SlideShare a Scribd company logo
Online Privacy A Module of the CYC Course – Personal Security 8-9-10
The Realities of Digital Communications:  ,[object Object]
The Realities of Digital Communications:  ,[object Object],[object Object],[object Object],[object Object]
The Realities of Digital Communications:  ,[object Object]
The Realities of Digital Communications:  ,[object Object],[object Object],[object Object],[object Object],[object Object]
The Realities of Digital Communications:  ,[object Object]
The Realities of Digital Communications:  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Realities of Digital Communications:  ,[object Object],[object Object]
The Realities of Digital Communications:  ,[object Object]
Privacy Levels on Social Networking Sites ,[object Object],[object Object]
Privacy Levels on Social Networking Sites ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Privacy Levels on Social Networking Sites ,[object Object]
Privacy Levels on Social Networking Sites ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Social Engineering ,[object Object],[object Object],[object Object],[object Object]
Example
Bogus Email Example
Privacy Levels on Social Networking Sites ,[object Object],[object Object],[object Object]
Understanding URLs ,[object Object],[object Object],[object Object],[object Object]
Understanding URLs ,[object Object],[object Object]
Passwords ,[object Object],[object Object],[object Object]
Passwords ,[object Object],[object Object],[object Object],[object Object],[object Object]
Shopping Online ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Credit Card Security ,[object Object],[object Object],[object Object]
Identity Theft ,[object Object],[object Object]
Identity Theft Prevention Tips ,[object Object],[object Object],[object Object],[object Object]
Identity Theft Prevention Tips ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Identity Theft Prevention Tips ,[object Object]
Identity Theft - Public Computer Safety Tips ,[object Object],[object Object],[object Object],[object Object],[object Object]
Identity Theft - Public Computer Safety Tips ,[object Object],[object Object],[object Object],[object Object]
Safety Checklist ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sources ,[object Object],[object Object]
Creative Commons License ,[object Object]

More Related Content

What's hot

Heads up!
Heads up!Heads up!
Social Networking
Social NetworkingSocial Networking
Social Networking
Nyros Technologies
 
Digital privacy
Digital privacyDigital privacy
Digital privacy
Anna Adel
 
Digital ASSETS: A PATH TO FIDUCIARY ACCESS - FALL 2014
Digital ASSETS:A PATH TO FIDUCIARY ACCESS- FALL 2014Digital ASSETS:A PATH TO FIDUCIARY ACCESS- FALL 2014
Digital ASSETS: A PATH TO FIDUCIARY ACCESS - FALL 2014
gallowayandcollens
 
Internet safety
Internet safetyInternet safety
Internet safety
walsh008
 
Becybersmart
BecybersmartBecybersmart
Becybersmart
Velma
 
Privacy Online
Privacy OnlinePrivacy Online
Privacy Online
John Curry
 
Internet issues
Internet issuesInternet issues
Internet issuesCJ900
 
Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentationMatthew Momney
 
Protecting your privacy online june 2012 tech tuesday
Protecting your privacy online june 2012 tech tuesdayProtecting your privacy online june 2012 tech tuesday
Protecting your privacy online june 2012 tech tuesdayMolly Immendorf
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
Naheelah Irving
 
Digital Footprint
Digital FootprintDigital Footprint
Digital Footprint
darpankambo
 
Internet safety presentation 2019
Internet safety presentation 2019Internet safety presentation 2019
Internet safety presentation 2019
KanelandSvihlik
 
Paul Madden Frokostseminar Slides
Paul Madden Frokostseminar SlidesPaul Madden Frokostseminar Slides
Paul Madden Frokostseminar Slides
LinkRisk
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
Shruti Bansal
 
Facebook for Parents
Facebook for ParentsFacebook for Parents
Facebook for Parents
amelialouise
 
Digital Assets: A Path To Fiduciary Access
Digital Assets: A Path To Fiduciary AccessDigital Assets: A Path To Fiduciary Access
Digital Assets: A Path To Fiduciary Access
Howard Collens
 
How to Avoid Getting Malware on Your Computer
How to Avoid Getting Malware on Your ComputerHow to Avoid Getting Malware on Your Computer
How to Avoid Getting Malware on Your Computer
Jillian Stone
 
Digital DNA (Toronto Public Library) May 26 2016
Digital DNA (Toronto Public Library) May 26 2016Digital DNA (Toronto Public Library) May 26 2016
Digital DNA (Toronto Public Library) May 26 2016
Towa Beer
 

What's hot (19)

Heads up!
Heads up!Heads up!
Heads up!
 
Social Networking
Social NetworkingSocial Networking
Social Networking
 
Digital privacy
Digital privacyDigital privacy
Digital privacy
 
Digital ASSETS: A PATH TO FIDUCIARY ACCESS - FALL 2014
Digital ASSETS:A PATH TO FIDUCIARY ACCESS- FALL 2014Digital ASSETS:A PATH TO FIDUCIARY ACCESS- FALL 2014
Digital ASSETS: A PATH TO FIDUCIARY ACCESS - FALL 2014
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Becybersmart
BecybersmartBecybersmart
Becybersmart
 
Privacy Online
Privacy OnlinePrivacy Online
Privacy Online
 
Internet issues
Internet issuesInternet issues
Internet issues
 
Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentation
 
Protecting your privacy online june 2012 tech tuesday
Protecting your privacy online june 2012 tech tuesdayProtecting your privacy online june 2012 tech tuesday
Protecting your privacy online june 2012 tech tuesday
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Digital Footprint
Digital FootprintDigital Footprint
Digital Footprint
 
Internet safety presentation 2019
Internet safety presentation 2019Internet safety presentation 2019
Internet safety presentation 2019
 
Paul Madden Frokostseminar Slides
Paul Madden Frokostseminar SlidesPaul Madden Frokostseminar Slides
Paul Madden Frokostseminar Slides
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Facebook for Parents
Facebook for ParentsFacebook for Parents
Facebook for Parents
 
Digital Assets: A Path To Fiduciary Access
Digital Assets: A Path To Fiduciary AccessDigital Assets: A Path To Fiduciary Access
Digital Assets: A Path To Fiduciary Access
 
How to Avoid Getting Malware on Your Computer
How to Avoid Getting Malware on Your ComputerHow to Avoid Getting Malware on Your Computer
How to Avoid Getting Malware on Your Computer
 
Digital DNA (Toronto Public Library) May 26 2016
Digital DNA (Toronto Public Library) May 26 2016Digital DNA (Toronto Public Library) May 26 2016
Digital DNA (Toronto Public Library) May 26 2016
 

Viewers also liked

Preparing students & teachers for culinary competition
Preparing students & teachers for culinary competitionPreparing students & teachers for culinary competition
Preparing students & teachers for culinary competitionNai Wang
 
KP Compass Learning Platform
KP Compass Learning PlatformKP Compass Learning Platform
KP Compass Learning Platform
Nai Wang
 
KP Compass Demo Instructions
KP Compass Demo InstructionsKP Compass Demo Instructions
KP Compass Demo Instructions
Nai Wang
 
St francis plansbook_fina_ll[1]
St francis plansbook_fina_ll[1]St francis plansbook_fina_ll[1]
St francis plansbook_fina_ll[1]
saulsberry22
 
KP Compass Student Training Slides
KP Compass Student Training SlidesKP Compass Student Training Slides
KP Compass Student Training Slides
Nai Wang
 
Intro for Subject Matter Experts
Intro for Subject Matter ExpertsIntro for Subject Matter Experts
Intro for Subject Matter Experts
Random Hacks of Kindness
 
KP Compass Teacher Training Slides
KP Compass Teacher Training SlidesKP Compass Teacher Training Slides
KP Compass Teacher Training Slides
Nai Wang
 
2012 cyc participant survey
2012 cyc participant survey2012 cyc participant survey
2012 cyc participant survey
ConnectYourCommunity
 
KP Compass & Game Theory
KP Compass & Game TheoryKP Compass & Game Theory
KP Compass & Game Theory
Nai Wang
 
Spark - Alexis Seigneurin (Français)
Spark - Alexis Seigneurin (Français)Spark - Alexis Seigneurin (Français)
Spark - Alexis Seigneurin (Français)
Alexis Seigneurin
 
Spark (v1.3) - Présentation (Français)
Spark (v1.3) - Présentation (Français)Spark (v1.3) - Présentation (Français)
Spark (v1.3) - Présentation (Français)
Alexis Seigneurin
 

Viewers also liked (19)

7 module web based email
7 module web based email7 module web based email
7 module web based email
 
Preparing students & teachers for culinary competition
Preparing students & teachers for culinary competitionPreparing students & teachers for culinary competition
Preparing students & teachers for culinary competition
 
KP Compass Learning Platform
KP Compass Learning PlatformKP Compass Learning Platform
KP Compass Learning Platform
 
5 module data storage
5 module data storage5 module data storage
5 module data storage
 
KP Compass Demo Instructions
KP Compass Demo InstructionsKP Compass Demo Instructions
KP Compass Demo Instructions
 
4 module windows operating system
4 module windows operating system4 module windows operating system
4 module windows operating system
 
St francis plansbook_fina_ll[1]
St francis plansbook_fina_ll[1]St francis plansbook_fina_ll[1]
St francis plansbook_fina_ll[1]
 
3 module basic hardware
3 module basic hardware3 module basic hardware
3 module basic hardware
 
4 module windows operating system
4 module windows operating system4 module windows operating system
4 module windows operating system
 
JoinMe by AnotherGroup
JoinMe by AnotherGroupJoinMe by AnotherGroup
JoinMe by AnotherGroup
 
E4 ms word a1
E4 ms word   a1E4 ms word   a1
E4 ms word a1
 
KP Compass Student Training Slides
KP Compass Student Training SlidesKP Compass Student Training Slides
KP Compass Student Training Slides
 
Intro for Subject Matter Experts
Intro for Subject Matter ExpertsIntro for Subject Matter Experts
Intro for Subject Matter Experts
 
KP Compass Teacher Training Slides
KP Compass Teacher Training SlidesKP Compass Teacher Training Slides
KP Compass Teacher Training Slides
 
8 module search techniques
8 module search techniques8 module search techniques
8 module search techniques
 
2012 cyc participant survey
2012 cyc participant survey2012 cyc participant survey
2012 cyc participant survey
 
KP Compass & Game Theory
KP Compass & Game TheoryKP Compass & Game Theory
KP Compass & Game Theory
 
Spark - Alexis Seigneurin (Français)
Spark - Alexis Seigneurin (Français)Spark - Alexis Seigneurin (Français)
Spark - Alexis Seigneurin (Français)
 
Spark (v1.3) - Présentation (Français)
Spark (v1.3) - Présentation (Français)Spark (v1.3) - Présentation (Français)
Spark (v1.3) - Présentation (Français)
 

Similar to 10 online privacy module samedit1

A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet
- Mark - Fullbright
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
Cathleen Richardson
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
KevinRiley83
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
CharithraaAR
 
Maintaining Online Privacy
Maintaining Online PrivacyMaintaining Online Privacy
Maintaining Online Privacy
Allison Carr Waechter
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
Gihan Dias
 
Identity theft
Identity theftIdentity theft
Identity theft
bhabagrahi dash
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayane Hazimeh
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
Marian Merritt
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayane Hazimeh
 
CYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptxCYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptx
Tapan Khilar
 
Safe Computing
Safe ComputingSafe Computing
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself Online
Gary Wagnon
 
Cybersecurity additional activities
Cybersecurity additional activitiesCybersecurity additional activities
Cybersecurity additional activities
Yumonomics
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
Achu69
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena Mishra
Devsena Mishra
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptx
adblue2017
 

Similar to 10 online privacy module samedit1 (20)

A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Maintaining Online Privacy
Maintaining Online PrivacyMaintaining Online Privacy
Maintaining Online Privacy
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Online privacy
Online privacyOnline privacy
Online privacy
 
CYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptxCYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptx
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself Online
 
Online privacy
Online privacy Online privacy
Online privacy
 
Cybersecurity additional activities
Cybersecurity additional activitiesCybersecurity additional activities
Cybersecurity additional activities
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena Mishra
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptx
 

More from ConnectYourCommunity

E2 module google docs and calendar
E2   module google docs and calendarE2   module google docs and calendar
E2 module google docs and calendarConnectYourCommunity
 

More from ConnectYourCommunity (10)

7 module web based email
7 module web based email7 module web based email
7 module web based email
 
4 module windows operating system
4 module windows operating system4 module windows operating system
4 module windows operating system
 
1 - Mouse Basics
1 - Mouse Basics1 - Mouse Basics
1 - Mouse Basics
 
3 module basic hardware
3 module basic hardware3 module basic hardware
3 module basic hardware
 
E2 module google docs and calendar
E2   module google docs and calendarE2   module google docs and calendar
E2 module google docs and calendar
 
Cyc fundamentals training courses
Cyc fundamentals training coursesCyc fundamentals training courses
Cyc fundamentals training courses
 
Curriculum computer fundamentals
Curriculum computer fundamentalsCurriculum computer fundamentals
Curriculum computer fundamentals
 
E3 microsoft office
E3 microsoft officeE3 microsoft office
E3 microsoft office
 
E1 cyc elective advanced e mail
E1 cyc elective advanced e mailE1 cyc elective advanced e mail
E1 cyc elective advanced e mail
 
5 module data storage 1
5 module data storage 15 module data storage 1
5 module data storage 1
 

Recently uploaded

A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 

Recently uploaded (20)

A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 

10 online privacy module samedit1

Editor's Notes

  1. This module is intended to help class participants be more aware of how to protect themselves online while still enjoying and making full use of the Internet.
  2. Backups, archives, data/content pushing all result in the ambiguity of deleting digital content. Digital content is easily forwarded and reposted. Sometimes this is a good thing and sometimes it is not. Regardless of how we view this phenomena, it is a reality. Private information is no longer, by default, private. If you want information to be private, you must take steps to make it so. For example, avoiding mentioning your address or even your neighborhood on social networks is a conscious act. Know who has direct access to your posts in your social networks and recognize that others may have indirect access. Heard any stories about someone making a mistake online resulting in negative impact offline?
  3. Backups, archives, data/content pushing all result in the ambiguity of deleting digital content. Digital content is easily forwarded and reposted. Sometimes this is a good thing and sometimes it is not. Regardless of how we view this phenomena, it is a reality. Private information is no longer, by default, private. If you want information to be private, you must take steps to make it so. For example, avoiding mentioning your address or even your neighborhood on social networks is a conscious act. Know who has direct access to your posts in your social networks and recognize that others may have indirect access. Heard any stories about someone making a mistake online resulting in negative impact offline?
  4. Backups, archives, data/content pushing all result in the ambiguity of deleting digital content. Digital content is easily forwarded and reposted. Sometimes this is a good thing and sometimes it is not. Regardless of how we view this phenomena, it is a reality. Private information is no longer, by default, private. If you want information to be private, you must take steps to make it so. For example, avoiding mentioning your address or even your neighborhood on social networks is a conscious act. Know who has direct access to your posts in your social networks and recognize that others may have indirect access. Heard any stories about someone making a mistake online resulting in negative impact offline?
  5. Backups, archives, data/content pushing all result in the ambiguity of deleting digital content. Digital content is easily forwarded and reposted. Sometimes this is a good thing and sometimes it is not. Regardless of how we view this phenomena, it is a reality. Private information is no longer, by default, private. If you want information to be private, you must take steps to make it so. For example, avoiding mentioning your address or even your neighborhood on social networks is a conscious act. Know who has direct access to your posts in your social networks and recognize that others may have indirect access. Heard any stories about someone making a mistake online resulting in negative impact offline?
  6. Backups, archives, data/content pushing all result in the ambiguity of deleting digital content. Digital content is easily forwarded and reposted. Sometimes this is a good thing and sometimes it is not. Regardless of how we view this phenomena, it is a reality. Private information is no longer, by default, private. If you want information to be private, you must take steps to make it so. For example, avoiding mentioning your address or even your neighborhood on social networks is a conscious act. Know who has direct access to your posts in your social networks and recognize that others may have indirect access. Heard any stories about someone making a mistake online resulting in negative impact offline?
  7. Backups, archives, data/content pushing all result in the ambiguity of deleting digital content. Digital content is easily forwarded and reposted. Sometimes this is a good thing and sometimes it is not. Regardless of how we view this phenomena, it is a reality. Private information is no longer, by default, private. If you want information to be private, you must take steps to make it so. For example, avoiding mentioning your address or even your neighborhood on social networks is a conscious act. Know who has direct access to your posts in your social networks and recognize that others may have indirect access. Heard any stories about someone making a mistake online resulting in negative impact offline?
  8. Backups, archives, data/content pushing all result in the ambiguity of deleting digital content. Digital content is easily forwarded and reposted. Sometimes this is a good thing and sometimes it is not. Regardless of how we view this phenomena, it is a reality. Private information is no longer, by default, private. If you want information to be private, you must take steps to make it so. For example, avoiding mentioning your address or even your neighborhood on social networks is a conscious act. Know who has direct access to your posts in your social networks and recognize that others may have indirect access. Heard any stories about someone making a mistake online resulting in negative impact offline?
  9. Backups, archives, data/content pushing all result in the ambiguity of deleting digital content. Digital content is easily forwarded and reposted. Sometimes this is a good thing and sometimes it is not. Regardless of how we view this phenomena, it is a reality. Private information is no longer, by default, private. If you want information to be private, you must take steps to make it so. For example, avoiding mentioning your address or even your neighborhood on social networks is a conscious act. Know who has direct access to your posts in your social networks and recognize that others may have indirect access. Heard any stories about someone making a mistake online resulting in negative impact offline?
  10. Who uses Facebook? Who uses MySpace? Have you adjusted your privacy settings? Default privacy setting on most social networks – everything is public! Instructor – if majority of students have an account on a social network, have them log in and adjust the privacy settings during class. Review the privacy setting pages of Facebook and MySpace prior to class because they often change.
  11. Who uses Facebook? Who uses MySpace? Have you adjusted your privacy settings? Default privacy setting on most social networks – everything is public! Instructor – if majority of students have an account on a social network, have them log in and adjust the privacy settings during class. Review the privacy setting pages of Facebook and MySpace prior to class because they often change.
  12. Who uses Facebook? Who uses MySpace? Have you adjusted your privacy settings? Default privacy setting on most social networks – everything is public! Instructor – if majority of students have an account on a social network, have them log in and adjust the privacy settings during class. Review the privacy setting pages of Facebook and MySpace prior to class because they often change.
  13. Who uses Facebook? Who uses MySpace? Have you adjusted your privacy settings? Default privacy setting on most social networks – everything is public! Instructor – if majority of students have an account on a social network, have them log in and adjust the privacy settings during class. Review the privacy setting pages of Facebook and MySpace prior to class because they often change.
  14. Social Engineering Tactics - Someone claiming to be doing research or survey for your bank, a new employee at a company you use, or a repair person that NEEDS your help. They may seem to ask round about or harmless questions that they then use against you. Verify they really are who they say they are before answering questions.
  15. Phishing, and spyware attacks are occurring often on social networking sites, especially Facebook. Anyone received a message via email or a social network that was not sent by the person it appeared to have been sent by? Most likely Michelle has no idea this message went out in her name. What is the top level domain in this message? Do a search of .in domain. What do you find? It’s the country domain for India.
  16. Why not trust this email? No such thing as free cash. Most likely they will ask for your bank account and password in order to supposedly deposit your check.
  17. Who uses Facebook? Who uses MySpace? Have you adjusted your privacy settings? Default privacy setting on most social networks – everything is public! Instructor – if majority of students have an account on a social network, have them log in and adjust the privacy settings during class. Review the privacy setting pages of Facebook and MySpace prior to class because they often change.
  18. You learned about URLs in How to Use a Browser. What is a URL? Uniform Resource Identifier. More commonly called a web address. Most popular top level domains? .com, .org, .net
  19. You learned about URLs in How to Use a Browser. What is a URL? Uniform Resource Identifier. More commonly called a web address. Most popular top level domains? .com, .org, .net
  20. Use a combination of letters (capital and lower case), numbers and symbols if allowed. Example are: EmilyP05 – Emily Pietilia was my great grandmother and she was born in 1905 – However, don’t do this with a spouse or child that relationship is too close and too obvious. Or use a mnemonic i.e. – mbsfe530 – my brother sells fire extinguishers and his birthday. Don’t use names or words in a dictionary, names, addresses, or birthdates. Or use a full sentence - ilovecats If you must write them down, don’t keep it in a file labeled passwords or on your calendar.
  21. If you are using public computers be alert to who is around you, if your password is too easy or too hard so you type it very slowly, it could be possible to watch what you type & learn your password. Why is your email account an important account? Because with access to your email account, someone could get access to your other accounts. Instructor – provide suggestions on how to create and keep track of passwords. Examples – use one string of letters and number but add a code to each one per application – such as having 135fox as a password and adding fb for Facebook to the beginning or end of 135fox, resulting in fb135fox. Your internet provider can access your account without your password – they would never contact you and ask for it. However, if you call them about a problem, they may ask for it so they can try and duplicate the problem you are having. If the incorrect password allows you to log into a site then you are on a spoofed site and not the company’s legitimate site. Most important – if you suspect someone is using your accounts, change the password and contact the company it is with immediately!
  22. Who has shopped online? What did you purchase? You initiate with a known and trusted company. Don’t use sites from unsolicited websites or pop up ads. www.hoogle.com vs. www.google.com
  23. MOST Credit cards have a maximum liability of $50.00 in the event of fraud, debit cards may have a higher or no limit check with your bank for information about the cards you have or read that little tiny print! One card lets you easily review online purchases and request a card with a lower limit Online transactions are said to be safer since there is no human interaction – you are not giving your card to a person.
  24. Anyone been a victim of identity theft?
  25. In addition to keeping your software up-to-date, keeping your anti-virus software up-to-date and doing weekly scans, and have a firewall you should: Laptops - Use a strong password, require a password log in and log off when you are finished using, that will at least make it difficult for a thief to access (not impossible) Wipe Utility or File Shredder - Files that have been deleted or moved to the trash or recycle bin can still be recovered using a recovery program. A wipe utility actually writes over old files on your hard drive so they can no longer be recovered. Privacy policies - should explain how they secure their site and what they do with the information they collect (do they share/sell it). If they sell information to others or there is no policy go somewhere else. Free Credit Reports – Reports can be requested annually online free but be very careful where you request it from. Use the Federal Trade Commission website. Do not go to a search engine!
  26. In addition to keeping your software up-to-date, keeping your anti-virus software up-to-date and doing weekly scans, and have a firewall you should: Laptops - Use a strong password, require a password log in and log off when you are finished using, that will at least make it difficult for a thief to access (not impossible) Wipe Utility or File Shredder - Files that have been deleted or moved to the trash or recycle bin can still be recovered using a recovery program. A wipe utility actually writes over old files on your hard drive so they can no longer be recovered. Privacy policies - should explain how they secure their site and what they do with the information they collect (do they share/sell it). If they sell information to others or there is no policy go somewhere else. Free Credit Reports – Reports can be requested annually online free but be very careful where you request it from. Use the Federal Trade Commission website. Do not go to a search engine! the ONLY authorized source for the free annual credit report that's yours by law. The Fair Credit Reporting Act guarantees you access to your credit report for free from each of the three nationwide credit reporting companies — Experian, Equifax, and TransUnion — every 12 months. The Federal Trade Commission has received complaints from consumers who thought they were ordering their free annual credit report, and yet couldn't get it without paying fees or buying other services. TV ads, email offers, or online search results may tout "free" credit reports, but there is only one authorized source for a truly free credit report.
  27. In addition to keeping your software up-to-date, keeping your anti-virus software up-to-date and doing weekly scans, and have a firewall you should: Laptops - Use a strong password, require a password log in and log off when you are finished using, that will at least make it difficult for a thief to access (not impossible) Wipe Utility or File Shredder - Files that have been deleted or moved to the trash or recycle bin can still be recovered using a recovery program. A wipe utility actually writes over old files on your hard drive so they can no longer be recovered. Privacy policies - should explain how they secure their site and what they do with the information they collect (do they share/sell it). If they sell information to others or there is no policy go somewhere else. Free Credit Reports – Reports can be requested annually online free but be very careful where you request it from. Use the Federal Trade Commission website. Do not go to a search engine! the ONLY authorized source for the free annual credit report that's yours by law. The Fair Credit Reporting Act guarantees you access to your credit report for free from each of the three nationwide credit reporting companies — Experian, Equifax, and TransUnion — every 12 months. The Federal Trade Commission has received complaints from consumers who thought they were ordering their free annual credit report, and yet couldn't get it without paying fees or buying other services. TV ads, email offers, or online search results may tout "free" credit reports, but there is only one authorized source for a truly free credit report.