Online and Mobile Basic Security
NGETH Moses
ICT Project Coordinator
Community Legal Education Center
(CLEC)
“No place like 127.0.0.1”
• 2nd Step Verification and Set up
• Remote your smart phone
• Easy to set up “strong” passwords...
2nd Step Verification
(For Google user ONLY)
• Stronger security for your Google Account
• With 2-Step Verification, you’l...
Why you needs it
Why you needs it
How it works
How it works
How it protects you
How it protects you
How it protects you
How to set up 2nd step verification
Sup 2nd step verification
• Go to your Gmail account
Set up 2nd step verification
• Go to “Security Tap”
• Click on “Setup”
Set up 2nd step verification
• Click on “Start setup”
• Re-type your password
Set up 2nd step verification
• Type your phone number
• Note: you either choose Google to send “Text
message (SMS” or Call...
Set up 2nd step verification
• Go to icon of you profile photo at the top right
side
Set up 2nd step verification
• Code was sent to your number.
• Fill in the 6 digits in a blank box
• Note: Mobile and Metf...
Set up 2nd step verification
• If you are setting up on somebody els’ computer,
please un-tick “Trust this computer”.
• Re...
Set up 2nd step verification
• Just to make sure you got the right phone number.
• Click Confirm to finish the setup
Set up 2nd step verification
• NOTE:
– After finish setup 2nd step verification, all your social media
that uses with this...
Remote your smart phone
1. First you need to make sure that you have turned it on, which you can do
by following this quic...
Remote your smart phone
Remote your smart phone
Remote your smart phone
Remote your smart phone
Remote your smart phone (On Device)
Remote your smart phone (On Device)
Easy create “Strong Password” not
“Long Password”
“Strong Password” not “Long
Password”
It is important to use different types of characters when
choosing a password. This ...
“Strong Password” not “Long
Password”
• Passwords can also take advantage of more
traditional mnemonic devices, such as th...
“Strong Password” not “Long
Password”
• A little effort to make the password more complex
goes a very long way. Increasing...
“Strong Password” not “Long
Password”
Upcoming SlideShare
Loading in …5
×

Basic mobile and internet security

93
-1

Published on

Basic mobile and internet seurity

Published in: Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
93
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
4
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Basic mobile and internet security

  1. 1. Online and Mobile Basic Security NGETH Moses ICT Project Coordinator Community Legal Education Center (CLEC)
  2. 2. “No place like 127.0.0.1” • 2nd Step Verification and Set up • Remote your smart phone • Easy to set up “strong” passwords not a long passwords
  3. 3. 2nd Step Verification (For Google user ONLY) • Stronger security for your Google Account • With 2-Step Verification, you’ll protect your account with both your password and your phone
  4. 4. Why you needs it
  5. 5. Why you needs it
  6. 6. How it works
  7. 7. How it works
  8. 8. How it protects you
  9. 9. How it protects you
  10. 10. How it protects you
  11. 11. How to set up 2nd step verification
  12. 12. Sup 2nd step verification • Go to your Gmail account
  13. 13. Set up 2nd step verification • Go to “Security Tap” • Click on “Setup”
  14. 14. Set up 2nd step verification • Click on “Start setup” • Re-type your password
  15. 15. Set up 2nd step verification • Type your phone number • Note: you either choose Google to send “Text message (SMS” or Call you “Voice Call”
  16. 16. Set up 2nd step verification • Go to icon of you profile photo at the top right side
  17. 17. Set up 2nd step verification • Code was sent to your number. • Fill in the 6 digits in a blank box • Note: Mobile and Metfone doesn’t work well.
  18. 18. Set up 2nd step verification • If you are setting up on somebody els’ computer, please un-tick “Trust this computer”. • Recommend to set up on your computer ONLY • Click Next
  19. 19. Set up 2nd step verification • Just to make sure you got the right phone number. • Click Confirm to finish the setup
  20. 20. Set up 2nd step verification • NOTE: – After finish setup 2nd step verification, all your social media that uses with this Gmail account will be sign out. It means you can’t log in to those account with your current password. It needs a one-time “App-specific passwords”. (Explanation off slide presentation)
  21. 21. Remote your smart phone 1. First you need to make sure that you have turned it on, which you can do by following this quick tutorial: 2. Go to the Google Setttings of your Android device. 3. Tap on Android Device Manager at the bottom of the list 4. Check the box for Remotely locate this device 5. Check box for remote lock and factory reset. 6. To the Settings of your phone. 7. Tap on Security and then Device administrator. Make sure the Android Device Manager is ticked off there. 8. Now that you have done this, you can remotely lock and wipe your device in case of theft or loss. To do this, go to the Device Manager website. 9. The path to activate this feature might differ depending on your device, but in general should be the same as it's a Google service and not one from your phone's manufacturer.
  22. 22. Remote your smart phone
  23. 23. Remote your smart phone
  24. 24. Remote your smart phone
  25. 25. Remote your smart phone
  26. 26. Remote your smart phone (On Device)
  27. 27. Remote your smart phone (On Device)
  28. 28. Easy create “Strong Password” not “Long Password”
  29. 29. “Strong Password” not “Long Password” It is important to use different types of characters when choosing a password. This can be done in various ways: • Varying capitalisation, such as: 'My naME is Not MR. MarSter' • Alternating numbers and letters, such as: 'a11 w0Rk 4nD N0 p14Y' • Incorporating certain symbols, such as: 'c@t(heR1nthery3' • Using multiple languages, such as: 'Let Them Eat 1e gateaU au ch()colaT
  30. 30. “Strong Password” not “Long Password” • Passwords can also take advantage of more traditional mnemonic devices, such as the use of acronyms. This allows long phrases to be turned into complex, seemingly-random words: • 'To be or not to be? That is the question' becomes '2Bon2B?TitQ’ • 'We hold these truths to be self-evident: that all men are created equal' becomes 'WhtT2bs-e:taMac=’ • 'Are you happy today?' becomes 'rU:-)2d@y?'
  31. 31. “Strong Password” not “Long Password” • A little effort to make the password more complex goes a very long way. Increasing the length of a password even just by a few characters, or by adding numbers or special characters, makes it much more difficult to crack. For demonstrative purposes, the table below shows how much longer it may take a hacker to break a list of progressively more complex passwords by trying different combinations of the password one after another.
  32. 32. “Strong Password” not “Long Password”
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×