Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Staying Safe Online (for kids)

1,980 views

Published on

Cybersecurity for kids, discusses phishing attacks, malware, and some basic tips for helping young adults identify attacks and what they can do to protect themselves.

Published in: Technology, Design
  • Be the first to comment

  • Be the first to like this

Staying Safe Online (for kids)

  1. 1. ©2009CarnegieMellonUniversity:1 Staying Safe Online iTeams 2013 Jason Hong
  2. 2. ©2013CarnegieMellonUniversity:2
  3. 3. ©2013CarnegieMellonUniversity:3 What do you do here?
  4. 4. ©2013CarnegieMellonUniversity:4 How to Tell It’s a Fake?
  5. 5. ©2013CarnegieMellonUniversity:5
  6. 6. ©2013CarnegieMellonUniversity:6 URLs tell you what web site you are really on • Let’s say we want to know if we are at Wombank.com
  7. 7. ©2013CarnegieMellonUniversity:7
  8. 8. ©2013CarnegieMellonUniversity:8
  9. 9. ©2013CarnegieMellonUniversity:9 How to Tell It’s a Fake?
  10. 10. ©2013CarnegieMellonUniversity:10 Fake or not? • http://ellsped.org/.google-docs.com/docs/ • http://facebook-info.ucoz.pl/Facedook-bde/ • https://www.facebook.com/ • http://www3.nationalgeographic.com • http://www.skype7.com/it • http://192.232.251.34/~cdslocal/paypal.com Takeaway 1: Learn where URLs are in the browser and how to read them
  11. 11. ©2013CarnegieMellonUniversity:11 When in Doubt, Don’t Click! Search for it online Takeaway 2: Use search engines to look up information if not sure
  12. 12. ©2013CarnegieMellonUniversity:12 Scammers can’t fake this part Takeaway 3: Scammers can put anything in the browser content area Takeaway 4: It’s easy to create fake web sites
  13. 13. ©2013CarnegieMellonUniversity:13
  14. 14. ©2013CarnegieMellonUniversity:14
  15. 15. ©2013CarnegieMellonUniversity:15 Takeaway 5: Be suspicious of any site that asks you for too much info, especially your password
  16. 16. ©2013CarnegieMellonUniversity:16 Who is Attacking, and Why?
  17. 17. ©2013CarnegieMellonUniversity:17 Who is Attacking, and Why? • Mainly computer hackers, all around the world (some organized crime) • Reason is mainly money – Spread spam on Facebook – Trick you into sending money • “Stuck in London scam” – Trick your friends into installing malware Takeaway 6: Anyone can be a target
  18. 18. ©2013CarnegieMellonUniversity:18 Malware • General term for “malicious software” – Viruses, worms, adware • Attack other computers • Attack your friends • Steal your parents’ bank accounts • Steal your virtual goods – Ex. World of Warcraft and other MMORPGs
  19. 19. ©2013CarnegieMellonUniversity:19 Looks legitimate, but it’s not! This is known as Fake Anti-Virus. Don’t click it! Just close the window.
  20. 20. ©2013CarnegieMellonUniversity:20 Other Examples of Fake AV Takeaway 7: Never install software you weren’t expecting to install
  21. 21. ©2013CarnegieMellonUniversity:21
  22. 22. ©2013CarnegieMellonUniversity:22 This is fake. Don’t ever install software this way. Go to Adobe’s site and update.
  23. 23. ©2013CarnegieMellonUniversity:23 Another Example of Fake Software
  24. 24. ©2013CarnegieMellonUniversity:24 Fake. Never install software you weren’t expecting. Also, look at the URL
  25. 25. ©2013CarnegieMellonUniversity:25 Also fake, look at the URL. Also, all web browsers auto-update now.
  26. 26. ©2013CarnegieMellonUniversity:26 Summary • Being online can be fun, but there are also a lot of bad people out there – Want you to click on things – Want you to give them your password – Want you to install malware
  27. 27. ©2013CarnegieMellonUniversity:27 You can protect yourself with basic precautions 1. Learn how to read URLs 2. Use search engines when in doubt 3. Scammers can put anything in the browser content area 4. It’s easy to create fake web sites 5. Be suspicious of any site that asks you for too much info, especially your password 6. Anyone can be a target 7. Never install software you weren’t expecting to install
  28. 28. ©2013CarnegieMellonUniversity:28 More Information • Cybersecurity for young adults https://www.mysecurecyberspace.com/ – Good passwords – Password reuse (don’t reuse passwords!) – Cyberbullying – Safe social networking
  29. 29. ©2013CarnegieMellonUniversity:29 More Information Commercially • Products for training people about cybersecurity http://wombatsecurity.com/ (Note: I’m a co-founder of Wombat)
  30. 30. ©2013CarnegieMellonUniversity:30 Extra backup slides
  31. 31. ©2013CarnegieMellonUniversity:31 Most Common Passwords (These are bad passwords)
  32. 32. ©2013CarnegieMellonUniversity:32

×