WATCH YOUR BACK Let’s Talk Web Safety and Personal Identity Theft
Overview <ul><li>Password Security </li></ul><ul><li>Email Security </li></ul><ul><li>Virus Scanners </li></ul><ul><li>Soc...
PASSWORD SECURITY
Best Practices  <ul><li>Writing down passwords </li></ul><ul><ul><li>If you must, store securely, and destroy when no long...
Best Practices  <ul><li>NEVER share passwords  </li></ul>
Best Practices  <ul><li>Use different passwords for every account </li></ul>
Best Practices  <ul><li>Change immediately if a password is compromised </li></ul>
Best Practices  <ul><li>Be careful about storing on your computer </li></ul>
Best Practices  <ul><li>Always use strong passwords </li></ul>
Strong Passwords <ul><li>A strong password: </li></ul><ul><ul><li>Should be at least 7 characters long </li></ul></ul><ul>...
Common Password
Common Password Themes <ul><li>Children’s Names </li></ul><ul><li>Birthdates </li></ul><ul><li>Spouse’s Name </li></ul><ul...
EMAIL SECURITY
Email Spoofing <ul><li>Reading email headers  </li></ul><ul><li>Recognizing Spoofed emails  </li></ul>
Top 10 Spam Subject Lines <ul><li>You’ve received a greeting ecard </li></ul><ul><li>Virtualization Webinar </li></ul><ul>...
Do Not Download These Types of Files Source:  http://www.novatone.net/mag/mailsec.htm File Extension Description File Exte...
Safe File Extensions for Email Downloads Source:  http://www.novatone.net/mag/mailsec.htm File Extension Description GIF P...
VIRUS SCANNERS
AVG Free Get a free virus scanner at:  http://free.avg.com/ Hint: Don’t install the tool bar!
Current Virus Threats <ul><li>Change Daily </li></ul><ul><li>Scheduled Signature Updates </li></ul><ul><li>Sources of Late...
What to do with a Virus <ul><li>Isolate </li></ul><ul><li>Cure </li></ul><ul><li>Identify Source  </li></ul>
SOCIAL ENGINEERING
Phone Calls <ul><li>Know who you’re talking to </li></ul><ul><li>Provide no confidential data </li></ul><ul><li>Call them ...
Phishing <ul><li>Definition </li></ul><ul><ul><li>In the field of computer security, phishing is the criminally fraudulent...
Top 10 Phishing Scams <ul><li>security alert! </li></ul><ul><li>account notification! </li></ul><ul><li>account notificati...
Top Brands Exploited by Phishing Scams http://www.mcafee.com/us/threat_center/anti_phishing/phishing_top10.html
Flash Drive Example <ul><li>USB Flash Drives Pose Security Risk  </li></ul>
HOME/WIRELESS SECURITY
Set-Up <ul><li>You may be at risk by default </li></ul><ul><li>Create a strong administrative password </li></ul><ul><li>D...
Password/Encryption <ul><li>The key to your data </li></ul><ul><li>Lock them away physically and electronically  </li></ul>
Definition: Firewall <ul><li>A firewall is a part of a computer system or network that is designed to block unauthorized a...
Definition: IP Address <ul><li>Internet Protocol  ( IP )  address - a numerical label that is assigned to devices particip...
Photo Credits <ul><li>http://www.flickr.com/photos/9483141@N02/1043482672/ </li></ul><ul><li>http://www.flickr.com/photos/...
RODNEY SABRSULA Schipul <ul><li>Personal Brand: rsabrsula </li></ul><ul><li>Facebook:  http://facebook.com/sabrsula </li><...
JENNIFER BROOKS Schipul <ul><li>Personal Brand: jbrooks </li></ul><ul><li>Facebook:  http://facebook.com/jbrooks </li></ul...
Upcoming SlideShare
Loading in...5
×

Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft

1,850

Published on

Jennifer Brooks and Rodney Sabrsula break down Personal Web Safety in this presentation. They'll review Password Security, Virus Scanners and more! This is need-to-know information to guard your identity online.

Published in: Technology
1 Comment
0 Likes
Statistics
Notes
  • Got good information of security and web safety.Thanks!
    If you are in need of any scammers related news.please visit my blog http://scambaitings.blogspot.com/
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Be the first to like this

No Downloads
Views
Total Views
1,850
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
20
Comments
1
Likes
0
Embeds 0
No embeds

No notes for slide
  • Pic source: http://www.flickr.com/photos/35034348736@N01/6091103/
  • http://www.flickr.com/photos/30055137@N05/2874818735/
  • Pic Source Ducks http://www.flickr.com/photos/71038389@N00/2335148856/
  • Pic source: Glass http://www.flickr.com/photos/80682954@N00/3168425434/ Head http://www.flickr.com/photos/26811362@N05/3169491395/
  • Pic Source: http://www.braswellcomputers.com/images/hackers.jpg
  • Pic source: http://www.flickr.com/photos/9483141@N02/1043482672/
  • Pic Source: Christmas http://www.flickr.com/photos/26260213@N05/3093056683/ Preg mom http://www.flickr.com/photos/34957438@N05/3416525003/
  • Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft

    1. 1. WATCH YOUR BACK Let’s Talk Web Safety and Personal Identity Theft
    2. 2. Overview <ul><li>Password Security </li></ul><ul><li>Email Security </li></ul><ul><li>Virus Scanners </li></ul><ul><li>Social Engineering </li></ul><ul><li>Home/Wireless Security </li></ul>
    3. 3. PASSWORD SECURITY
    4. 4. Best Practices <ul><li>Writing down passwords </li></ul><ul><ul><li>If you must, store securely, and destroy when no longer needed </li></ul></ul>
    5. 5. Best Practices <ul><li>NEVER share passwords </li></ul>
    6. 6. Best Practices <ul><li>Use different passwords for every account </li></ul>
    7. 7. Best Practices <ul><li>Change immediately if a password is compromised </li></ul>
    8. 8. Best Practices <ul><li>Be careful about storing on your computer </li></ul>
    9. 9. Best Practices <ul><li>Always use strong passwords </li></ul>
    10. 10. Strong Passwords <ul><li>A strong password: </li></ul><ul><ul><li>Should be at least 7 characters long </li></ul></ul><ul><ul><li>Does not contain your user name, real name, or company name </li></ul></ul><ul><ul><li>Does not contain a complete dictionary word </li></ul></ul><ul><ul><li>Is significantly different from previous passwords </li></ul></ul><ul><ul><ul><li>Incremental (password 1, password 2…) are not strong </li></ul></ul></ul><ul><ul><li>Contains uppercase, lowercase, numerical, and at least one special character </li></ul></ul>
    11. 11. Common Password
    12. 12. Common Password Themes <ul><li>Children’s Names </li></ul><ul><li>Birthdates </li></ul><ul><li>Spouse’s Name </li></ul><ul><li>Religious </li></ul><ul><li>Username </li></ul><ul><li>Pet’s Name </li></ul><ul><li>Sports Team </li></ul>
    13. 13. EMAIL SECURITY
    14. 14. Email Spoofing <ul><li>Reading email headers </li></ul><ul><li>Recognizing Spoofed emails </li></ul>
    15. 15. Top 10 Spam Subject Lines <ul><li>You’ve received a greeting ecard </li></ul><ul><li>Virtualization Webinar </li></ul><ul><li>Masters degree with no efforts </li></ul><ul><li>Career Advancement Opportunities – July of 2009 </li></ul><ul><li>Webinar: Think Big: Create Efficiencies With an Enterprise-Wide </li></ul><ul><li>Non-Profit job from home </li></ul><ul><li>Administrative Certification: Increase Productivity with Superior Organizational Skills </li></ul><ul><li>Administrative Certification: Gain Credibility by Maximizing Your Productivity </li></ul><ul><li>you can wear tag heuer watch now; </li></ul><ul><li>you can wear cartier watch now </li></ul><ul><li>Source: http://www.mcafee.com/us/threat_center/anti_spam/spam_top10.html </li></ul>
    16. 16. Do Not Download These Types of Files Source: http://www.novatone.net/mag/mailsec.htm File Extension Description File Extension Description ADE Microsoft Access Project Extension MDB Microsoft Access Application ADP Microsoft Access Project MDE Microsoft Access MDE Database BAS Visual Basic® Class Module MSC Microsoft Common Console Document BAT Batch File MSI Windows Installer Package CHM Compiled HTML Help File MSP Windows Installer Patch CMD Windows NT® Command Scrip MST Visual Test Source File COM MS-DOS® Application PCD Photo CD Image CPL Control Panel Extension PIF Shortcut to MS-DOS Program CRT Security Certificate REG Registration Entries EXE Application SCR Screen Saver HLP Windows® Help File SCT Windows Script Component HTA HTML Applications SHS Shell Scrap Object INF Setup Information File URL Internet Shortcut (Uniform Resource Locator) INS Internet Communication Settings VB VBScript File ISP Internet Communication Settings VBE VBScript Encoded Script File JS JScript® File VBS VBScript Script File JSE JScript Encoded Script File WSC Windows Script Component LNK Shortcut WSF Windows Script File WSH Windows Scripting Host Settings File
    17. 17. Safe File Extensions for Email Downloads Source: http://www.novatone.net/mag/mailsec.htm File Extension Description GIF Picture - Graphics Interchange Format (ConmuServe) JPG or JPEG Picture - Joint Photographic Expert Group TIF or TIFF Picture - Tagged Image File Format (Adobe) MPG or MPEG Movie - Motion Picture Expert Group MP3 Sound – MPEG compressed audio WAV Sound – Audio (Microsoft)
    18. 18. VIRUS SCANNERS
    19. 19. AVG Free Get a free virus scanner at: http://free.avg.com/ Hint: Don’t install the tool bar!
    20. 20. Current Virus Threats <ul><li>Change Daily </li></ul><ul><li>Scheduled Signature Updates </li></ul><ul><li>Sources of Latest Threat and Severity </li></ul>
    21. 21. What to do with a Virus <ul><li>Isolate </li></ul><ul><li>Cure </li></ul><ul><li>Identify Source </li></ul>
    22. 22. SOCIAL ENGINEERING
    23. 23. Phone Calls <ul><li>Know who you’re talking to </li></ul><ul><li>Provide no confidential data </li></ul><ul><li>Call them back </li></ul>
    24. 24. Phishing <ul><li>Definition </li></ul><ul><ul><li>In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details to “catch” financial information and passwords. </li></ul></ul>Source: http://en.wikipedia.org/wiki/Phishing
    25. 25. Top 10 Phishing Scams <ul><li>security alert! </li></ul><ul><li>account notification! </li></ul><ul><li>account notification </li></ul><ul><li>please confirm your data! </li></ul><ul><li>Chase Bank: online banking notification </li></ul><ul><li>Chase Bank: necessary to be read! </li></ul><ul><li>Chase Bank: important notice </li></ul><ul><li>Chase Bank: important security notice </li></ul><ul><li>Chase Bank: account secure confirmation </li></ul><ul><li>Chase Bank customer service: security alert </li></ul><ul><li>Source: http://www.mcafee.com/us/threat_center/anti_phishing/phishing_top10.html </li></ul>
    26. 26. Top Brands Exploited by Phishing Scams http://www.mcafee.com/us/threat_center/anti_phishing/phishing_top10.html
    27. 27. Flash Drive Example <ul><li>USB Flash Drives Pose Security Risk </li></ul>
    28. 28. HOME/WIRELESS SECURITY
    29. 29. Set-Up <ul><li>You may be at risk by default </li></ul><ul><li>Create a strong administrative password </li></ul><ul><li>Do not share your connection </li></ul>
    30. 30. Password/Encryption <ul><li>The key to your data </li></ul><ul><li>Lock them away physically and electronically </li></ul>
    31. 31. Definition: Firewall <ul><li>A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications. </li></ul>
    32. 32. Definition: IP Address <ul><li>Internet Protocol ( IP ) address - a numerical label that is assigned to devices participating in a computer network utilizing the Internet Protocol for communication between its devices. </li></ul>
    33. 33. Photo Credits <ul><li>http://www.flickr.com/photos/9483141@N02/1043482672/ </li></ul><ul><li>http://www.flickr.com/photos/35034348736@N01/6091103/ </li></ul><ul><li>http://www.flickr.com/photos/30055137@N05/2874818735/ </li></ul><ul><li>http://www.flickr.com/photos/71038389@N00/2335148856/ </li></ul><ul><li>http://www.flickr.com/photos/80682954@N00/3168425434/ </li></ul><ul><li>http://www.flickr.com/photos/26811362@N05/3169491395/ </li></ul><ul><li>http://www.braswellcomputers.com/images/hackers.jpg </li></ul><ul><li>http://www.flickr.com/photos/26260213@N05/3093056683/ </li></ul><ul><li>http://www.flickr.com/photos/34957438@N05/3416525003/ </li></ul><ul><li>http://static.howstuffworks.com/ </li></ul><ul><li>http://www.esat.kuleuven.be/ </li></ul><ul><li>http://www.computermantorbay.com/ </li></ul><ul><li>http://www.amsys.co.uk/ </li></ul><ul><li>http://engageology.wordpress.com/ </li></ul><ul><li>http://www.cscisd.net/ </li></ul><ul><li>http://www.vietnamalbum.com/ </li></ul><ul><li>http://www.noticebored.com/ </li></ul><ul><li>http://www.ehow.com/ </li></ul><ul><li>http://www.gadgetsnews.co.uk/ </li></ul><ul><li>http://www.webmastersbydesign.com/ </li></ul><ul><li>http://www.reasoft.com/solutions/ </li></ul>
    34. 34. RODNEY SABRSULA Schipul <ul><li>Personal Brand: rsabrsula </li></ul><ul><li>Facebook: http://facebook.com/sabrsula </li></ul><ul><li>Twitter: http://twitter.com/rsabrsula </li></ul>
    35. 35. JENNIFER BROOKS Schipul <ul><li>Personal Brand: jbrooks </li></ul><ul><li>Facebook: http://facebook.com/jbrooks </li></ul><ul><li>Twitter: http://twitter.com/jbrooks </li></ul><ul><li>Find this presentation here: www.schipulcon.com/presentations </li></ul>
    1. A particular slide catching your eye?

      Clipping is a handy way to collect important slides you want to go back to later.

    ×