SlideShare a Scribd company logo
1 of 35
WATCH YOUR BACK Let’s Talk Web Safety and Personal Identity Theft
Overview ,[object Object],[object Object],[object Object],[object Object],[object Object]
PASSWORD SECURITY
Best Practices  ,[object Object],[object Object]
Best Practices  ,[object Object]
Best Practices  ,[object Object]
Best Practices  ,[object Object]
Best Practices  ,[object Object]
Best Practices  ,[object Object]
Strong Passwords ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Common Password
Common Password Themes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
EMAIL SECURITY
Email Spoofing ,[object Object],[object Object]
Top 10 Spam Subject Lines ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Do Not Download These Types of Files Source:  http://www.novatone.net/mag/mailsec.htm File Extension Description File Extension Description ADE Microsoft Access Project Extension MDB Microsoft Access Application ADP Microsoft Access Project MDE Microsoft Access MDE Database BAS Visual Basic® Class Module MSC Microsoft Common Console Document BAT Batch File MSI Windows Installer Package CHM Compiled HTML Help File MSP Windows Installer Patch CMD Windows NT® Command Scrip MST Visual Test Source File COM MS-DOS® Application PCD Photo CD Image CPL Control Panel Extension PIF Shortcut to MS-DOS Program CRT Security Certificate REG Registration Entries EXE Application SCR Screen Saver HLP Windows® Help File SCT Windows Script Component HTA HTML Applications SHS Shell Scrap Object INF Setup Information File URL Internet Shortcut (Uniform Resource Locator) INS Internet Communication Settings VB VBScript File ISP Internet Communication Settings VBE VBScript Encoded Script File JS JScript® File VBS VBScript Script File JSE JScript Encoded Script File WSC Windows Script Component LNK Shortcut WSF Windows Script File WSH Windows Scripting Host Settings File
Safe File Extensions for Email Downloads Source:  http://www.novatone.net/mag/mailsec.htm File Extension Description GIF Picture - Graphics Interchange Format (ConmuServe) JPG or JPEG Picture - Joint Photographic Expert Group TIF or TIFF Picture - Tagged Image File Format (Adobe) MPG or MPEG Movie - Motion Picture Expert Group MP3 Sound – MPEG compressed audio WAV Sound – Audio (Microsoft)
VIRUS SCANNERS
AVG Free Get a free virus scanner at:  http://free.avg.com/ Hint: Don’t install the tool bar!
Current Virus Threats ,[object Object],[object Object],[object Object]
What to do with a Virus ,[object Object],[object Object],[object Object]
SOCIAL ENGINEERING
Phone Calls ,[object Object],[object Object],[object Object]
Phishing ,[object Object],[object Object],Source:  http://en.wikipedia.org/wiki/Phishing
Top 10 Phishing Scams ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Top Brands Exploited by Phishing Scams http://www.mcafee.com/us/threat_center/anti_phishing/phishing_top10.html
Flash Drive Example ,[object Object]
HOME/WIRELESS SECURITY
Set-Up ,[object Object],[object Object],[object Object]
Password/Encryption ,[object Object],[object Object]
Definition: Firewall ,[object Object]
Definition: IP Address ,[object Object]
Photo Credits ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
RODNEY SABRSULA Schipul ,[object Object],[object Object],[object Object]
JENNIFER BROOKS Schipul ,[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Most Common Application Level Attacks
Most Common Application Level AttacksMost Common Application Level Attacks
Most Common Application Level AttacksEC-Council
 
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...wajug
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)EC-Council
 
Types of Cyber Attacks
Types of Cyber AttacksTypes of Cyber Attacks
Types of Cyber AttacksRubal Sagwal
 
Internet threats and issues in korea 120325 eng_slideshare
Internet threats and issues in korea 120325 eng_slideshareInternet threats and issues in korea 120325 eng_slideshare
Internet threats and issues in korea 120325 eng_slideshareYoungjun Chang
 
Chapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet SecurityChapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet SecurityPatty Ramsey
 
Types of Cyber-Attacks
Types of Cyber-AttacksTypes of Cyber-Attacks
Types of Cyber-Attackstechexpert2345
 
8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catchiYogi
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internetdpd
 
this is test for today
this is test for todaythis is test for today
this is test for todayDreamMalar
 
Client server security threats
Client server security threatsClient server security threats
Client server security threatsrahul kundu
 

What's hot (20)

Most Common Application Level Attacks
Most Common Application Level AttacksMost Common Application Level Attacks
Most Common Application Level Attacks
 
Network security
Network securityNetwork security
Network security
 
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)
 
Security threats
Security threatsSecurity threats
Security threats
 
Network security
Network securityNetwork security
Network security
 
Types of Cyber Attacks
Types of Cyber AttacksTypes of Cyber Attacks
Types of Cyber Attacks
 
Code protection
Code protectionCode protection
Code protection
 
Internet threats and issues in korea 120325 eng_slideshare
Internet threats and issues in korea 120325 eng_slideshareInternet threats and issues in korea 120325 eng_slideshare
Internet threats and issues in korea 120325 eng_slideshare
 
Cyber attacks
Cyber attacks Cyber attacks
Cyber attacks
 
Internet security
Internet securityInternet security
Internet security
 
Chapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet SecurityChapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet Security
 
PACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of MalwarePACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of Malware
 
Types of Cyber-Attacks
Types of Cyber-AttacksTypes of Cyber-Attacks
Types of Cyber-Attacks
 
Network Security
Network SecurityNetwork Security
Network Security
 
8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internet
 
this is test for today
this is test for todaythis is test for today
this is test for today
 
Client server security threats
Client server security threatsClient server security threats
Client server security threats
 

Viewers also liked

Driving Traffic to your Website with Paid Advertising - AMA UHD Conference
Driving Traffic to your Website with Paid Advertising - AMA UHD ConferenceDriving Traffic to your Website with Paid Advertising - AMA UHD Conference
Driving Traffic to your Website with Paid Advertising - AMA UHD ConferenceSchipul - The Web Marketing Company
 
Social Media for Health Care Organizations - Hubmed Health Care Communication...
Social Media for Health Care Organizations - Hubmed Health Care Communication...Social Media for Health Care Organizations - Hubmed Health Care Communication...
Social Media for Health Care Organizations - Hubmed Health Care Communication...Schipul - The Web Marketing Company
 
Best Business Email Ever Written - Katrina Esco - Ignite Houston 2012 Present...
Best Business Email Ever Written - Katrina Esco - Ignite Houston 2012 Present...Best Business Email Ever Written - Katrina Esco - Ignite Houston 2012 Present...
Best Business Email Ever Written - Katrina Esco - Ignite Houston 2012 Present...Schipul - The Web Marketing Company
 

Viewers also liked (15)

Facebook Fanpage Optimization Webinar Training
Facebook Fanpage Optimization Webinar TrainingFacebook Fanpage Optimization Webinar Training
Facebook Fanpage Optimization Webinar Training
 
Understanding Memberships in Tendenci
Understanding Memberships in TendenciUnderstanding Memberships in Tendenci
Understanding Memberships in Tendenci
 
Hands On Drupal: Funny Name, Serious CMS
Hands On Drupal: Funny Name, Serious CMSHands On Drupal: Funny Name, Serious CMS
Hands On Drupal: Funny Name, Serious CMS
 
Web Analytics: Insights into Numbers is Exciting!
Web Analytics: Insights into Numbers is Exciting!Web Analytics: Insights into Numbers is Exciting!
Web Analytics: Insights into Numbers is Exciting!
 
Don't Forget the Milk
Don't Forget the MilkDon't Forget the Milk
Don't Forget the Milk
 
The Future & Non-Profit Organizations
The Future & Non-Profit OrganizationsThe Future & Non-Profit Organizations
The Future & Non-Profit Organizations
 
Driving Traffic to your Website with Paid Advertising - AMA UHD Conference
Driving Traffic to your Website with Paid Advertising - AMA UHD ConferenceDriving Traffic to your Website with Paid Advertising - AMA UHD Conference
Driving Traffic to your Website with Paid Advertising - AMA UHD Conference
 
Storytelling through Social Media
Storytelling through Social MediaStorytelling through Social Media
Storytelling through Social Media
 
TACCM 2013 DIY Email Marketing
TACCM 2013 DIY Email MarketingTACCM 2013 DIY Email Marketing
TACCM 2013 DIY Email Marketing
 
Social Media for Health Care Organizations - Hubmed Health Care Communication...
Social Media for Health Care Organizations - Hubmed Health Care Communication...Social Media for Health Care Organizations - Hubmed Health Care Communication...
Social Media for Health Care Organizations - Hubmed Health Care Communication...
 
The Personal Brand Era Cometh
The Personal Brand Era ComethThe Personal Brand Era Cometh
The Personal Brand Era Cometh
 
Best Business Email Ever Written - Katrina Esco - Ignite Houston 2012 Present...
Best Business Email Ever Written - Katrina Esco - Ignite Houston 2012 Present...Best Business Email Ever Written - Katrina Esco - Ignite Houston 2012 Present...
Best Business Email Ever Written - Katrina Esco - Ignite Houston 2012 Present...
 
The Next Generation Website
The Next Generation WebsiteThe Next Generation Website
The Next Generation Website
 
What do I do with this blog?? Blogging With Sharks
What do I do with this blog?? Blogging With SharksWhat do I do with this blog?? Blogging With Sharks
What do I do with this blog?? Blogging With Sharks
 
Trends in Communication Technology for Associations | ACCE 2013
Trends in Communication Technology for Associations | ACCE 2013Trends in Communication Technology for Associations | ACCE 2013
Trends in Communication Technology for Associations | ACCE 2013
 

Similar to Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft

Dark Alleys/Internet Security
Dark Alleys/Internet SecurityDark Alleys/Internet Security
Dark Alleys/Internet SecurityJohn Dorner
 
The Safest Way To Interact Online
The Safest Way To Interact OnlineThe Safest Way To Interact Online
The Safest Way To Interact Onlinepcsafe
 
Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
Protecting Your Key Asset – Data Protection Best Practices V2.0   FinalProtecting Your Key Asset – Data Protection Best Practices V2.0   Final
Protecting Your Key Asset – Data Protection Best Practices V2.0 FinalVinod Kumar
 
Dark Alleys Part1740
Dark Alleys Part1740Dark Alleys Part1740
Dark Alleys Part1740guest2bd2b2
 
Dark Alleys Part1
Dark Alleys Part1Dark Alleys Part1
Dark Alleys Part1Anne Adrian
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundaryDean Iacovelli
 
Internet Security
Internet SecurityInternet Security
Internet SecurityAnne Adrian
 
Word press security 101
Word press security 101  Word press security 101
Word press security 101 Kojac801
 
Passwords & security
Passwords & securityPasswords & security
Passwords & securityPer Thorsheim
 
Addressing the Top 3 Real-world Security Challenges for Your IBM i Systems
Addressing the Top 3 Real-world Security Challenges for Your IBM i SystemsAddressing the Top 3 Real-world Security Challenges for Your IBM i Systems
Addressing the Top 3 Real-world Security Challenges for Your IBM i SystemsPrecisely
 
Cyber Security 101 – A Practical Guide for Small Businesses
Cyber Security 101 – A Practical Guide for Small BusinessesCyber Security 101 – A Practical Guide for Small Businesses
Cyber Security 101 – A Practical Guide for Small BusinessesPECB
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businessesB2BPlanner Ltd.
 
302 Content Server Security Challenges And Best Practices
302   Content Server Security   Challenges And Best Practices302   Content Server Security   Challenges And Best Practices
302 Content Server Security Challenges And Best Practicesphanleson
 

Similar to Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft (20)

Dark Alleys/Internet Security
Dark Alleys/Internet SecurityDark Alleys/Internet Security
Dark Alleys/Internet Security
 
The Safest Way To Interact Online
The Safest Way To Interact OnlineThe Safest Way To Interact Online
The Safest Way To Interact Online
 
Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
Protecting Your Key Asset – Data Protection Best Practices V2.0   FinalProtecting Your Key Asset – Data Protection Best Practices V2.0   Final
Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
 
Dark Alleys Part1740
Dark Alleys Part1740Dark Alleys Part1740
Dark Alleys Part1740
 
Dark Alleys Part1
Dark Alleys Part1Dark Alleys Part1
Dark Alleys Part1
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Word press security 101
Word press security 101  Word press security 101
Word press security 101
 
Passwords & security
Passwords & securityPasswords & security
Passwords & security
 
Addressing the Top 3 Real-world Security Challenges for Your IBM i Systems
Addressing the Top 3 Real-world Security Challenges for Your IBM i SystemsAddressing the Top 3 Real-world Security Challenges for Your IBM i Systems
Addressing the Top 3 Real-world Security Challenges for Your IBM i Systems
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network security
Network security Network security
Network security
 
Cyber Security 101 – A Practical Guide for Small Businesses
Cyber Security 101 – A Practical Guide for Small BusinessesCyber Security 101 – A Practical Guide for Small Businesses
Cyber Security 101 – A Practical Guide for Small Businesses
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businesses
 
Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety
 
information security and backup system
information security and backup systeminformation security and backup system
information security and backup system
 
Network security
Network securityNetwork security
Network security
 
NetworkSecurity
NetworkSecurityNetworkSecurity
NetworkSecurity
 
302 Content Server Security Challenges And Best Practices
302   Content Server Security   Challenges And Best Practices302   Content Server Security   Challenges And Best Practices
302 Content Server Security Challenges And Best Practices
 
Desktop Security 8 9 07
Desktop Security 8 9 07Desktop Security 8 9 07
Desktop Security 8 9 07
 

More from Schipul - The Web Marketing Company (9)

TACCM 2013 Web Marketing Tool Kit - Texas Association of Community College Ma...
TACCM 2013 Web Marketing Tool Kit - Texas Association of Community College Ma...TACCM 2013 Web Marketing Tool Kit - Texas Association of Community College Ma...
TACCM 2013 Web Marketing Tool Kit - Texas Association of Community College Ma...
 
Social Media Strategy - Presented to the Louisiana Food Processor's Conference
Social Media Strategy - Presented to the Louisiana Food Processor's ConferenceSocial Media Strategy - Presented to the Louisiana Food Processor's Conference
Social Media Strategy - Presented to the Louisiana Food Processor's Conference
 
Facebook Fanpage Optimization
Facebook Fanpage OptimizationFacebook Fanpage Optimization
Facebook Fanpage Optimization
 
Hands On Filmmaking
Hands On FilmmakingHands On Filmmaking
Hands On Filmmaking
 
Your Brand is Out of Control
Your Brand is Out of ControlYour Brand is Out of Control
Your Brand is Out of Control
 
Unleash The SEO Beast
Unleash The SEO BeastUnleash The SEO Beast
Unleash The SEO Beast
 
Do’s and Don’ts of Online Newsletter Marketing
Do’s and Don’ts of Online Newsletter MarketingDo’s and Don’ts of Online Newsletter Marketing
Do’s and Don’ts of Online Newsletter Marketing
 
Tendenci 101 & Beyond
Tendenci 101 & BeyondTendenci 101 & Beyond
Tendenci 101 & Beyond
 
Evernote - Taking Notes
Evernote - Taking NotesEvernote - Taking Notes
Evernote - Taking Notes
 

Recently uploaded

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 

Recently uploaded (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft

  • 1. WATCH YOUR BACK Let’s Talk Web Safety and Personal Identity Theft
  • 2.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 12.
  • 14.
  • 15.
  • 16. Do Not Download These Types of Files Source: http://www.novatone.net/mag/mailsec.htm File Extension Description File Extension Description ADE Microsoft Access Project Extension MDB Microsoft Access Application ADP Microsoft Access Project MDE Microsoft Access MDE Database BAS Visual Basic® Class Module MSC Microsoft Common Console Document BAT Batch File MSI Windows Installer Package CHM Compiled HTML Help File MSP Windows Installer Patch CMD Windows NT® Command Scrip MST Visual Test Source File COM MS-DOS® Application PCD Photo CD Image CPL Control Panel Extension PIF Shortcut to MS-DOS Program CRT Security Certificate REG Registration Entries EXE Application SCR Screen Saver HLP Windows® Help File SCT Windows Script Component HTA HTML Applications SHS Shell Scrap Object INF Setup Information File URL Internet Shortcut (Uniform Resource Locator) INS Internet Communication Settings VB VBScript File ISP Internet Communication Settings VBE VBScript Encoded Script File JS JScript® File VBS VBScript Script File JSE JScript Encoded Script File WSC Windows Script Component LNK Shortcut WSF Windows Script File WSH Windows Scripting Host Settings File
  • 17. Safe File Extensions for Email Downloads Source: http://www.novatone.net/mag/mailsec.htm File Extension Description GIF Picture - Graphics Interchange Format (ConmuServe) JPG or JPEG Picture - Joint Photographic Expert Group TIF or TIFF Picture - Tagged Image File Format (Adobe) MPG or MPEG Movie - Motion Picture Expert Group MP3 Sound – MPEG compressed audio WAV Sound – Audio (Microsoft)
  • 19. AVG Free Get a free virus scanner at: http://free.avg.com/ Hint: Don’t install the tool bar!
  • 20.
  • 21.
  • 23.
  • 24.
  • 25.
  • 26. Top Brands Exploited by Phishing Scams http://www.mcafee.com/us/threat_center/anti_phishing/phishing_top10.html
  • 27.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.

Editor's Notes

  1. Pic source: http://www.flickr.com/photos/35034348736@N01/6091103/
  2. http://www.flickr.com/photos/30055137@N05/2874818735/
  3. Pic Source Ducks http://www.flickr.com/photos/71038389@N00/2335148856/
  4. Pic source: Glass http://www.flickr.com/photos/80682954@N00/3168425434/ Head http://www.flickr.com/photos/26811362@N05/3169491395/
  5. Pic Source: http://www.braswellcomputers.com/images/hackers.jpg
  6. Pic source: http://www.flickr.com/photos/9483141@N02/1043482672/
  7. Pic Source: Christmas http://www.flickr.com/photos/26260213@N05/3093056683/ Preg mom http://www.flickr.com/photos/34957438@N05/3416525003/