SlideShare a Scribd company logo
1 of 16
Defending Yourself From The InternetPeter Kellner At Kendal
Peter Kellner’s BIO ,[object Object]
Brother Of Patty Kellner
Went To Lots Of Schools
Had Lots of Jobs
Made Plenty Of Mistakes
Learned Lots Of Things(Blog at http://peterkellner.net a lot)
The Plan For Tonight	 Strategies for Using the Internet Safely I Will Talk About 5 Scenarios Get Your Scenarios Open Discussion, Lots of Participation
Two Strategies The Mickey Strategy All Other Options
The Mickey Strategy	 AKA Sand Strategy Total Aversion
Why Worry? Hacking Started in 1971 With Crackerjack Whistle (2600Mhz) Resulted in 5 Years Probation and the start of a new Era
No Silver Bullets	 Best we can do is lower our risk (unless use Mickey strategy) Worth the Risk?  You decide (I’ve decided Yes) Target Rich Environment.  Don’t make yourself a Target!!!   (Bike / Dog analogy)
Weapons Knowledge Passwords (examples of good ones) (bad ones) Why? – Computer Very fast at guessing * http://www.grossepointenews.com/Articles-i-2008-03-13-214830.112112_Defend_yourself_on_the_Internet.html
Big Guns / Virus Checking How to Choose (Big ones Only) Norton Symantec WebRoot McAfee More At: http://en.wikipedia.org/wiki/List_of_antivirus_software
Scenarios Social Networks (Twitter and Facebook) Reading Email Browsing the Internet (Not Financial) Buying Things On the Internet Doing Banking Responding to Emails
Social Networks Privacy Sharing Twitter Facebook Spending Money? (probably not)

More Related Content

What's hot

La prossima Internet degli Oggetti
La prossima Internet degli OggettiLa prossima Internet degli Oggetti
La prossima Internet degli OggettiDavid Orban
 
Networking : A New Paradigm for HR Professionals
Networking : A New Paradigm for HR ProfessionalsNetworking : A New Paradigm for HR Professionals
Networking : A New Paradigm for HR ProfessionalsFrancis Wade
 
Narrowcasting: How to Make the Most of Existing Connections
Narrowcasting: How to Make the Most of Existing ConnectionsNarrowcasting: How to Make the Most of Existing Connections
Narrowcasting: How to Make the Most of Existing ConnectionsPeter Bordes
 
Quora's Approach To Moving Fast Sustainably
Quora's Approach To Moving Fast SustainablyQuora's Approach To Moving Fast Sustainably
Quora's Approach To Moving Fast SustainablyNikhil Garg
 
Deck 8983a1d9-68df-4447-8481-3b4fd0de734c-317-409-417-452
Deck 8983a1d9-68df-4447-8481-3b4fd0de734c-317-409-417-452Deck 8983a1d9-68df-4447-8481-3b4fd0de734c-317-409-417-452
Deck 8983a1d9-68df-4447-8481-3b4fd0de734c-317-409-417-452Justin Ezor
 
Fostering Maturity Through a Security Lifecycle: An OSS Case Study
Fostering Maturity Through a Security Lifecycle: An OSS Case StudyFostering Maturity Through a Security Lifecycle: An OSS Case Study
Fostering Maturity Through a Security Lifecycle: An OSS Case StudyTim Fowler
 

What's hot (7)

La prossima Internet degli Oggetti
La prossima Internet degli OggettiLa prossima Internet degli Oggetti
La prossima Internet degli Oggetti
 
Networking : A New Paradigm for HR Professionals
Networking : A New Paradigm for HR ProfessionalsNetworking : A New Paradigm for HR Professionals
Networking : A New Paradigm for HR Professionals
 
VREBC Presentation - Mike Bowler Sr.
VREBC Presentation - Mike Bowler Sr.VREBC Presentation - Mike Bowler Sr.
VREBC Presentation - Mike Bowler Sr.
 
Narrowcasting: How to Make the Most of Existing Connections
Narrowcasting: How to Make the Most of Existing ConnectionsNarrowcasting: How to Make the Most of Existing Connections
Narrowcasting: How to Make the Most of Existing Connections
 
Quora's Approach To Moving Fast Sustainably
Quora's Approach To Moving Fast SustainablyQuora's Approach To Moving Fast Sustainably
Quora's Approach To Moving Fast Sustainably
 
Deck 8983a1d9-68df-4447-8481-3b4fd0de734c-317-409-417-452
Deck 8983a1d9-68df-4447-8481-3b4fd0de734c-317-409-417-452Deck 8983a1d9-68df-4447-8481-3b4fd0de734c-317-409-417-452
Deck 8983a1d9-68df-4447-8481-3b4fd0de734c-317-409-417-452
 
Fostering Maturity Through a Security Lifecycle: An OSS Case Study
Fostering Maturity Through a Security Lifecycle: An OSS Case StudyFostering Maturity Through a Security Lifecycle: An OSS Case Study
Fostering Maturity Through a Security Lifecycle: An OSS Case Study
 

Viewers also liked

Plate techtonics
Plate techtonicsPlate techtonics
Plate techtonicsddalzin
 
De Medewerkersmonitor 2011 Resultaten Landelijke Terugkomdag 2 Februari 2012 ...
De Medewerkersmonitor 2011 Resultaten Landelijke Terugkomdag 2 Februari 2012 ...De Medewerkersmonitor 2011 Resultaten Landelijke Terugkomdag 2 Februari 2012 ...
De Medewerkersmonitor 2011 Resultaten Landelijke Terugkomdag 2 Februari 2012 ...Ingrid_Goovaerts
 
1484 dtp#2 best_practice#1_2012(pms)
1484 dtp#2 best_practice#1_2012(pms)1484 dtp#2 best_practice#1_2012(pms)
1484 dtp#2 best_practice#1_2012(pms)Ingrid_Goovaerts
 
Senior Thesis Reality Tv
Senior Thesis Reality TvSenior Thesis Reality Tv
Senior Thesis Reality TvZosoManiac
 
Adventures in jQuery Mobile
Adventures in jQuery MobileAdventures in jQuery Mobile
Adventures in jQuery MobileAmber Brucker
 
Month of July
Month of JulyMonth of July
Month of Julyicmpidum
 
Move-Faster-Drive-Harder
Move-Faster-Drive-HarderMove-Faster-Drive-Harder
Move-Faster-Drive-Hardermattstencil
 
Layanan baik terhadap orang bukan islam
Layanan baik terhadap orang  bukan islamLayanan baik terhadap orang  bukan islam
Layanan baik terhadap orang bukan islamJosmer Smart
 
Digital Marketing Strategy for Powell's Books
Digital Marketing Strategy for Powell's BooksDigital Marketing Strategy for Powell's Books
Digital Marketing Strategy for Powell's BooksAmber Brucker
 
CONTOH PROPOSAL SPONSORDHIP FILM
CONTOH PROPOSAL SPONSORDHIP FILMCONTOH PROPOSAL SPONSORDHIP FILM
CONTOH PROPOSAL SPONSORDHIP FILMMarcom Agency
 

Viewers also liked (12)

Plate techtonics
Plate techtonicsPlate techtonics
Plate techtonics
 
De Medewerkersmonitor 2011 Resultaten Landelijke Terugkomdag 2 Februari 2012 ...
De Medewerkersmonitor 2011 Resultaten Landelijke Terugkomdag 2 Februari 2012 ...De Medewerkersmonitor 2011 Resultaten Landelijke Terugkomdag 2 Februari 2012 ...
De Medewerkersmonitor 2011 Resultaten Landelijke Terugkomdag 2 Februari 2012 ...
 
1484 dtp#2 best_practice#1_2012(pms)
1484 dtp#2 best_practice#1_2012(pms)1484 dtp#2 best_practice#1_2012(pms)
1484 dtp#2 best_practice#1_2012(pms)
 
Relevant Business Mindset
Relevant Business MindsetRelevant Business Mindset
Relevant Business Mindset
 
Senior Thesis Reality Tv
Senior Thesis Reality TvSenior Thesis Reality Tv
Senior Thesis Reality Tv
 
Adventures in jQuery Mobile
Adventures in jQuery MobileAdventures in jQuery Mobile
Adventures in jQuery Mobile
 
Month of July
Month of JulyMonth of July
Month of July
 
Move-Faster-Drive-Harder
Move-Faster-Drive-HarderMove-Faster-Drive-Harder
Move-Faster-Drive-Harder
 
The premise of green linked in
The premise of green linked inThe premise of green linked in
The premise of green linked in
 
Layanan baik terhadap orang bukan islam
Layanan baik terhadap orang  bukan islamLayanan baik terhadap orang  bukan islam
Layanan baik terhadap orang bukan islam
 
Digital Marketing Strategy for Powell's Books
Digital Marketing Strategy for Powell's BooksDigital Marketing Strategy for Powell's Books
Digital Marketing Strategy for Powell's Books
 
CONTOH PROPOSAL SPONSORDHIP FILM
CONTOH PROPOSAL SPONSORDHIP FILMCONTOH PROPOSAL SPONSORDHIP FILM
CONTOH PROPOSAL SPONSORDHIP FILM
 

Defending yourself from the internet

  • 1. Defending Yourself From The InternetPeter Kellner At Kendal
  • 2.
  • 4. Went To Lots Of Schools
  • 6. Made Plenty Of Mistakes
  • 7. Learned Lots Of Things(Blog at http://peterkellner.net a lot)
  • 8. The Plan For Tonight Strategies for Using the Internet Safely I Will Talk About 5 Scenarios Get Your Scenarios Open Discussion, Lots of Participation
  • 9. Two Strategies The Mickey Strategy All Other Options
  • 10. The Mickey Strategy AKA Sand Strategy Total Aversion
  • 11. Why Worry? Hacking Started in 1971 With Crackerjack Whistle (2600Mhz) Resulted in 5 Years Probation and the start of a new Era
  • 12. No Silver Bullets Best we can do is lower our risk (unless use Mickey strategy) Worth the Risk? You decide (I’ve decided Yes) Target Rich Environment. Don’t make yourself a Target!!! (Bike / Dog analogy)
  • 13. Weapons Knowledge Passwords (examples of good ones) (bad ones) Why? – Computer Very fast at guessing * http://www.grossepointenews.com/Articles-i-2008-03-13-214830.112112_Defend_yourself_on_the_Internet.html
  • 14. Big Guns / Virus Checking How to Choose (Big ones Only) Norton Symantec WebRoot McAfee More At: http://en.wikipedia.org/wiki/List_of_antivirus_software
  • 15. Scenarios Social Networks (Twitter and Facebook) Reading Email Browsing the Internet (Not Financial) Buying Things On the Internet Doing Banking Responding to Emails
  • 16. Social Networks Privacy Sharing Twitter Facebook Spending Money? (probably not)
  • 17. Email On the Web? Downloading Pictures Keeping your Computer Up to date Post Card Analogy (not letter with envelope)
  • 18. Browsing The Internet Inputting Passwords (where?) Where Did you Go? Google Incognito Mode (still followed) Cookie Tracking Post Card Analogy
  • 19. Buying Things On The Internet The LOCK symbol What Computer To Use (only yours) Never From Public Computer (library, café, etc.) Public/Private Key / SSL PayPal Offsite versus on site PCI Compliance / Certifications
  • 20. Internet Banking Be Very Careful Never give out passwords Use “Special” Password Never from Public Computers Never Respond to Email Warnings Change Your Password Every so Often