Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Dark side presentation lwhippedtc515


Published on

Dark Side Powerpoint project for APU EDTC 515

Published in: Education
  • Be the first to comment

  • Be the first to like this

Dark side presentation lwhippedtc515

  1. 1.
  2. 2. The Good, The Bad, and The Ugly<br />What you should know about the internet.<br />By Lisa Whipp<br />Azusa Pacific University EDTC 515<br />
  3. 3. What do you know?<br />Viruses<br /><ul><li>Firewall
  4. 4. Back ups
  5. 5. Antispyware
  6. 6. Child predators
  7. 7. Malware
  8. 8. Hackers
  9. 9. Phishing
  10. 10. https
  11. 11. Antivirus
  12. 12. Trojon Horses
  13. 13. Identity Theft
  14. 14. Adware
  15. 15. Cyber attacks
  16. 16. Spyware</li></li></ul><li>The good<br />Always run up to date definitions for your antivirus and spyware software.<br /><ul><li>Make sure your Firewall is turned on. Consider purchasing a Firewall protection at the router too.
  17. 17. Use safe and secure sites when making online purchases. Look for the https compared to just http. The s at the end provides some security.
  18. 18. Use safe and secure passwords and usernames. Do not give out birthday, name, and other personal information on the internet.
  19. 19. Always turn off your computer at the end of the night.</li></li></ul><li>The Bad<br />According to Wikipedia on electronic spam, “In the year 2011, the estimated figure for spam messages is around seven trillion. The costs, such as lost productivity and fraud, are borne by the public and by Internet service providers, which have been forced to add extra capacity to cope with the deluge. Spamming has been the subject of legislation in many jurisdictions.”[1]9 (wikipedia, 2011)<br /><br />
  20. 20. The Bad<br />Fox said “BOSTON - Spanish police have arrested three men accused of masterminding one of the biggest computer crimes to date -- infecting more than 13 million PCs with a virus that stole credit card numbers and other data.”(Reuters, 2010)<br />“Mariposa was programed to secretly take control of infected machines, recruiting them as "slaves" in an army known as a "botnet." It would steal login credentials and record every key stroke on an infected computer and send the data to a "command and control center," where the ringleaders stored it.”(Reuters, 2010)<br /> Click on this link to read more.<br />
  21. 21. The Bad<br /><ul><li>Malicious software is a common variation of a virus also known as Malware. There are two types of Malware, worms and Trojan horses. The most notorious worm was Melissa which quickly spread and caused serious harm to millions of computers.
  22. 22. Tech Faq says “The most important difference between a trojan virus/trojan horse and a virus is that trojans don’t spread themselves. Trojan horses disguise themselves as valuable and useful software available for download on the internet. Most people are fooled by this ploy and end up dowloading the virus disguised as some other application. The name comes from the mythical “Trojan Horse” that the Ancient Greeks set upon the city of Troy.” (TECH FAQ,2011)
  23. 23.</li></li></ul><li>The bad<br />Protect yourself from the bad things such as spam, viruses, and malware by……..<br /><ul><li>Always scan any attachments, downloads, and software. Never open email attachments from unknown sources.
  24. 24. Turn off your email preview.
  25. 25. Never start your computer with removable media in the drives.
  26. 26. Install a personal firewall program and consider a firewall at the router too.
  27. 27. Back up your files and set your antivirus program to scan automatically.</li></li></ul><li>The Ugly<br />Phishing is a term used when someone is attempting to acquire your private information such as social security number, bank account number, …etc to conduct fraud. Many times the attempts appear through an email acting like they are your bank or credit card company asking you to verify your information because it might have been compromised. Sometimes these phishing solicitations are over the phone.<br /><ul><li>Never give out any private information via email or over the phone.</li></li></ul><li>The Ugly<br /><ul><li>Spy software known as Spyware is deadly. Spyware can come in different forms from hackers being able to hack and see your desktop to them recording your every key stroke.
  28. 28. Employers are legally allowed to “record” your internet activities. They can see what web site you visited, get copies of emails, and every keystroke.
  29. 29. To protect yourself from Spyware you should not only have antispyware on your computer, but you should get a credit report once a year to monitor possible identity theft.</li></li></ul><li>The Ugly<br />
  30. 30. Protect yourself<br />
  31. 31. ReFeRENCES<br />G.Wolfgang. (n.d.). Clint Eastwood [picture]. Retrieved May 14, 2011, from<br />History Channel Cyber Security Greg Evan Talks Spyware [video]. (n.d.). Retrieved May 14, 2011, from YouTube: <br />ICA. (n.d.). Retrieved May 15, 2011, from Clint Eastwood [picture]:<br />Reuters. (2010, March 3). Accused Masterminds of world's Largest Computer Virus Network Arrested. Retrieved May 14, 2011, from Fox<br />
  32. 32. References<br />Shelly, G.&.(2010). Security Issues, Ethics, and Emerging Technologies in Education. In G.&. Shelly, Integrating Technology and Digital Media in the Classroom (pp.469-516). Boston: Course Technology, Cengage Learning.<br />Spam (electronic). (n.d.). Retrieved May 14, 2011, from Wikipedia:<br />The Good, The Bad & The Ugly [sound clip]. (n.d.). Retrieved May 14, 2011, from YouTube:<br />Trojan Virus. (n.d.). Retrieved May 15, 2011, from TECH FAQ:<br />