WE ARE DATA By Hazim Zaidani Do you really think that your personal data is protected ? Well… Think Again !!!

Slides:



Advertisements
Similar presentations
Online Privacy A Module of the CYC Course – Personal Security
Advertisements

Are you Safe at Work? A look into Safety at the Workplace and Internet Security Presented by Sheila Gee.
Online Holiday Shopping Brings Great Deals – and Fraud This lesson is part of the iKeepCurrent TM Program, provided by iKeepSafe TM.
The Internet.
SECURITY CHECK Protecting Your System and Yourself Source:
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Scams Stevie's Scam School videos
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Company LOGO Internet Safety A Community Approach.
Identify a few method to dispose of the hard drive of computers.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
MANAGING YOUR ONLINE PROFILE WHAT DOES THIS MEAN AND WHY SHOULD YOU CARE? Sarah Morris UT Libraries.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
STAY SAFE ONLINE. STAY SAFE ONLINE! PLEASE MAKE SURE YOU LOGIN AT THE CORRECT BANK URL / ADDRESS 1.NEVER LOGIN VIA LINKS 2.NEVER REVEAL YOUR PIN.
TITLE : E-SAFETY NAME : ABDUL HAFIQ ISKANDAR BIN ROZLAN PROGRAM : SR221 NO.STUDENT :
Hacking Phishing Passwords Sourendu Gupta (TIFR).
ESCCO Data Security Training David Dixon September 2014.
Stay Safe & Secure Online. Outline Passwords Everyday Security Security Physical Security Protecting Personal Information.
Reliability & Desirability of Data
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
IT security By Tilly Gerlack.
ICT in Banking.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Protecting Yourself Against Identity Theft By Sierra Monif Next.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
Aware the Effect of Social Network For 1 Malaysia’s Safety Towards A Healthy Virtual Socialization.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
FINANCIAL MANAGEMENT 29 AUG 05 OC CARUSO. OVERVIEW BUDGETS CREDIT CARDS IDENTITY THEFT IMPORTANT FINANCIAL TOPICS FOR NEW COLLEGE STUDENTS.
3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook.
PRIVACY IN COMPUTING BY: Engin and Will. WHY IS PRIVACY IMPORTANT? They can use your computer to attack others (money, revenge) They can use your computer.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Justice Stillwell 1.  Pre paid cards are non- reloadable  Similar to credit cards  No line of credit needed  Make sure you have enough balance before.
Joel Rosenblatt Director, Computer and Network Security September 10, 2013.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
Activity 4 Protecting Ourselves. Keeping Safe There are lots of different ways we can be at risk on the Internet. How can we protect ourselves and keep.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
Protecting Your Identity © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Online Banking. Learning Objectives To learn how society has been affected by online banking.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Avira Home Office Products: In the year of its 30th anniversary, Avira is going from strength to strength! No experiments when it comes to security.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Common sense solutions to data privacy observed by each employee is the crucial first step toward data security Data Privacy/Data Security Contact IRT.
Digital Citizenship Unit 2 Lesson 1: Strong Passwords
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Attention Identity theft Definition
Protecting What’s Yours: Your Identity
SAfe and ethical use page
Online Safety.
Lesson 2- Protecting Yourself Online
Information Security Awareness 101
Protecting Your Identity:
Digital $$ Quiz Test your knowledge.
Internet Safety – Social Media
Lesson 2- Protecting Yourself Online
Presentation transcript:

WE ARE DATA By Hazim Zaidani Do you really think that your personal data is protected ? Well… Think Again !!!

We all live in a hyperconnected world

A world full with opportunities and accessibilities

Connection is made possible through the Internet, telecommunication networks and digital devices.

Tablet s Smartphon es Laptops

Interne t Social Media

We Malaysians use quite a lot of technology in our daily lives. However, most of us do not know how to secure our digital data !!!

How do we Malaysians secure our digital data? Be Alert of Imposters Make sure you know who is receiving your personal or financial information. Unless you know who you’re dealing with, don’t give out personal information over the phone or Internet.

Dispose of Personal Information Safely Before you dispose of a computer, destroy all personal information stored inside. Use a “disk- wiping” software to overwrite the whole hard drive.

Encrypt Your Data Secure your browser. Guard your online transactions by using encryption software that scrambles information you send over the Internet. Also, check for a “lock” icon before you send any personal or financial information online. This icon located on the status bar of your Internet browser means your information will be safe when it’s transferred. Keep Passwords Private Use strong passwords for your laptop, credit, bank, and other accounts. Be creative: have a variety of characters in your password. Avoid using the same password for everything.

Don’t Reveal Too Much on Social Networking Sites Too much information about yourself posted online can enable an identity thief to use it to answer ‘security’ questions on your accounts and obtain access to your money. Try to limit access to your networking page to a small group of friends.

Conclusio n All of us need to be well aware of our digital data. Now, every device is connected via various types of connections. So, it is essential for us to protect our data from intruders and cyber crime. After all, we are all data…

Everything is connected...

Are you?

Credit s Referenc es Audio personal-information-secure &v=By_82VFFCFA /cinematic-production- music/free-cinematic-stock- music-all-that-remains/ Music By Free Stock Music Graphics laptop-portable.jpg social-media-icons.jpg Software Used Microsoft Powerpoint 2013 Audacity

The End