Class Name: Online Safety & Privacy Basics

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
The Internet.
What is identity theft, and how can you protect yourself from it?
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Unit 11 Communication & Collaboration.  Identify different communication methods  Identify advantages of electronic communication  Identify common.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Teach a man (person) to Phish Recognizing scams, spams and other personal security attacks July 17 th, 2013 High Tea at IT, Summer, 2013.
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
Threats to I.T Internet security By Cameron Mundy.
Security Issues: Phishing, Pharming, and Spam
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Protecting Yourself Online (Information Assurance)
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
How to use ? By Martyna Haliniak. How to log on? In order to log on, you have to type in your username & password in the text boxes, and then click.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Personal Online Safety Information Security Systems Community Outreach Program McKinley Middle School April 23, 2013.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
safety Bailey mullan. dangers ing has become on of the main sources for communicating. When using it is more likely for someone.
What is Spam? d min.
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Electronic Mail. Gmail Accounts USERNAME Skyward PASSWORD Same password as you use to log in to your computer.
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
Managing Money Workshop The National Autistic Society AGM
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Internet Safety.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Joseph J. Malone Security for Seniors Joseph J. Malone
What they are and how to protect against them
Phishing, identity theft, and more
Learn how to protect yourself against common attacks
Unit 4 IT Security.
Ways to protect yourself against hackers
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
Lesson 3 Safe Computing.
Unit 11 Communication & Collaboration
Phishing is a form of social engineering that attempts to steal sensitive information.
Protect Your Computer Against Harmful Attacks!
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
ISB Computer Security Training
Lesson 2- Protecting Yourself Online
Electronic Mail Opening Activity: 411 of
Staying safe on the internet
Electronic Mail.
9 ways to avoid viruses and spyware
Electronic Mail.
Lesson 2- Protecting Yourself Online
Presentation transcript:

Class Name: Online Safety & Privacy Basics Instructor: Don Gregory dgregory@provlib.org

Online Safety & Privacy Basics What do you know about Usernames & Passwords?

Secure Passwords >> A Video from Common Craft: Secure Passwords >>

The Password FEUD Let’s Play… Passwords 1 5 2 6 3 7 4 8 Top 8 answers on the board to this question… Name a popular 6 to 8 character password? Password 1 qwerty 5 123456 2 6 monkey 3 12345678 7 Letmein 4 abc123 8 dragon

25 Most Common (Worst) Passwords of 2012 Source: SplashData, Inc. 10…baseball 18…shadow 2…123456 11…iloveyou 19…Ashley 3…12345678 12…trustno1 20…football 4…abc123 13…1234567 21…jesus 5…qwerty 14…sunshine 22…Michael 6…monkey 15…master 23…ninja 7…Letmein 16…123123 24…mustang 8…dragon 17…welcome 25…password1 9…11111

Microsoft Password Strength Checker >> Let’s do some password checking: Microsoft Password Strength Checker >> http://microsoft.com/en-gb/security/pc-security/password-checker.aspx

Challenge Questions: Adding another layer of password security A security challenge question is used as an authenticator by banks, cable companies and wireless providers as an extra security layer. They are a form of shared secret. Financial institutions have used questions to authenticate customers since at least the early 20th century. In the early 2000s, security questions came into widespread use on the Internet, as a form of self-service password reset. The best questions have answers that are: Simple Memorable Not limited to a small list of answers Can't be guessed or researched easily Don't change over time Source: //en.wikipedia.org/wiki/Security_question

Security Challenge Questions Challenge Questions >> A Video from Indiana University: Challenge Questions >>

Which is a better Security Challenge Question? Let’s Play… Which is a better Security Challenge Question? What was your childhood nickname? A. What is your mother’s maiden name? B.

Which is a better Security Challenge Question? What is the name of the High School you graduated from? A. What is the name of your favorite childhood friend? B.

Which is a better Security Challenge Question? What is your favorite color? A. What is your favorite movie? B.

Which is a better Security Challenge Question? In what year was your father born? A. In what city or town did your mother and father meet? B.

Which is a better Security Challenge Question? What was the name of your first pet? A. What is your pet's name? B.

PHISHING SPAM VS. Spam Spam is electronic junk mail.  The word “SPAM” refers to unsolicited, bulk and usally unwanted email. Phishing Phishing attacks use email or fake websites (clicking on a link) to steal personal and financial information or infect your computer with malware.

Phishing “Click Here” A Video from Common Craft: Phishing >>

Phishing Examples:

Basic ground rules for avoiding phishing scams Don't email personal or financial information. Do not click on links in emails or reply to suspicious emails … independently open a browser and type in the website address. This way, you control what sites you visit. Do not let a phisher direct you to a false site. Only provide personal or financial information through an organization's website if you typed in the web address yourself and you see signals that the site is secure, like a URL that begins with https (the "s" stands for secure). Be very cautious about opening attachments and downloading files from emails, regardless of who sent them. These files can contain viruses or other malware that can weaken your computer's security. Be cautious about email messages that come from people or places you do not know. Scammers sometimes use mail or contact lists that are not protected – be sure that you know who you are getting email from. Be cautious of messages with no subject, or messages that are too general or out of character for the person sending the email . If you suspect that a friend did not send a message, email them in a separate message and ask. Sometimes other’s email addresses can be “pirated” by scammers.

Public vs. Private (secure) Websites Most of the Internet is like a public space: Like the lobby of a bank… Where others can overhear you, or see your information, or find your account information that you carelessly discard There are secure (private) sites that offer a higher level of information security: Like a Safe Deposit Box in a bank’s vault… Where only you and the bank have ANY access to your valuables and information

Rhode Island Property Database >> What information about me is already public? Rhode Island Property Database >> http://data.visionappraisal.com/ Google >> http://www.google.com

http:// vs. https://

Importance of “SIGN OUT” / “LOG OFF”

Malware ~ GCFLearnFree Malware = Malicious Software Malware ~ GCFLearnFree Malware ~ Google

Malware: Viruses, Worms, & Trojans Refer to your handout for the similarities and differences of these 3 main types of malware threats… Best Practices for Combating Viruses, Worms, and Trojans Ensure that your operating system is up-to-date by applying the most recent patches and fixes recommended by the OS vendor (Microsoft, Apple, etc…) Have antivirus software installed on your system and download updates frequently to ensure that your software has the latest fixes. Make sure that your antivirus program can scan e-mail and files as they are downloaded. You may also want to consider installing a firewall.

Parental Controls >> A Video from Microsoft… Parental Controls >>