Transcript Net.Safe

Click here
to start
Threat Trends in Australia
• One in five children (10 to 17 years old) receive unwanted
sexual solicitations online
• Identity theft and financial fraud have become much more
widespread
• Cyber-bullying is on the rise – by e-mail, blogs, SMS etc.
• Phishing attacks are becoming more sophisticated –
targeted social engineering
• Malicious code is proliferating and being used for financial
gain
• Hackers are promulgating attacks through armies of
zombie computers – or “BotNets”
Previous
Next
Leading Threats to PC Security
Viruses/Worms
Software programs
designed to invade
your computer, and
copy, damage or
delete your data
Previous
Trojan Horses
Viruses that pretend to
be programs that help
you while destroying
your data and damaging
your computer
Spyware
Software that secretly
watches and records
your online activities
or send you endless
pop-up ads
Next
Four Steps To
Protect Your Computer
Turn on an Internet firewall
Keep the operating system up to date
Install and maintain antivirus software
Install and maintain antispyware software
Previous
Next
Turn on an Internet Firewall
An Internet firewall
is like a moat around
a castle, creating a
barrier between
your computer and
the Internet
Previous
Next
Keep Your
Operating System Updated
•
•
Install all security
updates as soon as
they are available
Automatic updates
provide the best
protection
Previous
Next
Install Antivirus Software
Don’t let it expire
Previous
• Anti-virus software
can detect and
destroy computer
viruses before they
can cause damage
• Just like flu shots, for
anti-virus software to
be effective, you must
keep it up to date
Next
Install And Maintain
Antispyware Software
• Use anti-spyware software so
unknown people cannot lurk
on your computer and
potentially steal your
information
• Spyware may slow your
computer, show pop up ads,
change computer behavior
and track your activity
• Automatic updates often
provide the best protection
Previous
Next
Leading Threats to
Personal Online Safety
Phishing
Spam
E-mail sent by
online criminals that
tries to trick you into
revealing personal
information
Unwanted e-mail,
instant messages,
e-cards, and other
online communication
Hoaxes
E-mail sent by online
criminals that tries to
trick you into giving
them money
Previous
Identity Theft
A crime where con
artists get your
personal information
and access your
cash and/or credit
Next
Take Steps to Help Protect
Yourself
Practice Internet behavior
that lowers your risk
Manage personal information carefully
Use technology to reduce nuisances,
and raise the alarm when appropriate
Previous
Next
Delete Spam without Opening It
•
•
Never reply to spam
Technology can help you
identify spam so you can
delete it
• Many Internet providers
delete it for you
• Sign up to the ACMA
SpamMatters Tool:
www.spam.acma.gov.au
Previous
Next
Be on the Lookout for Scams!
There are signs that can alert you to e-mail
scams
Alarmist messages and threats of
account closures
Promises of big bucks for little effort
Deals that sound too
good to be true
Misspellings and
grammatical errors
Go to: www.scamwatch.gov.au for the
latest known scams by the ACCC.
Previous
Next
Don’t Share Personal
Information
•
•
•
Previous
Delete e-mails that request
personal information
Do not use e-mail
or instant messages to
share personal information
Secure websites with
trusted vendors are
different
Next
Use Strong Passwords
•
•
•
Keep passwords
private and create
ones that are hard
to “crack”
Never share your passwords
with friends or be tricked into
giving them away
Passwords are often “cracked” by high
speed computer programs – not guesswork
Previous
Next
What do Phish look like?
Phishing emails will:
• Ask you to provide
personal details such
as bank account
numbers, dates of
birth etc
• Often provide a link
for you to follow
Previous
Next
Phishing Filters
• Can be built into Browsers e.g. Internet Explorer, MSN /
Windows Live Toolbar (Opt-in required to turn it on)
• Most phishing sites are active for 2 to 3 days, at the most
• 3 “checks” to protect you from phishing
 Compares web site with local list of known legitimate sites
 Scans the site for characteristics common to phishing sites
 Double checks site with online Microsoft service of reported phishing sites
dynamically updated
Two Levels of Warning
and Protection in IE7 Security
Status Bar
Previous
Level 1: Warn
Suspicious Website
Signaled
Level 2: Block
Confirmed Phishing Site
Signaled and Blocked
Next
Phishing Filters
If the site is
flagged as
suspicious
you receive a
warning, so
you can
investigate
and make an
informed
choice.
Previous
Next
Phishing Filters
If the site is flagged
as a known
phishing site, it is
blocked.
You have to choose
to continue to get to
the site.
Previous
Next
More Safe Internet Behavior
Back up your
files regularly
Read website
privacy statements
Previous
Think before
you click
Close pop-ups
using red “X”
Next
Back Up Your Files
• Save to CD, DVD
or flash drive
• Use a Web-based
backup service
Previous
Next
Think Before You Click
•
•
Don’t open e-mail
attachments unless
you know what they
contain and who
sent them
Only download
files from websites
you trust
Previous
Next
Read Privacy Statements
Understand what
you are getting
before you agree to
download or share
your personal
information
Previous
Next
Close Pop-ups Using Red “X”
•
•
Previous
Always use the red
“X” in the corner of
a pop-up screen
Never click “yes,”
“accept” or even
“cancel”, because it
could be a trick that
installs software on
your PC
Next
Leading Online Risks for Youth
Predators
These people use
the Internet to trick
children into meeting
with them in person
Cyber-bullies
File-share Abuse
Exchanging music, video,
and other files with strangers
may be illegal, and can give
them access to your PC or
download viruses or worms
Both children and
adults may use the
Internet to harass or
intimidate other people
Disturbing Content
Invasion of Privacy
If kids fill out online forms, they
may share information you
don’t want strangers to have
about them or your family
Previous
If kids explore unsupervised,
they could stumble upon
images or information you may
not want them exposed to
Next
Take Steps to Help Protect
Young People
Keep personal information private
Talk with kids about what
they do online
Set clear rules for Internet use
Use family safety software
Previous
Next
Reporting SPAM and Scams
• Australian Communications and Media
Authority (ACMA)
www.acma.gov.au
• One click reporting tool for spam. See FAQ’s
and SpamMatters Download tool at:
www.spam.acma.gov.au
• For guidance on reporting scams, go to:
http://www.scamwatch.gov.au/content/index.p
html/tag/reportascam
Previous
Next
Reporting Offensive Material
or Child Abuse Images
• In an emergency (if a child is being abused or in
danger of being abused):
– Dial 000
– Crimestoppers: www.crimestoppers.com.au
• To report suspicious behaviour online (online
sexual exploitation):
https://www.afp.gov.au/online_forms/ocset_form
• For illegal or offensive content:
www.acma.gov.au
Previous
Next
If You Become a Victim of Cybercrime
• Report it to:
– Your state or territory police agency (if necessary,
they will refer it to the Federal authorities)
– Crimestoppers: www.crimestoppers.com.au
• Preserve information stored in your computer as evidence
(and save to CD or flash drive).
• Keep a log of all online sessions or print them out.
• Save any annoying or threatening email.
• Follow-up in writing.
• Change all of your passwords.
Previous
Next
Recap: Internet Safety Protection
Basics
Your children
Yourself
Your PCs
1. Talk with your
children about
what they
do online
2. Teach them to
keep personal
information private
3. Set clear
guidelines for
Internet use
4. Use family
safety software
1. Practice Internet
behavior that lowers
risk
2. Manage your personal
information carefully
3. Use technology to
reduce nuisances,
and raise the alarm
when appropriate
4. Stay alert and think
before you click
1. Turn on an
Internet firewall
2. Keep your operating
system up to date
3. Install and maintain
antivirus software
4. Install and maintain
antispyware software
5. Use only trusted sites
Previous
Next
For More Information
www.staysmartonline.gov.au
www.microsoft.com/athome/security
http://international.isafe.org
www.ahtcc.gov.au
www.thinkuknow.com.au
www.netalert.com.au
www.staysafe.org/unicef
www.acma.gov.au
www.virtualglobaltaskforce.com
www.crimestoppers.com.au
Previous
Next