Vous êtes sur la page 1sur 26

Privacy and Security

By: Albert
Spencer
Jenny

Computer Virus
A computer virus is a program that spreads malicious code by
coping itself and infecting host computers.

Spyware
Spyware is a type of malware that is installed on a computer
without the knowledge of the owner in order to collect the
owner's private information.

What kind of damage did viruses do?


The virus need to use internet to attack other computer, who
connect the computer either.

Computer infected for a virus


- Accepting without reading
- Downloading any infected software
- Opening e-mail attachments
- Inserting or connecting an infected
disk,disc or drive
- Not running the latest updates
- Pirating software,music,or movies
- No antivirus spyware scanner

Protect computer
- Install Anti-Virus Soft ware
- Update All Software
- Install only Trusted Software
- Avoid P2P File Sharing Software
- Delete Unknown Emails
- Do not click on Ads
- Run Virus Scans Regularly
- Be careful what you attach to your computer
- Avoid Shady Web Sites
- Turn On Install a Firewall
- Secure Your Wireless Network
- Use a complex Password for login

Why it is important
1. They infect your file allocation tables causing
corruption
2. they spread from one file to another and at
times mutate into more evil and malicious viruses
3. cause excess CPU usage
4. destroy your registry

5. cause programs to stop working (like firewalls,


and virus scanners)
6. Damage memory
7. Damage hard drives
8. Change your security settings.
9. Make Great cover for hackers and lurkers

PHISHING
When internet fraudsters
impersonate a business to
trick you into giving out your
personal information, its
called phishing.

INDENTITY THEFT
Identity theft is a crime in which an imposter obtains key pieces of
personal information

Such as Social Security or driver's license numbers, in order to


impersonate someone else.

In addition to running up debt, an imposter might provide false


identif ication to police, creating a criminal record or leaving
outstanding arrest warrants for the person whose identity has
been stolen.

HOW TO PROTECT?
1. Destroy private records and
statements. Tear up credit cards
statements and other documents that
contain private financial information.

2. Secure your mail. Empty you mailbox


quickly, lock it so criminals dont
have a chance to snatch credit card
pitches.
3. Safeguard your Social Security
number. Dont put your number on your
checks.

4. Dont leave a paper trail.


Never leave ATM, credit card or gas
station receipts behind.
5. Know who youre dealing with.
Whenever anyone ask you for identity or
personal information, make sure that you
know the reason and who they are.
6. Review your credit cards statements
carefully.

Rules to create passwords


1. Has 12 Characters :
You need to choose a password that's long enough.
2. Includes Numbers, Symbols, Capital Letters, and Lower-Case Letters :
Use a mix of different types of characters to make the password harder
to crack
3. Doesn't Rely on Obvious Substitutions :
Don't use common substitutions, either for example, H0use isn't
strong just because you've replaced an o with a 0. That's just obvious.

Tips for shopping online


Dont store your card information on the website. You don't want
hackers to get your information and use it without your permission.
Avoid using debit cards online.
Buy From Sites You Trust.
Dont Use Open WiFi Networks.
Public WiFi hotspots are especially
vulnerable, so buy something you
want until youre on a secure
network .

Prevent identity theft

To prevent the loss of money

Why it is important?

Internet is convenient for attackers, giving them


multiple ways to access the personal and
financial information of unsuspecting shoppers.

Encryption
Encrypt

change electronic information or signals into a


secret code
people cannot understand or use on normal
equipment

Encryption

the translation of data into a secret code


access to a secret key or password that enables you
to decrypt it

History

the most effective form of data security

few people know how to approach.

Importance

effective method of protecting your corporate data

preventing trespassers

lucrative prospect for a potential hacker

protection against hacking

Once hackers learn that your data is unencrypted, it


becomes an easy target.

Cyberstalking
- the use of the Internet or other electronic
- to stalk or harass an individual, a group, or an organization.

False accusations
Defamation
Slander
Libel
Monitoring
Identity theft
Threats
Vandalism
Solicitation for sex
Gathering information that
may be used to threaten or
harass.

Serious

accompanied by realtime or offline


stalking
criminal offenses
control, intimidate or influence a
victim
keeping tabs on an individuals
daily life

Destroy Victim

Friendships
Credit
Careers
Self-image
Confidence
Mental ans physical danger

Victim of cyberstalker lives in fear

What should I do??


The National Center for Victims of Crime (NCVC) suggests:

Inform a trusted adult(parents)


File a complaint with the cyberstalker's Internet service provider
Collect evidence, document instances and create a log of attempts

Present documentation to law


enforcement and explore legal avenues
Get a new email address and increase
privacy settings on public sites
Purchase privacy protection software
Request removal from online directories

Help Them
Talk with the victim
Contact the police

Increase personal protection


Collect evidence
Do what NCVC suggests

Resources:

http://winarticles.net/wp-content/uploads/2013/06/infected-computer.jpg

http://www.pctools.com/security-news/what-do-computer-viruses-do/

http://www.whoishostingthis.com/blog/2015/06/01/8-worst-viruses/

http://www.computerhope.com/issues/ch001045.htm

sources

P1-P2
https://austinisafecker.wordpress.com/2014/04/09/eek-windows-xp-has-died/
Larry M,2009,https://answers.yahoo.com/question/index?qid=20090212180009AABcoVW
P3
Rouse M,2009,http://searchsecurity.techtarget.com/defnition/identity-theft
Lord N,2016,
https://digitalguardian.com/blog/phishing-attack-prevention-how-identify-avoid-phishing-scams
P4
Rouse M,2009,http://searchsecurity.techtarget.com/defnition/identity-theft
P5-P6
https://www.iconfnder.com/icons/415064/email_password_key_locked_private_protect_email_safety_security_icon
http://www.teclasap.com.br/tear-apart-x-tear-x-tear-qual-e-diferenca/
City of Houston.2016, http://www.houstontx.gov/police/crime_prevention/id_theft.htm
VIAWIT,2013 https://pearlsofprofundity.wordpress.com/2013/06/27/identity-theft/
P7
How to greek,2006,
http://www.howtogeek.com/195430/how-to-create-a-strong-password-and-remember-it/
P8
http://unwire.pro/2015/07/14/unsecure-public-wif-hacking/security/
Dratch D,2011,
http://www.creditcards.com/credit-card-news/8-tips-keep-cards-safe-shopping-online-1280.php
Norcie G,2015, https://cdt.org/blog/make-your-password-exponentially-more-secure/
P9
US-Cert,2015,https://www.us-cert.gov/ncas/tips/ST07-001

Sources
Cambridge University Press. (May 18, 2016). Encrypt.
Retrieved from http://dictionary.cambridge.org/search/english/direct/?q=encryption
Packetworks Blog Editor. (May 25, 2015). Importance of Encryption for Corporate
Data Security.
Retrieved from http://www.packetworks.net/blog/encryption.htm
(April 17, 2016). Cyberstalking.
Retrieved from https://en.wikipedia.org/wiki/Cyberstalking
Techopedia. (May 18, 2016). Cyberstalking.
Retrieved from https://www.techopedia.com/definition/14326/cyberstalking
Duhaime, Lloyd. (October 31, 2011). Stalking.
Retrieved from http://www.duhaime.org/LegalResources/CriminalLaw/LawArticle95/Stalking.aspx

Vous aimerez peut-être aussi