Answer the following questions
Understand the risks associated with the use of computer systems in this day and age
Identify and describe different ways to keep ourselves safe and act responsibly when using computer systems, especially in regard to using the Internet
We have covered several topics in cyber security and crime:
Acts of Parliament that cover computer misuse
Open http://bit.ly/33SlTqm on your computer
Create a strong password that is less than 9 characters in length and is memorable but not easy to guess.
The password that takes the longest to crack with being able to be recited by the creator wins.
As covered the last time, phishing is the process of trying to get information out of someone by pretending to be someone else to an email user. This stage is called luring.
Phishing normally is done by asking the user to click on a link or by asking the user to email back.
This email came from a lecturer at Strathclyde not the IT Helpdesk.
Here’s an example pretending to be from PayPal that was sent to my email address.
The aim here is to get me to reply and basically confirm I have a PayPal account, to which the phisher will respond asking for details of it.
Here’s an example pretending to be from PayPal.
Often phishing is normally extremely easy to detect by following a few steps:
If it sounds too good to be true, it probably is
Hover over the links in the page to see where they go, if they go to somewhere you don’t expect, don’t click it
Check that the sender isn’t pretending to be someone they are not e.g. someone with the email address firstname.lastname@example.org is not identifying as Frank Peterson.
Think about how realistic the message sounds
Look for spelling and grammar mistakes
A keylogger is a small program that is designed to watch keypresses.
Each keypress is saved into a file on the local computer and then transmitted to a server or remote computer when the user does something (e.g. changes page)
Identity theft is a form of computer crime in which someone pretends to be someone else, as is often the case with phishing.
Committing identity theft can lead to prison sentences of an unlimited length, depending on how serious the crime is.
Extortion – extortion means to use something as leverage against someone using threats or bribery
Sextortion – is a form of extortion whereby someone blackmails them with images they have of a sexual nature of them.
Ransomware – a piece of software that prevents the computer from doing anything and requires payment to remove it
Complete the Task 1 on your worksheet by highlighting things would help you identify this email as fraudulent.
Create a poster about different threats online. You will need to include information about:
The following are key shortcuts for using BalfSlideView and reveal.js.
|→, PAGE DOWN, SPACE||Next slide|
|←, PAGE UP||Previous slide|
|SHIFT + →||Last Slide|
|SHIFT + ←||First slide|
|W||Widget Board/White Screen|
|C||Toggle Notes Canvas|
|DEL||Clears Whiteboard/Notes Canvas|
|S||Show Presenter Mode|
|SHIFT + D||Toggle Dark Mode|
|H||Goes to the Home Slide|
|META + P||Show Print options window|
In order to use the 'Start Remote' feature, you'll need to download JB Slide Controls from the Apple App Store. Once you have this you'll be able to control the slides using the app from you Apple Watch.
BalfSlideView and jamiebalfour.scot are copyright © Jamie B Balfour 2017 - 2023, 2010 - 2023. Content is copyright © Jamie B Balfour