Fighting Fakes                                            ●   Use a device such as the IronKey
Secure USB flash drive
   1. Read Past the Headline                                  (wwww.ironkey.com), which includes
   - Don't just read the catchy headline.                     special security software to protect your
        Read THE ARTICLE!                                     data and encrypt your online
   2. Check who published the story                           communications
   - If suspicious, Google the site!                      ●   Don’t fill out site registration forms
   3. Check the publish date and time                         unless you see a privacy policy
   - Is it new? Or just rehashed info?                        statement indicating that the information
        Remember, News=Current                                you supply won’t be sold to third parties.
   4. Who is the Author?                                  ●   Turn off cookies in order to prevent the
   - By-lines mean accountability                             activity of Web beacons.
   5. Check for links and sources
   - A solid story has multiple, verifiable               ●   A Web beacon is a tiny graphic image
        sources                                               that surveys a user's Web activity.
   6. Be wary of questionable quotes,                     ●   When a user visits a website or sends
        photos, and even videos                               an email that contains a Web beacon,
   - Everything can be faked!                                 that information is recorded for
   7. Be aware of your own biases                             analytical purposes.
   - We are drawn to stories that support our
        biases and fakers know this!                   Cookies
   8. Are others reporting it?                            - Cookies are small text files that are
   - If no other reputable sites, or if only                 written to your computer’s hard disk by
        similarly suspicious sites are reporting it,         many of the Web sites you visit.
        then it is most likely fake
   9. Think before you share!                          Privacy at Home
   - When in doubt, DON'T!                             How to protect yourself at home?
Additional resources to help you spot and fight            ● Create logins and passwords for each
FAKE NEWS:                                                    individual using a system to provide
   ● FactCheck.org                                            each user with a section to store
   ● Poynter’s Tips For Debunking Fake                        documents
        News                                               ● Do not save account numbers or
   ● TinEye Reverse Image Search                              passwords for access to secured sites
   ● Vera Files Fact Check                                    such as bank accounts and personal
                                                              email on a shared system
                                                           ● Do not leave a secured account active
Privacy, Crime, and Security                                  on the monitor and walk away
                                                           ● Do not leave devices like cell phones on
Privacy                                                       the tables at restaurants and other
    - Privacy refers to an individual’s ability to            public places
        restrict or eliminate the collection, use,         ● Turn off services that are not in use,
        and sale of confidential personal                     especially Bluetooth
        information.                                       ● Ensure that devices are configured
Online Privacy                                                securely and, if necessary, require
How to protect yourself online?                               authentication
    ● Surf the web anonymously by using
        software products such as Anonymizer’s
        Anonymous Surfing
                    (www.anonymizer.com)
Computer Crime and Cybercrime                              -  When hackers attempt unauthorized
                                                              access, they rarely damage data or
    -   Computer Crime are computer-based                     steal assets.
        activities that violate state, federal laws,   Crackers
        or international laws.                            - AKA black hats, are hackers who
    -   Cybercrime describes crimes carried                   become obsessed (often uncontrollably)
        out by means of the Internet.                         with gaining entry to highly secure
                                                              computer systems.
Types of Computer Crime                                Cybergangs
                                                          - Groups of hackers or crackers working
Identity Theft                                                together to coordinate attacks, post
    - A criminal obtains enough personal                      online graffiti, or engage in other
        information to impersonate you.                       malicious conduct.
How do criminals get this information?
   - Phishing – A “phisher” poses as a
      legitimate company/person in an email            Ethical Hackers
      or on a website in an attempt to obtain              - AKA white hats, offers their service to
      personal information.                                    companies hoping to use hacker
   - Malware – Used to send spam and                           expertise to shore up their computer
      steal your personal data.                                systems’ defenses.
                                                       Swindlers
                                                           - Perpetuate bogus work-at-home
Fraud, Theft, and Piracy                                       opportunities, illegal pyramid schemes,
   - When computer intruders make off with                     chain letters, risky business
       sensitive personal information, the                     opportunities, bogus franchises, etc.
       potential for fraud multiplies.                 Shills
   - Physical theft (hardware components)                  - A secret operative who bids on another
       and software piracy have been growing                   seller’s item to drive up the price.
       problems over the years.                        Cyberstalkers
                                                           - One of the newest and fastest growing
Cybergaming Crime                                              crimes. Cyberstalking uses the Internet,
   - Online games are played by real people,                   social networking sites, email, or other
      including thieves and con artists who                    electronic communications to repeatedly
      make real money by stealing other                        harass or threaten a person.
      peoples “virtual” property.                      Sexual Predators
                                                           - Online predators often pose as children,
Tricks for Obtaining PW                                        but many admit that they are older and
    - Involves unauthorized access, in which                   manipulate their victims by appealing to
        an intruder gains entry to a supposedly                the in other ways.
        secure computer system.
                                                       Cyberbullying
Meet the Attackers                                        - Involves situations in which one or more
                                                             individuals harass or threaten another
Hackers                                                      individual less capable of defending
   - Hackers are computer hobbyist who                       himself or herself.
      enjoys pushing computer systems (and
      themselves) to the limit.
Malwares
                                                    Spamming or Spam
Malware or Malicious Software                          - Spamming is a method of flooding the
   - is a term for any software that gets                 Internet with copies of the same
      installed on your machine and performs              message. Spams are also known as
      unwanted tasks, often for some third                Electronic junk mails or junk newsgroup
      party's benefit.                                    postings.
   - Malware programs can range from                Worms
      being simple annoyances (pop-up                  - Worms are malicious programs that
      advertising) to causing serious computer            make copies of themselves again and
      invasion and damage (e.g., stealing                 again on the local drive, network shares,
      passwords and data or infecting other               etc.
      machines on the network).
   - Malware refers to virus, spy ware, worm            -   The only purpose of the worm is to
      etc. and is designed to cause damage to               reproduce itself again and again. It
      a stand alone computer or a networked                 doesn’t harm any data/file on the
      pc.                                                   computer.
                                                    Trojan
Popular Types of Malware                                - a destructive program that looks as a
   - Trojans                                               genuine application. Unlike viruses,
   - Virus                                                 Trojan horses do not replicate
   - Adwares                                               themselves but they can be just as
   - Spam                                                  destructive.
   - Spywares                                           - Trojans also open a backdoor entry to
   - Worms                                                 your computer which gives malicious
   - hijackers                                             users/programs access to your system,
                                                           allowing confidential and personal
Adwares                                                    information to be theft.
    - Adware is the class of programs that          Virus
       place advertisements on your screen.             - a program written to enter to your
       These may be in the form of pop-ups,                computer and damage/alter your
       pop-unders, and advertisements                      files/data. A virus might corrupt or delete
       embedded in programs.                               data on your computer. Viruses can also
Spywares                                                   replicate themselves.
    - Programs classified as spyware send               - A computer Virus is more dangerous
       information about you and your                      than a computer worm as it makes
       computer to somebody else. Some                     changes or deletes your files while
       spyware simply relays the addresses of              worms only replicates itself with out
       sites you visit or terms you search for to          making changes to your files/data.
       a server somewhere.
Hijacker or Browser hijacking software
    - Advertising software that modifies your
       browser settings (e.g., default home
       page, search bars, toolbars), creates
       desktop shortcuts, and displays
       intermittent advertising pop-ups.