Protecting Your Personal Information November 15, 2013.

Slides:



Advertisements
Similar presentations
Part I: Making Good Online Choices
Advertisements

TECHNICOOL A Technology Safety Program © 2011 PCAV.
Helping our customers keep their computers safe.  Using your pet’s, business, family, friend’s names  Using number or letter sequences (0123, abcd)
Internet Safety May 2014 – KS3 AIMS  To find out what you know about staying safe online  To improve on your knowledge on internet safety  To be clear.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
What you don’t know CAN hurt you!
THAT STRANGER IS NOT YOUR FRIEND Facebook 101:. Housekeeping This presentation is not exhaustive It is just enough information to get you started; making.
Internet Security Passwords.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
How To Protect Your Privacy and Avoid Identity Theft Online.
Information Assurance Outreach. Overview Survey Results Password Security Safety Internet Privacy Social Media Privacy and Safety Technology Demonstration.
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
MANAGING YOUR ONLINE PROFILE WHAT DOES THIS MEAN AND WHY SHOULD YOU CARE? Sarah Morris UT Libraries.
How to Create (and use) Strong & Unique Passwords Larry Magid Co-director ConnectSafely.org.
STRONG PASSWORDS Common Sense Unit 2-Lesson 1 (Cross-Curricular Categories) Privacy and Security.
How To Protect Your Privacy and Avoid Identity Theft Online.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
Introduction Our Topic: Mobile Security Why is mobile security important?
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Information guide.
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
By: Brandee Burke.  This is an interactive slideshow that is going to teach you all about how to be safe while using the internet and also other kinds.
Online Social Networking. Agenda Survey Results What is Online Social Networking? Popular Online Social Networking Sites Privacy Settings for Facebook.
Staying Safe Online Keep your Information Secure.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
 Facebook  Twitter  MySpace  Windows LiveSpace.
Agenda Last class: Internet Literacy Lab Today: Internet Safety.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
Overview Internet Privacy & Safeguards Social Networking Potential Threats Cyber-bullying.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
How to be Safe Online. Online Access How many of you go online? What are your favorite things to do online? Who accesses the Internet from their smart.
Securing Your Facebook Identity Nicholas A. Davis, CISA, CISSP UW-Madison Division of Information Technology 11/10/2015 UNIVERSITY OF WISCONSIN1.
2 nd Grade.  ______ make passwords eight or more characters long.
INTERNET SAFETY FOR KIDS
Internet Safety Mr. Richard Orr Technology Teacher Murphy Jr. High School.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
MY ONLINE CODE In the last 2 years of digital literacy I have learned the proper ways to act and why to act that way online, I have also learned other.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
My Good Deed for Safer Internet Day Calum - 4W My good deed for Safer Internet Day 2015 is: Always try to help others and teach your parents or.
By John Williams. Why Secure Passwords Matter Passwords protect everything about you online. Once those passwords are discovered and used by someone else.
Chloe Hutton. Mobile phones are a very popular piece of technology and its main use is to contact people either through ringing people up or texting.
Facebook 101 This class contains content from Saint Paul Public Libraries, Project for Pride in Living, and GCFLearnFree.org.
By Jessica Parkinson. Mobile phones have allowed our generation to connect with others all over the world. However, the potential threats are numerous,
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Awareness raising session for Parents and Carers June Todd Awareness raising session for Parents and Carers June Todd.
Social Networking Practices. Information Security Purpose is to protect your information’s Confidentiality Integrity Availability.
1. Guard your privacy. What people know about you is up to you. 2. Protect your reputation. Self-reflect before you self-reveal. What’s funny or edgy.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
YEAR 6’S GUIDE TO STAYING SAFE ON THE INTERNET. CHATTING When you are chatting to people online, try not to give out any personal information about yourself.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Digital Citizenship Unit 2 Lesson 1: Strong Passwords
AN INTRODUCTION TO FACEBOOK. Learning Objectives A brief introduction to the social networking site Facebook. Instructions to create an account. How to.
Technological Awareness for Teens and Young Adults.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Unit 4 Protecting Your Information Section C. Chapter 1, Slide 2Starting Out with Visual Basic 3 rd EditionIntroduction to ComputersUnit 4C – Protecting.
Internet Safety.
Creating your online identity
Dove science academy Cyber Club
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Information Security.
Ways to protect yourself against hackers
Social Media: What You Should Know
DOVE SCIENCE ACADEMY CYBER CLUB
What you can do to support people to be safe online
Introduction to Computers
Presentation transcript:

Protecting Your Personal Information November 15, 2013

Introductions Who are we? Why are we here? –Part of our course work is Community Education and Outreach. We want to help you understand a little more about Information Security

Overview Social Networking and You (example: Facebook) Passwords Cell Phone Security Quiz Game

Facebook celeb story

Demonstration Fake Facebook account, set up with all privacy defaults –Tara Welsh (randomly generated name) – –Password: tara1234

Tara’s Facebook Settings Tour Tara’s Page

Tara’s Facebook

What Would Make it Better? What suggestions do you have to make Tara’s Facebook page more secure?

Tara’s Facebook Page- Improved Stronger privacy settings –Only friends Less personal information Be careful who she accepts as friends Don’t tag places she is A strong password!

Protecting Your Future Most hiring managers and HR departments use search engines to research applicants. Men and women Google each other when they first begin dating. Colleagues at your company and companies you collaborate with look for information about you on Google –they use that information to make judgments upon you. Once posted, always posted. –Facebook continues to store information after it has been deleted.

Forbes Survey

Creating a Strong Password Even if data is hidden, protection is highly dependent on the password used to secure the data- not just for social networking! Strong passwords: –At least 8 characters –Should not be dictionary words or something that relates to you (pet names, birthday, etc.) –Includes numbers and symbols –Upper and Lower case –Don’t use the same password for multiple sites

Password Managment Strong passwords can be difficult to create/remember, but there is software that can help! Software can: –Generate strong passwords –Securely store passwords –Organize –Be automatically retrieved Examples: –LastPass (demo this) –1Password –KeePass BUT REMEMBER! The security of all of these passwords is only as strong as the master password

Password Activity Come up with your own secure password using the guidelines Test your password using Intel’s password checker

Celeb Cell Phone Story

Cell Phones Has a TON of personal information –Your friends/family –Pictures – addresses –Logins for social networking sites –Browsing history Security is incredibly important for cell phones! –If your phone is stolen, the thief has access to all of this information. Having secure passwords may be irrelevant. A hacker can spend a ton of time trying to crack your password, or they can just wait until you leave your cell phone laying around and easily have access.

Protecting Your Cell Phone Make sure it has a password Know it’s location and physically secure it Set it to lock automatically after no activity Turn off features you aren’t using (Bluetooth) Erase all data before giving it away

Symantec study Protecting personal info –A total of 89 percent of devices showed attempts to access personal apps or data. –Attempts to access a private photos app occurred on 72 percent of the devices. –An attempt to access an online banking app was observed on 43 percent of the devices. –A “Saved Passwords” file was accessed on 57 percent of the phones

Questions?

Team Quiz Interactive game –5-6 Groups –Team name –Questions regarding material pesented –Prize for the winning team

Question 1 What reasons would a hiring manager reject a candidate based on their social networking profile? a. pictures of the candidate drinking alcohol b. pictures of the candidate at a Christmas party c. pictures of the candidate with someone the hiring manager dislikes d. all of the above

Question 2 True or False: A strong password should be one of your pets’ names.

Question 3 True or False: It is important to keep your password as simple as possible so that you do not forget it.

Question 4 Why is it important to protect information in your cell phone? a. thieves may attempt to hack your “saved passwords” b. thieves may be able to access your online banking account c. thieves may attempt to access private photos d. all of the above

Question 5 What sort of information would a thief obtain from your phone that might be harmful to you if obtained? a. a text message about homework b. a picture that you would not want anyone else to see c. your address d. both b and c

Question 6 True or False: You can use software to help you create and retrieve your password.

Question 7 Which of the following is an example of a software program that can be used to create and retrieve a password? a. MyPassword b. 1Password c. CantGuessThis d. ProtectPassword

Question 8 Which of the following is a reason you need to be careful about what you post on your social networking site? a. Once posted, always posted. b. Hiring managers may reject you for inappropriate posts/pictures c. Future friends, colleagues, and possible “dates” will likely google search your name d. all of the above

Question 9 True or False: If you give/sell your phone to someone, you should leave everything on it so that person can use the apps you have bought.

Question 10 Which of the following is a strong password? a. dD0g8myH*mewor& b. MyDog8MyHomework c. MyDog1234 d. d*ggg&&

Question 11 How often should your passwords be changed? a. Every day b. Every month c. Every 6 months d. Never

Question 12 True or False: Facebook’s default privacy settings are sufficient

Question 13 True or False: In the demo, Tara’s password is strong enough because it has numbers.

Question 14 Someone can get information about you from: a. Your phone b. Your Facebook profile c. Google d. Your friend’s Facebook profile e. All of the above

Question 15 True or False: In the Symatec study, most people did not try to access personal information from the lost cell phone.

Question 16 True or False: The information about what hiring managers look at doesn’t matter for you because you won’t be looking for a job for a long time.

Question 17 True or False: Your cell phone should have a password when it locked/idle even if you don’t have a smart phone.

Question 18 True or False: Facebook is evil and no one should use it, ever.

Question 19 Which of the following are good ways to protect your personal information? a. Secure devices and accounts with passwords that are easy to remember b. Talk to your friends and family about good security practices c. Use strong passwords wherever possible d. Both b. and c.

References user-deleted-content/4808http:// user-deleted-content/ prospective-employers-hope-to-see-in-your-facebook-account- creativity-well-roundedness-chastity/ prospective-employers-hope-to-see-in-your-facebook-account- creativity-well-roundedness-chastity/ theft/ theft/ at-risk/ at-risk/