Tot edu eng.


Published on

Internet safety

Published in: Education
1 Like
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • Slide 10: You see kindness and cruelty on social networksTALKING POINTSThe good news is that most of you who use social media say that in your experience, people your age are generally kind to one another on social networks. The researchers found that 78 percent of teens surveyed reported at least one positive outcome from their interactions on social network sites. [click]However, the researchers also found that 88 percent of you had witnessed someone being mean or cruel to another person on a social network.Just out of curiosity, how many of you have observed someone being mean or cruel on a social network? [click]
  • Slide 11: What you do online doesn’t stay onlineTALKING POINTSWhen the researchers looked deeper into online cruelty, they found that 69 percent of the teens in the study thought that their peers were mostly kind to each other, but more than a third (41 percent) said they had experienced at least one of the negative experiences the researchers asked about. [click]25 percent of teens who use social media had an experience that resulted in a face-to-face argument or confrontation with someone. [click]22 percent had an experience that ended their friendship with someone. [click]8 percent had a physical fight with someone because of something that happened on a social network site. [click]6 percent got in trouble at school because of an experience on a social site.Clearly, what teens experienced online had a direct impact on their “real” lives. With these statistics in mind: How many of you have had an experience online that affected your real life?What can you do if you see mean behavior on a social network?[The last three questions below are just different ways to elicit the response you’re looking for. You probably won’t need to ask all of them.]What do you think you can do to be a better friend on social sites?What advice would you give to someone about how to reduce online drama?What can you do if you see someone being bullied online?[DISCUSSION TAKES PLACE.]Let’s see the tips Microsoft’s safety experts came up with and how they compare with what you said. [click]NOTES FOR SPEAKERHere are some of the answers to your questions that may come up—you’ll be looking for these to transition to the safety tips on the next slide.Tell the person causing the drama to stop it.Don’t participate in drama—don’t post mean comments or pictures.Don’t ignore bullying or drama.Stand up for your friends. Don’t be a bystander.Don’t make private stuff about others public.What do we mean by “drama?“ This term has already popped up a couple of times in this presentation but is more central to the point here. It is based on studies by Danah Boyd at Microsoft Research, that showed that teenagers “describe many interpersonal conflicts playing out in their lives as drama,” including bullying.To get a glimpse into her ideas, read this opinion piece (that she co-authored with Alice Marwick) in the New York Times (September 2011): “Bullying as True Drama:”
  • Slide 19: Connect honestly and carefullyTALKING POINTSRemember the story of the players who pirated a game and were locked out of playing on Xbox? Download files legally and use web content honestly for school work. [click]
  • WW average CCM in 3Q12 = 5.3WW average CCM in 4Q12 = 6.0
  • WW average CCM in 3Q12 = 5.3WW average CCM in 4Q12 = 6.0
  • The Do Not Track header sends a signal to websites that you prefer not to have information collected about your visit used to track you as you browse the web.
  • According to DefinitionsSocial engineering is a term that describes a non-technical kind of intrusion thatrelies heavily on human interaction and often involves tricking other people to breaknormal security procedures. A social engineer runs what used to be called a "con game".“I explained that I could often get passwords and other pieces of sensitive information from companies bypretending to be someone else and just asking for it.” (Mitnick, 2002)“Two things are infinite: the universe and human stupidity; and I'm not sure about the universe.” Albert Einstein quotesMurphy’s Law says human error will creep into the most secure security systems.
  • Now you can use mobile apps to manipulate any one to give you personal information
  • Copy from an e-mail of young female that was stolen and exploited by a criminal – Egyptian police local case.Identity theft worse more than a car theft
  • Slide 13: Pirated programs are not a gameTALKING POINTSThe night the Xbox® game “Call of Duty: Modern Warfare 2” went on sale, thousands of gamers lined up hours in advance to snap up the first copies when the game was released at the stroke of midnight.But up to a million other gamers chose the piracy route, modifying their Xbox consoles to bypass the digital rights management features so they could download illegal copies of the game. Now they’re paying for it. Most of those players were banned from Xbox LIVE®—up to a million players!—for playing pirated versions of Microsoft games. These gamers learned the hard way that theft has consequences and that you’re never truly anonymous with digital files and devices. There are other ways you can connect honestly and carefully on the web. [click]NOTES FOR SPEAKERDepending how talkative your group has been, it’s quite possible that you won’t have time to include this point. In that case, skip this slide and the next. When you get to the “recap” slide (slide 15), summarize the points below, to give a slightly more substantive summary than you will on the other slides.
  • By:VyacheslavZakorzhevsky Kaspersky Lab ExpertWhile the freebie lover is waiting for the result, two pieces of malware that were stealthily installed and launched by the dropper make themselves at home on the PC. One of these is detected by Kaspersky Lab as Trojan.MSIL.Agent.aor. It steals registration data for other programs, as well as passwords, mostly for online games.
  • Pirated software as a threat vector
  • Used to conduct a variety of attacksSpamDenial of serviceClick fraudMore malware distribution
  • Drive-by download means two things, each concerning the unintended download of computersoftware from the Internet:Downloads which a person authorized but without understanding the consequences (e.g. downloads which install an unknown or counterfeit executable program, ActiveX component, or Java applet).Any download that happens without a person's knowledge, often a computer virus, spyware, malware, or crimeware.[1]Wikipedia
  • Example on how social media apps and quizzes can collect and identify personal information.Information from Allowing Access to ProfileName: Mellissa OurtheE-mail: mali437@Juno.comInformation from QuizzesBasic PersonalHeight: 5’1”Hair: Blonde and WavyEyes: BrownPierced NoseFavoritesFavorite Color: PurpleFavorite Candy: Reese’s Peanut Butter CupsFavorite food: MexicanFavorite drink: SodaFavorite Movie: Wall-E & Finding NemoFavorite Animal: CatsPersonality-Drives a minivan-Most important thing is family-Always carries cell phone with her-Self-proclaimed procrastinatorThere are three ways that the harvested information could be used: SpearPhishing, Impersonation or Identity Theft, and In-Person Attack or Scam.
  • Each click on any link is will install and activate malicious content.
  • Microsoft Security Essentials provides real-time protection for your home PC that guards against viruses, spyware, and other malicious software.Microsoft Security Essentials is a free* download from Microsoft that is simple to install, easy to use, and always kept up to date so you can be assured your PC is protected by the latest technology. It’s easy to tell if your PC is secure — when you’re green, you’re good. It’s that simple.Microsoft Security Essentials runs quietly and efficiently in the background so that you are free to use your Windows-based PC the way you want—without interruptions or long computer wait times.It’s easy to tell if your PC is secure — when you’re green, you’re good. It’s that simple.When y are red … y have a problem!Windows Defender detects and removes spywareWindows Defender is software that helps protect your computer against pop-ups, slow performance, and security threats caused by spyware and other unwanted software by detecting and removing known spyware from your computer. Windows Defender features Real-Time Protection, a monitoring system that recommends actions against spyware when it's detected, minimizes interruptions, and helps you stay productive.The benefits of installing Windows Defender include:Spyware detection and removalWindows Defender quickly and easily finds spyware and other unwanted programs that can slow down your computer, display annoying pop-up ads, change Internet settings, or use your private information without your consent.Windows Defender eliminates detected spyware easily at your direction, and if you inadvertently remove programs that you actually want, it's easy to get them back.Windows Defender allows you to schedule your scanning and removal times when it's convenient for you, whether it's on-demand or on a schedule that you set.Improved Internet browsing safetyWindows Defender helps stop spyware before it infiltrates your computer. Windows Defender also offers a continuous safeguard designed to target all the ways that spyware can infiltrate your computer.Windows Defender works without distracting you. It runs in the background and automatically handles spyware based on preferences that you set. You can use your computer with minimal interruption.Protection against the latest threatsA dedicated team of Microsoft researchers continuously searches the Internet to discover new spyware and develop methods to counteract it.A voluntary, worldwide network of Windows Defender users helps Microsoft determine which suspicious programs to classify as spyware. Participants help discover new threats quickly and notify Microsoft analysts, so that everyone is better protected. Anyone who uses Windows Defender can join this network and help report potential spyware to Microsoft.To help protect your computer from the latest threats, you can choose to have updates that counteract new spyware automatically downloaded to your computer.
  • For starters, before you enter sensitive data on a Web form or page, look for two things:1. Signs that the site uses data encryption: https (“s” is for secure).A closed padlock. It must be here, beside the Web address, or in the lower right corner of the window. 2. Signs of a trusted site, such as the green address bar in Windows® Internet Explorer®. The graphic in the slide shows what each of those things looks like in your browser.That’s the first strategy for protecting sensitive information. Another precaution you can take is to think before you click.
  • BE SUSPICIOUS OF ATTACHMENTS AND LINKS. There are several reasons to use caution: Senders can be phony. A virus (the colds and flu of computing, designed to spread to other computers) may have sent the mail you just received.Spyware can hide in e-mail attachments. Open one and you may download spyware which can track what you do on your computer. It may enable criminals to collect company or personal information, record account numbers and passwords as you type, or bombard you with pop-up ads.Click links or download videos and photos and you could be downloading a virus along with them. Links can go to phony Web sites.Toll-free numbers can go to fraudulent call centers.Keep in mind: If you click, you catch. MESSAGES ON SOCIAL SITES:Just because the e-mail message says it’s a LinkedIn update, doesn’t mean it is.Messages you get when you’re using a social site such as Facebook, LinkedIn, and Twitter can have viruses or be trying to entice you to divulge sensitive information, too. TO REPEAT: “THINK BEFORE YOU CLICK” IS A BEST PRACTICE FOR PROTECTING SENSITIVE DATA, but you also need to be on the lookout for scams and fraud in e-mail and instant messages.
  • Use the Red “X” to Close Pop-upsWhile you are surfing the Internet, if you see a pop-up window, never click any buttons in the window to close the window. Always use the red “X” in the corner of the pop-up window. Even though the pop-up window shows buttons saying “No,” or “Cancel,” criminals can program these buttons to trigger an action you don’t expect. Clicking any button, or even clicking anywhere in the pop-up window, could cause your computer to download unwanted software. The red “X,” usually found in the upper right corner of the pop-up window, is controlled by the browser program and is a safe way to close pop-up windows. With Internet Explorer 7, you can also press ALT+F4 to manually close a pop-up window.
  • CONFIRM WITH THE SENDER THAT THE E-MAIL OR INSTANT MESSAGE IS REALCall the company using a number you already have for it.Or check it against what you find on Bing, Google, or an online phone directory.To visit the site, TYPE THE WEB ADDRESS YOURSELF instead of clicking the link in the message.Or, use your own bookmark or favorite.USE A BROWSER WITH SAFETY FEATURESSuch as the anti-phishing feature (SmartScreen® Filter) and the pop-up blocker that’s on by default in Internet Explorer 8.If you’re ever in doubt about a site, consult a Web site that identifies known scams:Such as way to protect sensitive data is to use strong passwords.
  • You lock your house, your car, your bike. You also need to lock up corporate assets, client info, accounts, computers, mobile phones, etc. To do this on your computer:KEEP PASSWORDS SECRETIf stolen, everything they protect is at risk. Don’t share them with friends, colleagues, or businesses.Don’t use the same password (or simple variations) for different accounts or services.Don’t store passwords on your phone or in a file on your computer or on a post-it on your computer. It’s okay to store them on a well-hidden sheet of paper.Don’t let someone trick you into revealing them.CHANGE THEM OFTEN: Change the important ones regularly—like the one for your computer or mobile phone.MAKE THEM STRONGAt least eight characters. Upper and lower case letters, numbers, and symbols.Easy for you to remember and hard for others to guess.Avoid number sequences, your pet’s name, birth date, Social Security numbers, and the like. Don’t use words that you can find in the dictionary.Avoid using only look-alike substitutions of numbers or symbols.Choose a sentence that’s easy to remember and difficult for others to guess and use it as the basis of a password. (See below for an idea about how to present this.)CUSTOMIZING THE PRESENTATION: Ask the group to create a phrase that’s eight words or longer—like the first line of a favorite song. Take the first letter of each word to make the password. Substitute numbers or symbols for some of the letters—like “3” for “E” or “!” for “L.”
  • CUSTOMIZING THIS PRESENTATIONThis is an opportunity for the audience to test their password knowledge. There are several ways you can handle this:If you have a white board or flip chart, you can do this as a group activity: One password at a time, ask the group to decide whether it’s strong or not and discuss why.If people have paper and pen, ask everyone to do this as a task either by themselves or in pairs.Or simply give everyone a minute or two to think about which of these are strong, and which weak. When you’re ready to see the results, go to the next slide.
  • EXPLAINING THE ANSWERS:WEAK. Only numbers, possibly a Social Security number, which criminals can easily find online.WEAK. A date—birth or anniversary date, for example—can be known and easily found by a criminal.WEAK. Don’t use words you can find in any dictionary in any language (expeditious). Criminals will not be fooled by common look-alike replacements such as “3” for “e”.STRONG. Letters, symbols, numbers, not a word found in the dictionary.WEAK. Only numbers. Avoid sequences (or repeated numbers, like 22222222).STRONG. A sentence that’s easy to remember, but difficult for others to guess. Eight characters or longer.Take the first letters of this sentence: My son Aiden was 3 years Old in December. Add complexity by mixing upper and lower case letters, symbols, and numbers.Having reviewed many ways you can protect sensitive information, let’s look at the third way to avoid a bad day…
  • …protecting devices when you’re away from workThese include laptops, thumb drives (USB or flash drives), mobile phones.DO YOUR DEVICES HAVE THE LATEST PROTECTION?Make it part of your travel routine. Update before you leave.GUARD YOUR DEVICES LIKE YOU DO YOUR WALLET.For example, lock your mobile phone when you’re not using it. DON’T HAND-CARRY SENSITIVE DATA.On your laptop or thumb drive.It’s not worth the risk. If you lose it, anyone can access it.If you must take sensitive data, encrypt it. However, encryption only slows access to data; it doesn’t prevent access from a determined hacker after really valuable data.IF YOU USE YOUR THUMB DRIVE IN ANOTHER COMPUTER:That computer may be infected and could corrupt the thumb drive and ultimately your computer.When you re-insert the drive into your computer, click the Close button in any message that pops up so you don’t give any malware a chance to run.But you need to do more than protect the physical devices when you’re on the road…
  • BitLocker helps keep everything from documents to passwords safer by encrypting the entire drive that Windows and your data reside on. Once BitLocker is turned on, any file you save on that drive is encrypted automatically.BitLocker To Go—a new feature of Windows 7—gives the lockdown treatment to easily-misplaced portable storage devices like USB flash drives and external hard drives.
  • …Wireless hotspots can be risky, so here are ways to connect to the Web more safely: CONNECT SECURELY. Choose:The most secure connection, even if it means paying for it. Ask about it before you connect.WEP (at least) that encrypts (or scrambles) data as it travels between your laptop and the wireless access point. (WEP stands for Wired Equivalent Privacy. It is a system of data encryption that prevents access to a wireless network.) A password-protected connection, ideally one that is unique for your use.KNOW WHO YOU’RE CONNECTING TOConfirm the exact spelling of the network you’re connecting to. Beware of clever (slightly misspelled) fakes. For example: HLTONHOTELSNET vs. HILTONHOTELSNET. (There’s no “I” in the first Hilton.)Check the privacy statement on the network's Web site. No privacy statement? Wait until you return to the office to conduct sensitive business.SAVE SENSITIVE USES FOR MORE TRUSTED CONNECTIONSDon’t bank or make other financial transactions at a wireless hotspot.Don’t download, install, or update software.Use e-mail with the understanding that it can open the door to illegal access to corporate networks and data.Turn off the wireless connection when you’re not using it.
  • Tot edu eng.

    1. 1. Corporate Citizenship Keeping Children Safe Omar Hamdy | Microsoft Egypt CTZ
    2. 2. Worldwide Internet Users 2 BILLION+ 62 BILLION Internet users worldwide e-mails circulate 95% DAILY Some estimates suggest upwards of 95% of all e-mail is “SPAM” 5% The online world is “the world” of today’s child; no separation between “online” and “offline”
    3. 3. Parents’ Top Concern Microsoft Survey Online conversations with strangers 70% Age 10-12 65% Age 13-17
    4. 4. How do we use the internet in education? •Keeping in touch even after school hours. •Using the internet to access studying resources. •Using the internet for researches. •An interactive way for students to communicate . •No boundaries between the parents and the teachers.
    5. 5. How this helps you as a teacher? •Simplifies the way of communication. •Helps all the participants to know that technology isn’t only for entertainment. •Sets you as a role-model in using technology and the internet.
    6. 6. The Connection In order to use the technology in education you must be aware of the issues that might encounter you. •Online Reputation. •Internet Safety.
    7. 7. Online Security Versus Online Safety Safety: We must act in ways that help protect us against the risks that come with Internet use. Security: We must secure our computers with technology in the same way that we secure the doors to our homes.
    8. 8. Inappropriate content Top Online Risks for Children Exposure to potentially dangerous contact Cyber bullies
    9. 9. 1- Beef up computer’s defenses and keep them up to date 2- Beef up computer’s defenses and keep them up to date Top 10 Tips For Online Safety 3- Think first; Click later 4- Be protective of personal information 5- Make sure Web sites protect your personal information 6- Set clear, age-appropriate rules for Internet use 7- Use family safety software and up-to-date technology 8- Guidance not control for tweens and teens 9- Keep Communication Open With your children 10- Use Family Contracts to help protect your kids on line!
    10. 10. Key Points • The Internet is both a classroom and a virtual playground where children can explore, learn, and have fun • Older children use the Internet to form social networks • Just as there are places in every city and town that are unsafe or inappropriate for children and teenagers, there are places online that are not safe for kids • Learning about the risks children may encounter on the Internet, and how you can reduce those risks, will help you keep your family safer online
    11. 11. 1- Beef up computer’s defenses and keep them up to date 2- Beef up computer’s defenses and keep them up to date Top 10 Tips For Online Safety 3- Think first; Click later 4- Be protective of personal information 5- Make sure Web sites protect your personal information 6- Set clear, age-appropriate rules for Internet use 7- Use family safety software and up-to-date technology 8- Guidance not control for tweens and teens 9- Keep Communication Open With your children 10- Use Family Contracts to help protect your kids on line!
    12. 12. Online Reputatio n An online reputation is the publicly held social evaluation of a person based on their behavior; what they say, and what others say about them.
    13. 13. Online Reputatio n Online Reputation can affect child education, career and social life… His online actions, expressions, pictures is his life-long reputation that he can not ever remove and will accompany him to collage, work and later on when he himself is a parent.
    14. 14. Online Reputation and professional life •Your students watch you online and consider you a role model. •First impression online and Reputation AT work is through your social network pages. •You represent the school you work in, online AT ALL times! •Bad online reputation can get you fired!
    15. 15. You see kindness and cruelty on social networks 78% 88% of teens surveyed reported at least witnessed crueltyone positive experience
    16. 16. What you do online doesn’t stay just online 8% 6% 22% 25% physical trouble fight ended aat face-to-face school friendship argument
    17. 17. The effect of Online Reputation o Can Online Reputation affect your employment potential? o Can it affect your social life? Your Online Reputation can either benefit or harm you, it is your choice!
    18. 18. Online Reputation impact future decisions • 70.5% believe that it is considered in hiring decisions. • 30% believe that it is considered when being accepted into a school or college • 86% believe that affects friendship decisions • 80% believes it affects marriage decisions
    19. 19. Online Reputation and professional life • HR managers research job applicants online • First impression and Reputation AT work is that AT your social network pages. • You represent the company you work in online AT ALL times!
    20. 20. What you post on the internet affect you, your family and your friends. Online Reputatio n and Social life • Your pictures and actions on the internet is a memory you will keep forever. • How you behave online is a reflection on your values and your family. • You affect the lives of your friends whenever you post anything about them on the internet
    21. 21. PROTECT your online reputation Read the privacy policy of any site before sharing personal information online Use privacy settings on social networking sites that determine who can access and respond to your content Use the alert feature provided by some websites that automatically notifies you of any new mention of your name or other personal information Respect others privacy!
    22. 22. Think before you post • Don’t post anything you’d ordinarily say only to a close friend. This includes details that could identify you or locate you in person–your address, workplace, phone number, birth date, etc. • Use caution when sharing feelings– whether you’re happy, sad, angry, or have money worries; predators prey on emotions. • Talk with family and friends about their privacy. Remove from your pages any info that doesn’t conform to their wishes.
    23. 23. Connect honestly and carefully
    24. 24. • Express yourself and defend your position but don’t use any abusive language. Guard Your Reputatio n • Do not post anything in anger. • Do not share personal Data, Personal information can put you at RISK! • Remember your boss, your parents, and your future kids will see everything you are posting.
    25. 25. Bullying
    26. 26. Digital Citizen Being online today is more than simply surfing the web—it’s a way of life. Learning and connecting through technology is now vital to our daily routine, which means being a good digital citizen takes on greater importance. It means educating ourselves about both the benefits and risks of our online world, and then developing the habits that can help us stay safer there. Microsoft offers six essential steps that each of us can take to help protect our devices, information, and families as we learn, explore, and interact online.
    27. 27. Abusive Emails
    28. 28. Do not forward what you are not sure of! Take Responsibilit y!
    29. 29. Pranks can destroy lives
    30. 30. Primary Threats to Computer Security Viruses/Worms Trojans Software programs designed to invade your computer, and copy, damage, or delete your data. Viruses that pretend to be helpful programs while destroying your data, damaging your computer, and stealing your personal information. Spyware Software that tracks your online activities or displays endless ads.
    31. 31. Malware and potentially unwanted software categories in Egypt in 2013, by percentage of computers reporting detections Top Threats
    32. 32. Primary Threats to our information Phishing E-mail sent by online criminals to trick you into going to fake Web sites and revealing personal information Spam Unwanted e-mail, instant messages, and other online communication Identity Theft A crime where con artists get your personal information and access your cash and/or credit Hoaxes E-mail sent by online criminals to trick you into giving them money
    33. 33. Phishing sites
    34. 34. Blocked mail volumes in 1H13 were up slightly from 2H12, but remain well below levels seen prior to the end of 2010.
    35. 35. Enjoy private browsing with IE 10 Privacy Features • InPrivate Browsing • InPrivate Filtering • Browse confidently with built-in tools like SmartScreen Filter and Tracking Protection that let you be more aware of threats to your PC and your privacy. • Do Not Track header.
    36. 36. Scam Emails
    37. 37. “Amateurs hack systems, professionals hack people.” Bruce Schneier. Social Engineerin g Ian Mann, (2008) author of “Hacking the Human,” defines social engineering as the following: “To manipulate people by deception, into giving out information, or performing an action”
    38. 38. Example of social Engineering Tools
    39. 39. Identity Theft
    40. 40. Pirated programs are not a game
    41. 41. Non Geniune Operating system
    42. 42. Non Genuine Operating system
    43. 43. Cracks
    44. 44. Organized Crime Counterfeit Software Botnet Malware, botnets and organized crime In a 2013 study, IDC estimated that consumers would spend $22 billion and 1.5 billion hours dealing with security issues from counterfeit software that year alone.
    45. 45. Distribution of Counterfeit and Pirated Software Counterfeit Ecommerce Online Marketplaces BitTorrent P2P Downloads One-Click Downloads PC Malls
    46. 46. What is a botnet? Attacker Command and Control Server Bots Victim Botnets are networks of infected computers that can be remotely controlled by an individual or organization
    47. 47. Social Engineering & Social Media
    48. 48. Social Engineering & Social Media
    49. 49. Why Attacks Occur? The reasons that network attacks occur include: • Revenge • Espionage • Publicity • Personal satisfaction • Terrorism
    50. 50. Defend your Computer Turn on Windows Internet firewall Use Microsoft Update to keep Windows up-to-date automatically Install and maintain antivirus software Install and maintain antispyware software
    51. 51. Turn on Windows Internet Firewall help protect your PC from hackers and malicious software. It creates a protective barrier between your computer and the Internet
    52. 52. Use Automatic Updates to Keep Software Up-to-date •Install all updates as soon as they are available •Automatic updates provide the best protection •Windows 8 Action Center The new Windows 7 Action Center in the Control Panel helps you make sure that your firewall is on, your antivirus software is up to date, and your computer is set to install updates automatically
    53. 53. Install and Maintain Antivirus Software • Antivirus software helps to detect and remove computer viruses before they can cause damage. • For antivirus software to be effective, you must keep it up-todate.
    54. 54. Install and Maintain Antispyware software Use antispyware software, like Microsoft Windows Defender, so unknown software cannot track your online activity and potentially steal your information. Windows Defender include: Spyware detection and removal Improved Internet browsing safety Protection against the latest threats
    55. 55. Can you identify this software ?
    56. 56. Defend your computer against viruses, spyware, and other malware Microsoft Security Essentials is a free download for Windows 7 that helps protect your computer from viruses, spyware, worms, Trojans, and other malware.
    57. 57. #2: Protect sensitive data. • Think before you enter sensitive data • Be suspicious of attachments and links • Look out for scams and fraud • Create strong passwords
    58. 58. Think before you type. • Look for https (the “s” is for secure) • A closed padlock means secure, too • Are there signs the site is trustworthy?
    59. 59. Think before you click. Be suspicious and aware of: E-mail and IM attachments and links Messages within social sites
    60. 60. Use the Red “X” to Close Pop-ups •Always use the red “X” in the corner of a pop-up screen. •Never click “yes,” “accept,” or even “cancel,” because it could be a trick that installs software on your computer.
    61. 61. How to avoid the bait. Confirm that the message is real Type the Web address yourself Use a browser with safety features
    62. 62. Passwords lock data doors. • Keep them secret (Don’t write them Down on anything) • Change them often (Recommended every two weeks) • Make a different password for each password • Make them strong
    63. 63. Which passwords are strong? 1. 555.12.999 2. 06/04/79 3. Exp3d!ti0us 4. Ambl!anc3 5. 135781113 6. MsAw3yOiD
    64. 64. 1. 555.12.999 And the answers are… 2. 06/04/79 3. Exp3d!ti0us 4. Ambl!anc3 5. 135781113 6. MsAw3yOiD
    65. 65. #3 Protect devices on the go. • Do they have the latest protection? • Guard devices like you do your wallet • Don’t hand-carry sensitive data • Use caution if using a thumb drive in another computer
    66. 66. Windows 8 BitLocker Drive Encryption Windows 8 BitLocker Drive Encryption help you protect your data from loss, theft, or hackers BitLocker helps keep everything from documents to passwords safer by encrypting the entire drive that Windows and your data reside on. BitLocker To Go—a new feature of Windows 8—gives the lockdown treatment to easilymisplaced portable storage devices like USB flash drives and external hard drives.
    67. 67. On the go: wireless hotspots. • Connect securely • Know who you’re connecting to • Save sensitive uses for more trusted connections
    68. 68. What to do?  Contact an IT Professional  Contact the responsible authorities:  NTRA hotline : 155  Police Cyber Crime hotline : 108
    69. 69. © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
    70. 70. Cybercrime costs consumers $113 billion a year* 1 in 5 small and medium enterprises are targeted by cyber criminals** Every second, 12 people are victims of cybercrime – nearly 400 million every year* Cybercriminals have sophisticated operations to create and distribute malware 50% of online adults have been victims in the past year Financial Fraud 53% of the world’s securities exchanges were targeted in 2012 Online Child Exploitation The NCMEC has reviewed more than 90 million images and videos of child pornography.*** * 2013 Norton Report ** National Cyber Security Alliance *** National Center for Missing and Exploited Children The Impact of Cybercrime Cybercrime is evolving at lightning speed The risk to individuals and companies is growing Online criminals have global reach Cybercrime has been embraced by organized crime Traditional responses won’t suffice – proactive, aggressive action is required