emily jamin rachel sarah cyber safety by. identity theft by emily

52
Emily Jamin Rachel Sarah Cyber Safety By

Post on 19-Dec-2015

218 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Emily Jamin Rachel Sarah Cyber Safety By. Identity Theft By Emily

Emily JaminRachelSarah

Cyber Safety By

Page 2: Emily Jamin Rachel Sarah Cyber Safety By. Identity Theft By Emily

Identity Theft By Emily

Page 3: Emily Jamin Rachel Sarah Cyber Safety By. Identity Theft By Emily

What is ID Theft?

•ID Theft occurs when someone steals your personal information, such as: credit card number, Social Security number, ect.

•It can cost you alot of money and time.

•It has the ability to destroy your credit and your reputation.

Page 4: Emily Jamin Rachel Sarah Cyber Safety By. Identity Theft By Emily

What info do ID thieves steal?

•ATM cards

•Your name,birthdate, address.

•Telephone calling cards.

•Social Security Number

Page 5: Emily Jamin Rachel Sarah Cyber Safety By. Identity Theft By Emily

How ID Theft Happens.

•ID Theives might go through your trash to find personal info.

•They might use “Phishing” to get you to give your personal info to them.

•They could even steal your purse or wallet!

Page 6: Emily Jamin Rachel Sarah Cyber Safety By. Identity Theft By Emily

How to Prevent ID Theft.

•You should shred financial documents before you discard them.

•Don’t give anyone your personal information, unless you know who you are dealing with.

•Keep your passwords hard to guess but easy for you to memorize.

Page 7: Emily Jamin Rachel Sarah Cyber Safety By. Identity Theft By Emily

“Crackers”

•ID Thieves will sometimes try to gain access to your hard drive remotely over the internet.

•You can prevent “crackers” by installing a firewall, and using a dynamic IP address.

Page 8: Emily Jamin Rachel Sarah Cyber Safety By. Identity Theft By Emily

The “Phishing” Scam.

•You get an email from your bank saying they need your credit card number and personal info!

•Don’t be fooled by these fake emails, they are hackers who want to steal your identity!

Page 9: Emily Jamin Rachel Sarah Cyber Safety By. Identity Theft By Emily

How to identify “Fake” Email

address.•This is what a “fake” email looks

like. “www.23.345.567.87.Citybank.com” (notice the numbers before the words)

•The numbers before the words are how you can identify fake I.P. adresses.

Page 10: Emily Jamin Rachel Sarah Cyber Safety By. Identity Theft By Emily

True ID Theft Stories

• An IRS agent used the IRS database to locate the social security number of a stranger with good credit.  She used this SSN to obtain three credit cards and a car lease in that person's name.  Since the IRS agent paid the bills on time, the victim had no idea fraudulent accounts had been opened in her name until she pulled her credit report one day and discovered them.

Page 11: Emily Jamin Rachel Sarah Cyber Safety By. Identity Theft By Emily

ID Theft Statistics in the U.S.

•ID theft is the number one fraud complaint received by the government.

•5.5% of Americans have already been ID theft victims.

•There were 10 million victims of ID theft in 2003, $53 billion was the total loss from these victims.

Page 12: Emily Jamin Rachel Sarah Cyber Safety By. Identity Theft By Emily

Where you can go to Report ID Theft.

•Equifax - www.equifax.com

•Experian - www.experian.com

•Trans Union - www.transunion.com

•www.consumer.gov/idtheft

Page 13: Emily Jamin Rachel Sarah Cyber Safety By. Identity Theft By Emily

Thank You!!

Page 14: Emily Jamin Rachel Sarah Cyber Safety By. Identity Theft By Emily
Page 15: Emily Jamin Rachel Sarah Cyber Safety By. Identity Theft By Emily

Illegal Internet Illegal Internet ActivitiesActivities

Page 16: Emily Jamin Rachel Sarah Cyber Safety By. Identity Theft By Emily

•Most illegal activities require no great Most illegal activities require no great expertise with computers such as:expertise with computers such as:

•Software piracySoftware piracy

•Unauthorized distribution of copyrighted Unauthorized distribution of copyrighted materialsmaterials

•Chain letters for profit (Pyramid schemes)Chain letters for profit (Pyramid schemes)

•Fraudulent advertising or business Fraudulent advertising or business practicespractices

•Threatened acts of violenceThreatened acts of violence

Doing Illegal Stuff Is EASY...and

DANGEROUS

Page 17: Emily Jamin Rachel Sarah Cyber Safety By. Identity Theft By Emily

•Intellectual property, in the form or text, Intellectual property, in the form or text, images, and audio, is protected under images, and audio, is protected under copyrightcopyright

•Downloading MP3’s, for example, unless Downloading MP3’s, for example, unless they have been explicitly made public by they have been explicitly made public by the artist, is illegalthe artist, is illegal

•Universities are starting to protect Universities are starting to protect themselves by cracking down on themselves by cracking down on students who violate copyrightsstudents who violate copyrights

•Some have also been prosecutedSome have also been prosecuted

Mp3’s, Photos, Videos are Protected By Copyright

Page 18: Emily Jamin Rachel Sarah Cyber Safety By. Identity Theft By Emily

•The Internet has provided opportunities The Internet has provided opportunities for data collection that go far beyond a for data collection that go far beyond a marketer’s wildest dreamsmarketer’s wildest dreams

•Your browser contains information about Your browser contains information about you, including the types of sites you visityou, including the types of sites you visit

•Web pages can also be programmed to Web pages can also be programmed to collect information about you, such as collect information about you, such as when you visited the sitewhen you visited the site

•The Online Personal Privacy Act (2002) The Online Personal Privacy Act (2002) limits the kinds of information that is limits the kinds of information that is collectedcollected

Your Info Is on the Internet

Page 19: Emily Jamin Rachel Sarah Cyber Safety By. Identity Theft By Emily

•Violations of copyright law occur when Violations of copyright law occur when you reproduce and distribute someone you reproduce and distribute someone else’s writing, photograph, or artwork else’s writing, photograph, or artwork without permission of the copyright without permission of the copyright holder.holder.

•As a basic rule of thumb, you can save As a basic rule of thumb, you can save one copy and print out one copy of one copy and print out one copy of anything you find online on your anything you find online on your personal computer if it is for your personal computer if it is for your personal use only. personal use only.

Page 20: Emily Jamin Rachel Sarah Cyber Safety By. Identity Theft By Emily

•All computer accounts are subject to an All computer accounts are subject to an Acceptable Use Policy (AUP)Acceptable Use Policy (AUP)

•When you sign up for service, you also agree to When you sign up for service, you also agree to the terms of the AUPthe terms of the AUP

•Common university AUP’s prohibit the use of the Common university AUP’s prohibit the use of the school’s resources for:school’s resources for:

•Commercial activityCommercial activity

•Academic dishonestyAcademic dishonesty

•HarassmentHarassment

•Use of specific internet sights (ex: music Use of specific internet sights (ex: music sharing sites)sharing sites)

OBEY THE AUP!!

Page 21: Emily Jamin Rachel Sarah Cyber Safety By. Identity Theft By Emily

•Do not provide personal information Do not provide personal information such as: phone number, home address such as: phone number, home address etc.etc.

•Do not provide your Social Security Do not provide your Social Security Number or other sensitive informationNumber or other sensitive information

•Two federal laws exist to protect privacy:Two federal laws exist to protect privacy:

•Children’s Online Privacy Protection Children’s Online Privacy Protection Act of 1998 – for children under 13 Act of 1998 – for children under 13 years oldyears old

•Online Personal Privacy Act of 2002 - Online Personal Privacy Act of 2002 - everyoneeveryone

To Protect Your Privacy:

Page 22: Emily Jamin Rachel Sarah Cyber Safety By. Identity Theft By Emily

•Send unsolicited email (junk mail)Send unsolicited email (junk mail)

•Forge an email message or Forge an email message or misrepresent your true identitymisrepresent your true identity

•Initiate an electronic chain letter of any Initiate an electronic chain letter of any kindkind

•Misuse broadcast email for Misuse broadcast email for innappropriate announcementsinnappropriate announcements

It Is Inappropriate To:

Page 23: Emily Jamin Rachel Sarah Cyber Safety By. Identity Theft By Emily

•Online stalking and hate mail incidents Online stalking and hate mail incidents also need to be taken seriouslyalso need to be taken seriously

•Laws exist that make issuing threats Laws exist that make issuing threats illegalillegal

•This includes kidnapping or bodily harmThis includes kidnapping or bodily harm

•Threats against the President are Threats against the President are investigated by the Secret Serviceinvestigated by the Secret Service

Our Society Takes Threats VERY

Seriously

Page 24: Emily Jamin Rachel Sarah Cyber Safety By. Identity Theft By Emily

•Remember –Remember –

•Ignorance of the law and Ignorance of the law and good intentions are poor good intentions are poor defenses if you’re unlucky defenses if you’re unlucky enough to be in the wrong enough to be in the wrong place at the wrong time.place at the wrong time.

•Think before you leap!!Think before you leap!!

Page 25: Emily Jamin Rachel Sarah Cyber Safety By. Identity Theft By Emily

END.

Page 26: Emily Jamin Rachel Sarah Cyber Safety By. Identity Theft By Emily
Page 27: Emily Jamin Rachel Sarah Cyber Safety By. Identity Theft By Emily

Inappropriate Content

Rachel

Page 28: Emily Jamin Rachel Sarah Cyber Safety By. Identity Theft By Emily

What Is Considered

Inappropriate?•Pornography

•Hate Groups

•Violence

Page 29: Emily Jamin Rachel Sarah Cyber Safety By. Identity Theft By Emily

What Is Considered Inappropriate?

•Illegal Activity

•Extremist Groups and Cults

•Online Advertising

Page 30: Emily Jamin Rachel Sarah Cyber Safety By. Identity Theft By Emily

Places Your Child Could Encounter Inappropriate

Content

•THE INTERNET

•Chat sites

Page 31: Emily Jamin Rachel Sarah Cyber Safety By. Identity Theft By Emily

Chat Sites

Page 32: Emily Jamin Rachel Sarah Cyber Safety By. Identity Theft By Emily

Places Your Child Could Encounter Inappropriate

Content•Google- search and images

•Pop Ups

•Adult Websites

Page 33: Emily Jamin Rachel Sarah Cyber Safety By. Identity Theft By Emily

Monitor Your Young Children

•DO YOU HONESTLY WANT YOUR CHILDREN TO WATCH OR BE DOING ANY OF THIS?

Page 34: Emily Jamin Rachel Sarah Cyber Safety By. Identity Theft By Emily

Cyber Safety Tips

•Do not get into conversations with people you don’t know!

•Don’t add people to your Myspace, Facebook, or anything you have without knowing the person. You have no idea what this person could have on their profile.

Page 35: Emily Jamin Rachel Sarah Cyber Safety By. Identity Theft By Emily

True Story!

• Chloe Michaels was only 11 years old when she was lured into a relationship by a man through Internet chat. After months of exchanging messages in an Internet chat room he finally managed to meet and court her.

Chloe first started going into Internet chat rooms after her mother

Cathy, a teacher, bought a computer to help with her homework. Each evening when she'd finished her schoolwork, she would then log on to chat. Eventually their relationship

came to a boil; he dumped her, terrified, distraught, and pregnant.

Page 36: Emily Jamin Rachel Sarah Cyber Safety By. Identity Theft By Emily

Meet Your Child’s Internet Friends

Page 37: Emily Jamin Rachel Sarah Cyber Safety By. Identity Theft By Emily

!PARENTS!

• WATCH what your children are doing.

•See ALL of the websites that they visit!

•Talk to them and warn them about all of the inappropriate content and bad things online.

Page 38: Emily Jamin Rachel Sarah Cyber Safety By. Identity Theft By Emily

YOU

•should be your child’s internet babysitter

Page 39: Emily Jamin Rachel Sarah Cyber Safety By. Identity Theft By Emily
Page 40: Emily Jamin Rachel Sarah Cyber Safety By. Identity Theft By Emily

CyberBullyingCyber

Bullying

Page 41: Emily Jamin Rachel Sarah Cyber Safety By. Identity Theft By Emily

What is Cyberbullying?

•Cyberbullying involves the use of information and communication technologies such as email, cell phone and pager text messages, instant messaging (IM), defamatory personal web sites, and defamatory online personal polling web sites, to support deliberate, repeated, and hostile behavior by an individual or group, that is intended to harm others (Keith & Martin, 2004).

Page 42: Emily Jamin Rachel Sarah Cyber Safety By. Identity Theft By Emily

DIFFERENCESBULLYING

• DIRECT

• Occurs on school property

• Poor relationships with teachers

• Fear retributionPhysical: Hitting, Punching & ShovingVerbal: Teasing, Name calling & GossipNonverbal: Use of gestures & Exclusion

www.stopbullyingnow.hrsa.gov

CYBERBULLYING

• ANONYMOUS

• Occurs offschool property

• Good relationships with teachers

• Fear loss of technology privileges

• Further under the radar than bullying

• Emotional reactions cannot be determined

{McKenna & Bargh, 2004; Ybarra & Mitchell, 2004}

From ‘Demystifying and Deescalating Cyber Bullying’ by Barbara Trolley, Ph.D. CRC, Connie Hanel, M.S.E.d & Linda Shields, M.S.E.d. http://www.nyssca.org/CYBERBULLYING-pp-BT28th.ppt

Page 43: Emily Jamin Rachel Sarah Cyber Safety By. Identity Theft By Emily

iSafe Survey

•58% of kids admit someone has said mean or hurtful things to them online

•53% of kids admit having said something mean or hurtful things to another online

•42% of kids have been bullied while online

•34% were threatened

Page 44: Emily Jamin Rachel Sarah Cyber Safety By. Identity Theft By Emily

CYBER BULLYING PREVALENCE

• Aftab’s statistics:90% of middle school students they polled had their

feelings hurt online65% of their students between 8-14 have been

involved directly or indirectly in a cyber bullying incident as the cyber bully, victim or friend

50% had seen or heard of a website bashing of another student

75% had visited a website bashing40% had their password stolen and changed by a

bully (locking them out of their own account) or sent communications posing as them

Problems in studies: not assessing the ‘real thing’i.e. Only 15% of parent polled knew what cyber bullying was

http://www.aftab.com/

Page 45: Emily Jamin Rachel Sarah Cyber Safety By. Identity Theft By Emily

CYBER BULLYING PREVALENCE

• Cyber bullying typically starts at about 9 years of age and usually ends after 14 years of age; after 14, it becomes cyber or sexual harassment due to nature of acts and age of actors (Aftab)

• Affects 65-85% of kids in the core group directly or indirectly through close friends (Aftab)

http://www.aftab.com/

Page 46: Emily Jamin Rachel Sarah Cyber Safety By. Identity Theft By Emily

Why Use Technology to Bully?

•Anonymity

•Rapid deployment and dissemination

•Immediate

•Rich medium

•Natural

Page 47: Emily Jamin Rachel Sarah Cyber Safety By. Identity Theft By Emily

How Do PeopleCyberbully Others?

•Exclusion

•Outing

•Polling

•Stalking

•Libel

•Blackmail

• Flaming• E-mail• Websites• “Piling” via IM• Impersonation

Page 48: Emily Jamin Rachel Sarah Cyber Safety By. Identity Theft By Emily

What is the Impact of Cyberbullying?

•Psychological, physical, and emotional

•depression, anxiety, anger,

•school failure, school avoidance, suicide, and school violence

•Role modeling for others which increases likelihood of increased bullying

Page 49: Emily Jamin Rachel Sarah Cyber Safety By. Identity Theft By Emily

What is the Impact of Cyberbullying?

•Legal consequences for school and families (slander, defamation, terroristic threats, sexual exploitation, etc.)

•Family Complications

•Very difficult to take back once it begins.

•Antithetical to the overall school mission

Page 50: Emily Jamin Rachel Sarah Cyber Safety By. Identity Theft By Emily

Advantages of using Advantages of using PeersPeers

•power of peer influencepower of peer influence

• legitimizing the issue of harassmentlegitimizing the issue of harassment

• less hampered by institutional concernsless hampered by institutional concerns

•mobilize other studentsmobilize other students

Page 51: Emily Jamin Rachel Sarah Cyber Safety By. Identity Theft By Emily

QuickTime™ and aDV/DVCPRO - NTSC decompressor

are needed to see this picture.

Page 52: Emily Jamin Rachel Sarah Cyber Safety By. Identity Theft By Emily

Resources

•Ctap4.org

•Google images

•Wikepediea.org

•Aftab.com

•Icanhazcheezberger.com