Online
Security

Amanda L. Goodman, User Experience Librarian
Darien Library, January 2014

Source: http://www.flickr.com/...
Story Time!

Source: http://www.flickr.com/photos/looking_and_learning/8400360699
The Bad News

Source: http://www.darientimes.com/22805/darien-residents-identity-stolen-to-buy-online-goods
The Good News
Protecting yourself is easy!
Know the signs of a
scam, use strong
passwords, and
protect your
computer from
...
Your Online User Account
Be fake!

Create a fake persona for
yourself and use its
information when creating
accounts onlin...
Your Online User Account
Be fake!

Protect yourself:

Do not use your real personal data
I.e. not your mom’s maiden name

...
Scam Messages
Do not click!

Scammers and spammers
want to take your identity
and money.
Shows up on:
All social networks
...
Scam Messages
Do not click!

Giveaways of a scam:
No photo
No text but just a URL
Beware of messages like:
~ “You won’t be...
Scam Emails
Do not click!

Email scammers prey on
gullibility, greed, empathy,
and loneliness.
Shows up on:
All email prov...
Scam Emails
Do not click!

Giveaways of a scam:
Unreasonably high salary
Looking for no experience
or says you can work
fr...
Scam Emails
Do not click!

Giveaways of a scam:
Wants to transfer you money

From a foreign prince
A dead family member
So...
Phishing
Do not click!

Phisers want to hack
your account and steal
your information.
Shows up on:
All social networks
Ema...
Phishing
Do not click!

Giveaways of a scam:
Claims there’s an issue with
your account

Wants you to click on a link to
lo...
Phishing
Do not click!

How to check if real:
Hover over the URL

See if it really goes to the exact URL the email
claims ...
Romance Scam Emails
Do not click!

Giveaways of a scam:
Wants you to transfer money
For goods, services, plane tickets

Sw...
Scams
Protect yourself!

To learn more:
Wikipedia

en.wikipedia.org/wiki/Nigerian_scam

5 Common Email Scams
1.usa.gov/1fz...
Email Attachments
Do not open unless you are expecting an attachment!

Email hackers send
damaging attachments via
email t...
Email Attachments
Do not open unless you are expecting an attachment!

Giveaways of a scam:
Attachment(s) from a friend bu...
Passwords
Keep ‘em fresh!

Changing your passwords
frequently is the best
security measure.
Shows up:

Everywhere you go o...
Passwords
Keep ‘em fresh!

Source: https://xkcd.com/936
Passwords
Keep ‘em fresh!

Protect yourself:
Use different passwords for
important sites
E.g. bank, email, shopping sites
...
Two Factor Authentication
Add an extra level of protection!

Use a second layer of
authentication when
accessing your onli...
Two Factor Authentication
Add an extra level of protection!

Protect yourself:
Enable two factor authentication
You will n...
WiFi & Public Computer Safety
Be aware!

When on public WiFi
networks or computers, be
careful to not give away
your perso...
WiFi & Public Computer Safety
Be aware!

Protect yourself:
Stay off sensitive information sites
E.g. bank, email, shopping...
HTTPS
Use secure connections!

Encrypt your data as you
browse the web.
Shows up:

Many popular, major websites already of...
HTTPS
Use secure connections!

Protect yourself:
Download a browser extension that
tries to use HTTPS everywhere it is
ava...
Web Browser
Use a secure browser!

Keeping your browser up
to date is essential for safe
online usage.

Easy level:
Very e...
Web Browser
Use a secure browser!

Protect yourself:
Choose a better browser

My recommended browsers are Google
Chrome an...
Read Your Credit Report
It’s free!

Federal law guarantees
your access to an online
copy of your credit report.

Easy leve...
Read Your Credit Report
It’s free!

Protect yourself:
Get your free credit reports
https://www.annualcreditreport.com

Rep...
Viruses
Get yourself some anti-virus software.

Free

Paid

avast! Free Antivirus

Norton

avast.com/index

us.norton.com/...
Online
Privacy
Source: http://www.flickr.com/photos/avissena/6131373743/in/photostream/
COPPA
The Children’s Online Privacy Protection Act

The purpose of the law: How parental permission
Children under 13 cann...
CIPA
Children’s Internet Protection Act

Benefits to schools
The purpose of the law:
& libraries:
“to address concerns abo...
Protecting Children in the 21st Century Act
Works alongside CIPA

The purpose of the law:
To educate minors on appropriate...
Cyberbullying
24/7/365 access to the victim

Online bullying is worse
than traditional bullying.
Violent & sexual crimes
a...
Child Pornography Laws
Minors get charged too.

The PROTECT Act of 2003 & 18 U.S. Code §
1466A

criminalizes “knowingly or...
Teens & Online Privacy
They can hide it better.

Wrong assumption:

Teens don’t care about privacy

Truth:

60% of teens h...
Erasable History
Let it go. Let it go.

Delete, delete, delete.

Teens are learning to leave no trace of their
online pres...
Other Tips
Pay attention!

Protect yourself:
Follow the news to learn which
sites were hacked

Be mindful of others’ priva...
You are responsible for your online
security.
By being aware of what’s happening online and how your data
can be compromis...
Upcoming SlideShare
Loading in …5
×

Online Security & Privacy: Updated

1,742 views

Published on

Seen these slides before? Skip to slide 33 to see the new content. I presented these slides to an Online Security Workshop for Parents.

Property of Darien Library

Published in: Education, Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,742
On SlideShare
0
From Embeds
0
Number of Embeds
1,030
Actions
Shares
0
Downloads
12
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Online Security & Privacy: Updated

  1. 1. Online Security Amanda L. Goodman, User Experience Librarian Darien Library, January 2014 Source: http://www.flickr.com/photos/theeerin/7606588048/
  2. 2. Story Time! Source: http://www.flickr.com/photos/looking_and_learning/8400360699
  3. 3. The Bad News Source: http://www.darientimes.com/22805/darien-residents-identity-stolen-to-buy-online-goods
  4. 4. The Good News Protecting yourself is easy! Know the signs of a scam, use strong passwords, and protect your computer from hackers. Source: http://www.flickr.com/photos/seandreilinger/5739375222
  5. 5. Your Online User Account Be fake! Create a fake persona for yourself and use its information when creating accounts online. Ease to do: Moderately easy Source: http://www.flickr.com/photos/whiteboard_dave/8462689688/
  6. 6. Your Online User Account Be fake! Protect yourself: Do not use your real personal data I.e. not your mom’s maiden name Create a story for yourself Love a book character to death? Use their story information for your account Remember your fake details Source: http://www.flickr.com/photos/librarygoblin/6888540425
  7. 7. Scam Messages Do not click! Scammers and spammers want to take your identity and money. Shows up on: All social networks Instant messaging Text messages Difficulty to spot: Very easy
  8. 8. Scam Messages Do not click! Giveaways of a scam: No photo No text but just a URL Beware of messages like: ~ “You won’t believe what they said about you!” ~ “Check out this video of you.” Nonsense username
  9. 9. Scam Emails Do not click! Email scammers prey on gullibility, greed, empathy, and loneliness. Shows up on: All email providers Difficulty to spot: Depends Source: http://www.flickr.com/photos/nbr/3705010877
  10. 10. Scam Emails Do not click! Giveaways of a scam: Unreasonably high salary Looking for no experience or says you can work from home.
  11. 11. Scam Emails Do not click! Giveaways of a scam: Wants to transfer you money From a foreign prince A dead family member Someone trying to leave a dangerous situation Language is unusual English grammar is very weak Urges urgency Source: http://www.flickr.com/photos/librarygoblin/6888540425
  12. 12. Phishing Do not click! Phisers want to hack your account and steal your information. Shows up on: All social networks Emails Difficulty to spot: Moderately difficult Source: http://www.flickr.com/photos/djwaldow/4679640891
  13. 13. Phishing Do not click! Giveaways of a scam: Claims there’s an issue with your account Wants you to click on a link to log in or reactivate account Warnings of doom if you do not immediately comply
  14. 14. Phishing Do not click! How to check if real: Hover over the URL See if it really goes to the exact URL the email claims to be from Check the email address of the sender Beware of close URLs like gmale instead of gmail Know who will not send you such an email AKA your bank, the IRS, the FBI, etc. If in doubt, go the website directly and log in
  15. 15. Romance Scam Emails Do not click! Giveaways of a scam: Wants you to transfer money For goods, services, plane tickets Sweet talks you “Love of my life” “No one has made me feel like this before” Avoids meeting you Source: http://dailym.ai/17zMPKm
  16. 16. Scams Protect yourself! To learn more: Wikipedia en.wikipedia.org/wiki/Nigerian_scam 5 Common Email Scams 1.usa.gov/1fzsdCS Urban Legends snopes.com Latest Email Hoaxes www.hoax-slayer.com Source: http://dailym.ai/17zMPKm
  17. 17. Email Attachments Do not open unless you are expecting an attachment! Email hackers send damaging attachments via email to take over your computer. Shows up on: All email providers Difficulty to spot: Easy Source: http://www.flickr.com/photos/ari-herzog/3346927141
  18. 18. Email Attachments Do not open unless you are expecting an attachment! Giveaways of a scam: Attachment(s) from a friend but no text in the email body Attachment(s) from a stranger Attachment file ends in .exe or .rar
  19. 19. Passwords Keep ‘em fresh! Changing your passwords frequently is the best security measure. Shows up: Everywhere you go online Easy level: Very easy **********
  20. 20. Passwords Keep ‘em fresh! Source: https://xkcd.com/936
  21. 21. Passwords Keep ‘em fresh! Protect yourself: Use different passwords for important sites E.g. bank, email, shopping sites Do not leave your password cheat sheet lying around Keep your password to yourself Use a password manager E.g. LastPass, Dashlane, KeePass **********
  22. 22. Two Factor Authentication Add an extra level of protection! Use a second layer of authentication when accessing your online accounts. Shows up: Gmail Twitter Facebook Dropbox Easy level: Easy after setting up PayPal And more
  23. 23. Two Factor Authentication Add an extra level of protection! Protect yourself: Enable two factor authentication You will need a code, a password, or answer a question to log into a site where you have enabled two factor authentication Remember how to access your accounts Or you will not be able to log into the site You may need your mobile phone if your site uses an app to generate the access code More information http://bit.ly/17zkjEy
  24. 24. WiFi & Public Computer Safety Be aware! When on public WiFi networks or computers, be careful to not give away your personal information. Ease to do: Moderately easy
  25. 25. WiFi & Public Computer Safety Be aware! Protect yourself: Stay off sensitive information sites E.g. bank, email, shopping sites If on public WiFi, know that someone could be “sniffing” and stealing your data Student recommended using Hotspot Shield Always sign off all sites you log into on a public computer
  26. 26. HTTPS Use secure connections! Encrypt your data as you browse the web. Shows up: Many popular, major websites already offer HTTPS security so your data is encrypted. Easy level: Very easy
  27. 27. HTTPS Use secure connections! Protect yourself: Download a browser extension that tries to use HTTPS everywhere it is available on the web https://www.eff.org/https-everywhere Available for Firefox and Chrome browsers Check for HTTPS in the URL If a site which is handling sensitive data like financial information or Social Security Numbers does not use HTTPS, do not input your information
  28. 28. Web Browser Use a secure browser! Keeping your browser up to date is essential for safe online usage. Easy level: Very easy
  29. 29. Web Browser Use a secure browser! Protect yourself: Choose a better browser My recommended browsers are Google Chrome and Firefox (my bias) Add protective features to the browser AdBlock Plus HTTPS Everywhere Disconnect extension Keep My Opt-Outs Do Not Track Disable third party cookies http://bit.ly/14mVK2Q
  30. 30. Read Your Credit Report It’s free! Federal law guarantees your access to an online copy of your credit report. Easy level: Moderately easy Source: http://www.experian.com/assistance/free-annual-credit-report.html 123-45-6789
  31. 31. Read Your Credit Report It’s free! Protect yourself: Get your free credit reports https://www.annualcreditreport.com Reports are from three major reporting agencies Experian Equifax TransUnion Get a single report from a single agency every 4 months This way you can watch your credit report throughout the year 123-45-6789
  32. 32. Viruses Get yourself some anti-virus software. Free Paid avast! Free Antivirus Norton avast.com/index us.norton.com/antivirus AVG Free Bitdefender Antivirus Plus free.avg.com bitdeferender.com
  33. 33. Online Privacy Source: http://www.flickr.com/photos/avissena/6131373743/in/photostream/
  34. 34. COPPA The Children’s Online Privacy Protection Act The purpose of the law: How parental permission Children under 13 cannot give out is gathered: personal information without the consent of their parents ~ Signature via postal mail or email ~ A credit card for a transaction ~ A 1-800 number for parents to call Be aware: Children who have online accounts like email and social media can lose their accounts if its discovered that they’re younger than 13. Source: http://www.ftc.gov/news-events/media-resources/protecting-consumer-privacy/kids-privacy-coppa & http://www.coppa.org/comply.htm
  35. 35. CIPA Children’s Internet Protection Act Benefits to schools The purpose of the law: & libraries: “to address concerns about children’s access to obscene or harmful content over the Internet” especially in schools and libraries ~ Reduced rates for Internet access What schools & libraries must do: ~ Implement filtering software ~ Create an Internet safety policy in regards to minors Source: http://www.fcc.gov/guides/childrens-internet-protection-act
  36. 36. Protecting Children in the 21st Century Act Works alongside CIPA The purpose of the law: To educate minors on appropriate online behavior Education outline: ~ Posting responsibly ~ Cyberbullying ~ Creating a positive online profile ~ Consider the consequences of your actions Source: http://www.fcc.gov/guides/childrens-internet-protection-act & Michael Oide of OITP
  37. 37. Cyberbullying 24/7/365 access to the victim Online bullying is worse than traditional bullying. Violent & sexual crimes against the victim are shared via social media.
  38. 38. Child Pornography Laws Minors get charged too. The PROTECT Act of 2003 & 18 U.S. Code § 1466A criminalizes “knowingly or distributing ‘an obscene visual depiction of a minor engaging in sexually explicit conduct; or a visual depiction of an actual minor engaging in sexually explicit conduct.’” Source: http://www.law.cornell.edu/uscode/text/18/1466A & http://en.wikipedia.org/wiki/PROTECT_Act_of_2003
  39. 39. Teens & Online Privacy They can hide it better. Wrong assumption: Teens don’t care about privacy Truth: 60% of teens have private Facebook profiles & 26% post fake information about themselves Source: http://www.theguardian.com/technology/2013/oct/21/teenagers-careless-about-online-privacy
  40. 40. Erasable History Let it go. Let it go. Delete, delete, delete. Teens are learning to leave no trace of their online presence for others to find. Self-destructing services: Secretink.co Snapchat Wickr Source: http://www.theguardian.com/technology/2013/oct/21/teenagers-careless-about-online-privacy
  41. 41. Other Tips Pay attention! Protect yourself: Follow the news to learn which sites were hacked Be mindful of others’ privacy Do not give your password or PIN to your child No such thing as a free lunch Change your password immediately on that site They could run up charges by making purchasing on your iPad or iPhone Family and friends may not want their name, photo, or other information posted online Visiting pornography or free download sites (i.e. movies, music, etc.) may expose your computer to viruses
  42. 42. You are responsible for your online security. By being aware of what’s happening online and how your data can be compromised, you are now ready to protect yourself!

×