SlideShare a Scribd company logo
1 of 42
Online
Security

Amanda L. Goodman, User Experience Librarian
Darien Library, January 2014

Source: http://www.flickr.com/photos/theeerin/7606588048/
Story Time!

Source: http://www.flickr.com/photos/looking_and_learning/8400360699
The Bad News

Source: http://www.darientimes.com/22805/darien-residents-identity-stolen-to-buy-online-goods
The Good News
Protecting yourself is easy!
Know the signs of a
scam, use strong
passwords, and
protect your
computer from
hackers.
Source: http://www.flickr.com/photos/seandreilinger/5739375222
Your Online User Account
Be fake!

Create a fake persona for
yourself and use its
information when creating
accounts online.
Ease to do:
Moderately easy

Source: http://www.flickr.com/photos/whiteboard_dave/8462689688/
Your Online User Account
Be fake!

Protect yourself:

Do not use your real personal data
I.e. not your mom’s maiden name

Create a story for yourself

Love a book character to death? Use their story
information for your account

Remember your fake details

Source: http://www.flickr.com/photos/librarygoblin/6888540425
Scam Messages
Do not click!

Scammers and spammers
want to take your identity
and money.
Shows up on:
All social networks
Instant messaging
Text messages

Difficulty to spot:
Very easy
Scam Messages
Do not click!

Giveaways of a scam:
No photo
No text but just a URL
Beware of messages like:
~ “You won’t believe what they
said about you!”
~ “Check out this video of you.”

Nonsense username
Scam Emails
Do not click!

Email scammers prey on
gullibility, greed, empathy,
and loneliness.
Shows up on:
All email providers

Difficulty to spot:
Depends

Source: http://www.flickr.com/photos/nbr/3705010877
Scam Emails
Do not click!

Giveaways of a scam:
Unreasonably high salary
Looking for no experience
or says you can work
from home.
Scam Emails
Do not click!

Giveaways of a scam:
Wants to transfer you money

From a foreign prince
A dead family member
Someone trying to leave a dangerous situation

Language is unusual
English grammar is very weak

Urges urgency
Source: http://www.flickr.com/photos/librarygoblin/6888540425
Phishing
Do not click!

Phisers want to hack
your account and steal
your information.
Shows up on:
All social networks
Emails

Difficulty to spot:
Moderately difficult

Source: http://www.flickr.com/photos/djwaldow/4679640891
Phishing
Do not click!

Giveaways of a scam:
Claims there’s an issue with
your account

Wants you to click on a link to
log in or reactivate account
Warnings of doom if you do not
immediately comply
Phishing
Do not click!

How to check if real:
Hover over the URL

See if it really goes to the exact URL the email
claims to be from

Check the email address of
the sender

Beware of close URLs like gmale instead of gmail

Know who will not send you such
an email
AKA your bank, the IRS, the FBI, etc.

If in doubt, go the website directly and log in
Romance Scam Emails
Do not click!

Giveaways of a scam:
Wants you to transfer money
For goods, services, plane tickets

Sweet talks you

“Love of my life”
“No one has made me feel like this before”

Avoids meeting you

Source: http://dailym.ai/17zMPKm
Scams
Protect yourself!

To learn more:
Wikipedia

en.wikipedia.org/wiki/Nigerian_scam

5 Common Email Scams
1.usa.gov/1fzsdCS

Urban Legends
snopes.com

Latest Email Hoaxes
www.hoax-slayer.com

Source: http://dailym.ai/17zMPKm
Email Attachments
Do not open unless you are expecting an attachment!

Email hackers send
damaging attachments via
email to take over your
computer.
Shows up on:
All email providers

Difficulty to spot:
Easy

Source: http://www.flickr.com/photos/ari-herzog/3346927141
Email Attachments
Do not open unless you are expecting an attachment!

Giveaways of a scam:
Attachment(s) from a friend but
no text in the email body
Attachment(s) from a stranger
Attachment file ends in .exe or .rar
Passwords
Keep ‘em fresh!

Changing your passwords
frequently is the best
security measure.
Shows up:

Everywhere you go online

Easy level:
Very easy

**********
Passwords
Keep ‘em fresh!

Source: https://xkcd.com/936
Passwords
Keep ‘em fresh!

Protect yourself:
Use different passwords for
important sites
E.g. bank, email, shopping sites

Do not leave your password
cheat sheet lying around
Keep your password to yourself
Use a password manager
E.g. LastPass, Dashlane, KeePass

**********
Two Factor Authentication
Add an extra level of protection!

Use a second layer of
authentication when
accessing your online
accounts.
Shows up:
Gmail
Twitter

Facebook
Dropbox

Easy level:

Easy after setting up

PayPal
And more
Two Factor Authentication
Add an extra level of protection!

Protect yourself:
Enable two factor authentication
You will need a code, a password, or answer a
question to log into a site where you have
enabled two factor authentication

Remember how to access your
accounts
Or you will not be able to log into the site
You may need your mobile phone if your site
uses an app to generate the access code

More information
http://bit.ly/17zkjEy
WiFi & Public Computer Safety
Be aware!

When on public WiFi
networks or computers, be
careful to not give away
your personal
information.
Ease to do:
Moderately easy
WiFi & Public Computer Safety
Be aware!

Protect yourself:
Stay off sensitive information sites
E.g. bank, email, shopping sites

If on public WiFi, know that
someone could be “sniffing” and
stealing your data
Student recommended using Hotspot Shield

Always sign off all sites you log
into on a public computer
HTTPS
Use secure connections!

Encrypt your data as you
browse the web.
Shows up:

Many popular, major websites already offer
HTTPS security so your data is encrypted.

Easy level:
Very easy
HTTPS
Use secure connections!

Protect yourself:
Download a browser extension that
tries to use HTTPS everywhere it is
available on the web
https://www.eff.org/https-everywhere
Available for Firefox and Chrome browsers

Check for HTTPS in the URL

If a site which is handling sensitive data like financial
information or Social Security Numbers does not use
HTTPS, do not input your information
Web Browser
Use a secure browser!

Keeping your browser up
to date is essential for safe
online usage.

Easy level:
Very easy
Web Browser
Use a secure browser!

Protect yourself:
Choose a better browser

My recommended browsers are Google
Chrome and Firefox (my bias)

Add protective features to the
browser
AdBlock Plus
HTTPS Everywhere
Disconnect extension
Keep My Opt-Outs
Do Not Track

Disable third party cookies
http://bit.ly/14mVK2Q
Read Your Credit Report
It’s free!

Federal law guarantees
your access to an online
copy of your credit report.

Easy level:

Moderately easy
Source: http://www.experian.com/assistance/free-annual-credit-report.html

123-45-6789
Read Your Credit Report
It’s free!

Protect yourself:
Get your free credit reports
https://www.annualcreditreport.com

Reports are from three major
reporting agencies
Experian

Equifax

TransUnion

Get a single report from a single
agency every 4 months
This way you can watch your credit report
throughout the year

123-45-6789
Viruses
Get yourself some anti-virus software.

Free

Paid

avast! Free Antivirus

Norton

avast.com/index

us.norton.com/antivirus

AVG Free

Bitdefender Antivirus Plus

free.avg.com

bitdeferender.com
Online
Privacy
Source: http://www.flickr.com/photos/avissena/6131373743/in/photostream/
COPPA
The Children’s Online Privacy Protection Act

The purpose of the law: How parental permission
Children under 13 cannot give out
is gathered:
personal information without the
consent of their parents

~ Signature via postal mail or email
~ A credit card for a transaction
~ A 1-800 number for parents to call

Be aware:

Children who have online accounts like email and social media can lose
their accounts if its discovered that they’re younger than 13.
Source: http://www.ftc.gov/news-events/media-resources/protecting-consumer-privacy/kids-privacy-coppa & http://www.coppa.org/comply.htm
CIPA
Children’s Internet Protection Act

Benefits to schools
The purpose of the law:
& libraries:
“to address concerns about
children’s access to obscene or
harmful content over the Internet”
especially in schools and libraries

~ Reduced rates for Internet access

What schools & libraries must do:

~ Implement filtering software
~ Create an Internet safety policy in regards to minors
Source: http://www.fcc.gov/guides/childrens-internet-protection-act
Protecting Children in the 21st Century Act
Works alongside CIPA

The purpose of the law:
To educate minors on appropriate
online behavior

Education outline:

~ Posting responsibly
~ Cyberbullying
~ Creating a positive online profile
~ Consider the consequences of your actions
Source: http://www.fcc.gov/guides/childrens-internet-protection-act & Michael Oide of OITP
Cyberbullying
24/7/365 access to the victim

Online bullying is worse
than traditional bullying.
Violent & sexual crimes
against the victim are shared
via social media.
Child Pornography Laws
Minors get charged too.

The PROTECT Act of 2003 & 18 U.S. Code §
1466A

criminalizes “knowingly or distributing ‘an obscene visual depiction of a
minor engaging in sexually explicit conduct; or a visual depiction of an actual
minor engaging in sexually explicit conduct.’”

Source: http://www.law.cornell.edu/uscode/text/18/1466A & http://en.wikipedia.org/wiki/PROTECT_Act_of_2003
Teens & Online Privacy
They can hide it better.

Wrong assumption:

Teens don’t care about privacy

Truth:

60% of teens have private Facebook
profiles & 26% post fake information about
themselves
Source: http://www.theguardian.com/technology/2013/oct/21/teenagers-careless-about-online-privacy
Erasable History
Let it go. Let it go.

Delete, delete, delete.

Teens are learning to leave no trace of their
online presence for others to find.

Self-destructing services:
Secretink.co
Snapchat
Wickr

Source: http://www.theguardian.com/technology/2013/oct/21/teenagers-careless-about-online-privacy
Other Tips
Pay attention!

Protect yourself:
Follow the news to learn which
sites were hacked

Be mindful of others’ privacy

Do not give your password or
PIN to your child

No such thing as a free lunch

Change your password immediately on that
site

They could run up charges by making
purchasing on your iPad or iPhone

Family and friends may not want their name,
photo, or other information posted online

Visiting pornography or free download sites (i.e.
movies, music, etc.) may expose your computer to
viruses
You are responsible for your online
security.
By being aware of what’s happening online and how your data
can be compromised, you are now ready to protect yourself!

More Related Content

What's hot

Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internetmohmd-kutbi
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentationjaurisch
 
Internet issues
Internet issuesInternet issues
Internet issuesCJ900
 
Cyber peace for youth tanta
Cyber peace for youth tantaCyber peace for youth tanta
Cyber peace for youth tantaSamir Deutsch
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital AgeMarian Merritt
 
Internet safety presentation 2013
Internet safety presentation 2013Internet safety presentation 2013
Internet safety presentation 2013KanelandSvihlik
 
Becybersmart
BecybersmartBecybersmart
BecybersmartVelma
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminartholman77
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Eanes isd
 
Presentation on the optimal usage of facebook
Presentation on the optimal usage of facebookPresentation on the optimal usage of facebook
Presentation on the optimal usage of facebookShweta Agarwal
 
How to avoid facebook scams
How to avoid facebook scamsHow to avoid facebook scams
How to avoid facebook scamsMr.OoPpSs Group
 
Cybersecurity additional activities
Cybersecurity additional activitiesCybersecurity additional activities
Cybersecurity additional activitiesYumonomics
 
Internet use issues
Internet use issues Internet use issues
Internet use issues computers 11
 
ISSA - Security Awareness 2016-1
ISSA - Security Awareness 2016-1ISSA - Security Awareness 2016-1
ISSA - Security Awareness 2016-1Pedro Serrano
 

What's hot (20)

Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentation
 
Internet issues
Internet issuesInternet issues
Internet issues
 
Cyber peace for youth tanta
Cyber peace for youth tantaCyber peace for youth tanta
Cyber peace for youth tanta
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Internet safety presentation 2013
Internet safety presentation 2013Internet safety presentation 2013
Internet safety presentation 2013
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
 
Becybersmart
BecybersmartBecybersmart
Becybersmart
 
Myspace
MyspaceMyspace
Myspace
 
Social Networking
Social NetworkingSocial Networking
Social Networking
 
Online secuirty
Online secuirtyOnline secuirty
Online secuirty
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Presentation on the optimal usage of facebook
Presentation on the optimal usage of facebookPresentation on the optimal usage of facebook
Presentation on the optimal usage of facebook
 
How to avoid facebook scams
How to avoid facebook scamsHow to avoid facebook scams
How to avoid facebook scams
 
Cybersecurity additional activities
Cybersecurity additional activitiesCybersecurity additional activities
Cybersecurity additional activities
 
Internet use issues
Internet use issues Internet use issues
Internet use issues
 
ISSA - Security Awareness 2016-1
ISSA - Security Awareness 2016-1ISSA - Security Awareness 2016-1
ISSA - Security Awareness 2016-1
 

Viewers also liked

Supporting Small Biz: Digital Tools for Startups: 2016 Webinar
Supporting Small Biz: Digital Tools for Startups: 2016 WebinarSupporting Small Biz: Digital Tools for Startups: 2016 Webinar
Supporting Small Biz: Digital Tools for Startups: 2016 WebinarAmanda L. Goodman
 
How to Modernize Your Signage with Digital Screens
How to Modernize Your Signage with Digital ScreensHow to Modernize Your Signage with Digital Screens
How to Modernize Your Signage with Digital ScreensAmanda L. Goodman
 
CILIP day - Marketing your library using social media - Feb 2016
CILIP day - Marketing your library using social media - Feb 2016CILIP day - Marketing your library using social media - Feb 2016
CILIP day - Marketing your library using social media - Feb 2016Neil Infield
 
Five Minutes with Jen: Live!
Five Minutes with Jen: Live!Five Minutes with Jen: Live!
Five Minutes with Jen: Live!Amanda L. Goodman
 
Space Solutions in Makerspaces at Darien Library
Space Solutions in Makerspaces at Darien LibrarySpace Solutions in Makerspaces at Darien Library
Space Solutions in Makerspaces at Darien LibraryAmanda L. Goodman
 
CPD25 Marketing your library using social media
CPD25 Marketing your library using social mediaCPD25 Marketing your library using social media
CPD25 Marketing your library using social mediaNeil Infield
 

Viewers also liked (6)

Supporting Small Biz: Digital Tools for Startups: 2016 Webinar
Supporting Small Biz: Digital Tools for Startups: 2016 WebinarSupporting Small Biz: Digital Tools for Startups: 2016 Webinar
Supporting Small Biz: Digital Tools for Startups: 2016 Webinar
 
How to Modernize Your Signage with Digital Screens
How to Modernize Your Signage with Digital ScreensHow to Modernize Your Signage with Digital Screens
How to Modernize Your Signage with Digital Screens
 
CILIP day - Marketing your library using social media - Feb 2016
CILIP day - Marketing your library using social media - Feb 2016CILIP day - Marketing your library using social media - Feb 2016
CILIP day - Marketing your library using social media - Feb 2016
 
Five Minutes with Jen: Live!
Five Minutes with Jen: Live!Five Minutes with Jen: Live!
Five Minutes with Jen: Live!
 
Space Solutions in Makerspaces at Darien Library
Space Solutions in Makerspaces at Darien LibrarySpace Solutions in Makerspaces at Darien Library
Space Solutions in Makerspaces at Darien Library
 
CPD25 Marketing your library using social media
CPD25 Marketing your library using social mediaCPD25 Marketing your library using social media
CPD25 Marketing your library using social media
 

Similar to Online Security & Privacy: Updated

Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2NetLockSmith
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology- Mark - Fullbright
 
Protecting your privacy online
Protecting your privacy onlineProtecting your privacy online
Protecting your privacy onlineMolly Immendorf
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]sheenau
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1Rozell Sneede
 
5 a module online privacy
5 a module online privacy5 a module online privacy
5 a module online privacyRozell Sneede
 
October 2012 is_national_cyber_security_awareness_month
October 2012 is_national_cyber_security_awareness_monthOctober 2012 is_national_cyber_security_awareness_month
October 2012 is_national_cyber_security_awareness_monthEvelyn Berrier
 
Protecting your privacy online county leadership conference
Protecting your privacy online  county leadership conferenceProtecting your privacy online  county leadership conference
Protecting your privacy online county leadership conferenceMolly Immendorf
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxHarishParthasarathy4
 
Cyber crime awareness
Cyber crime awarenessCyber crime awareness
Cyber crime awarenessArjun Chetry
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptxTanvir Amin
 
Protecting Personal Privacy
Protecting Personal PrivacyProtecting Personal Privacy
Protecting Personal PrivacyDoubleXDS
 
Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notesLinda Barron
 
Protecting your privacy online june 2012 tech tuesday
Protecting your privacy online june 2012 tech tuesdayProtecting your privacy online june 2012 tech tuesday
Protecting your privacy online june 2012 tech tuesdayMolly Immendorf
 

Similar to Online Security & Privacy: Updated (20)

Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 
Security At Home
Security At HomeSecurity At Home
Security At Home
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
 
Protecting your privacy online
Protecting your privacy onlineProtecting your privacy online
Protecting your privacy online
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1
 
5 a module online privacy
5 a module online privacy5 a module online privacy
5 a module online privacy
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
October 2012 is_national_cyber_security_awareness_month
October 2012 is_national_cyber_security_awareness_monthOctober 2012 is_national_cyber_security_awareness_month
October 2012 is_national_cyber_security_awareness_month
 
Protecting your privacy online county leadership conference
Protecting your privacy online  county leadership conferenceProtecting your privacy online  county leadership conference
Protecting your privacy online county leadership conference
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
 
Cyber crime awareness
Cyber crime awarenessCyber crime awareness
Cyber crime awareness
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
 
Protecting Personal Privacy
Protecting Personal PrivacyProtecting Personal Privacy
Protecting Personal Privacy
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notes
 
Protecting your privacy online june 2012 tech tuesday
Protecting your privacy online june 2012 tech tuesdayProtecting your privacy online june 2012 tech tuesday
Protecting your privacy online june 2012 tech tuesday
 

Recently uploaded

Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 

Recently uploaded (20)

Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 

Online Security & Privacy: Updated

  • 1. Online Security Amanda L. Goodman, User Experience Librarian Darien Library, January 2014 Source: http://www.flickr.com/photos/theeerin/7606588048/
  • 3. The Bad News Source: http://www.darientimes.com/22805/darien-residents-identity-stolen-to-buy-online-goods
  • 4. The Good News Protecting yourself is easy! Know the signs of a scam, use strong passwords, and protect your computer from hackers. Source: http://www.flickr.com/photos/seandreilinger/5739375222
  • 5. Your Online User Account Be fake! Create a fake persona for yourself and use its information when creating accounts online. Ease to do: Moderately easy Source: http://www.flickr.com/photos/whiteboard_dave/8462689688/
  • 6. Your Online User Account Be fake! Protect yourself: Do not use your real personal data I.e. not your mom’s maiden name Create a story for yourself Love a book character to death? Use their story information for your account Remember your fake details Source: http://www.flickr.com/photos/librarygoblin/6888540425
  • 7. Scam Messages Do not click! Scammers and spammers want to take your identity and money. Shows up on: All social networks Instant messaging Text messages Difficulty to spot: Very easy
  • 8. Scam Messages Do not click! Giveaways of a scam: No photo No text but just a URL Beware of messages like: ~ “You won’t believe what they said about you!” ~ “Check out this video of you.” Nonsense username
  • 9. Scam Emails Do not click! Email scammers prey on gullibility, greed, empathy, and loneliness. Shows up on: All email providers Difficulty to spot: Depends Source: http://www.flickr.com/photos/nbr/3705010877
  • 10. Scam Emails Do not click! Giveaways of a scam: Unreasonably high salary Looking for no experience or says you can work from home.
  • 11. Scam Emails Do not click! Giveaways of a scam: Wants to transfer you money From a foreign prince A dead family member Someone trying to leave a dangerous situation Language is unusual English grammar is very weak Urges urgency Source: http://www.flickr.com/photos/librarygoblin/6888540425
  • 12. Phishing Do not click! Phisers want to hack your account and steal your information. Shows up on: All social networks Emails Difficulty to spot: Moderately difficult Source: http://www.flickr.com/photos/djwaldow/4679640891
  • 13. Phishing Do not click! Giveaways of a scam: Claims there’s an issue with your account Wants you to click on a link to log in or reactivate account Warnings of doom if you do not immediately comply
  • 14. Phishing Do not click! How to check if real: Hover over the URL See if it really goes to the exact URL the email claims to be from Check the email address of the sender Beware of close URLs like gmale instead of gmail Know who will not send you such an email AKA your bank, the IRS, the FBI, etc. If in doubt, go the website directly and log in
  • 15. Romance Scam Emails Do not click! Giveaways of a scam: Wants you to transfer money For goods, services, plane tickets Sweet talks you “Love of my life” “No one has made me feel like this before” Avoids meeting you Source: http://dailym.ai/17zMPKm
  • 16. Scams Protect yourself! To learn more: Wikipedia en.wikipedia.org/wiki/Nigerian_scam 5 Common Email Scams 1.usa.gov/1fzsdCS Urban Legends snopes.com Latest Email Hoaxes www.hoax-slayer.com Source: http://dailym.ai/17zMPKm
  • 17. Email Attachments Do not open unless you are expecting an attachment! Email hackers send damaging attachments via email to take over your computer. Shows up on: All email providers Difficulty to spot: Easy Source: http://www.flickr.com/photos/ari-herzog/3346927141
  • 18. Email Attachments Do not open unless you are expecting an attachment! Giveaways of a scam: Attachment(s) from a friend but no text in the email body Attachment(s) from a stranger Attachment file ends in .exe or .rar
  • 19. Passwords Keep ‘em fresh! Changing your passwords frequently is the best security measure. Shows up: Everywhere you go online Easy level: Very easy **********
  • 20. Passwords Keep ‘em fresh! Source: https://xkcd.com/936
  • 21. Passwords Keep ‘em fresh! Protect yourself: Use different passwords for important sites E.g. bank, email, shopping sites Do not leave your password cheat sheet lying around Keep your password to yourself Use a password manager E.g. LastPass, Dashlane, KeePass **********
  • 22. Two Factor Authentication Add an extra level of protection! Use a second layer of authentication when accessing your online accounts. Shows up: Gmail Twitter Facebook Dropbox Easy level: Easy after setting up PayPal And more
  • 23. Two Factor Authentication Add an extra level of protection! Protect yourself: Enable two factor authentication You will need a code, a password, or answer a question to log into a site where you have enabled two factor authentication Remember how to access your accounts Or you will not be able to log into the site You may need your mobile phone if your site uses an app to generate the access code More information http://bit.ly/17zkjEy
  • 24. WiFi & Public Computer Safety Be aware! When on public WiFi networks or computers, be careful to not give away your personal information. Ease to do: Moderately easy
  • 25. WiFi & Public Computer Safety Be aware! Protect yourself: Stay off sensitive information sites E.g. bank, email, shopping sites If on public WiFi, know that someone could be “sniffing” and stealing your data Student recommended using Hotspot Shield Always sign off all sites you log into on a public computer
  • 26. HTTPS Use secure connections! Encrypt your data as you browse the web. Shows up: Many popular, major websites already offer HTTPS security so your data is encrypted. Easy level: Very easy
  • 27. HTTPS Use secure connections! Protect yourself: Download a browser extension that tries to use HTTPS everywhere it is available on the web https://www.eff.org/https-everywhere Available for Firefox and Chrome browsers Check for HTTPS in the URL If a site which is handling sensitive data like financial information or Social Security Numbers does not use HTTPS, do not input your information
  • 28. Web Browser Use a secure browser! Keeping your browser up to date is essential for safe online usage. Easy level: Very easy
  • 29. Web Browser Use a secure browser! Protect yourself: Choose a better browser My recommended browsers are Google Chrome and Firefox (my bias) Add protective features to the browser AdBlock Plus HTTPS Everywhere Disconnect extension Keep My Opt-Outs Do Not Track Disable third party cookies http://bit.ly/14mVK2Q
  • 30. Read Your Credit Report It’s free! Federal law guarantees your access to an online copy of your credit report. Easy level: Moderately easy Source: http://www.experian.com/assistance/free-annual-credit-report.html 123-45-6789
  • 31. Read Your Credit Report It’s free! Protect yourself: Get your free credit reports https://www.annualcreditreport.com Reports are from three major reporting agencies Experian Equifax TransUnion Get a single report from a single agency every 4 months This way you can watch your credit report throughout the year 123-45-6789
  • 32. Viruses Get yourself some anti-virus software. Free Paid avast! Free Antivirus Norton avast.com/index us.norton.com/antivirus AVG Free Bitdefender Antivirus Plus free.avg.com bitdeferender.com
  • 34. COPPA The Children’s Online Privacy Protection Act The purpose of the law: How parental permission Children under 13 cannot give out is gathered: personal information without the consent of their parents ~ Signature via postal mail or email ~ A credit card for a transaction ~ A 1-800 number for parents to call Be aware: Children who have online accounts like email and social media can lose their accounts if its discovered that they’re younger than 13. Source: http://www.ftc.gov/news-events/media-resources/protecting-consumer-privacy/kids-privacy-coppa & http://www.coppa.org/comply.htm
  • 35. CIPA Children’s Internet Protection Act Benefits to schools The purpose of the law: & libraries: “to address concerns about children’s access to obscene or harmful content over the Internet” especially in schools and libraries ~ Reduced rates for Internet access What schools & libraries must do: ~ Implement filtering software ~ Create an Internet safety policy in regards to minors Source: http://www.fcc.gov/guides/childrens-internet-protection-act
  • 36. Protecting Children in the 21st Century Act Works alongside CIPA The purpose of the law: To educate minors on appropriate online behavior Education outline: ~ Posting responsibly ~ Cyberbullying ~ Creating a positive online profile ~ Consider the consequences of your actions Source: http://www.fcc.gov/guides/childrens-internet-protection-act & Michael Oide of OITP
  • 37. Cyberbullying 24/7/365 access to the victim Online bullying is worse than traditional bullying. Violent & sexual crimes against the victim are shared via social media.
  • 38. Child Pornography Laws Minors get charged too. The PROTECT Act of 2003 & 18 U.S. Code § 1466A criminalizes “knowingly or distributing ‘an obscene visual depiction of a minor engaging in sexually explicit conduct; or a visual depiction of an actual minor engaging in sexually explicit conduct.’” Source: http://www.law.cornell.edu/uscode/text/18/1466A & http://en.wikipedia.org/wiki/PROTECT_Act_of_2003
  • 39. Teens & Online Privacy They can hide it better. Wrong assumption: Teens don’t care about privacy Truth: 60% of teens have private Facebook profiles & 26% post fake information about themselves Source: http://www.theguardian.com/technology/2013/oct/21/teenagers-careless-about-online-privacy
  • 40. Erasable History Let it go. Let it go. Delete, delete, delete. Teens are learning to leave no trace of their online presence for others to find. Self-destructing services: Secretink.co Snapchat Wickr Source: http://www.theguardian.com/technology/2013/oct/21/teenagers-careless-about-online-privacy
  • 41. Other Tips Pay attention! Protect yourself: Follow the news to learn which sites were hacked Be mindful of others’ privacy Do not give your password or PIN to your child No such thing as a free lunch Change your password immediately on that site They could run up charges by making purchasing on your iPad or iPhone Family and friends may not want their name, photo, or other information posted online Visiting pornography or free download sites (i.e. movies, music, etc.) may expose your computer to viruses
  • 42. You are responsible for your online security. By being aware of what’s happening online and how your data can be compromised, you are now ready to protect yourself!