SlideShare a Scribd company logo
1 of 36
Social media for upskilling unemployed and low
skilled adult workers for digital society
2018-1-PT01-KA204-047429
IO2 Mobile and online interactive platform for building the digital
competence of low-skilled / low-qualified unemployed persons
Module 5: SAFETY
Author: MARIE CURIE ASSOCIATION – MCA, PLOVDIV, BULGARIA
LINK-UPS
The European Commission support for the production of this publication does not
constitute an endorsement of the contents which reflects the views only of the
authors, and the Commission cannot be held responsible for any use which may be
made of the information contained therein.
Aims of the module (in line with the
competence framework):
ī‚´ To protect the devices, personal data and privacy of adults,
who equally need to understand the risks and threats of
digital environments.
ī‚´ To train adults to know more about safety and security
measures and to consider reliability and privacy.
ī‚´ To enable adults to understand how to use and share
personally identifying information while being able to protect
oneself and others from damages.
ī‚´ To enable adults to understand that digital services use a
“Privacy policy” and be aware of how personal data is being
used.
Previous knowledge required
ī‚´ Basic literacy
ī‚´ Basic knowledge of common English terms used while
exploring digital devices and the internet
ī‚´ Basic digital competences required on how to use
independently a PC, tablet, smartphone, USB device,
and internet connection (incl. WiFi)
ī‚´ Completion of LINK-UPS modules 1-4
Learning outcomes
ī‚´ Knowledge
ī‚´ Knows that there are several risks associated with the use of technologies.
ī‚´ Knows about how to avoidrisks.
ī‚´ Understands the risks associated with using online services.
ī‚´ Knows how to protect personal data and privacy
ī‚´ Knows how to use properly USB flash drive
ī‚´ Skills
ī‚´ Is able to take steps to mitigate the risk of fraud by using safe credentials.
ī‚´ Is able to protect different devices from threats of the digital world
(malware, phishing, viruses, etc.).
ī‚´ Is able to protect personal data and privacy
ī‚´ Competences
ī‚´ Has a positive but realistic attitude towards the benefits and risks associated
with online technologies.
ī‚´ Is competent to protect personal data and privacy
Delivery
ī‚´ Training duration – 2 hours
ī‚´ Learning duration – 4 hours
ī‚´ Equipment/resource required – computer, tablet,
smartphone, access to internet, email
ī‚´ Assessment test – pre- and post-assessment
Short summary of the module
This module is providing information and guidance on how to
protect personal devices, data and privacy and to understand risks
and threats in digital environments.
It provides information about safety and security measures with
regards to computer usage, USB flash drives, and smartphones.
As an adult learner, you will raise your awareness and
understanding with regards to how to use and share personally
identifying information while being able to protect yourself and
others from damages.
You will understand that digital services use a “Privacy policy” to
inform how personal data is being used.
We will help you in preventing your personal data being used
wrongfully by non-authorised people.
Glossary
â€ĸThe attempt to access personal information by sending e-mails purporting to come from a genuine
company operating on the Internet,but in fact, it is a fake website operated by fraudsters
Data dredging/phishing
â€ĸA network security system that monitors and controls incoming and outgoing network traffic based on
predetermined security rules
Firewall
â€ĸTools, machinery, and other durable equipment
Hardware
â€ĸSoftware that is specifically designed to disrupt, damage, or gain unauthorized access to a computer
system
Malware
â€ĸThe programs and other operating information used by a computer, tablet, smartphone,etc.
Software
â€ĸIrrelevantor unsolicited messages sent over theInternet,usually of a commercial nature
Spam
â€ĸA flash driveis a deviceused for data storage that includes a flash memory and an integrated Universal
Serial Bus (USB) interface
USB flash drive
Chapter I. Safety and
associated risks
ī‚´ A digital citizen is “someone who is able to think critically
about the ethical opportunities and challenges of the
‘digital world’ and make safe, respectful, and responsible
choices.” (Common Sense Media, 2010)
Attributes of a good digital citizen:
ī‚´Respects others (doesn’t respond to or post negativecomments)
ī‚´Doesn’t steal (if you wouldn’t steal from a store, why steal music,
movies, videos)
ī‚´Accepts personal responsibility (smartphones and Internet)
Who is a digital citizen?
Closest Friends Friends Acquaintances Strangers
ī‚´ There is a perceived sense of anonymity online.
ī‚´ As a result, some individuals pretend to be someone they are not.
ī‚´ Users can misrepresent their ages, gender, personalities, location,
and other information about themselves.
Determine with whom you are communicatingâ€Ļ
Who are you when online?
Risks for all Internet users
The three Cs:
ī‚§ Inappropriate or unwanted Contact
ī‚§ Inappropriate or inaccurate Content
ī‚§ Deceptive or fraudulent Commerce
ī‚´ You as an adult needs to be aware of
what information you are posting and how
you are representing yourself online.
ī‚´ Limit the amount of personal information
ī‚´ Address
ī‚´ Phone number
ī‚´ Birthday
ī‚´ Videos
ī‚´ Images
ī‚´ Statements
ī‚´ Treat your personal information as you
would treat your money—protect it
and don't leaveit lying around for
others to take.
ī‚´ Mind appropriate self-representation
Online posted content
Safe posting tips: What to
post
What to block?
â€ĸ Use nickname only
â€ĸ Use cartoons, drawings, or
avatars
â€ĸ Make the profile private
â€ĸ Home telephone number
â€ĸ Cell phone number
â€ĸ Street address
â€ĸ Home town/city of
residence
â€ĸ Date of birth
â€ĸ Credit card numbers
Risky Behavior = Unwanted Outcomes
Try to avoid the following:
īŦ Talking to people in various places online
īŦ Adding strangers to a buddy list
īŦ Talking to strangers about sex
īŦ Acting in a rude or nasty manner online (trolling or
cyberbullying)
īŦ Harassing or posting embarrassing information
about others online
īŦ Sharing your personal information with strangers
īŦ Using file sharing programs for pornographic
images
How to protect against “phishing”?
ī‚´ Phishing e-mails usually claim that it is necessary to “update” or
“verify” your account information and urge recipients to click on a
link in the e-mail which may â€Ļ
ī‚´ take you subsequently to a bogus website which looks legit,but isn’t;
ī‚´ make you unconsciously install malicious software.
Any information entered on the website or in the installed
software is then retained by criminals for fraudulent purposes.
ī‚´ The e-mails are sent with the expectation of reaching an active e-
mail address belonging to a customer with an account at the
institution being targeted.
ī‚´ The key to remaining safe is to be suspicious of all unsolicited or
unexpected e-mails you receive, even if they appear to be from a
trusted source.
What is Cyberbullying?
ī‚´ When a person is tormented, harassed, humiliated,
embarrassed or otherwise targeted by any other person
using the Internet or other digital communication
technology.
What is a Virus?
A virus is software that spreads from program to
program, or from disk to disk, and uses each infected
program or disk to make copies of itself = computer
sabotage.
It can also spread to other computers via email
attachments, USB flash drives, etc.
Protect Yourself:
â€ĸ If you are using an unsecured operating system, you can install various virus
protection software like Windows Security (free), 360° Total Security (free),
McAfee, Avast or Norton AntiVirus.
â€ĸ To help avoid viruses, it’s very important that your computer runs the latest
updates and has antivirus tools installed.
â€ĸ Try to stay informed about recent threats about viruses and be careful
when surfing the Internet, downloading files and opening attachments.
What is an Antivirus Software?
ī‚´ It is a computer program intended to identify and
eliminate computer/smartphones viruses.
ī‚´ It has a user-friendly interface that scans all existing files
on your device.
ī‚´ It examines (scans) files to look for known viruses
matching.
ī‚´ Real-time “dynamic” scanning is recommended to
prevent the device from getting infected in the first
place.
ī‚´ The software will immediately put the affected files into
“quarantine”.
Chapter II. How to stay
safe using the internet &
app’s
What apps do you use?
ī‚´Even though being online can be really fun
and useful, we need to be aware of the
dangers.
ī‚´It is important to know how to be online safely.
Risks
â€ĸ Do not give people your mobile
phone, tablet or smartphone
because they may read your
personal data.
â€ĸ Use a code or a password to
protect personal data on your
mobile device.
â€ĸ Do not give your phone number to
anyone you do not know.
â€ĸ Be careful what WiFi connection
you use as unsecure ones allow
hackers to steal data.
Staying safe
Protecting Your Data
â€ĸ Activate (free) firewall
software
â€ĸ Install (free) antivirus
software
â€ĸ Install (free) antispyware
â€ĸ Activate a spam filter on
your email software
â€ĸ Perform timely updates
of your Operating System
(Windows, Android, etc.)
Protecting Your Data
ī‚§ Create strong passwords for all software you
access, offline and online, on your PC or
mobile
ī‚§ Secure your wireless network with a strong
password (avoid 123456 !!!)
ī‚§ Stick with trusted sources when purchasing
goods or software
ī‚§ Beware of older computers’ security
limitations
Keep passwords safe
ī‚´ Always memorise your passwords and other security information and promptly
destroy the notice containingthis information.
ī‚´ Take the appropriate steps to keep your password and other security
information secret at all times; never reveal it to family, friends, or anyone else.
ī‚´ If callingthe bank, be aware of which information you will be asked for: you will
never be asked for your password.
ī‚´ Ensure that you log out properly after doingyour online banking.
ī‚´ Never save your password on your computer unless it is protected (e.g.
password manager).
ī‚´ Never leave your computer unattended when logged into Internet banking.
ī‚´ We recommend changingyour password regularly. If you change your
password, choose one which cannot be guessed easily.
ī‚´ Do not use your online bankingpassword for any other websites.
Keep your computer secure
ī‚´ Be cautious of any unsolicited e-
mails (especially those from
unknown senders) and never click
on links in such e-mails to visit
unknown websites.
ī‚´ Do not open, download or
execute e-mail attachments from
unknown, suspicious, or
untrustworthy sources.
ī‚´ Install anti-virus software, keep it
up-to-date and run regular
security scans. Install the latest
security updates, also known as
patches.
Be careful with “Online Marketing”
ī‚§ Be wary of contests and
“special” offers received
via email or online (pop
ups, banners, etc.)
ī‚§ Read the privacy policy
of those sites
ī‚§ Use an alternate email
address if you do want
to engage
ī‚§ Guard your information
ī‚§ Manage your cookies
Chapter III. Safety
measures for mobile
devices and USB flash
drives
Use of mobile devices
ī‚´ Basically everyone has a mobile
device
ī‚´ These devices are used for
many activities
ī‚´Mobile banking
ī‚´Videos
ī‚´Pictures
ī‚´Messaging
ī‚´GPS
ī‚´â€Ļ
Mobile threats and attacks
ī‚´Mobile devices make attractive targets:
ī‚´People store much personal info on them:
email, calendars, contacts, pictures, etc.
ī‚´They are easily lost/stolen
ī‚´Built-in billing system: in-app purchases (credit
card)
ī‚´Many new devices have near field
communications (NFC), used for contactless
payments, etc.
ī‚´Your device becomes your credit card
ī‚´Location privacy issues
Protect your mobile device
ī‚´ Protect your telephone with a (non-trivial) password
and set your screen to lock automatically when it is
not being used.
ī‚´ Don’t use:
ī‚´Lazy users’ passwords: 123456, password,
letmein, your name, etc.
ī‚´Predictable patterns: Zorro sign (Z)â€Ļ
ī‚´ Do not allow the phone from which you are banking
online to be used by third persons without
supervision.
ī‚´ Download applications only from official application
stores (e.g. Apple Store, Google Play Store).
ī‚´ Install anti-virussoftware and keep it up to date.
Learn more at:
For Android devices: https://support.google.com/android/answer/6215472?hl=en
For iOS devices: https://support.apple.com/guide/iphone/important-safety-information-iph301fc905/ios
Authentication: Smart Cards / Security
Tokens
ī‚´ More expensive, harder to
implement
ī‚´ Vulnerability: prone to loss or theft
ī‚´ Very strong when combined with
another form of authentication, e.g.
a password
ī‚´ Does not work well in all applications
Authentication: Comparison
Passwords Smart Cards Biometrics Pattern Lock
Security Weak Strong Strong Weak
Ease of Use Easy Medium Hard Easy
Implementation Easy Hard Hard Easy
Works for phones Yes No Possible Yes
â€ĸ Deeper problem: mobile devices are
designed with a single-user assumptionâ€Ļ
How to safely use a USB flash drive?
This is called the “USB port”
Your computer can have 1 or more. Located on the front
or back of your computer.
USB ports are used to connect many different items to the
computer (printer, scanner, USB flash drive, etc.)
When you insert the USB flash drive into the USB Port, your
computer should automatically recognize it and let you
know.
Before using any file on your USB flash drive, do perform
a virus scanning
â€ĸ From My Computer
â€ĸ Right click on the name
of the USB drive (i.e.
SecureGuard)
â€ĸ Click on Scan for viruses
For further information please
contact us:
info@mariecurie.bg

More Related Content

What's hot

Security best practices for regular users
Security best practices for regular usersSecurity best practices for regular users
Security best practices for regular usersGeoffrey Vaughan
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProRonald Soh
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...David Menken
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer PrivacySaqib Raza
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Nicholas Davis
 
WFH Cybersecurity Basics Employees and Employers
WFH Cybersecurity Basics Employees and Employers WFH Cybersecurity Basics Employees and Employers
WFH Cybersecurity Basics Employees and Employers Dinesh O Bareja
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information SecurityKen Holmes
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...yaminohime
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and EthicsMohsin Riaz
 
COMPUTER ETHICS AND SECURITY
COMPUTER ETHICS AND SECURITYCOMPUTER ETHICS AND SECURITY
COMPUTER ETHICS AND SECURITYzenbrowski
 
Cyber ethics cbse class xi
Cyber ethics cbse class xiCyber ethics cbse class xi
Cyber ethics cbse class xiArchana Dwivedi
 
Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Anna Stirling
 
Microsoft protect ppt_ms_final
Microsoft protect ppt_ms_finalMicrosoft protect ppt_ms_final
Microsoft protect ppt_ms_final21_zaheer
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9NehaRohtagi1
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationHajarul Cikyen
 
Chapter11
Chapter11Chapter11
Chapter11Izaham
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy controlSifat Hossain
 

What's hot (20)

Security best practices for regular users
Security best practices for regular usersSecurity best practices for regular users
Security best practices for regular users
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
 
WFH Cybersecurity Basics Employees and Employers
WFH Cybersecurity Basics Employees and Employers WFH Cybersecurity Basics Employees and Employers
WFH Cybersecurity Basics Employees and Employers
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information Security
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
 
COMPUTER ETHICS AND SECURITY
COMPUTER ETHICS AND SECURITYCOMPUTER ETHICS AND SECURITY
COMPUTER ETHICS AND SECURITY
 
Cyber ethics cbse class xi
Cyber ethics cbse class xiCyber ethics cbse class xi
Cyber ethics cbse class xi
 
Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Discovering Computers: Chapter 11
Discovering Computers: Chapter 11
 
Microsoft protect ppt_ms_final
Microsoft protect ppt_ms_finalMicrosoft protect ppt_ms_final
Microsoft protect ppt_ms_final
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
Chapter11
Chapter11Chapter11
Chapter11
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
 

Similar to Stay safe online with mobile and internet safety tips

Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]sheenau
 
IT Security
IT SecurityIT Security
IT SecurityMohsin Laiq
 
Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Anwar CHFI, SSCP, ITIL
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptxUmaraZahidLecturer
 
CyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_WatsonCyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_WatsonPatricia M Watson
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityNcell
 
cyber_security
cyber_securitycyber_security
cyber_securityJana Baxter
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxBarakaMuyengi
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationSheryldeVilla2
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityAdeel Younas
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 
Cyber security
Cyber securityCyber security
Cyber securitySannith Reddy
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxAarush59
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptxCharithraaAR
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety Sadaf Walliyani
 
Computer Project on Cyber Safety
Computer Project on Cyber SafetyComputer Project on Cyber Safety
Computer Project on Cyber SafetyHarsh Tekriwal
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptxMohammedYaseen638128
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006Ben Rothke
 

Similar to Stay safe online with mobile and internet safety tips (20)

Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 
IT Security
IT SecurityIT Security
IT Security
 
Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
 
CyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_WatsonCyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_Watson
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
cyber_security
cyber_securitycyber_security
cyber_security
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Computer Project on Cyber Safety
Computer Project on Cyber SafetyComputer Project on Cyber Safety
Computer Project on Cyber Safety
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 
Digital Security and Hygiene.pptx
Digital Security and Hygiene.pptxDigital Security and Hygiene.pptx
Digital Security and Hygiene.pptx
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006
 

More from Karel Van Isacker

DIGITOUR IO4: Manual for trainers GR
DIGITOUR IO4: Manual for trainers GRDIGITOUR IO4: Manual for trainers GR
DIGITOUR IO4: Manual for trainers GRKarel Van Isacker
 
DIGITOUR IO4: Manual for trainees GR
DIGITOUR IO4: Manual for trainees GRDIGITOUR IO4: Manual for trainees GR
DIGITOUR IO4: Manual for trainees GRKarel Van Isacker
 
DIGITOUR IO4: Manual for trainees ES
DIGITOUR IO4: Manual for trainees ESDIGITOUR IO4: Manual for trainees ES
DIGITOUR IO4: Manual for trainees ESKarel Van Isacker
 
DIGITOUR IO4: Manual for trainers ES
DIGITOUR IO4: Manual for trainers ESDIGITOUR IO4: Manual for trainers ES
DIGITOUR IO4: Manual for trainers ESKarel Van Isacker
 
DIGITOUR IO4: Manual for trainees ES
DIGITOUR IO4: Manual for trainees ESDIGITOUR IO4: Manual for trainees ES
DIGITOUR IO4: Manual for trainees ESKarel Van Isacker
 
DIGITOUR IO4: Manual for trainers NL
DIGITOUR IO4: Manual for trainers NLDIGITOUR IO4: Manual for trainers NL
DIGITOUR IO4: Manual for trainers NLKarel Van Isacker
 
DIGITOUR IO4: Manual for trainees NL
DIGITOUR IO4: Manual for trainees NLDIGITOUR IO4: Manual for trainees NL
DIGITOUR IO4: Manual for trainees NLKarel Van Isacker
 
EcologyKM company presentation 2022 new
EcologyKM company presentation 2022 newEcologyKM company presentation 2022 new
EcologyKM company presentation 2022 newKarel Van Isacker
 
EcologyKM company presentation 2022
EcologyKM company presentation 2022EcologyKM company presentation 2022
EcologyKM company presentation 2022Karel Van Isacker
 
DIGITOUR IO4: Manual for trainees EN
DIGITOUR IO4: Manual for trainees ENDIGITOUR IO4: Manual for trainees EN
DIGITOUR IO4: Manual for trainees ENKarel Van Isacker
 
DIGITOUR IO4: Manual for trainers EN
DIGITOUR IO4: Manual for trainers ENDIGITOUR IO4: Manual for trainers EN
DIGITOUR IO4: Manual for trainers ENKarel Van Isacker
 
DIPCE How to use platform and mobile apps EL
DIPCE How to use platform and mobile apps ELDIPCE How to use platform and mobile apps EL
DIPCE How to use platform and mobile apps ELKarel Van Isacker
 
DIPCE IO3: How to use platform and mobile apps ES
DIPCE IO3: How to use platform and mobile apps ESDIPCE IO3: How to use platform and mobile apps ES
DIPCE IO3: How to use platform and mobile apps ESKarel Van Isacker
 
HIPPOTHERAPY and sensory processing BG
HIPPOTHERAPY and sensory processing BGHIPPOTHERAPY and sensory processing BG
HIPPOTHERAPY and sensory processing BGKarel Van Isacker
 
HIPPOTHERAPY and sensory processing TR
HIPPOTHERAPY and sensory processing TRHIPPOTHERAPY and sensory processing TR
HIPPOTHERAPY and sensory processing TRKarel Van Isacker
 
HIPPOTHERAPY and sensory processing EN
HIPPOTHERAPY and sensory processing ENHIPPOTHERAPY and sensory processing EN
HIPPOTHERAPY and sensory processing ENKarel Van Isacker
 
HIPPOTHERAPY MODULE 14 BG
HIPPOTHERAPY MODULE 14 BGHIPPOTHERAPY MODULE 14 BG
HIPPOTHERAPY MODULE 14 BGKarel Van Isacker
 
HIPPOTHERAPY MODULE 13 BG
HIPPOTHERAPY MODULE 13 BGHIPPOTHERAPY MODULE 13 BG
HIPPOTHERAPY MODULE 13 BGKarel Van Isacker
 
HIPPOTHERAPY MODULE 12 BG
HIPPOTHERAPY MODULE 12 BGHIPPOTHERAPY MODULE 12 BG
HIPPOTHERAPY MODULE 12 BGKarel Van Isacker
 
HIPPOTHERAPY MODULE 11 BG
HIPPOTHERAPY MODULE 11 BGHIPPOTHERAPY MODULE 11 BG
HIPPOTHERAPY MODULE 11 BGKarel Van Isacker
 

More from Karel Van Isacker (20)

DIGITOUR IO4: Manual for trainers GR
DIGITOUR IO4: Manual for trainers GRDIGITOUR IO4: Manual for trainers GR
DIGITOUR IO4: Manual for trainers GR
 
DIGITOUR IO4: Manual for trainees GR
DIGITOUR IO4: Manual for trainees GRDIGITOUR IO4: Manual for trainees GR
DIGITOUR IO4: Manual for trainees GR
 
DIGITOUR IO4: Manual for trainees ES
DIGITOUR IO4: Manual for trainees ESDIGITOUR IO4: Manual for trainees ES
DIGITOUR IO4: Manual for trainees ES
 
DIGITOUR IO4: Manual for trainers ES
DIGITOUR IO4: Manual for trainers ESDIGITOUR IO4: Manual for trainers ES
DIGITOUR IO4: Manual for trainers ES
 
DIGITOUR IO4: Manual for trainees ES
DIGITOUR IO4: Manual for trainees ESDIGITOUR IO4: Manual for trainees ES
DIGITOUR IO4: Manual for trainees ES
 
DIGITOUR IO4: Manual for trainers NL
DIGITOUR IO4: Manual for trainers NLDIGITOUR IO4: Manual for trainers NL
DIGITOUR IO4: Manual for trainers NL
 
DIGITOUR IO4: Manual for trainees NL
DIGITOUR IO4: Manual for trainees NLDIGITOUR IO4: Manual for trainees NL
DIGITOUR IO4: Manual for trainees NL
 
EcologyKM company presentation 2022 new
EcologyKM company presentation 2022 newEcologyKM company presentation 2022 new
EcologyKM company presentation 2022 new
 
EcologyKM company presentation 2022
EcologyKM company presentation 2022EcologyKM company presentation 2022
EcologyKM company presentation 2022
 
DIGITOUR IO4: Manual for trainees EN
DIGITOUR IO4: Manual for trainees ENDIGITOUR IO4: Manual for trainees EN
DIGITOUR IO4: Manual for trainees EN
 
DIGITOUR IO4: Manual for trainers EN
DIGITOUR IO4: Manual for trainers ENDIGITOUR IO4: Manual for trainers EN
DIGITOUR IO4: Manual for trainers EN
 
DIPCE How to use platform and mobile apps EL
DIPCE How to use platform and mobile apps ELDIPCE How to use platform and mobile apps EL
DIPCE How to use platform and mobile apps EL
 
DIPCE IO3: How to use platform and mobile apps ES
DIPCE IO3: How to use platform and mobile apps ESDIPCE IO3: How to use platform and mobile apps ES
DIPCE IO3: How to use platform and mobile apps ES
 
HIPPOTHERAPY and sensory processing BG
HIPPOTHERAPY and sensory processing BGHIPPOTHERAPY and sensory processing BG
HIPPOTHERAPY and sensory processing BG
 
HIPPOTHERAPY and sensory processing TR
HIPPOTHERAPY and sensory processing TRHIPPOTHERAPY and sensory processing TR
HIPPOTHERAPY and sensory processing TR
 
HIPPOTHERAPY and sensory processing EN
HIPPOTHERAPY and sensory processing ENHIPPOTHERAPY and sensory processing EN
HIPPOTHERAPY and sensory processing EN
 
HIPPOTHERAPY MODULE 14 BG
HIPPOTHERAPY MODULE 14 BGHIPPOTHERAPY MODULE 14 BG
HIPPOTHERAPY MODULE 14 BG
 
HIPPOTHERAPY MODULE 13 BG
HIPPOTHERAPY MODULE 13 BGHIPPOTHERAPY MODULE 13 BG
HIPPOTHERAPY MODULE 13 BG
 
HIPPOTHERAPY MODULE 12 BG
HIPPOTHERAPY MODULE 12 BGHIPPOTHERAPY MODULE 12 BG
HIPPOTHERAPY MODULE 12 BG
 
HIPPOTHERAPY MODULE 11 BG
HIPPOTHERAPY MODULE 11 BGHIPPOTHERAPY MODULE 11 BG
HIPPOTHERAPY MODULE 11 BG
 

Recently uploaded

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 

Recently uploaded (20)

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 

Stay safe online with mobile and internet safety tips

  • 1. Social media for upskilling unemployed and low skilled adult workers for digital society 2018-1-PT01-KA204-047429 IO2 Mobile and online interactive platform for building the digital competence of low-skilled / low-qualified unemployed persons Module 5: SAFETY Author: MARIE CURIE ASSOCIATION – MCA, PLOVDIV, BULGARIA LINK-UPS The European Commission support for the production of this publication does not constitute an endorsement of the contents which reflects the views only of the authors, and the Commission cannot be held responsible for any use which may be made of the information contained therein.
  • 2. Aims of the module (in line with the competence framework): ī‚´ To protect the devices, personal data and privacy of adults, who equally need to understand the risks and threats of digital environments. ī‚´ To train adults to know more about safety and security measures and to consider reliability and privacy. ī‚´ To enable adults to understand how to use and share personally identifying information while being able to protect oneself and others from damages. ī‚´ To enable adults to understand that digital services use a “Privacy policy” and be aware of how personal data is being used.
  • 3. Previous knowledge required ī‚´ Basic literacy ī‚´ Basic knowledge of common English terms used while exploring digital devices and the internet ī‚´ Basic digital competences required on how to use independently a PC, tablet, smartphone, USB device, and internet connection (incl. WiFi) ī‚´ Completion of LINK-UPS modules 1-4
  • 4. Learning outcomes ī‚´ Knowledge ī‚´ Knows that there are several risks associated with the use of technologies. ī‚´ Knows about how to avoidrisks. ī‚´ Understands the risks associated with using online services. ī‚´ Knows how to protect personal data and privacy ī‚´ Knows how to use properly USB flash drive ī‚´ Skills ī‚´ Is able to take steps to mitigate the risk of fraud by using safe credentials. ī‚´ Is able to protect different devices from threats of the digital world (malware, phishing, viruses, etc.). ī‚´ Is able to protect personal data and privacy ī‚´ Competences ī‚´ Has a positive but realistic attitude towards the benefits and risks associated with online technologies. ī‚´ Is competent to protect personal data and privacy
  • 5. Delivery ī‚´ Training duration – 2 hours ī‚´ Learning duration – 4 hours ī‚´ Equipment/resource required – computer, tablet, smartphone, access to internet, email ī‚´ Assessment test – pre- and post-assessment
  • 6. Short summary of the module This module is providing information and guidance on how to protect personal devices, data and privacy and to understand risks and threats in digital environments. It provides information about safety and security measures with regards to computer usage, USB flash drives, and smartphones. As an adult learner, you will raise your awareness and understanding with regards to how to use and share personally identifying information while being able to protect yourself and others from damages. You will understand that digital services use a “Privacy policy” to inform how personal data is being used. We will help you in preventing your personal data being used wrongfully by non-authorised people.
  • 7. Glossary â€ĸThe attempt to access personal information by sending e-mails purporting to come from a genuine company operating on the Internet,but in fact, it is a fake website operated by fraudsters Data dredging/phishing â€ĸA network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules Firewall â€ĸTools, machinery, and other durable equipment Hardware â€ĸSoftware that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system Malware â€ĸThe programs and other operating information used by a computer, tablet, smartphone,etc. Software â€ĸIrrelevantor unsolicited messages sent over theInternet,usually of a commercial nature Spam â€ĸA flash driveis a deviceused for data storage that includes a flash memory and an integrated Universal Serial Bus (USB) interface USB flash drive
  • 8. Chapter I. Safety and associated risks
  • 9. ī‚´ A digital citizen is “someone who is able to think critically about the ethical opportunities and challenges of the ‘digital world’ and make safe, respectful, and responsible choices.” (Common Sense Media, 2010) Attributes of a good digital citizen: ī‚´Respects others (doesn’t respond to or post negativecomments) ī‚´Doesn’t steal (if you wouldn’t steal from a store, why steal music, movies, videos) ī‚´Accepts personal responsibility (smartphones and Internet) Who is a digital citizen?
  • 10. Closest Friends Friends Acquaintances Strangers ī‚´ There is a perceived sense of anonymity online. ī‚´ As a result, some individuals pretend to be someone they are not. ī‚´ Users can misrepresent their ages, gender, personalities, location, and other information about themselves. Determine with whom you are communicatingâ€Ļ Who are you when online?
  • 11. Risks for all Internet users The three Cs: ī‚§ Inappropriate or unwanted Contact ī‚§ Inappropriate or inaccurate Content ī‚§ Deceptive or fraudulent Commerce
  • 12. ī‚´ You as an adult needs to be aware of what information you are posting and how you are representing yourself online. ī‚´ Limit the amount of personal information ī‚´ Address ī‚´ Phone number ī‚´ Birthday ī‚´ Videos ī‚´ Images ī‚´ Statements ī‚´ Treat your personal information as you would treat your money—protect it and don't leaveit lying around for others to take. ī‚´ Mind appropriate self-representation Online posted content
  • 13. Safe posting tips: What to post What to block? â€ĸ Use nickname only â€ĸ Use cartoons, drawings, or avatars â€ĸ Make the profile private â€ĸ Home telephone number â€ĸ Cell phone number â€ĸ Street address â€ĸ Home town/city of residence â€ĸ Date of birth â€ĸ Credit card numbers
  • 14. Risky Behavior = Unwanted Outcomes Try to avoid the following: īŦ Talking to people in various places online īŦ Adding strangers to a buddy list īŦ Talking to strangers about sex īŦ Acting in a rude or nasty manner online (trolling or cyberbullying) īŦ Harassing or posting embarrassing information about others online īŦ Sharing your personal information with strangers īŦ Using file sharing programs for pornographic images
  • 15. How to protect against “phishing”? ī‚´ Phishing e-mails usually claim that it is necessary to “update” or “verify” your account information and urge recipients to click on a link in the e-mail which may â€Ļ ī‚´ take you subsequently to a bogus website which looks legit,but isn’t; ī‚´ make you unconsciously install malicious software. Any information entered on the website or in the installed software is then retained by criminals for fraudulent purposes. ī‚´ The e-mails are sent with the expectation of reaching an active e- mail address belonging to a customer with an account at the institution being targeted. ī‚´ The key to remaining safe is to be suspicious of all unsolicited or unexpected e-mails you receive, even if they appear to be from a trusted source.
  • 16. What is Cyberbullying? ī‚´ When a person is tormented, harassed, humiliated, embarrassed or otherwise targeted by any other person using the Internet or other digital communication technology.
  • 17. What is a Virus? A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself = computer sabotage. It can also spread to other computers via email attachments, USB flash drives, etc. Protect Yourself: â€ĸ If you are using an unsecured operating system, you can install various virus protection software like Windows Security (free), 360° Total Security (free), McAfee, Avast or Norton AntiVirus. â€ĸ To help avoid viruses, it’s very important that your computer runs the latest updates and has antivirus tools installed. â€ĸ Try to stay informed about recent threats about viruses and be careful when surfing the Internet, downloading files and opening attachments.
  • 18. What is an Antivirus Software? ī‚´ It is a computer program intended to identify and eliminate computer/smartphones viruses. ī‚´ It has a user-friendly interface that scans all existing files on your device. ī‚´ It examines (scans) files to look for known viruses matching. ī‚´ Real-time “dynamic” scanning is recommended to prevent the device from getting infected in the first place. ī‚´ The software will immediately put the affected files into “quarantine”.
  • 19. Chapter II. How to stay safe using the internet & app’s
  • 20. What apps do you use?
  • 21. ī‚´Even though being online can be really fun and useful, we need to be aware of the dangers. ī‚´It is important to know how to be online safely. Risks
  • 22. â€ĸ Do not give people your mobile phone, tablet or smartphone because they may read your personal data. â€ĸ Use a code or a password to protect personal data on your mobile device. â€ĸ Do not give your phone number to anyone you do not know. â€ĸ Be careful what WiFi connection you use as unsecure ones allow hackers to steal data. Staying safe
  • 23. Protecting Your Data â€ĸ Activate (free) firewall software â€ĸ Install (free) antivirus software â€ĸ Install (free) antispyware â€ĸ Activate a spam filter on your email software â€ĸ Perform timely updates of your Operating System (Windows, Android, etc.)
  • 24. Protecting Your Data ī‚§ Create strong passwords for all software you access, offline and online, on your PC or mobile ī‚§ Secure your wireless network with a strong password (avoid 123456 !!!) ī‚§ Stick with trusted sources when purchasing goods or software ī‚§ Beware of older computers’ security limitations
  • 25. Keep passwords safe ī‚´ Always memorise your passwords and other security information and promptly destroy the notice containingthis information. ī‚´ Take the appropriate steps to keep your password and other security information secret at all times; never reveal it to family, friends, or anyone else. ī‚´ If callingthe bank, be aware of which information you will be asked for: you will never be asked for your password. ī‚´ Ensure that you log out properly after doingyour online banking. ī‚´ Never save your password on your computer unless it is protected (e.g. password manager). ī‚´ Never leave your computer unattended when logged into Internet banking. ī‚´ We recommend changingyour password regularly. If you change your password, choose one which cannot be guessed easily. ī‚´ Do not use your online bankingpassword for any other websites.
  • 26. Keep your computer secure ī‚´ Be cautious of any unsolicited e- mails (especially those from unknown senders) and never click on links in such e-mails to visit unknown websites. ī‚´ Do not open, download or execute e-mail attachments from unknown, suspicious, or untrustworthy sources. ī‚´ Install anti-virus software, keep it up-to-date and run regular security scans. Install the latest security updates, also known as patches.
  • 27. Be careful with “Online Marketing” ī‚§ Be wary of contests and “special” offers received via email or online (pop ups, banners, etc.) ī‚§ Read the privacy policy of those sites ī‚§ Use an alternate email address if you do want to engage ī‚§ Guard your information ī‚§ Manage your cookies
  • 28. Chapter III. Safety measures for mobile devices and USB flash drives
  • 29. Use of mobile devices ī‚´ Basically everyone has a mobile device ī‚´ These devices are used for many activities ī‚´Mobile banking ī‚´Videos ī‚´Pictures ī‚´Messaging ī‚´GPS ī‚´â€Ļ
  • 30. Mobile threats and attacks ī‚´Mobile devices make attractive targets: ī‚´People store much personal info on them: email, calendars, contacts, pictures, etc. ī‚´They are easily lost/stolen ī‚´Built-in billing system: in-app purchases (credit card) ī‚´Many new devices have near field communications (NFC), used for contactless payments, etc. ī‚´Your device becomes your credit card ī‚´Location privacy issues
  • 31. Protect your mobile device ī‚´ Protect your telephone with a (non-trivial) password and set your screen to lock automatically when it is not being used. ī‚´ Don’t use: ī‚´Lazy users’ passwords: 123456, password, letmein, your name, etc. ī‚´Predictable patterns: Zorro sign (Z)â€Ļ ī‚´ Do not allow the phone from which you are banking online to be used by third persons without supervision. ī‚´ Download applications only from official application stores (e.g. Apple Store, Google Play Store). ī‚´ Install anti-virussoftware and keep it up to date. Learn more at: For Android devices: https://support.google.com/android/answer/6215472?hl=en For iOS devices: https://support.apple.com/guide/iphone/important-safety-information-iph301fc905/ios
  • 32. Authentication: Smart Cards / Security Tokens ī‚´ More expensive, harder to implement ī‚´ Vulnerability: prone to loss or theft ī‚´ Very strong when combined with another form of authentication, e.g. a password ī‚´ Does not work well in all applications
  • 33. Authentication: Comparison Passwords Smart Cards Biometrics Pattern Lock Security Weak Strong Strong Weak Ease of Use Easy Medium Hard Easy Implementation Easy Hard Hard Easy Works for phones Yes No Possible Yes â€ĸ Deeper problem: mobile devices are designed with a single-user assumptionâ€Ļ
  • 34. How to safely use a USB flash drive? This is called the “USB port” Your computer can have 1 or more. Located on the front or back of your computer. USB ports are used to connect many different items to the computer (printer, scanner, USB flash drive, etc.) When you insert the USB flash drive into the USB Port, your computer should automatically recognize it and let you know.
  • 35. Before using any file on your USB flash drive, do perform a virus scanning â€ĸ From My Computer â€ĸ Right click on the name of the USB drive (i.e. SecureGuard) â€ĸ Click on Scan for viruses
  • 36. For further information please contact us: info@mariecurie.bg