Staying Safe in Cyberspace. What do YOU do online? Send and receive e-mail Send and receive e-mail Shop Shop Research Research Instant messaging/chat.

Slides:



Advertisements
Similar presentations
Instant Messages: I am bored. Social Networks: Facebook, Myspace.
Advertisements

Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Developed by Technology Services 1:1 Laptop Initiative
Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Keeping Your Child Safe on the Internet
Protecting children online  How can you protect your child online?  Are you aware of the dangers?  Do you know what you can put in place to protect.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Online Holiday Shopping Brings Great Deals – and Fraud This lesson is part of the iKeepCurrent TM Program, provided by iKeepSafe TM.
The Internet.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
What you don’t know CAN hurt you!
Facebook Security and Privacy Issues Brian Allen Network Security Analyst Washington University December 2, 2010 Alumni House.
What do I need to know?.   Instant Messages  Social Networking.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Teach a man (person) to Phish Recognizing scams, spams and other personal security attacks July 17 th, 2013 High Tea at IT, Summer, 2013.
Scams Stevie's Scam School videos
E SAFETY. SOME FACTS A Talk Talk survey of 500 children aged 6-15 in Feb 2010 found: 5% had communicated with a stranger via webcam. 2% have actually.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Company LOGO Internet Safety A Community Approach.
INTERNET SAFETY FOR STUDENTS
How To Protect Your Privacy and Avoid Identity Theft Online.
 Communicating with friends is now easier than ever, for example on Facebook you can connect with all your friends and chat to them very easily and instantly.
Threats to I.T Internet security By Cameron Mundy.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Over 3,000 computers are affected monthly by Malware and Phishing.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
© 2009 SCHOOL FAMILY MEDIA Keeping Your Child Safe on the Internet © 2009 SCHOOL FAMILY MEDIA.
1 Kids on the Web. Child’s play? September, 2008.
Have Fun, Be Safe Strategies for Internet and Social Media Safety.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Staying Safe Online Keep your Information Secure.
Impacts of the use of IT -Social network sites This is a site that lets you post messages, upload pictures and stories on your own personal page. You can.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
 Facebook  Twitter  MySpace  Windows LiveSpace.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
100 Internet Safety Jeopardy Social Network Sites Online Shopping Words & Pictures Cyber- bullying Internet Scams.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
INTERNET: The Good, The Bad and The Ugly
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
safety Bailey mullan. dangers ing has become on of the main sources for communicating. When using it is more likely for someone.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
Are you a Digital Native?
What is Spam? d min.
Internet 1) John R. Levine, Margaret Levine Young, The Internet for Dummies. Wiley Publishing, 12 th Edition, 2010.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
About Us AVG is a global security software maker protecting 98 million active users in 170 countries from the ever-growing incidence of Web threats, viruses,
REACTION AND ACTION RESPONDING TO FRAUD 1. THE VICTIMS THE CON IS TAILORED TO THE PROSPECTIVE VICTIMS. 2.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
KS2 E-Safety assembly How to be smart and keep safe online.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
Internet Identity, Safety, & Security
Lesson 3 Safe Computing.
Information Security 101 Richard Davis, Rob Laltrello.
Internet Safety – Social Media
Lesson 2- Protecting Yourself Online
Presentation transcript:

Staying Safe in Cyberspace

What do YOU do online? Send and receive Send and receive Shop Shop Research Research Instant messaging/chat Instant messaging/chat Social networking/blogging Social networking/blogging

What are the dangers? Malicious attachments Malicious attachments Malicious websites Malicious websites Phishing/fraudulent s Phishing/fraudulent s Merchants with weak security Merchants with weak security Search results (yes, really!) Search results (yes, really!)

Now what? Does all this bad stuff mean you should give up on the web? Does all this bad stuff mean you should give up on the web? NO WAY!

Get online! Stay connected with family Stay connected with family Communicate with friends Communicate with friends Keep up on current events Keep up on current events Plan vacations Plan vacations What else? What else?

security: Phishing Phishing/vishing messages Phishing/vishing messages –Use scare tactics/threats –May “borrow” graphics to look more real –May use poor English –Ask for info the business already has –May be multi-pronged

security: 419 Scams “I am a descendant of royalty…” “I am a descendant of royalty…” –Most common is “fund transfer” scam –Request bank account numbers –May also request fees to cover transaction –Never, EVER respond!

security: Malicious attachments Bad guys use to spread malware Bad guys use to spread malware –Beware of unsolicited attachments –Use an provider that scans attachments –Keep your antivirus software up to date

security: Malicious links Bad guys know we’re getting wise to attachments–they entice you to click links instead Bad guys know we’re getting wise to attachments–they entice you to click links instead –Adult content –Breaking news –Shocking video

security: Malicious links

Instant messaging Do you use chat? Do you use chat? –Only accept chat requests from people you know –Don’t click unsolicited links –Don’t accept unsolicited file transfers

Social Networking and Blogging Facebook, MySpace, LinkedIn, etc… Facebook, MySpace, LinkedIn, etc… –Understand and use privacy settings –Only “friend” people you know –Information posted here makes you a more public person!

What can I do? Want to know a secret? Want to know a secret? –You don’t need to be a geek to stay safe online!

What can I do? Be skeptical and ask questions! Be skeptical and ask questions! –Did I really win a foreign lottery? –Does my bank need to be reminded of my account number? –Will the software in that ad really make my computer faster if I click “OK?”

My favorite things… (Just like Oprah, but without the flattering lighting!) Surf Safer—use Firefox! Surf Safer—use Firefox! –Consider moving away from Internet Explorer

Surf Safer Use a phishing filter! Use a phishing filter! –McAfee SiteAdvisor (free) –Rates search results –Prevents you from visiting known-bad websites

Shop Safer When using a credit card online, always look for: When using a credit card online, always look for: – –Closed padlock Your CC# is encrypted in transit Your CC# is encrypted in transit

Safer Choose a good provider! Choose a good provider! –Is your scanned for viruses? –Will it attempt to alert you about phishing? Ask around—what providers do trusted friends use? Ask around—what providers do trusted friends use? –Are they generally happy? –Do they get a lot of spam?

safer No provider is perfect! No provider is perfect! –Unfortunately, they all get spam

safer Cast a wary eye upon messages Cast a wary eye upon messages –Don’t be afraid to call your bank, ISP, or other businesses about phishing messages

Handling phishing messages Don’t: Don’t: –Call any provided number –Reply to them via –Click any links or fill out any forms

Handling phishing messages Do… Do… –Call your bank on a known-good number Known-good: from the back of your card or bank statement Known-good: from the back of your card or bank statement –Report the message to your provider –Report the message to the FTC Forward to Forward to

Other types of fraud… Many types of fraud started offline but found new life on the Internet Many types of fraud started offline but found new life on the Internet –Phone scams –Check scams –Text message scams

Phone scams—”vishing” Register with the National Do Not Call registry Register with the National Do Not Call registry – –Scammers will not honor this list! –Remain on guard, report scam calls to the FTC: FTC-HELP

Check scams Arrive in “snail mail,” and may include: Arrive in “snail mail,” and may include: –Foreign business offers –Rental schemes –Overpayments –Sudden riches Get more info on check scams at Get more info on check scams at

Text message scams Do you have a mobile phone? Do you have a mobile phone? Do you use it for text messaging? Do you use it for text messaging? –Even if you don’t, scammers can still send messages to your phone –Disable text service if you don’t use it –NEVER respond to an unsolicited text message

In conclusion… It’s not possible or necessary to know about every threat It’s not possible or necessary to know about every threat Remain skeptical Remain skeptical Continue learning Continue learning Ask questions! Ask questions!

More information Be SeKUre blog Be SeKUre blog – Security workshops Security workshops – Be SeKUre on Twitter Be SeKUre on Twitter –

Contact me! Julie C. Fugett, CISSP, CCE Information Security Analyst The University of Kansas