Internet Identity Management Learning Outcomes Students will manage their web identity and presence according to e-safety, security, and privacy best practices.

Slides:



Advertisements
Similar presentations
Standard 1.02 Investigate uses of the Internet and World Wide Web.
Advertisements

Browser Comparisons Internet Explorer 8 & 9, Chrome 11 and Firefox 4 Security, Privacy, Add-ons & Convenience.
Web browsers It’s a software application for retrieving and presenting information on WWW. An information resource is identified by a Uniform Resource.
HTTPS Hypertext Transfer Protocol Secure Marcela López Hurtado.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
AN OVERVIEW OF BIOMETRIC ATMs. WHY ? CONVENTIONAL ATMs -> BIOMETRIC ATMs Environmental Concerns Environmental Concerns Security Concerns Security Concerns.
PASSWORD MANAGER Why you need one 1. WHAT IS A PASSWORD MANAGER? A modern Password Manager is a browser extension (Chrome, Internet Explorer, Firefox,
The Internet 8th Edition Tutorial 1 Browser Basics.
Boris Tshibangu. What is a proxy server? A proxy server is a server (a computer system or an application) that acts as an intermediary for requests from.
The Internet & Web Browsers Business Webpage Design Kelly Seale.
Technology and Hotel Security Hotel Mgmt. Hospitality Services R. McCann.
E-Safety Challenge College. Learning Objectives To assess the risks faced when online and how to use the options available to protect yourself.
Karthiknathan Srinivasan Sanchit Aggarwal
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Computing Concepts – Part 2 Getting Started with Applied Computer Concepts Computing Concepts: Part 2 1.
What is E-commerce Safety Precautions Password Strengths
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
© 2009 Prentice-Hall, Inc.1. 2 Technology in Action Technology in Focus: Protecting Your Computer and Backing Up Your Data.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
How To Preserve Online Privacy. 6 Major Ways To Protect Privacy  1.) Learn to Clear Browsing History  2.) Familiarize Yourself with Privacy Settings.
SURFING THE WEB PRIVACY, SAFETY, AND RELIABLE SOURCES.
Web Engineering we define Web Engineering as follows: 1) Web Engineering is the application of systematic and proven approaches (concepts, methods, techniques,
Security Issues and Strategies Chapter 8 – Computers: Understanding Technology (Third edition)
Networking and Health Information Exchange Unit 9b Privacy, Confidentiality, and Security Issues and Standards.
Agenda Last class: Software Lab Today: More Computer Software –Web Browsers –Searching the Internet.
The Internet CSC September 30, History of the Internet Developed for secure military communications Evolved from Advanced Research Projects.
Biometrics Authentication Technology
Biometrics.
1 3 Computing System Fundamentals 3.4 Networked Computer Systems.
DHP Agenda: How to Access Web Interface of the DHP-1320 on Access Point Mode How to Access Web Interface of the DHP-1320 on Router Mode How to Change.
PRESENTATION ON BIOMETRICS
Biometric Technologies
BIOMETRICS.   technology/9742-1_ html.
Borders Business Programme IT and Marketing Functions of Web-based Systems Russell Taylor Lecturer in Computing Borders Business Programme.
Staying Secure Online How do we buy and sell safely on the Internet?
Day 1 on Tech Use March 26, Students ◦ Log in at:  j.mp/cmsgaggle (don’t use www or  use FireFox browser ◦ Username: flastxxxx  first.
Networking Network Classification, by there: 3 Security And Communications software.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
#1 Firefox - Pros Fast Browsing Addons Saving Tabs/Automatic Session Restore Security Customisable Spell Checker Parental Control Saving Videos Download.
Web Browsers. Overview Definition How a Browser Works? History Today – Browser Wars The Future.
Biometrics By Rachel Borazio. What is biometrics? Biometrics is a security measure used to identify physical features of people to allow access to a system.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Uniform Resource Locator URL protocol URL host Path to file Every single website on the Internet has its own unique.
The Internet & Web Browsers Business Webpage Design Created by Kelly Seale Adapted by Jill Einerson.
Internet: The Nursing Resource. Is the INTERNET a government association? Yes No.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
How to Use Safe Money in Kaspersky? Help Desk Number.
Support For Internet Explorer
Connecting Desktops and Laptops to Networks
What this activity will show you
Silver Fox Surfers Online Safety
TECHNOLOGY GUIDE THREE
Private and Secure Biometric User Authentication in the Web Master Thesis Defense Zaki Alsubhi Department of Computer Science University of Colorado.
Navigating the Internet
Downloading the LAUSD Emergency Plan App from In Case of Crisis
Ian Ramsey C of E School GCSE ICT On the move Final steps.
Margaret Brown 3rd period October 14, 2007
Digital $$ Quiz Test your knowledge.
Security Protocols in the Internet
موضوع پروژه : تشخیص هویت بر اساس اثر انگشت
Chapter 3: Protecting Your Data and Privacy
K!M SAA LOGICAL SECURITY Strong Adaptive Authentication
Networks and the Internet
By: Lim An Guan Marc Chern Miao Sen Raphael Low Lim Jian Ling
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Unit 8 Network Security.
BY: Michael Etse and Maverick Fermill
BIOMETRICS Presented by :Wajiha Waseem Class : XII-c.
INTERNET SECURITY.
Presentation transcript:

Internet Identity Management Learning Outcomes Students will manage their web identity and presence according to e-safety, security, and privacy best practices and standards.

Strong Passwords Minimum of 8 characters Combination of uppercase letters, lowercase letters, numbers, and symbols No dictionary words – spelled backwards or forwards No personal information Use a different password for each system you access Change your passwords regularly NTM 17002

Authentication/Encryption Biometric devices examples examples CAPTCHA video video IP addresses (spoofing)spoofing Transport layer security cryptographic protocol designed to provide communication security over the Internet Secure networks recognized by or a padlock NTM 17003

4 At Walt Disney World in Lake Buena Vista, Florida, biometric measurements are taken from the fingers of guests to ensure that a ticket is used by the same person from day to dayWalt Disney WorldLake Buena Vista, Florida DNA Matching Shape of Ear Eyes – Iris Recognition Voice Recognition Fingerprint Recognition Gate Recognition video Signature Recognition The silhouette of a teacher having her iris scanned before entering the Park Avenue Elementary School Ear Biometrics Identification Odor Recognition

Web Identity Google search your name NTM 17005

Mobile Device Security Bluetooth range approx. 30 feet Turn off Bluetooth in a crowded place Password protected Remote erase NTM 17006

Privacy Review privacy modes in Browsers Internet Explorer – Tools Safari – Private Browsing Firefox – Tools Chrome – Incognito feature NTM 17007

LinkedIn NTM 17008

Internet Identity Management Learning Outcomes Students will manage their web identity and presence according to e-safety, security, and privacy best practices and standards.