Staying Safe Online
<ul><li>Who are we ? </li></ul><ul><li>What do we do ? </li></ul><ul><li>Why are we here ? </li></ul>
Who are you in cyberspace? <ul><li>What is Digital Security?  </li></ul><ul><ul><li>Security of your digital identity   </...
First line of defence  <ul><li>Passwords  </li></ul><ul><li>Device security  </li></ul><ul><li>Browser security  </li></ul...
Secure Email & Chat <ul><li>Avoid automatic sign in/remember me on computers  </li></ul><ul><li>Browsing through HTTPS </l...
Secure use of Social Media <ul><li>Social media is your social space  </li></ul><ul><li>Think before you upload </li></ul>...
Secure use of mobile <ul><li>Setting up passwords </li></ul><ul><li>Transfering data regularly to a secure location </li><...
TakeBackTheTech <ul><li>What constitutes harassment? </li></ul><ul><ul><ul><li>Infringing on someone’s social space </li><...
TakeBackTheTech Toolkit <ul><li>Portable Apps </li></ul>
Policies  <ul><li>Legislations & Policies & why should you care </li></ul><ul><li>Lack of Cyber crime legislation, Data Pr...
Upcoming SlideShare
Loading in …5
×

Bolo bhi-nust-stay-safe-online-

1,048 views

Published on

Tips and tricks on how to stay safe online

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,048
On SlideShare
0
From Embeds
0
Number of Embeds
73
Actions
Shares
0
Downloads
3
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Bolo bhi-nust-stay-safe-online-

  1. 1. Staying Safe Online
  2. 2. <ul><li>Who are we ? </li></ul><ul><li>What do we do ? </li></ul><ul><li>Why are we here ? </li></ul>
  3. 3. Who are you in cyberspace? <ul><li>What is Digital Security? </li></ul><ul><ul><li>Security of your digital identity </li></ul></ul><ul><li>What is your digital identity? </li></ul>
  4. 4. First line of defence <ul><li>Passwords </li></ul><ul><li>Device security </li></ul><ul><li>Browser security </li></ul><ul><li>Connection security </li></ul><ul><li>Content security </li></ul>
  5. 5. Secure Email & Chat <ul><li>Avoid automatic sign in/remember me on computers </li></ul><ul><li>Browsing through HTTPS </li></ul><ul><li>Avoid saving chat history </li></ul><ul><li>Can webcam turn dangerous? </li></ul><ul><li>Backing up emails </li></ul>
  6. 6. Secure use of Social Media <ul><li>Social media is your social space </li></ul><ul><li>Think before you upload </li></ul><ul><li>Grandma Test </li></ul><ul><li>What goes up, stays up FOREVER </li></ul>
  7. 7. Secure use of mobile <ul><li>Setting up passwords </li></ul><ul><li>Transfering data regularly to a secure location </li></ul><ul><li>Deleting all personal information (files, pictures, videos, contacts) before selling off the cellphone </li></ul>
  8. 8. TakeBackTheTech <ul><li>What constitutes harassment? </li></ul><ul><ul><ul><li>Infringing on someone’s social space </li></ul></ul></ul><ul><ul><ul><li>Abusive behavior </li></ul></ul></ul><ul><ul><ul><li>Cyber Stalking </li></ul></ul></ul><ul><ul><ul><li>Cyber Bullying </li></ul></ul></ul><ul><ul><ul><li>Unsolicited Attention </li></ul></ul></ul><ul><li>What to do? </li></ul>
  9. 9. TakeBackTheTech Toolkit <ul><li>Portable Apps </li></ul>
  10. 10. Policies <ul><li>Legislations & Policies & why should you care </li></ul><ul><li>Lack of Cyber crime legislation, Data Protection legislation, Privacy Legislation </li></ul><ul><li>What does this mean for businesses & individuals </li></ul><ul><li>What can you do? How can you get involved? </li></ul>

×