Standards and Purpose

Welcome:
My name is Jess Malinky. I'm currently a 10th grade Social Studies teacher at Brooke High School in Wellsburg, WV.



Goals:
The goals of this blog are to educate students, parents, and the community about the various threats lurking in the online world; how to protect themselves from these threats; and where to report misuse of the internet.



WV Content Standards:

21.0.9-12.3.TT.4

Student adheres to acceptable use policy and displays ethical behaviors related to acceptable use of information and communication technology (e.g. privary, security, copyright, file-sharing, plagiarism); student predicts the possible cost and effects of unethical use of technology (e.g. consumer fraud, intrusion, spamming, virus setting, hacking) on culture and society; students identify the methodologies that individuals and business can employ protect the integrity of technology systems.





21C.0.3-4.3TT.4

Student complies with county acceptable use policy. Student identifies the need for acceptable use policies (AUP), discusses the basic issues related to resposible use of technology and information, describes personal consequences of inappropriate use and begins to cite sources for information found through electronic searches.



21C.0.5-0.3TT.4

Student complies with county acceptable use policy. Students discuss legal and ethical behaviors related to the acceptable use of information and communications technology (e.g. privacy, security, copyright, file-sharing, plagiarism) and predicts the possible effects of unethical use of technology (e.g. consumer fraud, intrusion, spamming, virus setting, hacking) on the individual and society, as well as identify methods for addressing these risks.



Purpose:

This blog is intended to provide information about safe use of the internet. It is designed to educate students, parents, and members of the community of the risks posed in the cyber world as well as provide them with strategies to reduce their risks online.







Spam and Scams

WHAT IS SPAM?
Microsoft Safety and Security Center defines spam as any kind of unwanted online communication.  The most common form of spam is in the form of unwanted email, but spam can also be sent via text messages and social networking sites.  Most of the time spam is just annoying; however, it can become serious if the spam is part of an identity theft scam or some type of fraud.

Example of spam:
An example of spam would be an email asking you to open an attached file.  Once you open the attached file, a virus is unleashed onto your computer.  Expert spammers can make the email look like it comes from someone you know, a bank, or a business.
Image of a spammed email inbox:   Image citation: http://www.wikipedia.com/











WHAT IS A SCAM?
Online scams are attempts to trick people into giving up personal information or money.  Online scams often involve phishing.  Phishing email messages are attempts to steal your identity.  They ask for personal information, or direct you to websites or phone numbers where they will attempt to retrieve your personal information. 

Example of a scam:
An example of an online scam would be the “lottery scam”.  In this scam, you will receive an email notifying you that you’ve won the lottery.  The only catch is, you need to pay an upfront processing fee to collect your winnings.  The scammers will then collect your money, and you will never hear from them again.
The scam email may look like:

Where do people get scammed? 
GRAPH CITATION: KASPERSKY LAB



Possible results of spam…
  • Spam can be used to spread computer viruses, Trojan horses, or other forms of malicious software.
  • Spam can result in tricking (“phishing”) users for personal information and can result in identity theft or fraud. 
  • Once your identity is stolen, thieves can use your information to rack up credit card debt, apply for loans, commit crimes in your name, and much more.
How to avoid being “phished”:
  • If you get an email or pop-up message that asks for personal or financial information, do not reply.
  • Use anti-virus and anti-spyware software, as well as a firewall, and update them all regularly.
  • Don’t email personal or financial information.
  • Review credit card and bank account statements as soon as you receive them.
  • Be cautious about opening any attachment or downloading any files from emails
Tips to protect your identity... (Source: http://www.credit.org/)
  • Don't post private information unless the site is encrypted.
  • Update antivirus and firewall software regularly.
  • Only use protected wireless access.
  • Look for software or websites that encrypt your Instant Message or Chat conversations.
  • Hide your IP address.
  • Go to www.credit.org to read an entire article of tips to protect your identity online.


Where to report spam/scams:


Resources for checking spam/scam issues:

FREE AND INEXPENSIVE DOWNLOADS:
    •  AVG Antivirus Software- Offers firewall and anti-spam protection!
      • Shop and bank online without fear of identity theft with AVG Firewall, AVG Anti-Spam & AVG Identity Protection
    • McAfee Security- Offers firewall and anti-virus protection!
      • Protect your home against spam, identity theft, and viruses
    • Kaspersky Internet Security- Offers firewall and anti-virus protection!
      • Protect yourself from all online threats- including viruses, spyware, rootkits, spam, identity theft, hackers, and more
Real stories of internet scam victims:
Currently, people are getting scammed after receiving emails requesting donations for relief efforts after Japan’s earthquake in mid-March 2011.  Read about the warnings associated with this new internet scam.

Citations for information on this page:
Federal Trade Commissio:  http://www.ftc.gov/
Federal Bureau of Investigation: http://www.fbi.gov/