Net
Ramilia
 
Parent Info Night: Technology
Parent Info Night: TechnologyParent Info Night: Technology
Parent Info Night: Technology
HRS
 
Internet safety
Internet safetyInternet safety
Internet safety
dsansford
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
Lawrence Fine
 

What's hot (20)

Lesson 2 Rules of Netiquette
Lesson 2   Rules of NetiquetteLesson 2   Rules of Netiquette
Lesson 2 Rules of Netiquette
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Safety in the Net
Safety in the NetSafety in the Net
Safety in the Net
 
Chatting with Kids About Being Online
Chatting with Kids About Being OnlineChatting with Kids About Being Online
Chatting with Kids About Being Online
 
Dan sigurnijeg interneta (prezentacija)
Dan sigurnijeg interneta (prezentacija)Dan sigurnijeg interneta (prezentacija)
Dan sigurnijeg interneta (prezentacija)
 
Internet security
Internet securityInternet security
Internet security
 
Internet savety
Internet savetyInternet savety
Internet savety
 
Parent Info Night: Technology
Parent Info Night: TechnologyParent Info Night: Technology
Parent Info Night: Technology
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and Etiquette
 
Netiquette on using internet
Netiquette  on using internetNetiquette  on using internet
Netiquette on using internet
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Digital+safety+powerpoint
Digital+safety+powerpointDigital+safety+powerpoint
Digital+safety+powerpoint
 
Internet safety gerard and saul
Internet safety gerard and saulInternet safety gerard and saul
Internet safety gerard and saul
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
 
Spoofing
SpoofingSpoofing
Spoofing
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Resist Doxing & Take Back Your Online Privacy
Resist Doxing & Take Back Your Online PrivacyResist Doxing & Take Back Your Online Privacy
Resist Doxing & Take Back Your Online Privacy
 
Coffee and Tech
Coffee and TechCoffee and Tech
Coffee and Tech
 

Similar to Expert spam research

Issues with computers
Issues with computersIssues with computers
Issues with computers
ayerssaa
 
Q3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfQ3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdf
BryanSmile
 
Lesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxLesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptx
Joy Dugayo
 
L2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxL2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptx
sheena711714
 

Similar to Expert spam research (20)

Users guide
Users guideUsers guide
Users guide
 
Issues with computers
Issues with computersIssues with computers
Issues with computers
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
Q3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfQ3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdf
 
Lesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxLesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptx
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
CyberSafety
CyberSafetyCyberSafety
CyberSafety
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
L2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxL2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptx
 
L2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxL2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptx
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
E-Tech L2 Rules of Netiquette.pptx
E-Tech L2 Rules of Netiquette.pptxE-Tech L2 Rules of Netiquette.pptx
E-Tech L2 Rules of Netiquette.pptx
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Putting your life online
Putting your life onlinePutting your life online
Putting your life online
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
Hacker High School-Book 01- being_a_hacker
Hacker High School-Book 01- being_a_hackerHacker High School-Book 01- being_a_hacker
Hacker High School-Book 01- being_a_hacker
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Social Networks And Phishing
Social Networks And PhishingSocial Networks And Phishing
Social Networks And Phishing
 

More from heidirobison (20)

L26 communication services
L26   communication servicesL26   communication services
L26 communication services
 
L25 network fundamentals
L25   network fundamentalsL25   network fundamentals
L25 network fundamentals
 
Lesson 8 vocabulary
Lesson 8 vocabularyLesson 8 vocabulary
Lesson 8 vocabulary
 
Power point lesson 08
Power point lesson 08Power point lesson 08
Power point lesson 08
 
Lesson 7 vocabulary
Lesson 7 vocabularyLesson 7 vocabulary
Lesson 7 vocabulary
 
L7 operating system
L7   operating systemL7   operating system
L7 operating system
 
Questions for interviewers worksheet
Questions for interviewers worksheetQuestions for interviewers worksheet
Questions for interviewers worksheet
 
Starting the career search
Starting the career searchStarting the career search
Starting the career search
 
Osha rules
Osha rulesOsha rules
Osha rules
 
Labor laws questions
Labor laws questionsLabor laws questions
Labor laws questions
 
Work place readiness (student instructions)
Work place readiness (student instructions)Work place readiness (student instructions)
Work place readiness (student instructions)
 
Wpr career search
Wpr   career searchWpr   career search
Wpr career search
 
Candy bar presentation
Candy bar presentationCandy bar presentation
Candy bar presentation
 
Power point lesson 20
Power point lesson 20Power point lesson 20
Power point lesson 20
 
Power point lesson 19
Power point lesson 19Power point lesson 19
Power point lesson 19
 
Week 8 october 22
Week 8 october 22Week 8 october 22
Week 8 october 22
 
Week 7 october 15
Week 7 october 15Week 7 october 15
Week 7 october 15
 
Review for 6 week assessment
Review for 6 week assessmentReview for 6 week assessment
Review for 6 week assessment
 
Review for quiz lesson 3 5
Review for quiz lesson 3 5Review for quiz lesson 3 5
Review for quiz lesson 3 5
 
Lesson 5 vocabulary
Lesson 5 vocabularyLesson 5 vocabulary
Lesson 5 vocabulary
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Expert spam research

  • 1. Viruses, Pop-ups and Spam Viruses, Pop-ups and Spam – Oh My. Just like Dorothy and her companions in the Wizard of Oz, we are venturing out daily on our own yellow brick roads with dangers at every corner. No, not Lions and Tigers and Bears but threats that can ruin our computers, make us victims of fraud, cause us to lose our identities, and make us the target of predators and scam artists. You are the new “Wizards” in this Oz of computer technologies and Internet. You probably have more computer experience than most people twice and three times your age. But do you practice Cyber Safety and do you keep up to new developments when it comes to Viruses, Pop-ups, Spam, Hoaxes, etc.? Do you know what Phishing, Cookies and image-based spam are? Do you know how to protect yourself and your family against these types of threats? Here is how you can help. You each will be given 15 minutes to research your topic. Then we will group students by their topic and give the groups 5 minutes to share what they learned. Then we will divide into another group. Each group will have one “expert” for each topic and the each student will share what they know. As you work your way through the web sites in the explore section, you should be collecting specific information about the following: Viruses Hoaxes Cookies Pop-ups Scams/Fraud Phishing Spam Identity theft For each of the topic areas above, you should find out what it is, what types or variations there are, how does it affect and infect your computer and how can you protect yourself against it. You will no doubt find other areas and are welcome to propose your own investigation of a topic to your teacher. Try to find as much information as you can about these cyber intrusions. The following are suggestions but you should add to our classroom resource of materials. Review the Explain section to provide additional focus to your work. Your goal is inform others about this very important topic. You must record your findings. Highly recommended as a starting point for you. Nortel LearniT: Online Safety and Digital Ethics http://www.NortelLearniT.org Includes good information about spam, popups, online purchasing http://www.atg.wa.gov/safetynet/consumers.shtml Excellent source for ways to protect your self, firewalls, viruses etc. http://www.aarp.org/states/wa/wa-news/stay_safer_on_the_internet.html Some great information for kids and parents – categorized by age http://www.bewebaware.ca/english/default.aspx Very good site for many topics http://www.wiredsafety.org Pop-ups http://www.wiredsafety.org/safety/personal_information_safety/pop_ups/index.html Spam http://www.wiredsafety.org/safety/email_safety/spam/index.html Viruses http://www.wiredsafety.org/internet101/viruses.html Hoaxes http://www.wiredsafety.org/internet101/hoaxes.html http://hoaxbusters.ciac.org/ Good information – 8 excellent tips for Cyber security http://www.staysafeonline.info/ Good overview and information all of our topics http://www.getsafeonline.org/nqcontent.cfm?a_id=1168 Wired Safety - Cookies http://www.wiredsafety.org/law/kids/cookies.html