e-maile-maile-maile-maile-maile-maile-maile-maile-maile-maile-maile-maile-maile-maile-maile-maile-mail...

8
E-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-M MailE-MailE-MailE-MailE-Mail SpamSpamSpamSpamSpamSpamSpamSpam SpamSpamSpamSpamSpamSp PhishingPhishingPhishingPhishingPhishingPhishin ingPhi ComputersicherheitComputersicherheitComputersicherheit herheitComputers PasswörterPasswörterPasswörterPasswörte terPasswörte E-MailE-MailE-MailE-MailE-MailE-MailE-MailE- MailE-MailE-MailE-Mai SpamSpamSpamSpamSpamSpamSpamSpam SpamSpamS PhishingPhishingPhishingPhishingPh ComputersicherheitComputersicherheitCompu her PasswörterPasswörterPasswörterPassw terPassw E-MailE-MailE-MailE-MailE-MailE-MailE-MailE-M MailE-MailE-MailE-Mail SpamSpamSpamSpamSpamSpamSpamSpam SpamSpamS PhishingPhishingPhishingPhishingPhi ComputersicherheitComputersicherheitComput herh PasswörterPasswörterPasswörterPasswö terPasswö E- Mail, Spam & Phishing Computersicherheit & Passwörter

Upload: kirsa-wendlandt

Post on 05-Apr-2015

103 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: E-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-Mail SpamSpamSpamSpamSpamSpamSpamSpam SpamSpamSpamSpamSpamSpamSpamSpam

E-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailSpamSpamSpamSpamSpamSpamSpamSpam SpamSpamSpamSpamSpamSpamSpamSpam SpamSpamSpam

PhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingComputersicherheitComputersicherheitComputersicherheitComputersicherheitComputersicherheitComputersicherheitComputersicherheit

PasswörterPasswörterPasswörterPasswörterPasswörterPasswörterPasswörterPasswörterPasswörterPasswörter

E-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailSpamSpamSpamSpamSpamSpamSpamSpam SpamSpamSpamSpamSpamSpamSpamSpam SpamSpamSpam

PhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingComputersicherheitComputersicherheitComputersicherheitComputersicherheitComputersicherheitComputersicherheitComputersicherheit

PasswörterPasswörterPasswörterPasswörterPasswörterPasswörterPasswörterPasswörterPasswörterPasswörter

E-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailSpamSpamSpamSpamSpamSpamSpamSpam SpamSpamSpamSpamSpamSpamSpamSpam SpamSpamSpam

PhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingComputersicherheitComputersicherheitComputersicherheitComputersicherheitComputersicherheitComputersicherheitComputersicherheit

PasswörterPasswörterPasswörterPasswörterPasswörterPasswörterPasswörterPasswörterPasswörterPasswörter

E- Mail, Spam & Phishing Computersicherheit &

Passwörter

Page 2: E-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-Mail SpamSpamSpamSpamSpamSpamSpamSpam SpamSpamSpamSpamSpamSpamSpamSpam

E-Mail

• Netiquette

• HTML-Mails

• Funktionen „Wichtig“ oder „Dringend“

• BCC

E-MailE-M

ailE-MailE-M

ailE-MailE-M

ailE-MailE-M

ailE-MailE-M

ailE-MailE-M

ailE-MailE-

MailE-M

ailE-MailE-M

ailSpam

SpamSpam

SpamSpam

SpamSpam

Spam Spam

SpamSpam

SpamSpam

SpamSpam

Spam

SpamSpam

SpamPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhis

hingPhishingCom

putersicherheitComputersicherheitCom

putersicherheitComputersicherheitCom

putersicherheitComputersic

herheitComputersicherheit

PasswörterPassw

örterPasswörterPassw

örterPasswörterPassw

örterPasswörterPassw

örterPassw

örterPasswörter

Page 3: E-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-Mail SpamSpamSpamSpamSpamSpamSpamSpam SpamSpamSpamSpamSpamSpamSpamSpam

Spam

• unerlaubte Werbeemails • Ignorieren

• zwei E-Mail-Adressen

• „ECG-Liste“

• Spams versenden

E-MailE-M

ailE-MailE-M

ailE-MailE-M

ailE-MailE-M

ailE-MailE-M

ailE-MailE-M

ailE-MailE-

MailE-M

ailE-MailE-M

ailSpam

SpamSpam

SpamSpam

SpamSpam

Spam Spam

SpamSpam

SpamSpam

SpamSpam

Spam

SpamSpam

SpamPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhis

hingPhishingCom

putersicherheitComputersicherheitCom

putersicherheitComputersicherheitCom

putersicherheitComputersic

herheitComputersicherheit

PasswörterPassw

örterPasswörterPassw

örterPasswörterPassw

örterPasswörterPassw

örterPassw

örterPasswörter

Page 4: E-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-Mail SpamSpamSpamSpamSpamSpamSpamSpam SpamSpamSpamSpamSpamSpamSpamSpam

Phishing

• Passwort + fischen

• Zugangsdaten aktualisieren

• verschwommene Bilder, Rechtschreibfehler

E-MailE-M

ailE-MailE-M

ailE-MailE-M

ailE-MailE-M

ailE-MailE-M

ailE-MailE-M

ailE-MailE-

MailE-M

ailE-MailE-M

ailSpam

SpamSpam

SpamSpam

SpamSpam

Spam Spam

SpamSpam

SpamSpam

SpamSpam

Spam

SpamSpam

SpamPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhis

hingPhishingCom

putersicherheitComputersicherheitCom

putersicherheitComputersicherheitCom

putersicherheitComputersic

herheitComputersicherheit

PasswörterPassw

örterPasswörterPassw

örterPasswörterPassw

örterPasswörterPassw

örterPassw

örterPasswörter

Page 5: E-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-Mail SpamSpamSpamSpamSpamSpamSpamSpam SpamSpamSpamSpamSpamSpamSpamSpam

Viren

• Datenverlust Veränderung Zerstörung des Systems

• Wechseldatenträger

• Internet

• Keine Attatchments Nichts herunterladen

E-MailE-M

ailE-MailE-M

ailE-MailE-M

ailE-MailE-M

ailE-MailE-M

ailE-MailE-M

ailE-MailE-

MailE-M

ailE-MailE-M

ailSpam

SpamSpam

SpamSpam

SpamSpam

Spam Spam

SpamSpam

SpamSpam

SpamSpam

Spam

SpamSpam

SpamPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhis

hingPhishingCom

putersicherheitComputersicherheitCom

putersicherheitComputersicherheitCom

putersicherheitComputersic

herheitComputersicherheit

PasswörterPassw

örterPasswörterPassw

örterPasswörterPassw

örterPasswörterPassw

örterPassw

örterPasswörter

Page 6: E-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-Mail SpamSpamSpamSpamSpamSpamSpamSpam SpamSpamSpamSpamSpamSpamSpamSpam

Computersicherheit

• Software-Updates • Firewall• Anti-Viren-Programm • Anti-Spyware-Programm • mindestens 8 Buchstaben Groß- und Kleinbuchstaben Sonderzeichen• andere Anwendung → anderes Passwort !!!• Eselbrücken

E-MailE-M

ailE-MailE-M

ailE-MailE-M

ailE-MailE-M

ailE-MailE-M

ailE-MailE-M

ailE-MailE-

MailE-M

ailE-MailE-M

ailSpam

SpamSpam

SpamSpam

SpamSpam

Spam Spam

SpamSpam

SpamSpam

SpamSpam

Spam

SpamSpam

SpamPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhis

hingPhishingCom

putersicherheitComputersicherheitCom

putersicherheitComputersicherheitCom

putersicherheitComputersic

herheitComputersicherheit

PasswörterPassw

örterPasswörterPassw

örterPasswörterPassw

örterPasswörterPassw

örterPassw

örterPasswörter

Page 7: E-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-Mail SpamSpamSpamSpamSpamSpamSpamSpam SpamSpamSpamSpamSpamSpamSpamSpam

Öffentliche Computer

• Login-Daten nie speichern, automatische Anmeldefunktion deaktivieren

• Nicht unbeaufsichtigt lassen, log dich aus !!!• Beseitige deine Spuren• sei sparsam• Online-Banking, nur am privaten PC• Achtung! drahtlose Netzwerke! SSL

E-MailE-M

ailE-MailE-M

ailE-MailE-M

ailE-MailE-M

ailE-MailE-M

ailE-MailE-M

ailE-MailE-

MailE-M

ailE-MailE-M

ailSpam

SpamSpam

SpamSpam

SpamSpam

Spam Spam

SpamSpam

SpamSpam

SpamSpam

Spam

SpamSpam

SpamPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhis

hingPhishingCom

putersicherheitComputersicherheitCom

putersicherheitComputersicherheitCom

putersicherheitComputersic

herheitComputersicherheit

PasswörterPassw

örterPasswörterPassw

örterPasswörterPassw

örterPasswörterPassw

örterPassw

örterPasswörter

Page 8: E-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-Mail SpamSpamSpamSpamSpamSpamSpamSpam SpamSpamSpamSpamSpamSpamSpamSpam

E-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailSpamSpamSpamSpamSpamSpamSpamSpam SpamSpamSpamSpamSpamSpamSpamSpam SpamSpamSpam

PhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingComputersicherheitComputersicherheitComputersicherheitComputersicherheitComputersicherheitComputersicherheitComputersicherheit

PasswörterPasswörterPasswörterPasswörterPasswörterPasswörterPasswörterPasswörterPasswörterPasswörter

E-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailSpamSpamSpamSpamSpamSpamSpamSpam SpamSpamSpamSpamSpamSpamSpamSpam SpamSpamSpam

PhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingComputersicherheitComputersicherheitComputersicherheitComputersicherheitComputersicherheitComputersicherheitComputersicherheit

PasswörterPasswörterPasswörterPasswörterPasswörterPasswörterPasswörterPasswörterPasswörterPasswörter

E-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailE-MailSpamSpamSpamSpamSpamSpamSpamSpam SpamSpamSpamSpamSpamSpamSpamSpam SpamSpamSpam

PhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingPhishingComputersicherheitComputersicherheitComputersicherheitComputersicherheitComputersicherheitComputersicherheitComputersicherheit

PasswörterPasswörterPasswörterPasswörterPasswörterPasswörterPasswörterPasswörterPasswörterPasswörter

Danke für Eure Aufmerksamkeit! Verena Leitinger & Marion Wind