Download as pdf or txt
Download as pdf or txt
You are on page 1of 67

INFORMATION AS

RESOURCE WITH
CONTROL AND
PRIVACY
FAKE NEWS VS FALSE INFORMATION

■ Experts: avoiding the term ‘fake news


■ False Information
– Diverse range of information
– News, stories or hoaxes created to deliberately
misinform or deceive readers.
“There are three elements to fake news”
~ Martina Chapman (Media Literacy Expert)

MISTRUST MISINFORMATION MANIPULATION

TYPES OF FAKE INFORMATION


■ Clickbait
■ Propaganda
■ Satire/Parody
■ Sloppy Journalism
■ Misleading Headings
■ Biased/Slanted News
ONLINE SAFETY AND SECURITY
SPAM
➢ refers to the transmission of
unsolicited messages from
various origins using electronic
messaging systems such as e-
mail and chat messengers.
➢ Typically, attackers use spam as
a tool for adverts.
Most common form:
unsolicited bulk e-mail (UBE)
In a nutshell..
Social Engineering is the art of manipulating peope into giving up sensitive information
or gaining their trust to exploit them.
SOCIAL
ENGINEERING
IS
HACKING THE
HUMAN MIND
5 Social Engineering Attacks to
Watch Out FOR
1. PHISHING
Phishing scams
might be the most
common types of
social engineering
Most phishing scams demonstrate
the following characteristics:

• Seek to obtain personal information, such


as names, addresses and social security
numbers.
• Use link shorteners or embed links that
redirect users to suspicious websites in
URLs that appear legitimate.
• Incorporates threats, fear and a sense of
urgency in an attempt to manipulate the
user into acting promptly.
Some phishing emails are more
poorly crafted than others to the
extent that their messages
oftentimes exhibit spelling and
grammar errors but these
emails are no less focused on
directing victims to a fake
website or form where they can
steal user login credentials and
other personal information.
What is spear phishing?
Spear Phishing, targets a specific individual or group. They
lure their victims with information that makes it seem like
they’re a trusted or familiar source, with as much personal
information as possible to make their approach look
legitimate.
Spear phishers can target anyone in an
organization, even top executives. That’s
the logic behind a “whaling” attack, where
fraudsters attempt to harpoon an
executive and steal their login credentials.
2.
SMISHING
is
sms
phishing
Vishing* (a combination of the
words "voice" and "phishing") is the
fraudulent practice of attempting to
steal information or gain
unauthorized access to your
personal information via a telephone
call.
3.
Baiting is in many ways
similar to phishing attacks.
However, what distinguishes
them from other types of
social engineering is the
promise of an item or
good that hackers use
to entice victims.
Baiters may offer users free
music or movie downloads, if
they surrender their login
credentials to a certain site.
4. TAILGATING
Another social
engineering attack
type is known as
tailgating or
“piggybacking.”
These types of
attacks involve
someone who lacks
the proper
authentication
following an
employee into a
restricted area.
5.PRETENDING
CONFIDENCE
MAN

a swindler who
tries to gain the
confidence of the
victim in order to
defraud
NOW YOU SEE THEM
MALWARE
➢ short term for Malicious Software
➢ computer software sent by attackers to inflict chaos on a
computer’s operation and processes.
➢ Most of the time, this program is disguised as enticing Web
sites.
➢ Malwares are used to spy upon the activity of the computer
and steal information
3 types of Malware
Virus
➢ A computer virus attaches itself to a
program or file enabling it to spread
from one computer to another, leaving
infections as it travels.
➢ Like a human virus, a computer virus
can range in severity: some may
cause only mildly annoying effects
while others can damage your
hardware, software or files.
➢ Almost all viruses are attached to an
executable file, which means the virus
may exist on your computer but it
actually cannot infect your computer
unless you run or open the malicious
program.
Worm
➢ A worm is similar to a virus by design
and is considered to be a sub-class
of a virus.
➢ Worms spread from computer to
computer, but unlike a virus, it has
the capability to travel without any
human action.
➢ A worm takes advantage of file or
information transport features on
your system, which is what allows it
to travel unaided.
Trojan
➢ A Trojan Horse is full of as much
trickery as the mythological Trojan
Horse it was named after.
➢ The Trojan Horse, at first glance will
appear to be useful software but will
actually do damage once installed or
run on your computer.
➢ Those on the receiving end of a Trojan
Horse are usually tricked into opening
them because they appear to be
receiving legitimate software or files
from a legitimate source.
3 types of Malware

REPLICATES HAS A HOST MASQUERADES


Government Provisions for Online
Courtesy and Etiquette
➢ Republic Act 10627 or Anti-Bullying Act of 2013 – Bullying is
defined as “severe or repeated use by one or more student of a
written, verbal or electronic expression, or a physical gestures,
or any combination thereof, directed to another student that
has the effect of actually causing or placing the latter in
reasonable fear of physical or emotional harm or damage to
his property.” This law also includes an individual’s privacy by
using photos and other information meant to disgrace that
individual.
Government Provisions for Online
Courtesy and Etiquette
➢ Republic Act 10175 or Cybercrime Prevention Act of 2012 –
This Law protects an individual from various unwanted online
cyber acts that may harm or evade one’s privacy and integrity.
Cybercrime offence include, but are not limited to, integrity and
availability of data, illegal access of computers through remote
means without permission, interception of one’s information
from a private conversation or correspondence, acquisition of
password and other vital information from an individual, from
an individual, computer forgery, and libel.
THE BIGGEST THREAT ONLINE
YOU ARE
YOUR
BIGGEST
THREAT!
PROBLEM:
OVERSHARING
How much is too much
information when it comes to
sharing online?

~ STALKERS
OVERSHARING!
To fill up spare time
To stay in touch with what friends are doing
To find funny or

WHY DO
General entertaining content
networking with
other people
PEOPLE USE To share my opinion

To share photos or
SOCIAL Because friends are

MEDIA?
videos with others already on them

To research new products to buy To meet new people


FEAR OF MISSING OUT!
INTERNET SAFETY TIPS:
1. Keep Personal Information LIMITED.
Humans Trust Even When They
Shouldn't
Avoid the
temptation
to GIVE
information.
Protect yourself against online predators

Online predators are individuals who commit child sexual abuse that begins or takes place on the
Internet.
INTERNET SAFETY TIPS:
1. Keep Personal Information LIMITED.
2. Be Careful Who You Meet Online.
HYPERTEXT TRANSFER PROTOCOL SECURE
INTERNET SAFETY TIPS:
1. Keep Personal Information LIMITED.
2. Be Careful Who You Meet Online.
3. Visit SECURE WEBSITES
INTERNET SAFETY TIPS:
1. Keep Personal Information LIMITED.
2. Be Careful Who You Meet Online.
3. Visit SECURE WEBSITES
4. Be careful with your DOWNLOADS
INTERNET SAFETY TIPS:
1. Keep Personal Information LIMITED.
2. Be Careful Who You Meet Online.
3. Visit SECURE WEBSITES
4. Be careful with your DOWNLOADS
5. Secure your accounts with STRONG PASSWORD!
3 month p@$$w0rd rule
BUT SERIOUSLY…
Make it complicated
and treat it like your
toothbrush or
underwear.
THANK
YOU

You might also like