Web Security Tips Li-Chiou Chen & Mary Long Pace University September 1 st, 2010.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

WEB BROWSER SECURITY By Robert Sellers Brian Bauer.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Social media threats. Warning! May contain mild peril.
Network Security aka CyberSecurity Monitor and manage security risks at the network level for the entire Johns Hopkins Network.
A few simple steps, hints and tips to figure out if it is indeed fake. - By Emily Breuss.
Jason Rich CIS  The purpose of this project is to inform the audience about the act of phishing. Phishing is when fake websites are created.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Internet Phishing Not the kind of Fishing you are used to.
Chapter 7: The Web and 1 The Web and Chapter 7.
Don’t Lose Your Identity – Protect Yourself from Spyware Dan Frommer Sherry Minton.
Internet Security PA Turnpike Commission. Internet Security Practices, rule #1: Be distrustful when using the Internet!
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
Security Warnings TROPE: Teachers’ Resources for Online Privacy Education 1.
INTERNET SAFETY FOR STUDENTS
Quiz Review.
The Internet & Web Browsers Business Webpage Design Kelly Seale.
Internet Security In the 21st Century Presented by Daniel Mills.
November 2009 Secure Data Transmission May 2014 What are Secure Methods of Transmission? Encrypted Services Encrypted Memory Sticks Fax Secure.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
STAY SAFE ONLINE. STAY SAFE ONLINE! PLEASE MAKE SURE YOU LOGIN AT THE CORRECT BANK URL / ADDRESS 1.NEVER LOGIN VIA LINKS 2.NEVER REVEAL YOUR PIN.
Safe Computing Outreach Joseph Howard Undergraduate Research Assistant 05/01/2015 Disclaimer: This research was supported by the National Science Foundation.
Research Problems in Information Assurance Talk for the second year DPS students Li-Chiou Chen Seidenberg School of Computer Science and Information Systems.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Web Spoofing John D. Cook Andrew Linn. Web huh? Spoof: A hoax, trick, or deception Spoof: A hoax, trick, or deception Discussed among academics in the.
Keeping Information Safe Task 4. Basic security measures Passwords Change password on regular basis Do not use names or words easily linked to yourself.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Reliability & Desirability of Data
Another Method to Open WebSpace as a Web Folder Alternative Method for Creating Web Folder in WebSpace, Slide 1Copyright © 2004, Jim Schwab, University.
Log on to Digital Locker Website You should be able to log on using Internet Explorer browser at the campus. You may need to log in using Mozilla FireFox.
DIGITAL SECURITY PART 2 TOOLS. phising  Internet criminals can steal your personal and banking information without you ever noticing – they can do it.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
NDSU Lunchbytes "Are They Really Who They Say They Are?" Digital or Electronic Signature Information Rick Johnson, Theresa Semmens, Lorna Olsen April 24,
CCT355H5 F Presentation: Phishing November Jennifer Li.
How Phishing Works Prof. Vipul Chudasama.
McLean HIGHER COMPUTER NETWORKING Lesson 8 E-Commerce Explanation of ISP Description of E-commerce Description of E-sales.
Cookies COEN 351 E-commerce Security. Client / Session Identification HTTP Headers Client IP Address HTTP User Login FAT URLs Cookies.
What is Spam? d min.
Internet 1) John R. Levine, Margaret Levine Young, The Internet for Dummies. Wiley Publishing, 12 th Edition, 2010.
An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks Collin Jackson et. all Presented by Roy Ford.
Activity 4 Protecting Ourselves. Keeping Safe There are lots of different ways we can be at risk on the Internet. How can we protect ourselves and keep.
Staying Secure Online How do we buy and sell safely on the Internet?
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
1.  Usability study of phishing attacks & browser anti-phishing defenses – extended validation certificate.  27 Users in 3 groups classified 12 web.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Computers Are Your Future Eleventh Edition Chapter 6: The Internet and the World Wide Web Copyright © 2011 Pearson Education, Inc. Publishing as Prentice.
Any criminal action perpetrated primarily through the use of a computer.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
E-Commerce & Bank Security By: Mark Reed COSC 480.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
GUIDE TO INTERNET SAFETY A VISUAL WALKTHROUGH TO SAFE INTERNET BROWSING.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Hotspot Shield Protect Your Online Identity
Information Security.
ISYM 540 Current Topics in Information System Management
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
Protect Your Computer Against Harmful Attacks!
Information Security Session October 24, 2005
GSBS IT Resources and Security
Staying safe on the internet
Parent Instructions for applying for Scholarships
Computer Security.
What is Phishing? Pronounced “Fishing”
Presentation transcript:

Web Security Tips Li-Chiou Chen & Mary Long Pace University September 1 st, 2010

Acknowledgement The authors acknowledge the support of the Verizon Foundation in partnership with Pace University through its Thinkfinity Initiative. 2 © Li-Chiou Chen & Mary Long, Pace University

What do you do online? Browsing sites Blogging Social networking Online shopping Online banking Managing photos Managing calendars ……. 3 © Li-Chiou Chen & Mary Long, Pace University

Common Threats Intrusion  Accessing a computer without permission Malware  Programs that are designed to harm your computer Spyware  Software that sends information from your computer to a third party without your consent 4 © Li-Chiou Chen & Mary Long, Pace University

Common Threats (2) Site Hijacking  Misrepresenting a web site by stealing and manipulating its content Phishing  Using fake Web sites to trick you into giving away personal information © Li-Chiou Chen & Mary Long, Pace University 5

DoD video on Phishing age.htm age.htm © Li-Chiou Chen & Mary Long, Pace University 6

How to determine if a web site is legitimate Make sure that the web address is correct  Google it or type it yourself  Do not click on links in s Use HTTPS encryption for sensitive information Verify the site using the security padlock Use browser security features  Firefox has more default security settings than IE Pay attention to browser warnings © Li-Chiou Chen & Mary Long, Pace University 7

Look at web address to determine if it is a legitimate site 8 “https” refers to the content is encrypted is the domain name (or site name) © Li-Chiou Chen & Mary Long, Pace University

Examples of fake web addresses © Li-Chiou Chen & Mary Long, Pace University 9

Examine the security padlock to verify the site 10 Alternative ways of showing the security Padlock © Li-Chiou Chen & Mary Long, Pace University

You need to double click the padlock to verify it 11 This verifies that is owned by Citigroup Inc. VeriSign, Inc. verifies this information This indicates that the content is encrypted © Li-Chiou Chen & Mary Long, Pace University

User login only authenticate users It cannot tell users if the site is legitimate or not © Li-Chiou Chen & Mary Long, Pace University 12

References My Secure Cyber Space  13 © Li-Chiou Chen & Mary Long, Pace University