Top Banner
Click here to start
30

Click here to start. NextPrevious Threat Trends in Australia One in five children (10 to 17 years old) receive unwanted sexual solicitations online Identity.

Dec 15, 2015

Download

Documents

Alyson Astley
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Click here to start. NextPrevious Threat Trends in Australia One in five children (10 to 17 years old) receive unwanted sexual solicitations online Identity.

Click here to start

Page 2: Click here to start. NextPrevious Threat Trends in Australia One in five children (10 to 17 years old) receive unwanted sexual solicitations online Identity.

NextPrevious

Threat Trends in Australia• One in five children (10 to 17 years old) receive unwanted

sexual solicitations online

• Identity theft and financial fraud have become much more widespread

• Cyber-bullying is on the rise – by e-mail, blogs, SMS etc.

• Phishing attacks are becoming more sophisticated – targeted social engineering

• Malicious code is proliferating and being used for financial gain

• Hackers are promulgating attacks through armies of zombie computers – or “BotNets”

Page 3: Click here to start. NextPrevious Threat Trends in Australia One in five children (10 to 17 years old) receive unwanted sexual solicitations online Identity.

NextPrevious

Viruses/WormsSoftware programs designed to invade your computer, and copy, damage or delete your data

Trojan HorsesViruses that pretend to be programs that help you while destroying your data and damaging your computer

SpywareSoftware that secretly watches and records your online activities or send you endless pop-up ads

Leading Threats to PC Security

Page 4: Click here to start. NextPrevious Threat Trends in Australia One in five children (10 to 17 years old) receive unwanted sexual solicitations online Identity.

NextPrevious

Turn on an Internet firewall

Keep the operating system up to date

Install and maintain antivirus software

Install and maintain antispyware software

Four Steps To Protect Your Computer

Page 5: Click here to start. NextPrevious Threat Trends in Australia One in five children (10 to 17 years old) receive unwanted sexual solicitations online Identity.

NextPrevious

Turn on an Internet Firewall

An Internet firewall is like a moat around a castle, creating a barrier between your computer and the Internet

Page 6: Click here to start. NextPrevious Threat Trends in Australia One in five children (10 to 17 years old) receive unwanted sexual solicitations online Identity.

NextPrevious

Keep Your Operating System Updated

• Install all security updates as soon as they are available

• Automatic updates provide the best protection

Page 7: Click here to start. NextPrevious Threat Trends in Australia One in five children (10 to 17 years old) receive unwanted sexual solicitations online Identity.

NextPrevious

Install Antivirus Software

• Anti-virus software can detect and destroy computer viruses before they can cause damage

• Just like flu shots, for anti-virus software to be effective, you must keep it up to date

Don’t let it expire

Page 8: Click here to start. NextPrevious Threat Trends in Australia One in five children (10 to 17 years old) receive unwanted sexual solicitations online Identity.

NextPrevious

Install And Maintain Antispyware Software

• Use anti-spyware software so unknown people cannot lurk

on your computer and potentially steal your information

• Spyware may slow your computer, show pop up ads,

change computer behavior and track your activity

• Automatic updates often provide the best protection

Page 9: Click here to start. NextPrevious Threat Trends in Australia One in five children (10 to 17 years old) receive unwanted sexual solicitations online Identity.

NextPrevious

SpamUnwanted e-mail, instant messages, e-cards, and other online communication

PhishingE-mail sent by online criminals that tries to trick you into revealing personal information

Identity TheftA crime where con artists get your personal information and access your cash and/or credit

HoaxesE-mail sent by online criminals that tries to trick you into giving them money

Leading Threats to Personal Online Safety

Michelle Hargarten
add in better images.
Page 10: Click here to start. NextPrevious Threat Trends in Australia One in five children (10 to 17 years old) receive unwanted sexual solicitations online Identity.

NextPrevious

Take Steps to Help Protect Yourself

Practice Internet behavior that lowers your risk

Manage personal information carefully

Use technology to reduce nuisances, and raise the alarm when appropriate

Page 11: Click here to start. NextPrevious Threat Trends in Australia One in five children (10 to 17 years old) receive unwanted sexual solicitations online Identity.

NextPrevious

Delete Spam without Opening It

• Never reply to spam

• Technology can help you identify spam so you can delete it

• Many Internet providers delete it for you

• Sign up to the ACMA SpamMatters Tool:

www.spam.acma.gov.au

Michelle Hargarten
add in new image.
Page 12: Click here to start. NextPrevious Threat Trends in Australia One in five children (10 to 17 years old) receive unwanted sexual solicitations online Identity.

NextPrevious

Be on the Lookout for Scams! There are signs that can alert you to e-mail

scamsAlarmist messages and threats of account closures

Promises of big bucks for little effort

Deals that sound too good to be true

Misspellings and grammatical errors

Go to: www.scamwatch.gov.au for the latest known scams by the ACCC.

Michelle Hargarten
add in new image.
Page 13: Click here to start. NextPrevious Threat Trends in Australia One in five children (10 to 17 years old) receive unwanted sexual solicitations online Identity.

NextPrevious

Don’t Share Personal Information

• Delete e-mails that request personal information

• Do not use e-mail or instant messages to share personal information

• Secure websites with trusted vendors are different

Michelle Hargarten
add in new image.
Page 14: Click here to start. NextPrevious Threat Trends in Australia One in five children (10 to 17 years old) receive unwanted sexual solicitations online Identity.

NextPrevious

Use Strong Passwords• Keep passwords

private and create ones that are hard to “crack”

• Never share your passwords

with friends or be tricked into giving them away

• Passwords are often “cracked” by high speed computer programs – not guesswork

Michelle Hargarten
add in new image.
Page 15: Click here to start. NextPrevious Threat Trends in Australia One in five children (10 to 17 years old) receive unwanted sexual solicitations online Identity.

NextPrevious

What do Phish look like?Phishing emails will:

• Ask you to provide personal details such as bank account numbers, dates of birth etc

• Often provide a link for you to follow

Page 16: Click here to start. NextPrevious Threat Trends in Australia One in five children (10 to 17 years old) receive unwanted sexual solicitations online Identity.

NextPrevious

Phishing Filters

• Can be built into Browsers e.g. Internet Explorer, MSN / Windows Live Toolbar (Opt-in required to turn it on)

• Most phishing sites are active for 2 to 3 days, at the most

• 3 “checks” to protect you from phishing Compares web site with local list of known legitimate sites

Scans the site for characteristics common to phishing sites

Double checks site with online Microsoft service of reported phishing sites dynamically updated

Level 1: Warn Suspicious Website

Signaled

Level 2: Block Confirmed Phishing Site

Signaled and Blocked

Two Levels of Warning Two Levels of Warning and Protection in IE7 Security and Protection in IE7 Security

Status BarStatus Bar

Page 17: Click here to start. NextPrevious Threat Trends in Australia One in five children (10 to 17 years old) receive unwanted sexual solicitations online Identity.

NextPrevious

Phishing Filters

If the site is flagged as suspicious you receive a warning, so you can investigate and make an informed choice.

Page 18: Click here to start. NextPrevious Threat Trends in Australia One in five children (10 to 17 years old) receive unwanted sexual solicitations online Identity.

NextPrevious

Phishing Filters

If the site is flagged as a known phishing site, it is blocked.

You have to choose to continue to get to the site.

Page 19: Click here to start. NextPrevious Threat Trends in Australia One in five children (10 to 17 years old) receive unwanted sexual solicitations online Identity.

NextPrevious

More Safe Internet Behavior

Back up your files regularly

Think before you click

Read website privacy statements

Close pop-ups using red “X”

Michelle Hargarten
recreate graphic on right to match template.
Page 20: Click here to start. NextPrevious Threat Trends in Australia One in five children (10 to 17 years old) receive unwanted sexual solicitations online Identity.

NextPrevious

Back Up Your Files

• Save to CD, DVD or flash drive

• Use a Web-based backup service

Page 21: Click here to start. NextPrevious Threat Trends in Australia One in five children (10 to 17 years old) receive unwanted sexual solicitations online Identity.

NextPrevious

Think Before You Click

• Don’t open e-mail attachments unless you know what they contain and who sent them

• Only download files from websites you trust

Page 22: Click here to start. NextPrevious Threat Trends in Australia One in five children (10 to 17 years old) receive unwanted sexual solicitations online Identity.

NextPrevious

Read Privacy Statements

Understand what you are getting before you agree to download or share your personal information

Page 23: Click here to start. NextPrevious Threat Trends in Australia One in five children (10 to 17 years old) receive unwanted sexual solicitations online Identity.

NextPrevious

Close Pop-ups Using Red “X”

• Always use the red “X” in the corner of a pop-up screen

• Never click “yes,” “accept” or even “cancel”, because it could be a trick that installs software on your PC

Page 24: Click here to start. NextPrevious Threat Trends in Australia One in five children (10 to 17 years old) receive unwanted sexual solicitations online Identity.

NextPrevious

PredatorsThese people use the Internet to trick children into meeting with them in person

File-share AbuseExchanging music, video, and other files with strangers may be illegal, and can give them access to your PC or download viruses or worms

Cyber-bullies Both children and adults may use the Internet to harass or intimidate other people

Invasion of PrivacyIf kids fill out online forms, they may share information you don’t want strangers to have about them or your family

Disturbing ContentIf kids explore unsupervised, they could stumble upon images or information you may not want them exposed to

Leading Online Risks for Youth

Page 25: Click here to start. NextPrevious Threat Trends in Australia One in five children (10 to 17 years old) receive unwanted sexual solicitations online Identity.

NextPrevious

Take Steps to Help Protect Young People

Talk with kids about what they do online

Keep personal information private

Set clear rules for Internet use

Use family safety software

Page 26: Click here to start. NextPrevious Threat Trends in Australia One in five children (10 to 17 years old) receive unwanted sexual solicitations online Identity.

NextPrevious

 Reporting SPAM and Scams

• Australian Communications and Media Authority (ACMA)

www.acma.gov.au• One click reporting tool for spam. See FAQ’s

and SpamMatters Download tool at:

www.spam.acma.gov.au• For guidance on reporting scams, go to:

http://www.scamwatch.gov.au/content/index.phtml/tag/reportascam

Page 27: Click here to start. NextPrevious Threat Trends in Australia One in five children (10 to 17 years old) receive unwanted sexual solicitations online Identity.

NextPrevious

Reporting Offensive Material or Child Abuse Images

• In an emergency (if a child is being abused or in danger of being abused):– Dial 000– Crimestoppers: www.crimestoppers.com.au

• To report suspicious behaviour online (online sexual exploitation):

https://www.afp.gov.au/online_forms/ocset_form• For illegal or offensive content:

www.acma.gov.au

Page 28: Click here to start. NextPrevious Threat Trends in Australia One in five children (10 to 17 years old) receive unwanted sexual solicitations online Identity.

NextPrevious

If You Become a Victim of Cybercrime

• Report it to: – Your state or territory police agency (if necessary,

they will refer it to the Federal authorities)– Crimestoppers: www.crimestoppers.com.au

• Preserve information stored in your computer as evidence (and save to CD or flash drive).

• Keep a log of all online sessions or print them out. • Save any annoying or threatening email.• Follow-up in writing.• Change all of your passwords.

Page 29: Click here to start. NextPrevious Threat Trends in Australia One in five children (10 to 17 years old) receive unwanted sexual solicitations online Identity.

NextPrevious

Recap: Internet Safety Protection Basics

Your PCs1. Turn on an

Internet firewall

2. Keep your operating system up to date

3. Install and maintain antivirus software

4. Install and maintain antispyware software

5. Use only trusted sites

Yourself1. Practice Internet

behavior that lowers risk

2. Manage your personal information carefully

3. Use technology to reduce nuisances, and raise the alarm when appropriate

4. Stay alert and think before you click

Your children1. Talk with your

children about what they do online

2. Teach them to keep personal information private

3. Set clear guidelines for Internet use

4. Use family safety software

Page 30: Click here to start. NextPrevious Threat Trends in Australia One in five children (10 to 17 years old) receive unwanted sexual solicitations online Identity.

NextPrevious

For More Informationwww.staysmartonline.gov.au

www.microsoft.com/athome/security

http://international.isafe.org

www.ahtcc.gov.au

www.thinkuknow.com.au

www.netalert.com.au

www.staysafe.org/unicef

www.acma.gov.au

www.virtualglobaltaskforce.com

www.crimestoppers.com.au