6. QR questions
What does “QR” mean?
When were QR codes invented? By what company?
Which holds more information, barcodes or QR codes?
Which direction are QR codes “read” ?
Which of these is the “correct” direction for a QR code?
a) b) c) d)
7. QR questions
What does “QR” mean?
Quick Response
When were QR codes invented? By what company?
QR codes were invented in 1994 by Toyota.
Which holds more information, barcodes or QR codes?
QR codes kick barcode butt.
Which direction are QR codes “read” ?
Up and down (barcodes are read side to side).
Which of these is the “correct” direction for a QR code?
a) b) c) d)
8. Internet security
There are threats to anyone who uses a computer.
Some of these include:
Viruses / malware
Online Scams
Phishing
Social Network Hacking
Credit Card Fraud
Let’s take a look at each type…
10. Malware
Internet
Security Phishing
The internet is such a
big part of your lives Social Network Hacking
that we can forget that
it even though it is
convenient, it can also
be dangerous.
You need to be careful.
Today I will introduce
some of the most
common threats ( 威
脅 ).
Sources:
http://www.slideshare.net/TechSoupGlobal/security-basics-webinar
http://en.wikipedia.org/
11. Virus - a program that can spread
from computer to computer by
Malware itself.
Most of you have heard of a
computer “virus” before…
Trojan - a hidden program (for
Viruses are actually a kind example in free / illegal software)
of Malware ( 惡意軟體 )
Bot - a robot network
which can be controlled
outside the computer.
Keystroke logger
(keylogger): a program
that records what you
type into the computer.
12. A computer virus is a computer
program that can spread from one
Virus computer to another.
Some viruses can be
harmless, but others
A virus can spread from one
can slow down or even
ruin a computer. Many
computer to another using code,
people don’t even know for instance because a user sent it
that their computer has
a virus at all. over the Internet, or carried it on
a memory device such as
a CD, DVD, or USB drive.
Viruses that spread them-
selves online or across a
network are called worms.
13. A Trojan horse, or Trojan, is
software that hides inside
Trojans software and then steals
The term “Trojan” comes
from the Greek story about
information or hurts the user’s
the Trojan Horse from a computer.
very old story (The Iliad).
Some things trojans can do to
In the story, Greeks left a
big wooden horse to the your computer:
Trojans, people they were at
war against. After the
Make your computer a “zombie”
Trojans brought the horse Download or upload files
into the city, the Greeks who
were hidden inside snuck Steal your information
out and opened the city
gates to let the Greek army
Watch your screen
come in and destroy the city Crash your computer
of Troy.
Record your keystrokes
14. One kind of malware, usually
Bots, botnets brought into a computer through
and zombies! a trojan, is a bot. Here’s one of the
Bots, or internet robots,
didn’t start out as bad - and
way hackers can use bots:
not all of them are. For
example, Google uses bots
to get for their search
results.
What we are talking about
here are botnets, which take
over computers and become
an army of computers doing
what they are told, or
zombies, by an outside
program.
15. Botnets are bad. Really bad. They can
Bots, botnets be used to send spam, send or
and zombies! download files or even more malware,
Bots, or internet robots,
didn’t start out as bad - and
and they can even be used for
not all of them are. For Distributed Denial of Service (DDoS)
example, Google uses bots
to get for their search attacks, where so many different
results. computers are told to go to the same
What we are talking about
here are botnets, which take
website all
over computers and become
an army of computers doing
at the same
what they are told, or
zombies, by an outside
time that
program.
the website
crashes.
16. Keyloggers simply record whatever the
user is typing on their keyboard.
Keyloggers Some keyloggers also record what is
Keyloggers are actually
quite easy to write. Usually
on the screen at the same time. Here’s
keyloggers are put together an example of a keylogger file that
with other types of
malware. also shows what form the user was
typing in (form grabbing):
17. Keyloggers are some of the worst
kinds of malware. Spies love
Keyloggers keyloggers, and countries often
try to sneak them onto
computers. Sometimes people use
them to spy on each other - for
example, maybe a husband thinks
his wife has a secret boyfriend…
Criminals use keyloggers to try to
get usernames and
passwords for bank
information.
18. Phishing is a way of tricking people
into giving their information to what
Phishing they think is a site they can trust.
While phishing isn’t a
from of malware (it’s
Here’s an example:
more like tricking you
and stealing), it’s
becoming more and
more common, and
more dangerous.
The link in the email takes you to a
login page that asks you to type in
your gmail information.
Look at the domain name!
19. Here’s another example of an
email that takes you to a phishing
More Phishing site:
Phishing has become a
real problem in recent
years, and social media
sites are one of their
favorite targets.
22. Who is Sophie Ng?
Let’s see if Google knows her:
Take one of her profile pictures and put it into Google images.
Hey, that’s a different
name! What’s going on?
23. After Google searching…
After uploading a couple of
“Sophie” pictures to Google and
getting several different Facebook
profiles, her pictures appeared on
a different site, where she was listed as “Cute college girl of
the day for October 22, 2010”
It turns out that people use her (and other college girl photos)
to try to get people to accept her as a Facebook friend. Once
she has been accepted, the hackers can get information on
you and your friends, or get other people to click on links that
will download malware to their computers.
24. Dangerous links in email, IM,
How does this Twitter messages, Facebook and
happen? YouTube comments
Now that we know what
some types of malware
Infected devices: USB sticks, disks,
are called, we should
ask, “How do end up
laptops, digital photo frames
with malware?” Online auctions, online dating
Phishing attacks
Fake pop-up alerts
25. Underground cybercrime economy
Bigger business than international
Why?
drug trade
Why are people doing
this? What’s the point? Hackers with computer skills and
desire for money
Organized online buy/sell of stolen
data
Low risk, high reward - many
hackers can attack anywhere in the
world from their own countries, and
most countries don’t have strong
laws against hacking
26. Zeus is a trojan that steals banking
Just one case: information
Zeus using keylogging and form
grabbing.
In June 2009, a security company
discovered that Zeus had hacked
74,000 FTP accounts on websites of
such companies as the Bank of
America, NASA, , ABC, Oracle,
Play.com, Cisco, Amazon,
and BusinessWeek.
27. Zeus botnets are thought to include
millions of computers (around 3.6
Zeus million in the United States).
By October 28, 2009 over 1,500,000
phishing messages were sent
on Facebook to spread the Zeus
trojan.
November 14–15, 2009 Zeus spread
via e-mails saying it was from a
telephone company. A total of
9,000,000 of these phishing e-mails
were sent.
28. It is still active today. In 2010, an
internet security company, wrote that
Zeus the credit cards of more than 15
unnamed US banks have been stolen
using the Zeus malware.
So far, over US $70,000,000 has been
stolen from people and companies
with Zeus.
More than 90 criminals using Zeus
were arrested in the US, England and
Ukraine ( 烏克蘭 ).
In May, 2011, the code of Zeus was put
online for anyone to use and change.
29. Don’t open mail attachments from
So what can people you don’t know.
you do? Try not to click on links inside
How can you protect
yourself from these emails - if you get an email telling
kinds of online threats? you to update your information, go
to the website yourself - don’t use
their link.
Get a good anti-virus program,
spyware remover, and firewall.
There are free programs available
online, such as avast!
antivirus, Grisoft's AVG, Microsoft
Anti-SpywareWebroot.
30. Don’t expect something for
So what can nothing.
you do?
Don’t download pirated software, or
How can you protect
yourself from these “keygens” - software that will give you
kinds of online threats? a license number for software.
Don’t friend people on Facebook that
you don’t know - even if you think
they’re attractive!
Carefully check where your email is
coming from - always check the
domain name of the sender.
31. Go to Facebook. If there are people in your friends
list that you don’t really know, put the link to their
picture into Google images and see if they are
OK Now: really who they say they are.
Log into Facebook and
check through your
Check your email. Are there any emails asking you
friends. Do you really
know them? to update your information? If so, check the
domain name. Is it really the website it says it is?
Update your anti-virus software and do a full
system scan of your computer at least once a
week. Change your passwords every 3-4 months
Think! Be skeptical ( 懷疑論的 ) about what
people are sending you, and be careful!