Presentation is loading. Please wait.

Presentation is loading. Please wait.

Class Name: Online Safety & Privacy Basics

Similar presentations


Presentation on theme: "Class Name: Online Safety & Privacy Basics"— Presentation transcript:

1 Class Name: Online Safety & Privacy Basics
Instructor: Don Gregory

2 Online Safety & Privacy Basics
What do you know about Usernames & Passwords?

3 Secure Passwords >>
A Video from Common Craft: Secure Passwords >>

4 The Password FEUD Let’s Play… Passwords 1 5 2 6 3 7 4 8
Top 8 answers on the board to this question… Name a popular 6 to 8 character password? Password 1 qwerty 5 123456 2 6 monkey 3 7 Letmein 4 abc123 8 dragon

5 25 Most Common (Worst) Passwords of 2012 Source: SplashData, Inc.
10…baseball 18…shadow 2…123456 11…iloveyou 19…Ashley 3… 12…trustno1 20…football 4…abc123 13… 21…jesus 5…qwerty 14…sunshine 22…Michael 6…monkey 15…master 23…ninja 7…Letmein 16…123123 24…mustang 8…dragon 17…welcome 25…password1 9…11111

6 Microsoft Password Strength Checker >>
Let’s do some password checking: Microsoft Password Strength Checker >>

7 Challenge Questions: Adding another layer of password security
A security challenge question is used as an authenticator by banks, cable companies and wireless providers as an extra security layer. They are a form of shared secret. Financial institutions have used questions to authenticate customers since at least the early 20th century. In the early 2000s, security questions came into widespread use on the Internet, as a form of self-service password reset. The best questions have answers that are: Simple Memorable Not limited to a small list of answers Can't be guessed or researched easily Don't change over time Source: //en.wikipedia.org/wiki/Security_question

8 Security Challenge Questions Challenge Questions >>
A Video from Indiana University: Challenge Questions >>

9 Which is a better Security Challenge Question?
Let’s Play… Which is a better Security Challenge Question? What was your childhood nickname? A. What is your mother’s maiden name? B.

10 Which is a better Security Challenge Question?
What is the name of the High School you graduated from? A. What is the name of your favorite childhood friend? B.

11 Which is a better Security Challenge Question?
What is your favorite color? A. What is your favorite movie? B.

12 Which is a better Security Challenge Question?
In what year was your father born? A. In what city or town did your mother and father meet? B.

13 Which is a better Security Challenge Question?
What was the name of your first pet? A. What is your pet's name? B.

14 PHISHING SPAM VS. Spam Spam is electronic junk mail.  The word “SPAM” refers to unsolicited, bulk and usally unwanted . Phishing Phishing attacks use or fake websites (clicking on a link) to steal personal and financial information or infect your computer with malware.

15

16 Phishing “Click Here” A Video from Common Craft: Phishing >>

17 Phishing Examples:

18

19 Basic ground rules for avoiding phishing scams
Don't personal or financial information. Do not click on links in s or reply to suspicious s … independently open a browser and type in the website address. This way, you control what sites you visit. Do not let a phisher direct you to a false site. Only provide personal or financial information through an organization's website if you typed in the web address yourself and you see signals that the site is secure, like a URL that begins with https (the "s" stands for secure). Be very cautious about opening attachments and downloading files from s, regardless of who sent them. These files can contain viruses or other malware that can weaken your computer's security. Be cautious about messages that come from people or places you do not know. Scammers sometimes use mail or contact lists that are not protected – be sure that you know who you are getting from. Be cautious of messages with no subject, or messages that are too general or out of character for the person sending the . If you suspect that a friend did not send a message, them in a separate message and ask. Sometimes other’s addresses can be “pirated” by scammers.

20 Public vs. Private (secure) Websites
Most of the Internet is like a public space: Like the lobby of a bank… Where others can overhear you, or see your information, or find your account information that you carelessly discard There are secure (private) sites that offer a higher level of information security: Like a Safe Deposit Box in a bank’s vault… Where only you and the bank have ANY access to your valuables and information

21 Rhode Island Property Database >>
What information about me is already public? Rhode Island Property Database >> Google >>

22 vs.

23 Importance of “SIGN OUT” / “LOG OFF”

24 Malware ~ GCFLearnFree
Malware = Malicious Software Malware ~ GCFLearnFree Malware ~ Google

25 Malware: Viruses, Worms, & Trojans
Refer to your handout for the similarities and differences of these 3 main types of malware threats… Best Practices for Combating Viruses, Worms, and Trojans Ensure that your operating system is up-to-date by applying the most recent patches and fixes recommended by the OS vendor (Microsoft, Apple, etc…) Have antivirus software installed on your system and download updates frequently to ensure that your software has the latest fixes. Make sure that your antivirus program can scan and files as they are downloaded. You may also want to consider installing a firewall.

26 Parental Controls >>
A Video from Microsoft… Parental Controls >>


Download ppt "Class Name: Online Safety & Privacy Basics"

Similar presentations


Ads by Google