SlideShare uma empresa Scribd logo
1 de 31
CLASS 7
Introduction to Computers
Input and output
Name these peripherals:
a b c d e
f g h i j
Input and output
Name these peripherals:
joystick printer earphones keyboard scanner
mouse microphone speakers monitor barcode reader
Input and output
Now put the peripherals into “input” and “output” devices:
a b c d e
f g h i j
Input and output
input devices output devices
QR questions
What does “QR” mean?
When were QR codes invented? By what company?
Which holds more information, barcodes or QR codes?
Which direction are QR codes “read” ?
Which of these is the “correct” direction for a QR code?
a) b) c) d)
QR questions
What does “QR” mean?
Quick Response
When were QR codes invented? By what company?
QR codes were invented in 1994 by Toyota.
Which holds more information, barcodes or QR codes?
QR codes kick barcode butt.
Which direction are QR codes “read” ?
Up and down (barcodes are read side to side).
Which of these is the “correct” direction for a QR code?
a) b) c) d)
Internet security
There are threats to anyone who uses a computer.
Some of these include:
Viruses / malware
Online Scams
Phishing
Social Network Hacking
Credit Card Fraud
Let’s take a look at each type…
THREATS AND ISSUES WHEN YOU USE THE INTERNET
Being careful online
Internet
Security
The internet is such a
big part of your lives
that we can forget that
it even though it is
convenient, it can also
be dangerous.
You need to be careful.
Today I will introduce
some of the most
common threats ( 威
脅 ).
Sources:
http://www.slideshare.net/TechSoupGlobal/security-basics-webinar
http://en.wikipedia.org/
Malware
Phishing
Social Network Hacking
Malware
Most of you have hear d of a
computer “virus” before…
Viruses are actually a kind
of Malware ( 惡意軟體 )
Virus - that can spread from
computer to computer by itself.
Trojan - a hidden program (for
example in free / illegal software)
Bot - a robot network
which can be controlled
outside the computer.
Keystroke logger
(keylogger): a program
that records what you
type into the computer.
Virus
Some viruses can be
harmless, but others
can slow down or even
ruin a computer. Many
people don’t even know
that their computer has
a virus at all.
A computer virus is a computer
program that can spread from one
computer to another.
A virus can spread from one
computer to another using code,
for instance because a user sent it
over the Internet, or carried it on
a memory device such as
a CD, DVD, or USB drive.
Viruses that spread them-
selves online or across a
network are called worms.
Trojans
The term “Trojan” comes
from the Greek story about
the Trojan Horse from a
very old story (The Iliad).
In the story, Greeks left a
big wooden horse to the
Trojans, people they were at
war against. After the
Trojans brought the horse
into the city, the Greeks who
were hidden inside snuck
out and opened the city
gates to let the Greek army
come in and destroy the city
of Troy.
A Trojan horse, or Trojan, is
software that hides inside
software and then steals
information or hurts the user’s
computer.
Some things trojans can do to
your computer:
 Make your computer a “zombie”
 Download or upload files
 Steal your information
 Watch your screen
 Crash your computer
 Record your keystrokes
Bots, botnets
and zombies!
Bots, or internet robots,
didn’t start out as bad - and
not all of them are. For
example, Google uses bots
to get for their search
results.
What we are talking about
here are botnets, which take
over computers and become
an army of computers doing
what they are told, or
zombies, by an outside
program.
One kind of malware, usually
brought into a computer through
a trojan, is a bot. Here’s one of the
way hackers can use bots:
Bots, botnets
and zombies!
Bots, or internet robots,
didn’t start out as bad - and
not all of them are. For
example, Google uses bots
to get for their search
results.
What we are talking about
here are botnets, which take
over computers and become
an army of computers doing
what they are told, or
zombies, by an outside
program.
Botnets are bad. Really bad. They can
be used to send spam, send or
download files or even more malware,
and they can even be used for
Distributed Denial of Service (DDoS)
attacks, where so many different
computers are told to go to the same
website all
at the same
time that
the website
crashes.
Keyloggers
Keyloggers are actually
quite easy to write. Usually
keyloggers are put together
with other types of
malware.
Keyloggers simply record whatever the
user is typing on their keyboard.
Some keyloggers also record what is
on the screen at the same time. Here’s
an example of a keylogger file that
also shows what form the user was
typing in (form grabbing):
Keyloggers
Keyloggers are some of the worst
kinds of malware. Spies love
keyloggers, and countries often
try to sneak them onto
computers. Sometimes people use
them to spy on each other - for
example, maybe a husband thinks
his wife has a secret boyfriend…
Criminals use keyloggers to try to
get usernames and
passwords for bank
information.
Phishing
While phishing isn’t a
from of malware (it’s
more like tricking you
and stealing), it’s
becoming more and
more common, and
more dangerous.
Phishing is a way of tricking people
into giving their information to what
they think is site they can trust.
Here’s an example:
The link in the email takes you to a
login page that asks you to type in
your gmail information.
Look at the domain name!
More Phishing
Phishing has become a
real problem in recent
years, and social media
sites are one of their
favorite targets.
Here’s another example of an
email that takes you to a phishing
site:
Here’s another phishing example:
And a “friend phishing” example:
Who is Sophie Ng?
Let’s see if Google knows her:
Take one of her profile pictures and put it into Google images.
Hey, that’s a different
name! What’s going on?
After Google searching…
After uploading a couple of
“Sophie” pictures to Google and
getting several different Facebook
profiles, her pictures appeared on
a different site, where she was listed as “Cute college girl of
the day for October 22, 2010”
It turns out that people use her (and other college girl photos)
to try to get people to accept her as a Facebook friend. Once
she has been accepted, the hackers can get information on
you and your friends, or get other people to click on links that
will download malware to their computers.
How does this
happen?
Now that we know what
some types of malware
are called, we should
ask, “How do end up
with malware?”
Dangerous links in email, IM,
Twitter messages, Facebook and
YouTube comments
Infected devices: USB sticks, disks,
laptops, digital photo frames
Online auctions, online dating
Phishing attacks
Fake pop-up alerts
Why?
Why are people doing
this? What’s the point?
Underground cybercrime economy
Bigger business than international
drug trade
Hackers with computer skills and
desire for money
Organized online buy/sell of stolen
data
Low risk, high reward - many
hackers can attack anywhere in the
world from their own countries, and
most countries don’t have strong
laws against hacking
Just one case:
Zeus
Zeus is a trojan that steals banking
information
using keylogging and form
grabbing.
In June 2009, a security company
discovered that Zeus had hacked
74,000 FTP accounts on websites of
such companies as the Bank of
America, NASA, , ABC, Oracle,
Play.com, Cisco, Amazon,
and BusinessWeek.
Zeus
Zeus botnets are thought to include
millions of computers (around 3.6
million in the United States).
By October 28, 2009 over 1,500,000
phishing messages were sent
on Facebook to spread the Zeus
trojan.
November 14–15, 2009 Zeus spread
via e-mails saying it was from a
telephone company. A total of
9,000,000 of these phishing e-mails
were sent.
Zeus
It is still active today. In 2010, an
internet security company, wrote that
the credit cards of more than 15
unnamed US banks have been stolen
using the Zeus malware.
So far, over US $70,000,000 has been
stolen from people and companies
with Zeus.
More than 90 criminals using Zeus
were arrested in the US, England and
Ukraine ( 烏克蘭 ).
In May, 2011, the code of Zeus was put
online for anyone to use and change.
So what can
you do?
How can you protect
yourself from these
kinds of online threats?
Don’t open mail attachments from
people you don’t know.
Try not to click on links inside
emails - if you get an email telling
you to update your information, go
to the website yourself - don’t use
their link.
Get a good anti-virus program,
spyware remover, and firewall.
There are free programs available
online, such as avast!
antivirus, Grisoft's AVG, Microsoft
Anti-SpywareWebroot.
So what can
you do?
How can you protect
yourself from these
kinds of online threats?
Don’t expect something for
nothing.
Don’t download pirated software, or
“keygens” - software that will give you
a license number for software.
Don’t friend people on Facebook that
you don’t know - even if you think
they’re attractive!
Carefully check where your email is
coming from - always check the
domain name of the sender.
OK Now:
Log into Facebook and
check through your
friends. Do you really
know them?
 Go to Facebook. If there are people in your friends
list that you don’t really know, put the link to their
picture into Google images and see if they are
really who they say they are.
 Check your email. Are there any emails asking you
to update your information? If so, check the
domain name. Is it really the website it says it is?
 Update your anti-virus software and do a full
system scan of your computer at least once a
week. Change your passwords every 3-4 months
 Think! Be skeptical ( 懷疑論的 ) about what
people are sending you, and be careful!

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Online safety, security, and ethics
Online safety, security, and ethicsOnline safety, security, and ethics
Online safety, security, and ethics
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and Safety
 
Malware
MalwareMalware
Malware
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
Internet Security in Web 2.0
Internet Security in Web 2.0 Internet Security in Web 2.0
Internet Security in Web 2.0
 
A to z of Cyber Crime
A to z of Cyber CrimeA to z of Cyber Crime
A to z of Cyber Crime
 
Malwares
MalwaresMalwares
Malwares
 
Malwares
MalwaresMalwares
Malwares
 
Safety, Security and Ethics
Safety, Security and EthicsSafety, Security and Ethics
Safety, Security and Ethics
 
Security Pp Cis
Security Pp CisSecurity Pp Cis
Security Pp Cis
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Firewall
FirewallFirewall
Firewall
 
Ten Important Rules
Ten Important RulesTen Important Rules
Ten Important Rules
 
MALWARE
MALWAREMALWARE
MALWARE
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
 
Virus trojanworm
Virus trojanwormVirus trojanworm
Virus trojanworm
 
Internet threat
Internet threatInternet threat
Internet threat
 

Destaque

Summary. “DO SPANISH JOURNALISTS CARE ABOUT ASSET MANAGEMENT COMPANIES INFORM...
Summary. “DO SPANISH JOURNALISTS CARE ABOUT ASSET MANAGEMENT COMPANIES INFORM...Summary. “DO SPANISH JOURNALISTS CARE ABOUT ASSET MANAGEMENT COMPANIES INFORM...
Summary. “DO SPANISH JOURNALISTS CARE ABOUT ASSET MANAGEMENT COMPANIES INFORM...lau_db
 
Photos de Paris - France
Photos de Paris - France Photos de Paris - France
Photos de Paris - France sioalex
 
Datafesta 20141004_05
Datafesta 20141004_05Datafesta 20141004_05
Datafesta 20141004_05博三 太田
 
Don't be an altruistic angel. Be open about what is in it for you.
Don't be an altruistic angel.  Be open about what is in it for you.Don't be an altruistic angel.  Be open about what is in it for you.
Don't be an altruistic angel. Be open about what is in it for you.Wayne Dunn
 
Rietveld Targeting young adults young households in Central Uganda - where is...
Rietveld Targeting young adults young households in Central Uganda - where is...Rietveld Targeting young adults young households in Central Uganda - where is...
Rietveld Targeting young adults young households in Central Uganda - where is...futureagricultures
 
Java swing tips
Java swing tipsJava swing tips
Java swing tipsTuan Ngo
 
Inanimate Alice Episode 5 by Louie & Luke
Inanimate Alice Episode 5 by Louie & LukeInanimate Alice Episode 5 by Louie & Luke
Inanimate Alice Episode 5 by Louie & LukeMrsPrentice
 
Inanimate Alice Episode 5 by Ben & George
Inanimate Alice Episode 5 by Ben & GeorgeInanimate Alice Episode 5 by Ben & George
Inanimate Alice Episode 5 by Ben & GeorgeMrsPrentice
 
Inanimate Alice episode 5 by Daniel & Matteo
Inanimate Alice episode 5 by Daniel & MatteoInanimate Alice episode 5 by Daniel & Matteo
Inanimate Alice episode 5 by Daniel & MatteoMrsPrentice
 
Shifts in the music industry
Shifts in the music industryShifts in the music industry
Shifts in the music industrysadieolen
 
Xpflow training ppt_update_may 2007-051807
Xpflow training ppt_update_may 2007-051807Xpflow training ppt_update_may 2007-051807
Xpflow training ppt_update_may 2007-051807Debjani Roy
 
Elements of Art - nf
Elements of Art - nfElements of Art - nf
Elements of Art - nfmindartpower
 
Compare mysql5.1.50 mysql5.5.8
Compare mysql5.1.50 mysql5.5.8Compare mysql5.1.50 mysql5.5.8
Compare mysql5.1.50 mysql5.5.8Philip Zhong
 
Plasticine, natural materials oct 2012
Plasticine, natural materials oct 2012Plasticine, natural materials oct 2012
Plasticine, natural materials oct 2012balada65
 
Englekirk News
Englekirk NewsEnglekirk News
Englekirk Newskimtanouye
 

Destaque (20)

Summary. “DO SPANISH JOURNALISTS CARE ABOUT ASSET MANAGEMENT COMPANIES INFORM...
Summary. “DO SPANISH JOURNALISTS CARE ABOUT ASSET MANAGEMENT COMPANIES INFORM...Summary. “DO SPANISH JOURNALISTS CARE ABOUT ASSET MANAGEMENT COMPANIES INFORM...
Summary. “DO SPANISH JOURNALISTS CARE ABOUT ASSET MANAGEMENT COMPANIES INFORM...
 
270611%20bezoek%20roosendaal[1]
270611%20bezoek%20roosendaal[1]270611%20bezoek%20roosendaal[1]
270611%20bezoek%20roosendaal[1]
 
Photos de Paris - France
Photos de Paris - France Photos de Paris - France
Photos de Paris - France
 
Pantheon basics
Pantheon basicsPantheon basics
Pantheon basics
 
Datafesta 20141004_05
Datafesta 20141004_05Datafesta 20141004_05
Datafesta 20141004_05
 
Don't be an altruistic angel. Be open about what is in it for you.
Don't be an altruistic angel.  Be open about what is in it for you.Don't be an altruistic angel.  Be open about what is in it for you.
Don't be an altruistic angel. Be open about what is in it for you.
 
Rietveld Targeting young adults young households in Central Uganda - where is...
Rietveld Targeting young adults young households in Central Uganda - where is...Rietveld Targeting young adults young households in Central Uganda - where is...
Rietveld Targeting young adults young households in Central Uganda - where is...
 
Java swing tips
Java swing tipsJava swing tips
Java swing tips
 
Proses Start-Up Komputer
Proses Start-Up KomputerProses Start-Up Komputer
Proses Start-Up Komputer
 
Inanimate Alice Episode 5 by Louie & Luke
Inanimate Alice Episode 5 by Louie & LukeInanimate Alice Episode 5 by Louie & Luke
Inanimate Alice Episode 5 by Louie & Luke
 
Inanimate Alice Episode 5 by Ben & George
Inanimate Alice Episode 5 by Ben & GeorgeInanimate Alice Episode 5 by Ben & George
Inanimate Alice Episode 5 by Ben & George
 
Inanimate Alice episode 5 by Daniel & Matteo
Inanimate Alice episode 5 by Daniel & MatteoInanimate Alice episode 5 by Daniel & Matteo
Inanimate Alice episode 5 by Daniel & Matteo
 
Shifts in the music industry
Shifts in the music industryShifts in the music industry
Shifts in the music industry
 
Xpflow training ppt_update_may 2007-051807
Xpflow training ppt_update_may 2007-051807Xpflow training ppt_update_may 2007-051807
Xpflow training ppt_update_may 2007-051807
 
Elements of Art - nf
Elements of Art - nfElements of Art - nf
Elements of Art - nf
 
Compare mysql5.1.50 mysql5.5.8
Compare mysql5.1.50 mysql5.5.8Compare mysql5.1.50 mysql5.5.8
Compare mysql5.1.50 mysql5.5.8
 
Plasticine, natural materials oct 2012
Plasticine, natural materials oct 2012Plasticine, natural materials oct 2012
Plasticine, natural materials oct 2012
 
Inheritance
InheritanceInheritance
Inheritance
 
Englekirk News
Englekirk NewsEnglekirk News
Englekirk News
 
Bab i pendahuluan
Bab i pendahuluanBab i pendahuluan
Bab i pendahuluan
 

Semelhante a C 7

Multimedia01
Multimedia01Multimedia01
Multimedia01Les Davy
 
Malware and malicious programs
Malware and malicious programsMalware and malicious programs
Malware and malicious programsAmmar Hasayen
 
Ransomware hostage rescue manual
Ransomware hostage rescue manualRansomware hostage rescue manual
Ransomware hostage rescue manualRoel Palmaers
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security9784
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security riskK. A. M Lutfullah
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer securityWritingHubUK
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGudipudiDayanandam
 
How spam change the world
How spam change the world How spam change the world
How spam change the world Farhaan Bukhsh
 
Thane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationThane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationJeff Zahn
 
Dark side presentation lwhippedtc515
Dark side presentation lwhippedtc515Dark side presentation lwhippedtc515
Dark side presentation lwhippedtc515lisawhipp
 
Empowerment lesson 2.ppt
Empowerment lesson 2.pptEmpowerment lesson 2.ppt
Empowerment lesson 2.pptAndrew_Braza
 
Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spywaremissstevenson01
 
Cyber crime defination, meaning and history
Cyber crime defination, meaning and historyCyber crime defination, meaning and history
Cyber crime defination, meaning and historygururaj lulkarni
 

Semelhante a C 7 (20)

C 7
C 7C 7
C 7
 
Multimedia01
Multimedia01Multimedia01
Multimedia01
 
Malware and malicious programs
Malware and malicious programsMalware and malicious programs
Malware and malicious programs
 
Ransomware hostage rescue manual
Ransomware hostage rescue manualRansomware hostage rescue manual
Ransomware hostage rescue manual
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
 
Hacking And Virus.pptx
Hacking And Virus.pptxHacking And Virus.pptx
Hacking And Virus.pptx
 
How spam change the world
How spam change the world How spam change the world
How spam change the world
 
Thane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationThane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentation
 
Dark side presentation lwhippedtc515
Dark side presentation lwhippedtc515Dark side presentation lwhippedtc515
Dark side presentation lwhippedtc515
 
Empowerment lesson 2.ppt
Empowerment lesson 2.pptEmpowerment lesson 2.ppt
Empowerment lesson 2.ppt
 
Security Primer
Security PrimerSecurity Primer
Security Primer
 
Cybercrime 1
Cybercrime 1Cybercrime 1
Cybercrime 1
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
The malware (r)evolution
The malware (r)evolutionThe malware (r)evolution
The malware (r)evolution
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spyware
 
Cyber crime defination, meaning and history
Cyber crime defination, meaning and historyCyber crime defination, meaning and history
Cyber crime defination, meaning and history
 
My presentation
My presentationMy presentation
My presentation
 

Mais de Les Davy

1051 Tourism English Unit 3
1051 Tourism English Unit 31051 Tourism English Unit 3
1051 Tourism English Unit 3Les Davy
 
1051 Tourism English Unit 4
1051 Tourism English Unit 41051 Tourism English Unit 4
1051 Tourism English Unit 4Les Davy
 
1051 Tourism English class 4 week 5
1051 Tourism English class 4 week 51051 Tourism English class 4 week 5
1051 Tourism English class 4 week 5Les Davy
 
1051 Tourism English Week 4
1051 Tourism English Week 41051 Tourism English Week 4
1051 Tourism English Week 4Les Davy
 
Vocab colors
Vocab   colorsVocab   colors
Vocab colorsLes Davy
 
Tourism English 15
Tourism English 15Tourism English 15
Tourism English 15Les Davy
 
Shopping items
Shopping itemsShopping items
Shopping itemsLes Davy
 
Tourism English 14
Tourism English 14Tourism English 14
Tourism English 14Les Davy
 
Advertising Techniques 3
Advertising Techniques 3Advertising Techniques 3
Advertising Techniques 3Les Davy
 
Tourism English 13
Tourism English 13Tourism English 13
Tourism English 13Les Davy
 
Our scavenger hunt
Our scavenger huntOur scavenger hunt
Our scavenger huntLes Davy
 
Guess the foods
Guess the foodsGuess the foods
Guess the foodsLes Davy
 
Tourism English 9
Tourism English 9Tourism English 9
Tourism English 9Les Davy
 
Tourism English 10
Tourism English 10Tourism English 10
Tourism English 10Les Davy
 
Tourism english 9
Tourism english 9Tourism english 9
Tourism english 9Les Davy
 
Tourism english 8
Tourism english 8Tourism english 8
Tourism english 8Les Davy
 
Tourism English 7
Tourism English 7Tourism English 7
Tourism English 7Les Davy
 
Multimedia06
Multimedia06Multimedia06
Multimedia06Les Davy
 
Tourism english 5
Tourism english 5Tourism english 5
Tourism english 5Les Davy
 
Multimedia05
Multimedia05Multimedia05
Multimedia05Les Davy
 

Mais de Les Davy (20)

1051 Tourism English Unit 3
1051 Tourism English Unit 31051 Tourism English Unit 3
1051 Tourism English Unit 3
 
1051 Tourism English Unit 4
1051 Tourism English Unit 41051 Tourism English Unit 4
1051 Tourism English Unit 4
 
1051 Tourism English class 4 week 5
1051 Tourism English class 4 week 51051 Tourism English class 4 week 5
1051 Tourism English class 4 week 5
 
1051 Tourism English Week 4
1051 Tourism English Week 41051 Tourism English Week 4
1051 Tourism English Week 4
 
Vocab colors
Vocab   colorsVocab   colors
Vocab colors
 
Tourism English 15
Tourism English 15Tourism English 15
Tourism English 15
 
Shopping items
Shopping itemsShopping items
Shopping items
 
Tourism English 14
Tourism English 14Tourism English 14
Tourism English 14
 
Advertising Techniques 3
Advertising Techniques 3Advertising Techniques 3
Advertising Techniques 3
 
Tourism English 13
Tourism English 13Tourism English 13
Tourism English 13
 
Our scavenger hunt
Our scavenger huntOur scavenger hunt
Our scavenger hunt
 
Guess the foods
Guess the foodsGuess the foods
Guess the foods
 
Tourism English 9
Tourism English 9Tourism English 9
Tourism English 9
 
Tourism English 10
Tourism English 10Tourism English 10
Tourism English 10
 
Tourism english 9
Tourism english 9Tourism english 9
Tourism english 9
 
Tourism english 8
Tourism english 8Tourism english 8
Tourism english 8
 
Tourism English 7
Tourism English 7Tourism English 7
Tourism English 7
 
Multimedia06
Multimedia06Multimedia06
Multimedia06
 
Tourism english 5
Tourism english 5Tourism english 5
Tourism english 5
 
Multimedia05
Multimedia05Multimedia05
Multimedia05
 

Último

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 

Último (20)

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 

C 7

  • 2. Input and output Name these peripherals: a b c d e f g h i j
  • 3. Input and output Name these peripherals: joystick printer earphones keyboard scanner mouse microphone speakers monitor barcode reader
  • 4. Input and output Now put the peripherals into “input” and “output” devices: a b c d e f g h i j
  • 5. Input and output input devices output devices
  • 6. QR questions What does “QR” mean? When were QR codes invented? By what company? Which holds more information, barcodes or QR codes? Which direction are QR codes “read” ? Which of these is the “correct” direction for a QR code? a) b) c) d)
  • 7. QR questions What does “QR” mean? Quick Response When were QR codes invented? By what company? QR codes were invented in 1994 by Toyota. Which holds more information, barcodes or QR codes? QR codes kick barcode butt. Which direction are QR codes “read” ? Up and down (barcodes are read side to side). Which of these is the “correct” direction for a QR code? a) b) c) d)
  • 8. Internet security There are threats to anyone who uses a computer. Some of these include: Viruses / malware Online Scams Phishing Social Network Hacking Credit Card Fraud Let’s take a look at each type…
  • 9. THREATS AND ISSUES WHEN YOU USE THE INTERNET Being careful online
  • 10. Internet Security The internet is such a big part of your lives that we can forget that it even though it is convenient, it can also be dangerous. You need to be careful. Today I will introduce some of the most common threats ( 威 脅 ). Sources: http://www.slideshare.net/TechSoupGlobal/security-basics-webinar http://en.wikipedia.org/ Malware Phishing Social Network Hacking
  • 11. Malware Most of you have hear d of a computer “virus” before… Viruses are actually a kind of Malware ( 惡意軟體 ) Virus - that can spread from computer to computer by itself. Trojan - a hidden program (for example in free / illegal software) Bot - a robot network which can be controlled outside the computer. Keystroke logger (keylogger): a program that records what you type into the computer.
  • 12. Virus Some viruses can be harmless, but others can slow down or even ruin a computer. Many people don’t even know that their computer has a virus at all. A computer virus is a computer program that can spread from one computer to another. A virus can spread from one computer to another using code, for instance because a user sent it over the Internet, or carried it on a memory device such as a CD, DVD, or USB drive. Viruses that spread them- selves online or across a network are called worms.
  • 13. Trojans The term “Trojan” comes from the Greek story about the Trojan Horse from a very old story (The Iliad). In the story, Greeks left a big wooden horse to the Trojans, people they were at war against. After the Trojans brought the horse into the city, the Greeks who were hidden inside snuck out and opened the city gates to let the Greek army come in and destroy the city of Troy. A Trojan horse, or Trojan, is software that hides inside software and then steals information or hurts the user’s computer. Some things trojans can do to your computer:  Make your computer a “zombie”  Download or upload files  Steal your information  Watch your screen  Crash your computer  Record your keystrokes
  • 14. Bots, botnets and zombies! Bots, or internet robots, didn’t start out as bad - and not all of them are. For example, Google uses bots to get for their search results. What we are talking about here are botnets, which take over computers and become an army of computers doing what they are told, or zombies, by an outside program. One kind of malware, usually brought into a computer through a trojan, is a bot. Here’s one of the way hackers can use bots:
  • 15. Bots, botnets and zombies! Bots, or internet robots, didn’t start out as bad - and not all of them are. For example, Google uses bots to get for their search results. What we are talking about here are botnets, which take over computers and become an army of computers doing what they are told, or zombies, by an outside program. Botnets are bad. Really bad. They can be used to send spam, send or download files or even more malware, and they can even be used for Distributed Denial of Service (DDoS) attacks, where so many different computers are told to go to the same website all at the same time that the website crashes.
  • 16. Keyloggers Keyloggers are actually quite easy to write. Usually keyloggers are put together with other types of malware. Keyloggers simply record whatever the user is typing on their keyboard. Some keyloggers also record what is on the screen at the same time. Here’s an example of a keylogger file that also shows what form the user was typing in (form grabbing):
  • 17. Keyloggers Keyloggers are some of the worst kinds of malware. Spies love keyloggers, and countries often try to sneak them onto computers. Sometimes people use them to spy on each other - for example, maybe a husband thinks his wife has a secret boyfriend… Criminals use keyloggers to try to get usernames and passwords for bank information.
  • 18. Phishing While phishing isn’t a from of malware (it’s more like tricking you and stealing), it’s becoming more and more common, and more dangerous. Phishing is a way of tricking people into giving their information to what they think is site they can trust. Here’s an example: The link in the email takes you to a login page that asks you to type in your gmail information. Look at the domain name!
  • 19. More Phishing Phishing has become a real problem in recent years, and social media sites are one of their favorite targets. Here’s another example of an email that takes you to a phishing site:
  • 21. And a “friend phishing” example:
  • 22. Who is Sophie Ng? Let’s see if Google knows her: Take one of her profile pictures and put it into Google images. Hey, that’s a different name! What’s going on?
  • 23. After Google searching… After uploading a couple of “Sophie” pictures to Google and getting several different Facebook profiles, her pictures appeared on a different site, where she was listed as “Cute college girl of the day for October 22, 2010” It turns out that people use her (and other college girl photos) to try to get people to accept her as a Facebook friend. Once she has been accepted, the hackers can get information on you and your friends, or get other people to click on links that will download malware to their computers.
  • 24. How does this happen? Now that we know what some types of malware are called, we should ask, “How do end up with malware?” Dangerous links in email, IM, Twitter messages, Facebook and YouTube comments Infected devices: USB sticks, disks, laptops, digital photo frames Online auctions, online dating Phishing attacks Fake pop-up alerts
  • 25. Why? Why are people doing this? What’s the point? Underground cybercrime economy Bigger business than international drug trade Hackers with computer skills and desire for money Organized online buy/sell of stolen data Low risk, high reward - many hackers can attack anywhere in the world from their own countries, and most countries don’t have strong laws against hacking
  • 26. Just one case: Zeus Zeus is a trojan that steals banking information using keylogging and form grabbing. In June 2009, a security company discovered that Zeus had hacked 74,000 FTP accounts on websites of such companies as the Bank of America, NASA, , ABC, Oracle, Play.com, Cisco, Amazon, and BusinessWeek.
  • 27. Zeus Zeus botnets are thought to include millions of computers (around 3.6 million in the United States). By October 28, 2009 over 1,500,000 phishing messages were sent on Facebook to spread the Zeus trojan. November 14–15, 2009 Zeus spread via e-mails saying it was from a telephone company. A total of 9,000,000 of these phishing e-mails were sent.
  • 28. Zeus It is still active today. In 2010, an internet security company, wrote that the credit cards of more than 15 unnamed US banks have been stolen using the Zeus malware. So far, over US $70,000,000 has been stolen from people and companies with Zeus. More than 90 criminals using Zeus were arrested in the US, England and Ukraine ( 烏克蘭 ). In May, 2011, the code of Zeus was put online for anyone to use and change.
  • 29. So what can you do? How can you protect yourself from these kinds of online threats? Don’t open mail attachments from people you don’t know. Try not to click on links inside emails - if you get an email telling you to update your information, go to the website yourself - don’t use their link. Get a good anti-virus program, spyware remover, and firewall. There are free programs available online, such as avast! antivirus, Grisoft's AVG, Microsoft Anti-SpywareWebroot.
  • 30. So what can you do? How can you protect yourself from these kinds of online threats? Don’t expect something for nothing. Don’t download pirated software, or “keygens” - software that will give you a license number for software. Don’t friend people on Facebook that you don’t know - even if you think they’re attractive! Carefully check where your email is coming from - always check the domain name of the sender.
  • 31. OK Now: Log into Facebook and check through your friends. Do you really know them?  Go to Facebook. If there are people in your friends list that you don’t really know, put the link to their picture into Google images and see if they are really who they say they are.  Check your email. Are there any emails asking you to update your information? If so, check the domain name. Is it really the website it says it is?  Update your anti-virus software and do a full system scan of your computer at least once a week. Change your passwords every 3-4 months  Think! Be skeptical ( 懷疑論的 ) about what people are sending you, and be careful!