Keeping Your Online Presence Safe and Professional November 8, 2013.

Slides:



Advertisements
Similar presentations
Tiffany Phillips CIS What is a Social Networking Website? Social networking websites function like an online community of internet users. Depending.
Advertisements

CP3397 ECommerce.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
By: Mr Hashem Alaidaros MIS 326 Lecture 6 Title: E-Business Security.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
Security & Encryption Thomas Fenske & Joseph Minter.
1.3 Control of Information In this section you must be able to: Describe the legal rights and obligations on holders of personal data to permit access.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Cryptography: Keeping Your Information Safe. Information Assurance/Information Systems –What do we do? Keep information Safe Keep computers Safe –What.
Course Technology *Instructor* Navigation Guide YOUR NAME YOUR .
1 Applications of Computers Lecture-3 2 E-Commerce 4 Almost all major companies have their homes on the web, mainly for advertising 4 Companies were.
Chapter 10: Electronic Commerce Security. Electronic Commerce, Seventh Annual Edition2 Impact of Security on E-Commerce In 2006 an estimated $913 million.
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 13-1© 2007 Prentice-Hall, Inc ELC 200 Day 23.
Welcome to the Arizona State University Online Employment System Applicant Tutorial.
How To Protect Your Privacy and Avoid Identity Theft Online.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
How to Create (and use) Strong & Unique Passwords Larry Magid Co-director ConnectSafely.org.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
What is E-commerce Safety Precautions Password Strengths
FlipFlop PD June 12, 2012 Stephanie Dixon, EBRPSS What’s in Your Digital Dossier?
PAGE 1 Company Proprietary and Confidential Internet Safety and Security Presented January 13, 2014.
ESCCO Data Security Training David Dixon September 2014.
PRIVACY BOOTCAMP YpJU.
Chapter 10 Developing a Web-Based Online Shopping Application (I)
June 2009 Memory Reed Harris County High School What is E-Commerce? MKT-EM-2.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
OHT 11.1 © Marketing Insights Limited 2004 Chapter 9 Analysis and Design EC Security.
Encryption Objective 1: Explain data encryption procedures.
Securing Electronic Transactions University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Chapter 4 Getting Paid. Objectives Understand electronic payment systems Know why you need a merchant account Know how to get a merchant account Explain.
E-commerce What are the relationships among: – Client (i.e. you) – Server – Bank – Certification authority Other things to consider: – How to set up your.
Protecting Your Personal Information November 15, 2013.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
1 DCS 835 – Computer Networking and the Internet Digital Certificate and SSL (rev ) Team 1 Rasal Mowla (project leader) Alvaro Restrepo, Carlos.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Consumer Protection Shop Safely and Guard Your Financial Information.
Fall University- Wide Employment Fair Over 120 organizations to attend! Free LinkedIn portraits available. View the list at: Friday,
Adxstudio Portals Training
Risks and Protection. What are the risks of shopping online? Spend 2 minutes identifying risks associated with shopping online card details could be stolen.
PRIVACY BOOTCAMP Jack Vale - Social Media Experiement.
Multimedia Security. “Everything” is digital these days - a copy of a digital media element is identical to the original. How can an owner protect their.
Networking E-commerce. E-commerce ► A general term used to describe the buying and selling of products or services over the Internet. ► This covers a.
E-commerce Security By John Doran. What is e-commerce?  the buying and selling of products or services over the internet [3].  Most e-commerce transactions.
The Future of Effective Social Media is Here! ATTRACT – ENGAGE – PROMOTE – RETAIN YOUR CUSTOMERS OptimumLiving™
Internet use 2. How internet used in business and learning? s Cloud computing Video conferencing.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
Digital & Internet Safety. Understanding your personal data Defining “Big Data” Protecting your data, computer & devices Avoiding identity theft.
Copyright © Terry Felke-Morris Web Development & Design Foundations with HTML5 8 th Edition CHAPTER 12 KEY CONCEPTS 1 Copyright.
Florida Department of Business and Professional Regulations Ken Lawson Juana Watkins Secretary Director Division of Real Estate.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Unit 3 Section 6.4: Internet Security
Setting and Upload Products
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
How to Protect Yourself from ID Theft and Social Engineering
Virtual Private Networks (VPN)
How to Check if a site's connection is secure ?
Passwords.
Who Uses Encryption? Module 7 Section 3.
Digital Citizen.
Presentation transcript:

Keeping Your Online Presence Safe and Professional November 8, 2013

What to expect today Cryptography and Online Shopping Password Security Professional Online Presence

Enigma (2001) Movie Trailer

Cryptography and Shopping Are they related? Bombe Machine used to decipher Enigma Code in WWII

E-commerce and Digital Signatures In 2009, $234.7 billion in retail merchandise was sold. 48.1% of this was e-commerce sales Online shopping continues to grow. $327 billion is expected to be spent in Retailers protect your information using digital certificates. Source: U.S. Census Bureau, “E-Stats, 2009 E-Commerce Multi-Sector Report,” May 2011,

What are digital certificates? Business buys certificate Company verifies ID Issues certificate

What does it mean? Type of encryption Cipher and cryptographic hash function

Let’s revisit the Enigma Code Public Key – Code book issued by German Secret Service that had settings for each day. The stacker board was changed according to the code book. Is there a private key? No. The operator used the same book. How would you make this asymmetric encryption?

Certificate Issuance Symantec procedures to identify and authenticate Subscriber information from Section 3.2: 1.Use at least one 3 rd party identity proofing service. 2.Telephone or postal mail confirmation that applicant has applied for certificate. 3.If certificate includes name of individual, verify that they are an authorized representative of the applying organization.

Are you safe shopping online? Several breaches have occurred. Fake digital certificates have been issued. –Bit9 – Endpoint and server security –Adobe Fictitious company in Brazil able to pass malware through a verified digital certificate. What to do? –Google to find info on company before you purchase –Be leery of attachments in s

S3CuR!Ty Without password protection, nothing is safe!

Unique Passwords Use a unique password for each of your important accounts - -Online banking -Social Network -School -Work

Password Best Practices Creating Your Password Use a long password made up of: –Numbers –Letters –Symbols What to Avoid Avoid using: –Only letters/numbers. –Names of spouses, children or pets. –Phone numbers, SS#, or birthdates –Same word as your log-in –Words that can be found in the dictionary.

Keeping Your Password Safe Keep your passwords in a secret place that isn’t easily visible –Don’t leave notes with passwords in plain sight It is important to change your password –Every 30 to 90 days

Creating a Strong Password

LastPass – Password Manager

LastPass, con’t Autofill or autologin to sites Group by type of website **What are some disadvantages to using a password manager?

Professional Online Presence What does your online presence say about you?

Be Professional Clean up your social networking sites such as Facebook and TwitterFacebookTwitter

Employees Fired Over Posts

Facebook 1.Customize your privacy settings 2.Keep photos appropriate 3.Be careful what you post 4.Be aware of what you share or “Like”

Library of Congress Is Archiving All of America’s Tweets

Twitter Professional Networking 1.Write a short description that is professional and indicates your career field. 2.Link to your professional website such as LinkedIn or an ePortfolio (optional). 3.Upload a professionally appropriate photo 4.Choose a professional Twitter handle