Crimes, Malware and Phishing - PowerPoint PPT Presentation

1 / 22
About This Presentation
Title:

Crimes, Malware and Phishing

Description:

... WILL DESTROY COMPANY RECORDS ONE WEEK AFTER HE IS FIRED. What would you do ? ... ( Facebook, MySpace) On a fake Web site that accepts donations for charity. ... – PowerPoint PPT presentation

Number of Views:57
Avg rating:3.0/5.0
Slides: 23
Provided by: fla77
Category:

less

Transcript and Presenter's Notes

Title: Crimes, Malware and Phishing


1
Crimes, Malware and Phishing
2
  • MOST CRIMES ARE DUE TO MOTIVATION AND
    OPPORTUNITY. IN A HIGH-TECH WORLD WITH NETWORKS
    EVERYWHERE, OPPORTUNITY IS ALWAYS PRESENT.
  • WHO IN YOUR COMPANY HAS ACCESS TO FINANCIAL AND
    PERSONAL DATA ?

3
  • CRIME 1
  • F.P.L. PROGRAMMER TOOK 1/10 CENT FROM EACH
    CUSTOMER..
  • CRIME 2
  • COMPANY MADE UP BILLS FOR OFFICE SUPPLIES.

4
AS TECHNOLOGY IMPROVES, PEOPLE GET MORE
RESOURCEFUL. EX FAKE ATM MACHINE WAS USED TO
GET CREDIT CARD NUMBERS AND PASSWORDS.
5
  • THE MOST COMMON COMPUTER CRIME IS SOFTWARE
    PIRACY. (COPYING SOFTWARE )
  • THESE CRIMES HAVE THE SAME MOTIVATION MONEY

6
  • OTHER TYPES OF COMPUTER CRIMES INCLUDE SABOTAGE.
  • CRIME EMPLOYEE SETS UP A PROGRAM THAT WILL
    DESTROY COMPANY RECORDS ONE WEEK AFTER HE IS
    FIRED.

7
  • What would you do ?
  • You are the owner of a company and your network
    geek just told you that you couldnt fire him.
    He said all of your records would all be
    destroyed if he was fired

8
  • Another type of Crime is to obtain information
    and then use it for personal gain
  • This is done with a KEYBOARD LOGGER
  • And by PHISHING

9
PHISHING
  • Phishing is the art of sending a request to
    people in the hopes that they will supply you
    with personal information about themselves.
  • Phishing has been around for many years. It was
    previously done by calling people or sending
    paper letters - but has been perfected with
    the creation of Internet and e-mail.

10
  • WHY ?
  • If you supply personal information to someone,
    they can open accounts and use your credit to buy
    items for themselves using your name.
  • HOW ?
  • E-mail is the newest method of phishing e-mails
    are sent to thousands of people at once. These
    e-mails convince the reader to click on a link
    that sends them to a fake website. The website
    prompts the user for personal information and
    sends it back to the sender who uses it for their
    own gain.

11
  • From Washington Mutual
  • Sent Friday, November 28, 2008 1014 AM
  • Subject WaMu Chase. Safe Secure - Message id
    XLKLTRZBGWWaMu customers we're proud to
    welcome you to one of the nation's largest banks
    as of September 25, 2008, all WaMu customer
    deposits are now deposits of JPMorgan Chase, one
    of the most stable banks in America.What will
    change Some aspects of the ONLINE SERVICES
    Chase Online and WaMu Online DEADLINE December,
    30, 2008 What you need to do Update your
    information by visiting Chase Online or WaMu
    Online. Log on to your account and you will be
    instructed on how to update the client
    information screen. Click here to access your
    account.Pif you do not complete this within 48
    hours, your online priviledges will be suspended.
    Please do not reply to this message. For
    questions, please call Customer Service. We are
    available 24 hours a day, 7 days a week.
    Sincerely, Carter Franke Chief Marketing
    Officer Member Services

12
  • You might see a phishing scam
  • In e-mail messages, even if they appear to be
    from a coworker or someone you know.
  • On your social networking Web site. (Facebook,
    MySpace)
  • On a fake Web site that accepts donations for
    charity.
  • On Web sites that spoof your familiar sites using
    slightly different Web addresses, hoping you
    won't notice.
  • In your instant message program.
  • On your cell phone or other mobile device.
  • By receiving a phone call at home.

13
  • How to protect yourself
  • Don't use the links in an email to get to a web
    page. EVER !!
  • Instead, log onto the website directly by typing
    in the Web address in your browser.
  • Avoid filling out forms in email messages that
    ask for personal financial information. You
    should only communicate information such as
    credit card numbers or account information via a
    secure website or the telephone.
  • Always ensure that you're using a secure website
    when submitting credit card or other sensitive
    information via your Web browser. To make sure
    you're on a secure Web server, check the
    beginning of the Web address in your browser's
    address bar - it should be https// rather
    than just http//.

14
Malware
ADWARE - Keeps track of events and creates
POP-Ups easily solved with free
programs SPYWARE Keeps track of events and
sends to others VIRUSES Harmful programs
designed to disrupt ..
15
SPYWARE
  • Spyware is a general name given to programs that
    hide on your computer. These programs TRACK
    your internet usage and then
  • Send your personal info to someone by e-mailing
    it to them from your own computer.

16
VIRUSES
A VIRUS IS A SMALL PROGRAM THAT IS WRITTEN BY
SOMEONE. THE PROGRAM IS ATTACHED TO ANOTHER
LARGE PROGRAM SUCH AS A GAME. WHEN THE USER
LOADS THE GAME INTO HIS COMPUTER, THE VIRUS IS
ALSO LOADED.
17
  • VIRUSES ARE TRIGGERED BY DIFFERENT MEANS
    TIME, DATE, NUMBER OF OFF/ON CYCLES, ETC.
  • A WAY TO PREVENT YOUR COMPUTER FROM BEING
    INFECTED IS ABSTENANCE ( BUY ONLY LICENSED
    SOFTWARE AND NEVER USE A MODEM TO CONNECT TO
    INTERNET)

18
A MORE REALISTIC WAY IS TO USE AN ANTI-VIRUS
PROGRAM NORTON ANTI-VIRUS, MCAFEE, VIRUS-TECH,
A.V.G. THESE ARE INSTALLED ON YOUR COMPUTER AND
SCAN EVERY BIT OF DATA THAT YOU PUT INTO YOUR
COMPUTER. IT CHECKS IT AGAINST A LIST OF KNOWN
VIRUSES. IF IT FINDS A MATCH, IT ALERTS YOU.
19
backup
BACKUP, BACKUP, BACKUP MAKE SEVERAL COPIES OF
VALUABLE DATA. SOME PEOPLE STORE ALL OF THEIR
DATA ON THE HARD DRIVE OF ONE COMPUTER..
FOOLISH The hard drive of a computer is a
cheap physical device that can (and will )
break..
20
Methods of Backing up data
  • 1. FLOPPY DISK
  • 2. TAPE BACKUP
  • 3. CD - BURNER
  • 4. ZIP DRIVE
  • 5. THUMB DRIVE
  • 6. ON-LINE STORAGE COMPANY
  • 7. EMBEDDED FINGER CHIP ?

21
A DEVICE CALLED A U.P.S (UNINTERRUPTIBLE POWER
SUPPLY) PROVIDES CLEAN POWER TO YOUR COMPUTER.
IT PROVIDES BATTERY PROTECTION FOR 10 15
MINUTES. A DEVICE CALLED A SURGE PROTECTOR
PREVENTS YOUR COMPUTER FROM POWER SPIKES.
22
the end
Write a Comment
User Comments (0)
About PowerShow.com