Download presentation
Presentation is loading. Please wait.
Published byBaldwin King Modified over 7 years ago
1
Digital Security Identity theft Copyright Laws Plagiarism, and More
2
Internet protocol address
Your personal information cannot be easily discovered, an IP address can reveal your approximate geographic location. Any s you send from your computer or mobile devices have an IP address attached to them. Use caution when doing so. Aka an IP address, is a number used to identify and electronic device connected to the internet.
3
Secure Websites Public Wi-Fi hotspots should be avoided. (you inadvertently put yourself at risk to exposing your data because they are generally not secure sites). Hackers can also create illicit hotspots in locations where free or paid public Wi-Fi exists. To protect yourself online, ensure that you are transmitting data over secure web pages. A secure URL begins with HTTPS. The S stands for secure. This is not 100% fool proof, but generally is a sign of protection . Be wary of uploading personal information on sites that do not display a protection icon.
4
Users unknowingly connect to the incorrect network, which allows the hacker access to any data being transmitted over that connection. The signal with the best strength may not always be the legitimate hotspot. If a Wi-Fi authentication screen ask for credit card information, confirm that the Wi-Fi connection is legitimate. Hacking Is illegally accessing or altering digital devices, software, or networks.
5
May also contain the personal information you enter on a website.
Most cookies are from legitimate websites and will not harm your computer. If a hacker gains access to your computer, you are at risk. Cookies can also be used to target you for a scam based on your internet history. Cookies Are bits of data stored on your computer that record information about the website you have visited.
6
Protect yourself from Cookies
Prevent them from being accepted by the browsers. Delete cookies on a regular basis. Cookies can also be removed by running a disk cleanup utility.
7
A common form of phishing is sending a fraudulent e- mail that appears to be from a legitimate source, such as a bank. The asks for certain information such as Social Security number or bank account. Sometimes it provides a link, looks real but is used solely to commit fraud. Phishing The use of fraudulent s and copies of valid websites to trick people into providing private and confidential data.
8
Avoid phishing. . . Most legitimate organizations do not sue to request this type of information. Never provide confidential information in response to an unsolicited . Avoid clicking a link to a website in an It is better to enter the website URL into a web browser. Never open an attachment that you are not expecting.
9
Beware of an invitation to click on a website link for more information about an advertisement, as the link may trigger malware. One click can activate a code, and your computer could be hacked or infected. Malware comes in many forms including spyware, Trojan horses, worms, and viruses. Malware short for malicious software, is a term given to software programs that are intended to damage, destroy, or steal data.
10
Often affected users are not aware that spyware is on their computer.
Trojan horses are malware usually disguised to appear as a useful or common application in order to convince people to download or use programs. They perform malicious actions on the user’s computer such as destroying data or stealing information. They do not self-replicate, nor do they infect other files. Spyware Software that spies on a computer by capturing private information, such as messages, usernames, and passwords, bank accounts, and credit cards.
11
Software virus: is a computer program designed to negatively impact a computer system by infecting other files. A virus may destroy date on the computer, cause malfunction, bring harm to a network, or steal information. Viruses can be introduced by a computer in may ways, e.g., downloading infected files from an or website.
12
Firewall is program that monitor information coming into a computer and helps to ensure that only safe information gets through. Virus protection should have a firewall. Virus protection helps safeguard a computer and should be used on any computer or electronic device that is connected to the Internet or any type of network. Virus protection software is referred to as antivirus or antimalware software.
13
Digital Security Do not be lulled into a false sense of security when communicating online. Be especially careful with who you do not know personally. Avoid opening s that look suspicious. Use common sense when deciding what personal details you share, especially your address, social security number, etc. Resist the urge to share too much information that could be stolen.
14
Identity Theft Avoid Identity Theft There are many ways that your personal information can be stolen (lost credit card, driver’s license, etc.) Criminals also steal physical mail to commit identity theft; called dumpster diving. However, computer technology has made identity theft through digital means the most prevalent. Be wary of how much information that you share on social networking sights. If you suspect that your identity has been stolen, visit the Identity Theft website provided by the Federal Trade Commission for resources and guidance. Identify theft is an illegal act that involves stealing someone’s personal information and using that information to commit theft or fraud.
15
How can I protect my identity?
On the computer: Use passwords that are not easy to guess. Use numbers and symbols when you can. Do not respond to s or other messages that ask for personal information. Do not put personal information on a computer in a public place, like the library. Shop on secure websites. They have an address that starts with “https”. Have security software on your own computer. There are many precautions that you can take when you are on the computer. Always use passwords that are not easy to guess. When you can, include numbers and symbols. If you receive s or messages that ask for personal information, do not respond. Never put your personal information on a computer that is in a public place such as a library. Only shop on secure websites. Usually secure websites begin with https. Note the s at the end. It could also be helpful to download or purchase security software for your computer.
16
Create a Security plan Secure Passwords Secure Settings
A security plan should be in place for your computer in general. Consider downloading and running antivirus software for your devices. Create a strong secure password. Do not use the obvious such as your date of birth, important names, etc. Create a Security plan Secure Passwords Secure Settings Back Up Your Computer
17
Become familiar with the settings and features on your browser when accessing the Internet. Enabling a pop-up blocker prevents your browser from allowing you to see pop-up, ads, which can contain malware. Back up your computer – this saves your data just in case a virus invades your computer or the hard disk crashes, it may be too late to retrieve your files and computer programs.
18
Secure Passwords Do not be careless or in a hurry.
Do not use passwords that contain easily guessed information. Do not use the same passwords for multiple accounts or profiles. Do change your passwords often. Do record your passwords on a dedicated and secure hard-copy documents.
19
Resources
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.