1 Safely Using Shared Computers Amanda Grady December 2013.

Slides:



Advertisements
Similar presentations
Smart Identity Protection That Works for You and Your Users 2 Petri Ala-Annala Senior Principal, CISSP-ISSAP, CISA, CISM.
Advertisements

Symantec Education Skills Assessment SESA 3.0 Feature Showcase
IT Analytics for Symantec Endpoint Protection
‘Changing environment – changing security’ - Cyber-threat challenges today – Budapest, September 17-18, Industry and the fight against cybercrime.
Online Shopping Self-Defense
1 Online Self-Defense: Avoiding Scams Chau Mai December 5, 2013.
Threat Intelligence Use in Information Security: History, Theory and Practice Tim Gallo Cyber Security Field Engineering 1.
Security for Today’s Threat Landscape Kat Pelak 1.
Symantec Tech Symposium Randy Cochran, Vice Present Channel Sales – Americas August 17, 2009.
The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec Security Conference 2010_Bangalore.
Network & Computer Security Training.  Prevents unauthorized access to our network and your computer  Helps keep unwanted viruses and malware from entering.
Internet Security Passwords.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
1 When Cloud Networking meets Cloud Computing: Software-Defined Networking (SDN) Customer Application Faan DeSwardt Infrastructure Architecture Manager.
GPS 2011 Slide - 1 COMPETITIVE STRATEGIES APAC Discussion.
Практические аспекты аутсорсинга ИБ Алексей Чередниченко Ведущий консультант, Symantec Services Group 28 апреля 2009.
STRONG PASSWORDS Common Sense Unit 2-Lesson 1 (Cross-Curricular Categories) Privacy and Security.
E-Safety Challenge College. Learning Objectives To assess the risks faced when online and how to use the options available to protect yourself.
Tutorial Video basic skills basic skills Next page -->
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
Mobile Devices Carry Hidden Threats With Financial Consequences Hold StillInstalled.
Personal Safety Unit - Level 7. The Internet is not anonymous. Your address, screen name, and password serve as barriers between you and others.
Symantec Managed Security Services The Power To Protect Duncan Evans Director, Cyber Security Services 1.
Computer Security Preventing and Detecting Unauthorized Use of Your Computer.
President’s Forum and WSML 2012 Mobile Market Dynamics Deborah Clark, Dawn Davis, Brian Duckering, Marie Pettersson 1 “A Day in the Life of a Mobile Family”
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
Common Sense Media Unit 3 – Lesson 1 Category: Privacy & Security.
Online Safety 6th grade. Rules to know Protect your privacy Protect your password Protect the privacy of others Beware of contests, clubs, prizes, & gifts.
Quick Thoughts on PGP Use Cases for KMIP 1 Michael Allen Sr. Technical Director.
The current state of Cybersecurity Targeted and In Your Pocket Dale “Dr. Z” Zabriskie CISSP CCSK Symantec Evangelist.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
Innovation From the Ground Up Fred Hollowood, Martin Roche.
Helping your family to stay in control Living with technology.
Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away.
Installation of Storage Foundation for Windows High Availability 5.1 SP2 1 Daniel Schnack Principle Technical Support Engineer.
1 APJ Curriculum Paths for Partners Specialization Accelerates Shirley Hoon APJ Partner Enablement Partner Enablement Oct
Julie Latham Digital Citizenship: An Informational Guide.
Copy to Tape TOI. 2 Copy to Tape TOI Agenda Overview1 Technical Feature Implementation2 Q&A3.
Cyber Safety Jamie Salazar.
Shared Engineering Services APJ Ghostdetect ver 1.0 for SPC Donghyun Seo Dec 12, 2008.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Setting up Suitable for: Beginner.
Optimized Synthetics 1 OpenStorage Optimized Synthetics.
Type presentation name here in slide master © 2007 SDL. Company Confidential. Forward-looking information is based upon multiple assumptions and uncertainties.
Partner Proctored Assessment Registration Process Ajit Jha 1 Partner Assessment.
OST Virtual Synthetics 1. Synthetics Overvier Definitions – Catalog – Image – Extent Process Overview (today) – Extent map derivation – Read agenda –
Cyber Security in the Post-AV Era Amit Mital Chief Technology Officer General Manager, Emerging Endpoints Business Unit.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Editing Tons of Text? RegEx to the Rescue! Eric Cressey Senior UX Content Writer Symantec Corporation.
APIs related to NBU AIR Feature 1 OST APIs Related to NBU AIR Feature.
Digital Citizenship Unit 2 Lesson 1: Strong Passwords
Maximize Profits Through Stronger Security Brook Chelmo Product Marketing
Internet Basics 10/23/2012. What is the Internet? It’s a world-wide network of computer networks. It grows hourly and involves national governments, communities,
Top Tips for Online Safety Speaker Name Speaker Organization.
Instructor Materials for Course 70158: Microsoft Word 2013 Essentials Aligned with Microsoft Office Specialist (MOS) exam : Microsoft Word 2013.
PUBLIC COMPUTER SAFETY
Internet Safety.
Fraud Protection.
Fraud protection.
Dove science academy Cyber Club
How to use the internet safely and How to protect my personal data?
How to use the internet safely and How to protect my personal data?
STOP. THINK. CONNECT. Online Safety Quiz.
DOVE SCIENCE ACADEMY CYBER CLUB
Lesson 2: Epic Security Considerations
Lesson 2: Epic Security Considerations
1 Session Title 2 line 3 line 4 line
Digital Citizen.
Keeping Our Data Secure
Presentation transcript:

1 Safely Using Shared Computers Amanda Grady December 2013

Objectives for this session Learn about protecting our identity on shared computers like the ones in computer labs or public libraries, or even your friend’s computer that you borrow. Learn how to make “strong” Internet passwords. Explore options for remembering passwords and keeping passwords safe. Consider best practices during social networking. 2

Opening question: Who uses a computer that belongs only to him or her? Who uses a computer that is shared with the public, like at the library or at a senior center computer lab? Who shares a computer with other people that they know, like friends and family members? What are some pros and cons of using shared computers? 3

Protect your identity on shared computers 4 Log out or sign out every time you leave the computer. Be aware of “shoulder surfers” who might try to peek at your passwords. Create “strong” passwords that are hard for others to guess. Do not share account information or passwords with others.

Protect your identity on shared computers – logging out 5

Opening question: How do you keep your valuables safe? Who do you share your “keys” with? 6

Using Passwords to keep your identity safe Passwords keep your identity and account information safe just like your house key keeps your belongings safe. Passwords provide an additional layer of security which is especially important for transactional activities. You’ll need passwords if you decide to do things online like shop, interact with other people, and sign up for different programs, events, and services. 7

Make “strong” Internet passwords. At least 6 characters long. Combine UPPER CASE LETTERS, lower case letters, numbers, and symbols (like Do not use your name, address, or birthdate Do not just choose a “regular” word. Use a word that means something to you, and then replace at least one letter with a number or a symbol. – Example: (Michele  M1ch&l&) 8

Activity: Password practice 9 What would make a good password for you? Pick your favorite word and turn it into a “strong” password that: – Is at least 6 characters long. – Combine UPPER CASE LETTERS, lower case letters, numbers, and symbols (like – Not your name, address, or birthdate – No “regular words.”

Managing your passwords 10

Managing your passwords 11 Some DON’T’s for passwords: – DON’T store your password list on your computer in a file called “passwords.” – DON’T keep your passwords with your account information. – DON’T tell your password to other people – DON’T let other people watch you enter your passwords. – DON’T stay logged in on a public computer.

Safe Social Networking – 5 tips Presentation Identifier Goes Here 12 Tip #1: Limit the amount of personal information available on your social networking profile. (don’t publicize your unlisted phone number!) Tip #2: Learn how to change your privacy settings. Tip #3: Only accept friend requests from people you know. Tip #4: Limit the amount of "time and place" data that you expose through social networking. Tip #5: Remember that even people you know can be identity thieves.

Review 13 In this session, we: – Learned about Internet passwords and why we need them. – Learned how to make “strong” Internet passwords. – Explored options for remembering passwords and keeping passwords safe. – Considered protecting your identify during social networking

Thank you! Copyright © 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. 14