Click here to start
NextPrevious
Threat Trends in Australia• One in five children (10 to 17 years old) receive unwanted
sexual solicitations online
• Identity theft and financial fraud have become much more widespread
• Cyber-bullying is on the rise – by e-mail, blogs, SMS etc.
• Phishing attacks are becoming more sophisticated – targeted social engineering
• Malicious code is proliferating and being used for financial gain
• Hackers are promulgating attacks through armies of zombie computers – or “BotNets”
NextPrevious
Viruses/WormsSoftware programs designed to invade your computer, and copy, damage or delete your data
Trojan HorsesViruses that pretend to be programs that help you while destroying your data and damaging your computer
SpywareSoftware that secretly watches and records your online activities or send you endless pop-up ads
Leading Threats to PC Security
NextPrevious
Turn on an Internet firewall
Keep the operating system up to date
Install and maintain antivirus software
Install and maintain antispyware software
Four Steps To Protect Your Computer
NextPrevious
Turn on an Internet Firewall
An Internet firewall is like a moat around a castle, creating a barrier between your computer and the Internet
NextPrevious
Keep Your Operating System Updated
• Install all security updates as soon as they are available
• Automatic updates provide the best protection
NextPrevious
Install Antivirus Software
• Anti-virus software can detect and destroy computer viruses before they can cause damage
• Just like flu shots, for anti-virus software to be effective, you must keep it up to date
Don’t let it expire
NextPrevious
Install And Maintain Antispyware Software
• Use anti-spyware software so unknown people cannot lurk
on your computer and potentially steal your information
• Spyware may slow your computer, show pop up ads,
change computer behavior and track your activity
• Automatic updates often provide the best protection
NextPrevious
SpamUnwanted e-mail, instant messages, e-cards, and other online communication
PhishingE-mail sent by online criminals that tries to trick you into revealing personal information
Identity TheftA crime where con artists get your personal information and access your cash and/or credit
HoaxesE-mail sent by online criminals that tries to trick you into giving them money
Leading Threats to Personal Online Safety
NextPrevious
Take Steps to Help Protect Yourself
Practice Internet behavior that lowers your risk
Manage personal information carefully
Use technology to reduce nuisances, and raise the alarm when appropriate
NextPrevious
Delete Spam without Opening It
• Never reply to spam
• Technology can help you identify spam so you can delete it
• Many Internet providers delete it for you
• Sign up to the ACMA SpamMatters Tool:
www.spam.acma.gov.au
NextPrevious
Be on the Lookout for Scams! There are signs that can alert you to e-mail
scamsAlarmist messages and threats of account closures
Promises of big bucks for little effort
Deals that sound too good to be true
Misspellings and grammatical errors
Go to: www.scamwatch.gov.au for the latest known scams by the ACCC.
NextPrevious
Don’t Share Personal Information
• Delete e-mails that request personal information
• Do not use e-mail or instant messages to share personal information
• Secure websites with trusted vendors are different
NextPrevious
Use Strong Passwords• Keep passwords
private and create ones that are hard to “crack”
• Never share your passwords
with friends or be tricked into giving them away
• Passwords are often “cracked” by high speed computer programs – not guesswork
NextPrevious
What do Phish look like?Phishing emails will:
• Ask you to provide personal details such as bank account numbers, dates of birth etc
• Often provide a link for you to follow
NextPrevious
Phishing Filters
• Can be built into Browsers e.g. Internet Explorer, MSN / Windows Live Toolbar (Opt-in required to turn it on)
• Most phishing sites are active for 2 to 3 days, at the most
• 3 “checks” to protect you from phishing Compares web site with local list of known legitimate sites
Scans the site for characteristics common to phishing sites
Double checks site with online Microsoft service of reported phishing sites dynamically updated
Level 1: Warn Suspicious Website
Signaled
Level 2: Block Confirmed Phishing Site
Signaled and Blocked
Two Levels of Warning Two Levels of Warning and Protection in IE7 Security and Protection in IE7 Security
Status BarStatus Bar
NextPrevious
Phishing Filters
If the site is flagged as suspicious you receive a warning, so you can investigate and make an informed choice.
NextPrevious
Phishing Filters
If the site is flagged as a known phishing site, it is blocked.
You have to choose to continue to get to the site.
NextPrevious
More Safe Internet Behavior
Back up your files regularly
Think before you click
Read website privacy statements
Close pop-ups using red “X”
NextPrevious
Back Up Your Files
• Save to CD, DVD or flash drive
• Use a Web-based backup service
NextPrevious
Think Before You Click
• Don’t open e-mail attachments unless you know what they contain and who sent them
• Only download files from websites you trust
NextPrevious
Read Privacy Statements
Understand what you are getting before you agree to download or share your personal information
NextPrevious
Close Pop-ups Using Red “X”
• Always use the red “X” in the corner of a pop-up screen
• Never click “yes,” “accept” or even “cancel”, because it could be a trick that installs software on your PC
NextPrevious
PredatorsThese people use the Internet to trick children into meeting with them in person
File-share AbuseExchanging music, video, and other files with strangers may be illegal, and can give them access to your PC or download viruses or worms
Cyber-bullies Both children and adults may use the Internet to harass or intimidate other people
Invasion of PrivacyIf kids fill out online forms, they may share information you don’t want strangers to have about them or your family
Disturbing ContentIf kids explore unsupervised, they could stumble upon images or information you may not want them exposed to
Leading Online Risks for Youth
NextPrevious
Take Steps to Help Protect Young People
Talk with kids about what they do online
Keep personal information private
Set clear rules for Internet use
Use family safety software
NextPrevious
Reporting SPAM and Scams
• Australian Communications and Media Authority (ACMA)
www.acma.gov.au• One click reporting tool for spam. See FAQ’s
and SpamMatters Download tool at:
www.spam.acma.gov.au• For guidance on reporting scams, go to:
http://www.scamwatch.gov.au/content/index.phtml/tag/reportascam
NextPrevious
Reporting Offensive Material or Child Abuse Images
• In an emergency (if a child is being abused or in danger of being abused):– Dial 000– Crimestoppers: www.crimestoppers.com.au
• To report suspicious behaviour online (online sexual exploitation):
https://www.afp.gov.au/online_forms/ocset_form• For illegal or offensive content:
www.acma.gov.au
NextPrevious
If You Become a Victim of Cybercrime
• Report it to: – Your state or territory police agency (if necessary,
they will refer it to the Federal authorities)– Crimestoppers: www.crimestoppers.com.au
• Preserve information stored in your computer as evidence (and save to CD or flash drive).
• Keep a log of all online sessions or print them out. • Save any annoying or threatening email.• Follow-up in writing.• Change all of your passwords.
NextPrevious
Recap: Internet Safety Protection Basics
Your PCs1. Turn on an
Internet firewall
2. Keep your operating system up to date
3. Install and maintain antivirus software
4. Install and maintain antispyware software
5. Use only trusted sites
Yourself1. Practice Internet
behavior that lowers risk
2. Manage your personal information carefully
3. Use technology to reduce nuisances, and raise the alarm when appropriate
4. Stay alert and think before you click
Your children1. Talk with your
children about what they do online
2. Teach them to keep personal information private
3. Set clear guidelines for Internet use
4. Use family safety software
NextPrevious
For More Informationwww.staysmartonline.gov.au
www.microsoft.com/athome/security
http://international.isafe.org
www.ahtcc.gov.au
www.thinkuknow.com.au
www.netalert.com.au
www.staysafe.org/unicef
www.acma.gov.au
www.virtualglobaltaskforce.com
www.crimestoppers.com.au