Internet Security:Staying Safe, Having Fun, And Cruising The ‘NetDaniel OwensIT Security Professional
Agenda Introduction Staying Safe Having Fun Cruising The ‘Net Conclusion And Appendices
A Note About Good And Evil   Nothing in this world is purely good or purely evil –    to include the Internet and those wh...
With That Said… A Note About Me Currently   Working as a NASA contractor in IT Security Formerly   Worked for/with the…   ...
Agenda Introduction Staying Safe Having Fun Cruising The ‘Net Conclusion And Appendices
Protecting Your Computer Apply updates and patches   This includes for the Operating System, your web   browser, any plug-...
Protecting Your Privacy Don’t fill out online surveys or enter contests without permission   Many of these are simply ther...
Doubt Everything If you can’t verify someone’s identity, you can’t trust them with your information Anyone can post just a...
Doubt Everything (cont.)
Agenda Introduction Staying Safe Having Fun Cruising The ‘Net Conclusion And Appendices
Cyberbullying Often either a source of or voice for rumors   Common places are MySpace and Facebook Often successful only ...
Cyberpredators Few cyberpredators give out their real age, name, and other information   And anyone can find a picture onl...
If All Else Fails  Change your account name and password    Most bullies and predators won’t be able to track    you if yo...
Agenda Introduction Staying Safe Having Fun Cruising The ‘Net Conclusion And Appendices
Be Suspicious Of The Unknown Warez and Torrents   Many of the software and videos on these sites   are bugged in one way o...
Be Suspicious Of The Unknown(cont.)
Online Gaming Protect your privacy   Give out as little information as possible     And don’t have your screenname be your...
Agenda Introduction Staying Safe Having Fun Cruising The ‘Net Conclusion And Appendices
For More Information Media Awareness Network (MNet)   http://www.media-   awareness.ca/english/index.cfm Cyberbullying Res...
For More Information (cont.) Safe Internet Alliance   http://www.safeinternet.org/ GRC IT Security Office   http://itsecur...
Acknowledgements I stole the background from Microsoft I stole a lot from my experiences and previous writings
Upcoming SlideShare
Loading in …5
×

Staying Safe, Having Fun, And Cruising The ‘Net

542 views
464 views

Published on

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
542
On SlideShare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
7
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Staying Safe, Having Fun, And Cruising The ‘Net

  1. 1. Internet Security:Staying Safe, Having Fun, And Cruising The ‘NetDaniel OwensIT Security Professional
  2. 2. Agenda Introduction Staying Safe Having Fun Cruising The ‘Net Conclusion And Appendices
  3. 3. A Note About Good And Evil Nothing in this world is purely good or purely evil – to include the Internet and those who use it. -Daniel Owens
  4. 4. With That Said… A Note About Me Currently Working as a NASA contractor in IT Security Formerly Worked for/with the… Department of Defense (DoD) to include the NSA FBI MySpace Justice Department IBM Microsoft Xerox Oracle Booz Allen Hamilton Cisco SystemSecurities And many more…
  5. 5. Agenda Introduction Staying Safe Having Fun Cruising The ‘Net Conclusion And Appendices
  6. 6. Protecting Your Computer Apply updates and patches This includes for the Operating System, your web browser, any plug-ins and add-ons for the web browser, any games, and any other software Use Anti-Malware Software This includes antivirus, antispyware, and anti- adware software Examples Include (all free for home use): AVG and Avast! Spybot Search & Destroy Adaware
  7. 7. Protecting Your Privacy Don’t fill out online surveys or enter contests without permission Many of these are simply there to get information about you and some can be harmful Never give out sensitive information about yourself, your family, or others This includes addresses, school names, your full name, phone numbers, and your schedule/vacation data in advance Don’t open or respond to SPAM And don’t give your email address to just anyone
  8. 8. Doubt Everything If you can’t verify someone’s identity, you can’t trust them with your information Anyone can post just about anything on the Internet… pretending to be just about anyone Just like any other medium
  9. 9. Doubt Everything (cont.)
  10. 10. Agenda Introduction Staying Safe Having Fun Cruising The ‘Net Conclusion And Appendices
  11. 11. Cyberbullying Often either a source of or voice for rumors Common places are MySpace and Facebook Often successful only AFTER the victim starts to respond to the bully(ing) While it may be difficult, ignoring posts and simply blocking instant messages from people you don’t know is the best way to stop cyberbullying Can also include compromising a victim’s account and using it Again, MySpace and Facebook are common vectors, but so are Instant Messengers
  12. 12. Cyberpredators Few cyberpredators give out their real age, name, and other information And anyone can find a picture online Unsolicited instant messages, posts, and emails from strangers should never be responded to 40% of females have been solicited on the Internet at least once before graduating high school Males are vulnerable too Should be treated the same as bullying
  13. 13. If All Else Fails Change your account name and password Most bullies and predators won’t be able to track you if you change your information… unless you give it to them Don’t go there… Just don’t visit the site The Internet isn’t anonymous Well-trained professionals (and criminals) can track down almost anyone on the Internet If you’re a victim, talk to your parents and/or a trusted adult
  14. 14. Agenda Introduction Staying Safe Having Fun Cruising The ‘Net Conclusion And Appendices
  15. 15. Be Suspicious Of The Unknown Warez and Torrents Many of the software and videos on these sites are bugged in one way or another Free Games and Software Many of the freeware and shareware software gathers personal information Often the company owning the software then sells the data Unknown Websites Some sites are designed to install malware onto visitor computers
  16. 16. Be Suspicious Of The Unknown(cont.)
  17. 17. Online Gaming Protect your privacy Give out as little information as possible And don’t have your screenname be your real name Find a ‘room’ where you feel both safe and comfortable and stay there If things start to go downhill, leave and don’t come back Avoid games with monthly fees These often require you to give credit card information and other data that an attacker can steal from the server
  18. 18. Agenda Introduction Staying Safe Having Fun Cruising The ‘Net Conclusion And Appendices
  19. 19. For More Information Media Awareness Network (MNet) http://www.media- awareness.ca/english/index.cfm Cyberbullying Research Center http://www.cyberbullying.us/ NetAlert http://www.netalert.gov.au/ OnGuard Online http://www.onguardonline.gov/
  20. 20. For More Information (cont.) Safe Internet Alliance http://www.safeinternet.org/ GRC IT Security Office http://itsecurity.grc.nasa.gov STOP Cyberbullying http://www.stopcyberbullying.org/
  21. 21. Acknowledgements I stole the background from Microsoft I stole a lot from my experiences and previous writings

×