Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
1 If You Are Me, Then Who Am I? Tips on Identity Theft Prevention California Office of Privacy Protection.
Fighting Back Against Identity Theft A Presentation for CSM564 – Dr. Price By Matt Poole.
SECURITY CHECK Protecting Your System and Yourself Source:
Presented By Drexel and FMFCU.
What to Know, What to Do Presentation Powered By: The Federal Trade Commission Consumer Protection Toolkit.
Preventing Identity Theft Beware the Trails You Leave Behind Use limitations: These materials may be used only for nonprofit, noncommercial educational.
Protecting Your Identity: What to Know, What to Do.
1 Identity Theft and Phishing: What You Need to Know.
Protecting Yourself Against Identity Theft TSCPA Member Name, CPA Firm/Company Name.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
8 Mistakes That Expose You to Online Fraud to Online Fraud.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
How To Protect Your Privacy and Avoid Identity Theft Online.
Internet safety By Lydia Snowden.
Internet Safety Dr. Steve Broskoske Misericordia University.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Have You Lost Your Identity? By Sierra Bowland. Deter Detect Defend.
Who Is This?! By Bailey Hoover. Foreword Deter Detect Defend Deter, Detect, Defend Brochure ID Theft: What It’s All About.
Have Fun, Be Safe Strategies for Internet and Social Media Safety.
Identity Theft By: Victoria Tuttle. DeterDetect Defend.
WHEN BAD THINGS HAPPEN TO GOOD NAMES IDENTITY THIEVES FRADULENTLY USE YOUR PERSONAL INFORMATION TO.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Staying Safe Online Keep your Information Secure.
Identity theft: Real or Virtual? By: Alex Metzler.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Identity theft By Joey Pawoll. intro DeterDetectDefend.
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
Legal Division CSAA Insurance Group, a AAA Insurer Protecting Your Identity: What to Know, What to Do 2015 Risky Business Week.
Protecting Yourself Against Identity Theft By Sierra Monif Next.
Be Cautious of Identity Theft By: Sydney Langley.
Computer Security By Joey Pawoll. Introduction to computer security Have you been wondering how to be safe online? Well look no further! This powerpoint.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Identity Theft: Protect Yourself By Rachel Gaines.
Information Security Sharon Welna Information Security Officer.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Protecting Your Identity Anders Olson Computers III September 18, 2008.
By: Asfa Khan and Huda Mukhtar
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
Identity Theft How it happens and how to avoid it.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
Identity Theft: Prepare and Protect Yourself. What is Identity Theft? Identity theft occurs when someone uses your personal information, without your.
Cyber Safety Jamie Salazar.
BBB IDENTITY THEFT By Blake Bowland Computers III.
INTRODUCTION & QUESTIONS.
Identity Theft One of America's fastest growing crimes.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Carroll County Advisement Program FINANCIAL LITERACY *IDENTITY THEFT *MONEY MANAGEMENT.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Preventing Identity Theft. PREVENTING IDENTITY THEFT 2 Agenda Introduction What Is Identity Theft? Tips to Protect Yourself What to Do if You Have Been.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
Protecting Yourself Against Identity Theft A Financial Literacy Presentation by.
IDENTITY FRAUD Lesson 2-5. A Few Figures on Fraud… 1 in Americans are victims of identity fraud each year. $ Average out of pocket cost to.
Identity Theft: Protect Yourself Ronald J. Leach.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Protecting Your Identity:
Protect Your Computer Against Harmful Attacks!
Protecting Your Identity:
HOW DO I KEEP MY COMPUTER SAFE?
Internet Safety – Social Media
Identity Theft Samuel H. Slater.
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski, May

Introduction Internet: Good or Bad? Privacy/Security Issues Victims? What victims? Scams: How hard are they to spot? Scams: FBI/NW3C. Which ones have you heard of? Privacy Threats Tips to protect yourself Security Threats Tips to protect your computer Personal Privacy & Security - Z. Bahorski, May

Internet: Good or Bad? “Good” uses of the Internet “Bad” uses of the Internet Personal Privacy & Security - Z. Bahorski, May

4 Where the hackers are from! Trustwave Global Security Report 2012.pdf

Internet: Good or Bad? Should we keep it anyway? Quote: chap01# Personal Privacy & Security - Z. Bahorski, May

Privacy/Security Issues: What’s in a name? – Names with Positive connotations – Names with Negative connotations Personal Privacy & Security - Z. Bahorski, May

Privacy/Security Issues: How can people find information about us? Personal Privacy & Security - Z. Bahorski, May

Can we really remain anonymous when we use the Web? – How much can a web site tell about you and your computer just by you connecting to their web site? Go to: To whom is it advantageous to gather information about you? – Go to: Personal Privacy & Security - Z. Bahorski, May Privacy/Security Issues:

Computers NEVER forget! – Sign in to Google or Gmail – In location box, type in: – Why DOES Google keep track of Key words in Gmail Search phrases Personal Privacy & Security - Z. Bahorski, May

Victims? What victims? According to the United States Census: – there are now 313,310,928 million people in the United States with over 7 billion in the world (USCB, 2012). – The Federal Trade Commission (FTC) estimates that, “as many as 9 million Americans have their identities stolen each year” (FTC, n.d.). – That is almost 3 percent of the American population! Personal Privacy & Security - Z. Bahorski, May

Victims? What victims? Identity theft – Using another person’s name, personal identification (driver’s license number, social security number), credit card, or banking information for personal gain Taking advantage of credit history to:* – Buy a car (turn around quickly at an auction house) – Buy a house Taking advantage of credit card or banking info: – Get cash – Open and pay for a cell phone account – Buy goods or services Get government documents – for their new identity! Personal Privacy & Security - Z. Bahorski, May

Victims? What victims? Identity theft – What to do if you are a victim: – Keep a DETAILED log including dates, times, names and numbers called. Do these 4 things: 1.Call or go online and place a fraud alert: – TransUnion: ; – Equifax: ; – Experian: EXPERIAN ( ); Close the accounts that have been compromised. 3.File a complaint with the FTC to help police track like-thefts. 4.File a police report (give them a copy of your FTC complaint to add to the police report). From the FTC at: ml Personal Privacy & Security - Z. Bahorski, May

Privacy Threats Surveillance: – Cameras Look up! Cameras are “everywhere” (public places and in private places where posted) Look for these! You’ll be amazed! Case: Don’t take pictures in private places – Cookies For an explanation of cookies, go to: – Spying on Cell Phones: go to Personal Privacy & Security - Z. Bahorski, May

Privacy Threats Surveillance cont… – Keyloggers Record keys pressed on keyboard: Hardware or Software (easy to do, directions are available on the Internet!) How to Add a keylogger: – Is “FREE” Internet really “free”? Be careful of fake wi-fi – Just how much surveillance is allowed in the workplace? Go to: Personal Privacy & Security - Z. Bahorski, May

Tips to Protect Yourself! Protecting yourself online: – Go to: Youtube.com video: Online Security Tips and Most Used Passwords To Avoid – ure=relmfu ure=relmfu – 5 tips to help protect yourself online: (This list is from the PrivacyNowTV video) 1. Don’t use a single password 2. Never access online accounts through an link 3. Never click on popup ads 4. Macs are vulnerable to phishing scams 5. Use a dedicated credit card for online purchases Personal Privacy & Security - Z. Bahorski, May

Tips to Protect Yourself! Protecting yourself online: – (my 6 th ): Do not reply to an to “unsubscribe”! – (my 7 th ): NEVER post anything online that you don’t want posted on a billboard on I-94! Includes: Personal information, pictures, poetry, reports (papers), etc. Facebook (and their “partners”) can USE any picture that you post for any reason. ANY employer (current or future) can view anything you post onto Facebook. (Don’t think that only your friends can see your stuff.) They can pay for this. – (my 8 th ): Don’t use information (such as pet names) as passwords if you include that info online. Personal Privacy & Security - Z. Bahorski, May

Tips to Protect Your Computer! Protecting your computer: – Tips to help you protect your computer from viruses and spyware: 1.Keep your Operating System updated (don’t ignore updates!) 2.Install a firewall 3.Install antivirus software (2 if you can) 4.Do not open attachments from unknown sources 5.Do not run programs that you’ve downloaded from online unless you check it for viruses first! 6.Do not download from unknown sites. 7.Do not click on ads 8.DO surf wisely! Is the site REALLY worth the RISK? Personal Privacy & Security - Z. Bahorski, May

Contact Information Zenia C. Bahorski Ph.D. 511 Pray-Harrold Hall Department of Computer Science Eastern Michigan University Web page: people.emich.edu/zbahorski Images: Microsoft Clipart Personal Privacy & Security - Z. Bahorski, May