9953330565 Low Rate Call Girls In Rohini Delhi NCR
Â
Stay safe online with mobile and internet safety tips
1. Social media for upskilling unemployed and low
skilled adult workers for digital society
2018-1-PT01-KA204-047429
IO2 Mobile and online interactive platform for building the digital
competence of low-skilled / low-qualified unemployed persons
Module 5: SAFETY
Author: MARIE CURIE ASSOCIATION â MCA, PLOVDIV, BULGARIA
LINK-UPS
The European Commission support for the production of this publication does not
constitute an endorsement of the contents which reflects the views only of the
authors, and the Commission cannot be held responsible for any use which may be
made of the information contained therein.
2. Aims of the module (in line with the
competence framework):
ī´ To protect the devices, personal data and privacy of adults,
who equally need to understand the risks and threats of
digital environments.
ī´ To train adults to know more about safety and security
measures and to consider reliability and privacy.
ī´ To enable adults to understand how to use and share
personally identifying information while being able to protect
oneself and others from damages.
ī´ To enable adults to understand that digital services use a
âPrivacy policyâ and be aware of how personal data is being
used.
3. Previous knowledge required
ī´ Basic literacy
ī´ Basic knowledge of common English terms used while
exploring digital devices and the internet
ī´ Basic digital competences required on how to use
independently a PC, tablet, smartphone, USB device,
and internet connection (incl. WiFi)
ī´ Completion of LINK-UPS modules 1-4
4. Learning outcomes
ī´ Knowledge
ī´ Knows that there are several risks associated with the use of technologies.
ī´ Knows about how to avoidrisks.
ī´ Understands the risks associated with using online services.
ī´ Knows how to protect personal data and privacy
ī´ Knows how to use properly USB flash drive
ī´ Skills
ī´ Is able to take steps to mitigate the risk of fraud by using safe credentials.
ī´ Is able to protect different devices from threats of the digital world
(malware, phishing, viruses, etc.).
ī´ Is able to protect personal data and privacy
ī´ Competences
ī´ Has a positive but realistic attitude towards the benefits and risks associated
with online technologies.
ī´ Is competent to protect personal data and privacy
5. Delivery
ī´ Training duration â 2 hours
ī´ Learning duration â 4 hours
ī´ Equipment/resource required â computer, tablet,
smartphone, access to internet, email
ī´ Assessment test â pre- and post-assessment
6. Short summary of the module
This module is providing information and guidance on how to
protect personal devices, data and privacy and to understand risks
and threats in digital environments.
It provides information about safety and security measures with
regards to computer usage, USB flash drives, and smartphones.
As an adult learner, you will raise your awareness and
understanding with regards to how to use and share personally
identifying information while being able to protect yourself and
others from damages.
You will understand that digital services use a âPrivacy policyâ to
inform how personal data is being used.
We will help you in preventing your personal data being used
wrongfully by non-authorised people.
7. Glossary
âĸThe attempt to access personal information by sending e-mails purporting to come from a genuine
company operating on the Internet,but in fact, it is a fake website operated by fraudsters
Data dredging/phishing
âĸA network security system that monitors and controls incoming and outgoing network traffic based on
predetermined security rules
Firewall
âĸTools, machinery, and other durable equipment
Hardware
âĸSoftware that is specifically designed to disrupt, damage, or gain unauthorized access to a computer
system
Malware
âĸThe programs and other operating information used by a computer, tablet, smartphone,etc.
Software
âĸIrrelevantor unsolicited messages sent over theInternet,usually of a commercial nature
Spam
âĸA flash driveis a deviceused for data storage that includes a flash memory and an integrated Universal
Serial Bus (USB) interface
USB flash drive
9. ī´ A digital citizen is âsomeone who is able to think critically
about the ethical opportunities and challenges of the
âdigital worldâ and make safe, respectful, and responsible
choices.â (Common Sense Media, 2010)
Attributes of a good digital citizen:
ī´Respects others (doesnât respond to or post negativecomments)
ī´Doesnât steal (if you wouldnât steal from a store, why steal music,
movies, videos)
ī´Accepts personal responsibility (smartphones and Internet)
Who is a digital citizen?
10. Closest Friends Friends Acquaintances Strangers
ī´ There is a perceived sense of anonymity online.
ī´ As a result, some individuals pretend to be someone they are not.
ī´ Users can misrepresent their ages, gender, personalities, location,
and other information about themselves.
Determine with whom you are communicatingâĻ
Who are you when online?
11. Risks for all Internet users
The three Cs:
ī§ Inappropriate or unwanted Contact
ī§ Inappropriate or inaccurate Content
ī§ Deceptive or fraudulent Commerce
12. ī´ You as an adult needs to be aware of
what information you are posting and how
you are representing yourself online.
ī´ Limit the amount of personal information
ī´ Address
ī´ Phone number
ī´ Birthday
ī´ Videos
ī´ Images
ī´ Statements
ī´ Treat your personal information as you
would treat your moneyâprotect it
and don't leaveit lying around for
others to take.
ī´ Mind appropriate self-representation
Online posted content
13. Safe posting tips: What to
post
What to block?
âĸ Use nickname only
âĸ Use cartoons, drawings, or
avatars
âĸ Make the profile private
âĸ Home telephone number
âĸ Cell phone number
âĸ Street address
âĸ Home town/city of
residence
âĸ Date of birth
âĸ Credit card numbers
14. Risky Behavior = Unwanted Outcomes
Try to avoid the following:
īŦ Talking to people in various places online
īŦ Adding strangers to a buddy list
īŦ Talking to strangers about sex
īŦ Acting in a rude or nasty manner online (trolling or
cyberbullying)
īŦ Harassing or posting embarrassing information
about others online
īŦ Sharing your personal information with strangers
īŦ Using file sharing programs for pornographic
images
15. How to protect against âphishingâ?
ī´ Phishing e-mails usually claim that it is necessary to âupdateâ or
âverifyâ your account information and urge recipients to click on a
link in the e-mail which may âĻ
ī´ take you subsequently to a bogus website which looks legit,but isnât;
ī´ make you unconsciously install malicious software.
Any information entered on the website or in the installed
software is then retained by criminals for fraudulent purposes.
ī´ The e-mails are sent with the expectation of reaching an active e-
mail address belonging to a customer with an account at the
institution being targeted.
ī´ The key to remaining safe is to be suspicious of all unsolicited or
unexpected e-mails you receive, even if they appear to be from a
trusted source.
16. What is Cyberbullying?
ī´ When a person is tormented, harassed, humiliated,
embarrassed or otherwise targeted by any other person
using the Internet or other digital communication
technology.
17. What is a Virus?
A virus is software that spreads from program to
program, or from disk to disk, and uses each infected
program or disk to make copies of itself = computer
sabotage.
It can also spread to other computers via email
attachments, USB flash drives, etc.
Protect Yourself:
âĸ If you are using an unsecured operating system, you can install various virus
protection software like Windows Security (free), 360° Total Security (free),
McAfee, Avast or Norton AntiVirus.
âĸ To help avoid viruses, itâs very important that your computer runs the latest
updates and has antivirus tools installed.
âĸ Try to stay informed about recent threats about viruses and be careful
when surfing the Internet, downloading files and opening attachments.
18. What is an Antivirus Software?
ī´ It is a computer program intended to identify and
eliminate computer/smartphones viruses.
ī´ It has a user-friendly interface that scans all existing files
on your device.
ī´ It examines (scans) files to look for known viruses
matching.
ī´ Real-time âdynamicâ scanning is recommended to
prevent the device from getting infected in the first
place.
ī´ The software will immediately put the affected files into
âquarantineâ.
21. ī´Even though being online can be really fun
and useful, we need to be aware of the
dangers.
ī´It is important to know how to be online safely.
Risks
22. âĸ Do not give people your mobile
phone, tablet or smartphone
because they may read your
personal data.
âĸ Use a code or a password to
protect personal data on your
mobile device.
âĸ Do not give your phone number to
anyone you do not know.
âĸ Be careful what WiFi connection
you use as unsecure ones allow
hackers to steal data.
Staying safe
23. Protecting Your Data
âĸ Activate (free) firewall
software
âĸ Install (free) antivirus
software
âĸ Install (free) antispyware
âĸ Activate a spam filter on
your email software
âĸ Perform timely updates
of your Operating System
(Windows, Android, etc.)
24. Protecting Your Data
ī§ Create strong passwords for all software you
access, offline and online, on your PC or
mobile
ī§ Secure your wireless network with a strong
password (avoid 123456 !!!)
ī§ Stick with trusted sources when purchasing
goods or software
ī§ Beware of older computersâ security
limitations
25. Keep passwords safe
ī´ Always memorise your passwords and other security information and promptly
destroy the notice containingthis information.
ī´ Take the appropriate steps to keep your password and other security
information secret at all times; never reveal it to family, friends, or anyone else.
ī´ If callingthe bank, be aware of which information you will be asked for: you will
never be asked for your password.
ī´ Ensure that you log out properly after doingyour online banking.
ī´ Never save your password on your computer unless it is protected (e.g.
password manager).
ī´ Never leave your computer unattended when logged into Internet banking.
ī´ We recommend changingyour password regularly. If you change your
password, choose one which cannot be guessed easily.
ī´ Do not use your online bankingpassword for any other websites.
26. Keep your computer secure
ī´ Be cautious of any unsolicited e-
mails (especially those from
unknown senders) and never click
on links in such e-mails to visit
unknown websites.
ī´ Do not open, download or
execute e-mail attachments from
unknown, suspicious, or
untrustworthy sources.
ī´ Install anti-virus software, keep it
up-to-date and run regular
security scans. Install the latest
security updates, also known as
patches.
27. Be careful with âOnline Marketingâ
ī§ Be wary of contests and
âspecialâ offers received
via email or online (pop
ups, banners, etc.)
ī§ Read the privacy policy
of those sites
ī§ Use an alternate email
address if you do want
to engage
ī§ Guard your information
ī§ Manage your cookies
29. Use of mobile devices
ī´ Basically everyone has a mobile
device
ī´ These devices are used for
many activities
ī´Mobile banking
ī´Videos
ī´Pictures
ī´Messaging
ī´GPS
ī´âĻ
30. Mobile threats and attacks
ī´Mobile devices make attractive targets:
ī´People store much personal info on them:
email, calendars, contacts, pictures, etc.
ī´They are easily lost/stolen
ī´Built-in billing system: in-app purchases (credit
card)
ī´Many new devices have near field
communications (NFC), used for contactless
payments, etc.
ī´Your device becomes your credit card
ī´Location privacy issues
31. Protect your mobile device
ī´ Protect your telephone with a (non-trivial) password
and set your screen to lock automatically when it is
not being used.
ī´ Donât use:
ī´Lazy usersâ passwords: 123456, password,
letmein, your name, etc.
ī´Predictable patterns: Zorro sign (Z)âĻ
ī´ Do not allow the phone from which you are banking
online to be used by third persons without
supervision.
ī´ Download applications only from official application
stores (e.g. Apple Store, Google Play Store).
ī´ Install anti-virussoftware and keep it up to date.
Learn more at:
For Android devices: https://support.google.com/android/answer/6215472?hl=en
For iOS devices: https://support.apple.com/guide/iphone/important-safety-information-iph301fc905/ios
32. Authentication: Smart Cards / Security
Tokens
ī´ More expensive, harder to
implement
ī´ Vulnerability: prone to loss or theft
ī´ Very strong when combined with
another form of authentication, e.g.
a password
ī´ Does not work well in all applications
33. Authentication: Comparison
Passwords Smart Cards Biometrics Pattern Lock
Security Weak Strong Strong Weak
Ease of Use Easy Medium Hard Easy
Implementation Easy Hard Hard Easy
Works for phones Yes No Possible Yes
âĸ Deeper problem: mobile devices are
designed with a single-user assumptionâĻ
34. How to safely use a USB flash drive?
This is called the âUSB portâ
Your computer can have 1 or more. Located on the front
or back of your computer.
USB ports are used to connect many different items to the
computer (printer, scanner, USB flash drive, etc.)
When you insert the USB flash drive into the USB Port, your
computer should automatically recognize it and let you
know.
35. Before using any file on your USB flash drive, do perform
a virus scanning
âĸ From My Computer
âĸ Right click on the name
of the USB drive (i.e.
SecureGuard)
âĸ Click on Scan for viruses