Protecting Your Identity © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.

Slides:



Advertisements
Similar presentations
Online Privacy A Module of the CYC Course – Personal Security
Advertisements

Review Ch. 3 – Connecting to the Worlds Information © 2010, 2006 South-Western, Cengage Learning.
Part I: Making Good Online Choices
TECHNICOOL A Technology Safety Program © 2011 PCAV.
Internet Safety James Fuller Internet Rules To Remember When asked by friends or strangers, online or offline, never share Account IDs and Passwords.
The Internet.
Social media threats. Warning! May contain mild peril.
A guide to protecting your money and your identity KEEPING MONEY SAFE Keeping money safe Money Works: Level 1 Topic 3.
Kevin Mitnick Home Internet Security Course Today, Internet criminals are going after families. They try to guess your passwords and steal your credit.
Lesson 11 Using Online Banking. Key Terms Account Transfer – online transfer of money; ex. Savings to checking acct. Fraud – using trickery to convince.
Using internet and cell phones safely
Internet Security Awareness Presenter: Royce Wilkerson.
How To Protect Your Privacy and Avoid Identity Theft Online.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Protecting Your Identity While Attending College.
Staying Safe Online Keep your Information Secure.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Donette Mullinix ED 505 UWA Clipart:
Suggested grade levels 7-12 Students will explore strategies that promote personal safety when using the texting-based social network, Twitter.
Legal Division CSAA Insurance Group, a AAA Insurer Protecting Your Identity: What to Know, What to Do 2015 Risky Business Week.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
BY: CHASIDY TUCKER Digital Citizenship Project. Plagiarism Pass off ideas of others without crediting the source.
WE ARE DATA By Hazim Zaidani Do you really think that your personal data is protected ? Well… Think Again !!!
Identity Theft Since 2005, there has been a dramatic increase in the occurrence of identity theft among students online.
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
Internet Safety Mr. Richard Orr Technology Teacher Murphy Jr. High School.
Consumer Protection Shop Safely and Guard Your Financial Information.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away.
Building Structures. Building Relationships. Passwords February 2010 Marshall Tuck.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
By: Nikki Tucker MARSHALL MIDDLE SCHOOL 7 TH GRADE MR. DRYER.
Protecting Your Assets By Preventing Identity Theft 1.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Internet safety.. Dangers of the internet: Paedophiles. Cyber bullying. Money theft. Sexual harassment. Identity theft. Hacking of your accounts. Viruses.
Safety in the digital world. Survey Thank you for completing the Information Security Survey!
Cybersecurity Test Review Introduction to Digital Technology.
1. Guard your privacy. What people know about you is up to you. 2. Protect your reputation. Self-reflect before you self-reveal. What’s funny or edgy.
Internet Safety By Blair Number 1 Use a nickname not your real name.
Password Theft By: Markie Jones. Road Map Do’s Do Not’s What can someone do with it? How do they get it? Who’s most at risk? When & Where are consumers.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Identity Theft: Protect Yourself Ronald J. Leach.
Technological Awareness for Teens and Young Adults.
Computer Security Keeping you and your computer safe in the digital world.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Information Technology Security Office of the Vice President for Information Technology New Employee Orientation II.
PASSWORD SECURITY A Melbourne Athenaeum Library
Key words: Secure | Password | Character
Internet Identity, Safety, & Security
Protecting What’s Yours: Your Identity
ARE YOU A TARGET? YOU MAY NOT REALIZE IT, BUT YOU ARE A TARGET FOR CYBER CRIMINALS. IDENTITY THEFT IS ON THE RISE. BE AWARE AND TAKE PREVENTIVE ACTIONS.
Lesson 2- Protecting Yourself Online
STOP. THINK. CONNECT. Online Safety Quiz.
Digital Citizenship and Social Media
Staying safe on the internet
Bethesda Cybersecurity Club
ICT Communications Lesson 3: Internet Life and Privacy
E SAFETY ASSEMBLY.
Internet Safety – Social Media
InformatiOn Technology Services
Lesson 2- Protecting Yourself Online
Safe, secure and empowered
Presentation transcript:

Protecting Your Identity © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering

More than 50% of employers now use social media to screen candidates Why Protect Your Public Persona Why Protect Your Private Data Identity theft: Predators borrow money in your name Malware uses your personal data to attack your friends Most identity theft from year olds

Malware steals your data and makes your devices slow or non-functioning Criminals attack others from your devices More than 30% of devices are compromised, but most attacks can be prevented with simple measures Why Protect Devices and Software

Assume digital data are "forever" Assume digital data are public How to Protect Your Privacy

Don’t reveal personal information Don't share name and address Be skeptical Review and adjust privacy settings when creating an account Beware default settings Remember posts are permanent and public Safety on Social Sites

Use strong passwords: mix cases, numbers, and symbols use many characters, not just words Use different passwords on different systems Memorable doesn't have to be easy to guess. E.g., use mnemonic passphrases: Nd!2singsonGs (No doubt! to sing songs) Good Passwords

Never send or use password "in the clear," i.e., unencrypted Don't share passwords Don't store passwords in the browser Look away when someone types a password Respect Passwords

Read your bank statement Check your credit report annually annualcreditreport.com but beware spoofs of that address Monitor for Identity Theft

Use credit card rather than debit card Use a secondary for public use Safe Shopping