DIGITAL SECURITY PART 2 TOOLS. phising  Internet criminals can steal your personal and banking information without you ever noticing – they can do it.

Slides:



Advertisements
Similar presentations
Online Privacy A Module of the CYC Course – Personal Security
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Primary Threats to Computer Security
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Company LOGO Internet Safety A Community Approach.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
GONE PHISHING ECE 4112 Final Lab Project Group #19 Enid Brown & Linda Larmore.
By: Daniel Krueger ITC 525: Computers for Educators Summer II 2010 Click Here to Begin.
FRAUD, ONE OF THE FASTEST GROWING SEGMENTS OF OUR INDUSTRY Joseph Bajic, Chief Compliance Officer and Vice-President, Compliance.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Web Browser Security Prepared By Mohammed EL-Batta Mohammed Soubih Supervised By Eng. Eman alajrami Explain Date 10. may University of Palestine.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
IT security By Tilly Gerlack.
Move Pictures From Your Mobile Phone to Your PC.  You never know when a photo opportunity is going to arise, which is why having a camera phone can be.
1. Self Awareness You should only access your accounts and private informations from a safe location (only at home as necessary if at all possible) where.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
Computer Security By Rachel Gaines. Computers are used for work, play, and everything in between. So here’s how to keep it fun and protected.
Types of Electronic Infection
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Protecting Students on the School Computer Network Enfield High School.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Onguardonline.gov By Austin Kellogg. Main ideas  Protect your personal information  Know who your dealing with  Use security software that updates.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Any criminal action perpetrated primarily through the use of a computer.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Managing Money Workshop The National Autistic Society AGM
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
Computer Security Keeping you and your computer safe in the digital world.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Have a Safe Shopping Online Experience. Did You Shop Online Today?  Anything you need today is available online. Whether it’s groceries, jewellery, clothes,
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Hotspot Shield Protect Your Online Identity
Learn how to protect yourself against common attacks
Unit 4 IT Security.
Information Security 101 Richard Davis, Rob Laltrello.
Protect Your Computer Against Harmful Attacks!
Lesson 2- Protecting Yourself Online
STOP. THINK. CONNECT. Online Safety Quiz.
Cybersecurity Awareness
Digital $$ Quiz Test your knowledge.
HOW DO I KEEP MY COMPUTER SAFE?
9 ways to avoid viruses and spyware
Internet Safety – Social Media
What is Phishing? Pronounced “Fishing”
Lesson 2- Protecting Yourself Online
Presentation transcript:

DIGITAL SECURITY PART 2 TOOLS

phising  Internet criminals can steal your personal and banking information without you ever noticing – they can do it while you’re online shopping, reading , or just browsing online. Phishing is when fraudsters send an pretending to be a bank or other trusted source and ask you to confirm your personal information. A link in the connects you to a phony site that looks just like the legitimate one. Pharming – an even sneakier way that fraudsters can gain access to your computer and personal information – uses malicious programs that can get installed on your computer when you simply click on a link in an or view an image on a web page.

Tips to protect yourself against phising  When entering sensitive information (bank account numbers, credit card information, social security number, mother's maiden name) online look for “shttp://” or " in the address line of your browser. This means information is being sent securely.  Never click on a link in an directing you to a Web site. Manually type the Web site address into your browser to be sure you are not misdirected.  To prevent pharming, use anti-virus and anti-spyware software and be sure to keep them up to date.  Don't give out personal information unless you've initiated the contact or are sure with whom you are dealing.  ·Look for Web site privacy policies. They should answer questions about maintaining accuracy, access, security, and control of personal information collected by the site, how the information will be used, and whether it will be provided to third parties. If you don't see a privacy policy – or if you can't understand it – consider doing business elsewhere.

Tools to use  Phish Tank,  Fried Phish, The above two sites are used to report suspected phising websites. Comodo group offers free secure browsing experience to ensure you are protected against any form of fraudulent online activity There are many other organizations that focus in ensuring safety online.

ANONYMOUS BROWSING  The best website for anonymous experience is Tor. tor project.org/ It ensures that your browsing habits and location is protected. It even gives you a different IP address to make your detection impossible. Tor is a good tool for media journalists to protect their sources and research.

MOBILE SECURITY  Encrypted communication is the way to go if your concern is privacy and security.  Media, activists and techies value privacy and security in their field.  Tools like: surespot  ChatSecure

Encryption  The most common channel of effective communication is via .  We apply or jobs, make online payments and verify with our account, share confidential reports and work resources through .  Rarely do we think its important to encrypt our important communications.

Tools for encryption  Mozilla thunderbird mozilla.org/ thunderbird / downloadhttps://www. mozilla.org/ thunderbird / download  Enigmail enigmail.net/ download / enigmail.net/ download /  All your s will then be imported to thunderbird for encrypted safe keeping.

Encrypting your hard drive  Download truecrypt and use it to create a partition on your hard drive for secure storage of important files.  This is an effective way to protect your data from prying eyes and safe from both internal and external access.  NOTE: Truecrypt has been compromised and so I would suggest use of bitlocker. For all windows machines, they have bitlocker installed by default and all you need to do is turn it on as it uses TPM ( Trsuted Platform Module)hardware to protect your files and drive. Select a drive of chice that has all your important files and folders then turn on bitlocker to protect them. Whenever you add new files and folders to the drive, they automatically become encrypted.