Class Name: Online Safety & Privacy Basics Instructor: Don Gregory dgregory@provlib.org
Online Safety & Privacy Basics What do you know about Usernames & Passwords?
Secure Passwords >> A Video from Common Craft: Secure Passwords >>
The Password FEUD Let’s Play… Passwords 1 5 2 6 3 7 4 8 Top 8 answers on the board to this question… Name a popular 6 to 8 character password? Password 1 qwerty 5 123456 2 6 monkey 3 12345678 7 Letmein 4 abc123 8 dragon
25 Most Common (Worst) Passwords of 2012 Source: SplashData, Inc. 10…baseball 18…shadow 2…123456 11…iloveyou 19…Ashley 3…12345678 12…trustno1 20…football 4…abc123 13…1234567 21…jesus 5…qwerty 14…sunshine 22…Michael 6…monkey 15…master 23…ninja 7…Letmein 16…123123 24…mustang 8…dragon 17…welcome 25…password1 9…11111
Microsoft Password Strength Checker >> Let’s do some password checking: Microsoft Password Strength Checker >> http://microsoft.com/en-gb/security/pc-security/password-checker.aspx
Challenge Questions: Adding another layer of password security A security challenge question is used as an authenticator by banks, cable companies and wireless providers as an extra security layer. They are a form of shared secret. Financial institutions have used questions to authenticate customers since at least the early 20th century. In the early 2000s, security questions came into widespread use on the Internet, as a form of self-service password reset. The best questions have answers that are: Simple Memorable Not limited to a small list of answers Can't be guessed or researched easily Don't change over time Source: //en.wikipedia.org/wiki/Security_question
Security Challenge Questions Challenge Questions >> A Video from Indiana University: Challenge Questions >>
Which is a better Security Challenge Question? Let’s Play… Which is a better Security Challenge Question? What was your childhood nickname? A. What is your mother’s maiden name? B.
Which is a better Security Challenge Question? What is the name of the High School you graduated from? A. What is the name of your favorite childhood friend? B.
Which is a better Security Challenge Question? What is your favorite color? A. What is your favorite movie? B.
Which is a better Security Challenge Question? In what year was your father born? A. In what city or town did your mother and father meet? B.
Which is a better Security Challenge Question? What was the name of your first pet? A. What is your pet's name? B.
PHISHING SPAM VS. Spam Spam is electronic junk mail. The word “SPAM” refers to unsolicited, bulk and usally unwanted email. Phishing Phishing attacks use email or fake websites (clicking on a link) to steal personal and financial information or infect your computer with malware.
Phishing “Click Here” A Video from Common Craft: Phishing >>
Phishing Examples:
Basic ground rules for avoiding phishing scams Don't email personal or financial information. Do not click on links in emails or reply to suspicious emails … independently open a browser and type in the website address. This way, you control what sites you visit. Do not let a phisher direct you to a false site. Only provide personal or financial information through an organization's website if you typed in the web address yourself and you see signals that the site is secure, like a URL that begins with https (the "s" stands for secure). Be very cautious about opening attachments and downloading files from emails, regardless of who sent them. These files can contain viruses or other malware that can weaken your computer's security. Be cautious about email messages that come from people or places you do not know. Scammers sometimes use mail or contact lists that are not protected – be sure that you know who you are getting email from. Be cautious of messages with no subject, or messages that are too general or out of character for the person sending the email . If you suspect that a friend did not send a message, email them in a separate message and ask. Sometimes other’s email addresses can be “pirated” by scammers.
Public vs. Private (secure) Websites Most of the Internet is like a public space: Like the lobby of a bank… Where others can overhear you, or see your information, or find your account information that you carelessly discard There are secure (private) sites that offer a higher level of information security: Like a Safe Deposit Box in a bank’s vault… Where only you and the bank have ANY access to your valuables and information
Rhode Island Property Database >> What information about me is already public? Rhode Island Property Database >> http://data.visionappraisal.com/ Google >> http://www.google.com
http:// vs. https://
Importance of “SIGN OUT” / “LOG OFF”
Malware ~ GCFLearnFree Malware = Malicious Software Malware ~ GCFLearnFree Malware ~ Google
Malware: Viruses, Worms, & Trojans Refer to your handout for the similarities and differences of these 3 main types of malware threats… Best Practices for Combating Viruses, Worms, and Trojans Ensure that your operating system is up-to-date by applying the most recent patches and fixes recommended by the OS vendor (Microsoft, Apple, etc…) Have antivirus software installed on your system and download updates frequently to ensure that your software has the latest fixes. Make sure that your antivirus program can scan e-mail and files as they are downloaded. You may also want to consider installing a firewall.
Parental Controls >> A Video from Microsoft… Parental Controls >>