SlideShare a Scribd company logo
1 of 16
Censored
Intent vs. Impact

Online actions have REAL world consequences

Once posted …never un-posted


Rule of Thumb :
“If you would not show it to your Grandmother DON’T post it”
 Use privacy settings – Learn were on the application to find them so
  that you can adjust them

 Don’t talk to strangers – If you did NOT initiate; then you should be
  cautious

 Trust your instincts – Look for red flags- things “that just don’t seem right”

           Clues that something might not be legit are:
                 Bad grammar or spelling
                 Historical people sending you notifications
                “Government Agencies” sending email from free email providers
Settings drop down menus for the most popular sites are
located in the top right hand side of main page or profile
page
Settings menu for LinkedIn
Settings menu for Twitter
Information exchange on your terms

    Social Security number

    Routing and account numbers

    Security question defaults
Password structure
As a minimum ALL passwords should be 8 characters long and
be made up of :
      2 lowercase
      2 UPPERCASE
      2 Special Characters (!@#$%^&*()_+|}{></)
      2 Numbers (1 2 3 4 5 6 7 8 9 0)
Password construction
For example begin with a word you will remember:
               PASSWORD
Change it to:     P@$sW9r4
 You can also use a phrase:
            Mary had a little lamb 2012
Change to:      M3@1Tla2012
The key is a consistent pattern only you know and
will remember.
Never click on a pop up Ctrl alt del
Never open an email attachment from an unknown
 source
Never “update” account information in response to a
 request you did not initiate
Maintain security software - current and updated
Three levels of defense:
      Anti-virus
      Firewall
      Non administrator account for Internet surfing

Free – You get what pay for (and sometimes a little extra)

Beware of Peer to Peer sites or File sharing sites
 Think before you post

 Check default privacy settings

 Strong passwords minimum

 Rules for the physical world; good guide for the virtual world

 Always read before you click

 Anti-virus & non admin account
Internet Security  Comp Refurb

More Related Content

What's hot

Document from Sidra Saghir Asim.pptx
Document from Sidra Saghir Asim.pptxDocument from Sidra Saghir Asim.pptx
Document from Sidra Saghir Asim.pptxsidrasagheer1
 
Ict H A C K I N G
Ict    H A C K I N GIct    H A C K I N G
Ict H A C K I N GHafizra Mas
 
Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethicsNikki Shree
 
Internet Saftey Final
Internet Saftey FinalInternet Saftey Final
Internet Saftey Finalguest252cc9
 
Email Security Awareness
Email Security AwarenessEmail Security Awareness
Email Security AwarenessDale Rapp
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your usersSimpliv LLC
 
Hacking and its types V2
Hacking and its types V2Hacking and its types V2
Hacking and its types V2Mian Khayyam
 
Security Awareness 9-10-09 v5 You've Got Mail
Security Awareness 9-10-09 v5 You've Got MailSecurity Awareness 9-10-09 v5 You've Got Mail
Security Awareness 9-10-09 v5 You've Got MailCatherine MacAllister
 
Hacking
HackingHacking
HackingVirus
 
Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Michael Asres
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentationZahid Rajeel
 
PowerPoint Presentation: Hacking
PowerPoint Presentation: HackingPowerPoint Presentation: Hacking
PowerPoint Presentation: HackingBareetSingh
 

What's hot (20)

Document from Sidra Saghir Asim.pptx
Document from Sidra Saghir Asim.pptxDocument from Sidra Saghir Asim.pptx
Document from Sidra Saghir Asim.pptx
 
Ict H A C K I N G
Ict    H A C K I N GIct    H A C K I N G
Ict H A C K I N G
 
Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethics
 
Internet Saftey Final
Internet Saftey FinalInternet Saftey Final
Internet Saftey Final
 
Email Security Awareness
Email Security AwarenessEmail Security Awareness
Email Security Awareness
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your users
 
Hacking and its types V2
Hacking and its types V2Hacking and its types V2
Hacking and its types V2
 
R@1n
R@1nR@1n
R@1n
 
Hacking
HackingHacking
Hacking
 
Security Awareness 9-10-09 v5 You've Got Mail
Security Awareness 9-10-09 v5 You've Got MailSecurity Awareness 9-10-09 v5 You've Got Mail
Security Awareness 9-10-09 v5 You've Got Mail
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Hacking
HackingHacking
Hacking
 
Computer and Internet hacking
Computer and Internet hackingComputer and Internet hacking
Computer and Internet hacking
 
Hacking
HackingHacking
Hacking
 
Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Is hacking good or bad
Is hacking good or badIs hacking good or bad
Is hacking good or bad
 
Hacking
HackingHacking
Hacking
 
PowerPoint Presentation: Hacking
PowerPoint Presentation: HackingPowerPoint Presentation: Hacking
PowerPoint Presentation: Hacking
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 

Viewers also liked

Fotonovela
FotonovelaFotonovela
Fotonovelasarasa77
 
Whitepaper choosing 2012_web2
Whitepaper choosing 2012_web2Whitepaper choosing 2012_web2
Whitepaper choosing 2012_web2jwb349
 
Outlook staff pres comp
Outlook staff pres compOutlook staff pres comp
Outlook staff pres compLuis Terron
 
Cost Of Prevention: Overview of Affordable Care Act and Preventive Care Costs
Cost Of Prevention: Overview of Affordable Care Act and Preventive Care CostsCost Of Prevention: Overview of Affordable Care Act and Preventive Care Costs
Cost Of Prevention: Overview of Affordable Care Act and Preventive Care CostsLuis Terron
 
Foreign Direct Investment And Government Stability
Foreign Direct Investment And Government StabilityForeign Direct Investment And Government Stability
Foreign Direct Investment And Government StabilityLuis Terron
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldabaux singapore
 

Viewers also liked (7)

Fotonovela
FotonovelaFotonovela
Fotonovela
 
Whitepaper choosing 2012_web2
Whitepaper choosing 2012_web2Whitepaper choosing 2012_web2
Whitepaper choosing 2012_web2
 
Outlook staff pres comp
Outlook staff pres compOutlook staff pres comp
Outlook staff pres comp
 
Cost Of Prevention: Overview of Affordable Care Act and Preventive Care Costs
Cost Of Prevention: Overview of Affordable Care Act and Preventive Care CostsCost Of Prevention: Overview of Affordable Care Act and Preventive Care Costs
Cost Of Prevention: Overview of Affordable Care Act and Preventive Care Costs
 
Foreign Direct Investment And Government Stability
Foreign Direct Investment And Government StabilityForeign Direct Investment And Government Stability
Foreign Direct Investment And Government Stability
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
 
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job? Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
 

Similar to Internet Security Comp Refurb

Lesson learned from linked in
Lesson learned from linked inLesson learned from linked in
Lesson learned from linked inPayza
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1Rozell Sneede
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness trainingAbdalrhmanTHassan
 
How to choose a password that’s hard to crack
How to choose a password that’s hard to crackHow to choose a password that’s hard to crack
How to choose a password that’s hard to crackKlaus Drosch
 
CYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptxCYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptxTapan Khilar
 
Internet Security
Internet SecurityInternet Security
Internet Securitymjelson
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness TrainingJen Ruhman
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness TrainingJen Ruhman
 
Security and the Service Desk
Security and the Service DeskSecurity and the Service Desk
Security and the Service DeskNorthCoastHDI
 
Awareness Security 123.pptx
Awareness Security 123.pptxAwareness Security 123.pptx
Awareness Security 123.pptxRajuSingh730938
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxBilmyRikas
 
USG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer (1).pptxUSG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer (1).pptxssuser59e4b8
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxsumita02
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is DangerousGihan Dias
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptxTanvir Amin
 
Are Phishing Attacks Angling For You?
Are Phishing Attacks Angling For You? Are Phishing Attacks Angling For You?
Are Phishing Attacks Angling For You? The TNS Group
 

Similar to Internet Security Comp Refurb (20)

Lesson learned from linked in
Lesson learned from linked inLesson learned from linked in
Lesson learned from linked in
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness training
 
How to choose a password that’s hard to crack
How to choose a password that’s hard to crackHow to choose a password that’s hard to crack
How to choose a password that’s hard to crack
 
CYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptxCYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptx
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Security and the Service Desk
Security and the Service DeskSecurity and the Service Desk
Security and the Service Desk
 
Awareness Security 123.pptx
Awareness Security 123.pptxAwareness Security 123.pptx
Awareness Security 123.pptx
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptx
 
USG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer (1).pptxUSG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer (1).pptx
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptx
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
 
Security provisions
Security provisions Security provisions
Security provisions
 
Security Tips
Security TipsSecurity Tips
Security Tips
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
Are Phishing Attacks Angling For You?
Are Phishing Attacks Angling For You? Are Phishing Attacks Angling For You?
Are Phishing Attacks Angling For You?
 

Internet Security Comp Refurb

  • 1.
  • 2.
  • 4. Intent vs. Impact Online actions have REAL world consequences Once posted …never un-posted Rule of Thumb : “If you would not show it to your Grandmother DON’T post it”
  • 5.  Use privacy settings – Learn were on the application to find them so that you can adjust them  Don’t talk to strangers – If you did NOT initiate; then you should be cautious  Trust your instincts – Look for red flags- things “that just don’t seem right” Clues that something might not be legit are: Bad grammar or spelling Historical people sending you notifications “Government Agencies” sending email from free email providers
  • 6. Settings drop down menus for the most popular sites are located in the top right hand side of main page or profile page
  • 7. Settings menu for LinkedIn
  • 9.
  • 10. Information exchange on your terms Social Security number Routing and account numbers Security question defaults
  • 11. Password structure As a minimum ALL passwords should be 8 characters long and be made up of : 2 lowercase 2 UPPERCASE 2 Special Characters (!@#$%^&*()_+|}{></) 2 Numbers (1 2 3 4 5 6 7 8 9 0)
  • 12. Password construction For example begin with a word you will remember: PASSWORD Change it to: P@$sW9r4 You can also use a phrase: Mary had a little lamb 2012 Change to: M3@1Tla2012 The key is a consistent pattern only you know and will remember.
  • 13. Never click on a pop up Ctrl alt del Never open an email attachment from an unknown source Never “update” account information in response to a request you did not initiate
  • 14. Maintain security software - current and updated Three levels of defense: Anti-virus Firewall Non administrator account for Internet surfing Free – You get what pay for (and sometimes a little extra) Beware of Peer to Peer sites or File sharing sites
  • 15.  Think before you post  Check default privacy settings  Strong passwords minimum  Rules for the physical world; good guide for the virtual world  Always read before you click  Anti-virus & non admin account

Editor's Notes

  1. Pause after asking the question.
  2. Intent vs. Impact – It has been said that the road to hell is paved with good intentions. Our INTENT may be to be humorous but the IMPACT of an off color photo or statement could have negative consequences on our job, family and reputation.(Expound, explain, and discuss)Online actions – Not just the posting of one page but a collection of information from many sources; this helps to build an online persona. This persona if negative can have real world consequences like loss of job, failure to find employment and potentially disqualify a person from civic organizations or service.(NJ teacher fired, Anthony Weiner)Once Posted – material that is posted on line either in an album or part of a tweet may be downloaded and retained on a local computer.Just because an account is deleted or deactivated does not mean that the information is gone.
  3. Privacy – Look at the settings; do not rely on default to be secure. Customize to the strongest level and then back them down as you become more familiar with the application.Strange contacts – The rules for users is the physical world are the same in the virtual. Do not accept unsolicited contact. Trust your instincts – If it is to good to be true then it is; beware of the con man
  4. Explain, Expand, Discuss
  5. Explain, Expand, Discuss
  6. Explain, Expand, Discuss
  7. Bring out the bad grammar / structure give awayBen S. Bernanke scamExplain, Expand, Discuss
  8. Info protection – What value do you place on your information- what actions do you take in the physical world to safe guard your information? Carry that on to the virtual world.
  9. Password – Single most important part of the class. Emphasize the importance of the structure and the minimum requirements.
  10. Password construction – The main point is to find a SECURE routine that they will remember.Memorize is the best. Write down only in a code and then secure that document. DO NOT KEEP A REORD OF IT ON THE COMPUTER!!!!!
  11. Info Protect – Explain Task Manager and do hands on-Bring out typo in WSA virus
  12. Explain, Expand, DiscussBring out non admin account for surfing the netMention the dangers of P2P sites
  13. Explain, Expand, Discuss
  14. Open up to questions – stay conscious of the time