Online Safety
Culture of Surveillance
Hackers
Malware Attacks
Malware
100

Anything you post online can be forwarded, copied, found, and travel further than you intend it to.  

Think Before You Share

100

We have chosen convenience over...

Privacy

100

3 Types of Hackers

White, Gray, & Black Hat

100

A worm that was downloaded by clicking on an attachment called ‘LOVE-LETTER-FOR-YOU.TXT.vbs

ILOVEYOU

100

A nasty program that resides and infects the computer.

Virus

200

Only share things with people you know.

Use Your Settings

200

Apple, Google and Facebook are actively storing and selling data about their users

Tracking

200

The Good Guys

White Hat Hackers

200

Pretty harmless and didn’t do much actual damage.

Anna Kournikova

200

A program or technique that monitors what you do on the internet.

Spyware

300

To keep things secure, make sure that you have set strong passwords on your accounts.

Protect Your Stuff

300

After the 9/11 attack, the American government began keeping a closer eye on the online activities of their citizens.

"The Patriot Act"

300

Work both sides of the street/can be bought for hire

Gray Hat Hackers

300

A worm that scammed random IP addresses and instructed them to download the virus.

Sasser & Netsky

300

The web page tricks you into providing information because it looks legitimate.

Phishing

400

Understanding how you can change keep your information private.

Know Your Settings

400

Former intelligence contractor for the NSA, revealed the existence of previously highly classified intelligence-gathering surveillance programs run by the NSA.

Edward Snowden

400

15-year old sent a Denial of Service attack against big companies like CNN, Yahoo and eBay

Mafiaboy

400

“andy; I’m just doing my job, nothing personal, sorry”.

MyDoom

400

It looks like something helpful and then when opened it turns out it gives you instructions for a destructive task instead.

Trojan Horse

500

Knowing that harmless offers can be dangerous

Avoid Scams

500

Company ID badge with embedded sensors allows them to monitor how everybody interacts with one another.

Humanize

500

Created a worm virus that spread across the MySpace social network

Samy Kamkar

500

The hackers then sent a decryption key in return for a sum of money, usually somewhere from a few hundred dollars up to a couple of grand.

CryptoLocker

500

A virus that replicates itself, by sending out copies to other people.

Worm

M
e
n
u