SlideShare a Scribd company logo
Computer / Internet Security
West Haven Public Library
www.westhavenlibrary.org
Computer / Internet Security
• Use of internet services are unavoidable
  ▫ Job applications, school
    applications, taxes, credit, banking, DMV
    forms, personal communication (email), social
    networking
    (facebook), shopping, research, entertainment
• All parts of your life potentially have an online
  counterpart
Computer / Internet Security
• Everything you do online…
 ▫ Every account you make
 ▫ Every purchase
 ▫ Every job application

• Creates data about you
Computer / Internet Security
• Not always a bad thing… BUT
 ▫ Danger in losing control of your data (accounts)
 ▫ Danger in over sharing
 ▫ Danger in important data being destroyed
   (photos, records, documents)
Good News
It’s easy to stay safe and protect yourself
Computer / Internet Security
Goals
    • Secure your data
    • Keep what’s private
      PRIVATE
    • Prevent attack/ intrusion
    • Prepare for the worst,
      prevent loss
Computer / Internet Security
Goals                              Action
• Secure your data                 • Use better password practices

• Keep what’s private PRIVATE      • Be aware of what/how you
                                     share

• Prevent attack/ intrusion        • Be proactive- use protective
                                     software- be vigilant

• Prepare for the worst, prevent   • BACKUP, BACKUP, BACKUP
  loss
Data?
• Your data is anything on your computer or
  information stored in online accounts
 ▫   Documents, files, photos
 ▫   Online shopping sites
 ▫   Banking, credit card
 ▫   Social networking profiles
• Data that you own/control
• Private (banking info)
• Public (online profiles)
Why bother?
• Whether public (online profiles) or private
  (financial info) you need to stay in control

• Ensure that only authorized people can access
  your data, accounts, files

  Web-based accounts and services are increasingly
  important
Dangers
• Breaches can come from
 ▫ Leaked/ stolen data
   Leaked by a company or organization
   Stolen via virus on a computer you use
 ▫ Targeted attacks
 ▫ Automated attacks- cracks
Dangers
• Virus, Malware, Spyware, Adware, Trojans
 ▫ Software created to steal information, change
   settings, destroy files, take control of your system

 ▫ Most commonly contracted online unbeknownst
   to the user
    Email attachments, malicious websites, software
     downloads, toolbars
Secure Your Data
• Biggest step is use better password
  practices
 ▫ more difficult to guess
 ▫ Harder to crack (longer in length)
 ▫ Make it easier to deal with if username/passwords
   are leaked
Better Passwords
• Don't use passwords that are based on personal
  information that can be easily accessed or
  guessed.
 ▫ It may be easier than you think to guess your pet’s
   name, birthday, child’s name, favorite
   color, mother’s maiden name, etc.
 ▫ “password” “love” are extremely common and
   easily guessed
25 Worst Passwords of 2011
1. password       14. master
2. 123456         15. sunshine
3.12345678        16. ashley
4. qwerty         17. bailey
5. abc123         18. passw0rd
6. monkey         19. shadow
7. 1234567        20. 123123
8. letmein        21. 654321
9. trustno1       22. superman
10. dragon        23. qazwsx
11. baseball      24. michael
12. 111111        25. football
13. iloveyou

                 http://mashable.com/2011/11/17/worst-internet-
                 passwords/
Better Passwords
• Don't use words that can be found in any
  dictionary of any language.
 ▫ A single word, spelled correctly, is easy to check
   against a dictionary
 ▫ Single words are also short, easy to break using
   random guesses.
Stronger Passwords
• Use both lowercase and capital letters.
• Use a combination of letters, numbers, and
  special characters.

 ▫ Maine96knees@MtSnow

• Develop a mnemonic for remembering complex
  passwords.
Stronger Passwords
• Use passphrases when you can.
 ▫ Longer in length- harder to guess/ crack
 ▫ Easier to remember


 ▫ puppytograndmasforsummervacation
Stronger Passwords
• Use different passwords on different systems

 ▫ If you use the same password at one site that is
   broken into- then attackers can access your data at
   other sites using that same username/password.
Use different
passwords on
different systems
Keep what’s private PRIVATE
• Be aware of what you share
• When creating an account consider who you are
  giving your data to
• Any site asking for banking, social security, or
  login information for a different site should be
  closely examined.
Keep what’s private PRIVATE
• When creating accounts consider what you are
  entering and how it will be used
• You decide your comfort level with what you
  share
Email
• Email is more like a postcard than a letter

• Chances are no one other than the recipient will
  see it BUT it is possible for others see its content
  along the way (just like a postcard)

• Do not email: credit card #, logins/passwords
Web Addresses- URL
URL (Uniform Resource Locator)
           The address that connects you with a website.
Parts of the URL
http://www.google.com
       http://           = protocol [Hypertext Transfer Protocol]
       www.              = World Wide Web
       google            = domain name
       .com              = domain type
Domain Types
      .com       = commercial
      .org       = generally nonprofit organizations
      .edu       = higher education
      .gov       = U.S. government agency
Browsing the Web- Secure Sites
• Any site asking for sensitive info should be
  encrypted (Banks, Insurance, etc.)
• Encrypted site addresses begin with
  ▫ https://www.google.com- ENCRYPTED
  ▫ http://www.google.com- NOT encrypted
Browsing the Web- Secure Sites
Browsing the Web
• As you browse the web- websites collect info
  about you
• Your web browser keeps a history and collects
  cookies from websites

• Use your browser settings to:
 ▫ Clear your browser cache/history/cookies
 ▫ Limit 3rd party cookies
Keep what’s private PRIVATE
• If you have WiFi at home, set a password
 ▫ Keep your neighbors off your network (unless you
   want them there)

 ▫ Refer to the directions that came with your
   Router/Modem/Wifi
Prevent attack/ intrusion
• A Virus will get in through an open door or you
  unwillingly open the door yourself
Anti-Virus
• A program that scans your files and actively
  monitors to prevent infection
• Once installed, anti-virus monitors for virus
  activity, quarantines, and deletes

• Be sure to frequently run the virus scan
• Be sure that “definitions” are updated
Anti-Virus
• Free
 ▫ AVG
 ▫ Avast
 ▫ Microsoft Security Essentials
     www.windows.microsoft.com/mse
• Commercial
 ▫ McAffee
 ▫ Symantec Norton
 ▫ Bit Defender
Prevent attack/ intrusion
• Be vigilant
• Don’t download email attachments that you
  don’t trust
• If something from someone you trust looks
  suspicious check with them before opening
Prevent attack/ intrusion
• Scareware
 ▫ Virus/Malware that looks like an anti-virus
   program
 ▫ Popup while browsing the web

• Know what Anti-virus you have and how to use it
Fake Anti-Virus Warning
Prepare for the worst
• Backup your important files
  ▫ Keep duplicate copies
• Worst case scenario: you will still have what’s
  important to you
• Keep your backup current
Prepare for the worst
• Backup files locally
  ▫ Copy to cdr
  ▫ Flash drive
  ▫ external hard drive
• Paper copies
  ▫ tax returns
  ▫ Important photos
Prepare for the worst
• Cloud storage- files copied to a secure site over
  the internet
  ▫ Be sure that service is reputable, safe, stable
  ▫ Backup regularly
Resources
• http://www.us-cert.gov/cas/tips/
• http://www.ftc.gov/bcp/edu/microsites/onguard/




                  westhavenlibrary.org




                      David Cirella- dcirella@westhavenlibrary.org, 2012-03-01

More Related Content

What's hot

How to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique PasswordsHow to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique Passwords
ConnectSafely
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
wstagnaro
 
Microsoft protect ppt_ms_final
Microsoft protect ppt_ms_finalMicrosoft protect ppt_ms_final
Microsoft protect ppt_ms_final
21_zaheer
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminars
Emmanuel Arthur
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
ICT Frame Magazine Pvt. Ltd.
 
Password protection
Password protectionPassword protection
Password protection
post_it
 
Online reputation
Online reputationOnline reputation
Online reputation
esl2m
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
Lori Lee Mickelson
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
Marian Merritt
 
NHC Tips - Secure your ID Theft - By Bijay Acharya
NHC Tips - Secure your ID Theft - By Bijay AcharyaNHC Tips - Secure your ID Theft - By Bijay Acharya
NHC Tips - Secure your ID Theft - By Bijay Acharya
Bijay Acharya
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
Sadaf Walliyani
 
Personal security
Personal securityPersonal security
CYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWCYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEW
Billy Warero
 
Social Media Marketing 04 08 10
Social Media Marketing 04 08 10Social Media Marketing 04 08 10
Social Media Marketing 04 08 10
Matthew Asbell
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
Lawrence Fine
 

What's hot (15)

How to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique PasswordsHow to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique Passwords
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Microsoft protect ppt_ms_final
Microsoft protect ppt_ms_finalMicrosoft protect ppt_ms_final
Microsoft protect ppt_ms_final
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminars
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Password protection
Password protectionPassword protection
Password protection
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
NHC Tips - Secure your ID Theft - By Bijay Acharya
NHC Tips - Secure your ID Theft - By Bijay AcharyaNHC Tips - Secure your ID Theft - By Bijay Acharya
NHC Tips - Secure your ID Theft - By Bijay Acharya
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Personal security
Personal securityPersonal security
Personal security
 
CYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWCYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEW
 
Social Media Marketing 04 08 10
Social Media Marketing 04 08 10Social Media Marketing 04 08 10
Social Media Marketing 04 08 10
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
 

Similar to Computer / Internet Security WHPL

Lesson 5 protecting yourself on the internet
Lesson 5 protecting yourself on the internetLesson 5 protecting yourself on the internet
Lesson 5 protecting yourself on the internet
San Diego Continuing Education
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
KevinRiley83
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
Kazi Sarwar Hossain
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
Randy Bowman
 
Internet Security
Internet SecurityInternet Security
Internet Security
mjelson
 
Security best practices for regular users
Security best practices for regular usersSecurity best practices for regular users
Security best practices for regular users
Geoffrey Vaughan
 
Security Best Practices for Regular Users
Security Best Practices for Regular UsersSecurity Best Practices for Regular Users
Security Best Practices for Regular Users
Security Innovation
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
CharithraaAR
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
Ronald Soh
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
Abzetdin Adamov
 
Cyber security
Cyber security Cyber security
Cyber security
ZwebaButt
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayane Hazimeh
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
amiinaaa
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcare
Nicholas Davis
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
Brian Pichman
 
securityawareness.pptx
securityawareness.pptxsecurityawareness.pptx
securityawareness.pptx
binowe
 
Securityawareness
SecurityawarenessSecurityawareness
Securityawareness
JayfErika
 
securityawareness.pptx
securityawareness.pptxsecurityawareness.pptx
securityawareness.pptx
reagan sapul
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayanehaz
 

Similar to Computer / Internet Security WHPL (20)

Lesson 5 protecting yourself on the internet
Lesson 5 protecting yourself on the internetLesson 5 protecting yourself on the internet
Lesson 5 protecting yourself on the internet
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Security best practices for regular users
Security best practices for regular usersSecurity best practices for regular users
Security best practices for regular users
 
Security Best Practices for Regular Users
Security Best Practices for Regular UsersSecurity Best Practices for Regular Users
Security Best Practices for Regular Users
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
Cyber security
Cyber security Cyber security
Cyber security
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcare
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
 
securityawareness.pptx
securityawareness.pptxsecurityawareness.pptx
securityawareness.pptx
 
Securityawareness
SecurityawarenessSecurityawareness
Securityawareness
 
securityawareness.pptx
securityawareness.pptxsecurityawareness.pptx
securityawareness.pptx
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 

More from West Haven Public Library

Introduction to Blogging WHPL
Introduction to Blogging WHPLIntroduction to Blogging WHPL
Introduction to Blogging WHPL
West Haven Public Library
 
WHPL Computer Basics 2011
WHPL Computer Basics 2011WHPL Computer Basics 2011
WHPL Computer Basics 2011
West Haven Public Library
 
WHPL Introduction to PowerPoint 2011
WHPL Introduction to PowerPoint 2011WHPL Introduction to PowerPoint 2011
WHPL Introduction to PowerPoint 2011
West Haven Public Library
 
WHPL Introduction to Excel
WHPL Introduction to ExcelWHPL Introduction to Excel
WHPL Introduction to Excel
West Haven Public Library
 
WHPL Online Job Search
WHPL Online Job SearchWHPL Online Job Search
WHPL Online Job Search
West Haven Public Library
 
WHPL Resume Creation
WHPL Resume CreationWHPL Resume Creation
WHPL Resume Creation
West Haven Public Library
 
WHPL iCONN instruction
WHPL iCONN instructionWHPL iCONN instruction
WHPL iCONN instruction
West Haven Public Library
 
WHPL Internet and Searching Basics
WHPL Internet and Searching BasicsWHPL Internet and Searching Basics
WHPL Internet and Searching Basics
West Haven Public Library
 

More from West Haven Public Library (8)

Introduction to Blogging WHPL
Introduction to Blogging WHPLIntroduction to Blogging WHPL
Introduction to Blogging WHPL
 
WHPL Computer Basics 2011
WHPL Computer Basics 2011WHPL Computer Basics 2011
WHPL Computer Basics 2011
 
WHPL Introduction to PowerPoint 2011
WHPL Introduction to PowerPoint 2011WHPL Introduction to PowerPoint 2011
WHPL Introduction to PowerPoint 2011
 
WHPL Introduction to Excel
WHPL Introduction to ExcelWHPL Introduction to Excel
WHPL Introduction to Excel
 
WHPL Online Job Search
WHPL Online Job SearchWHPL Online Job Search
WHPL Online Job Search
 
WHPL Resume Creation
WHPL Resume CreationWHPL Resume Creation
WHPL Resume Creation
 
WHPL iCONN instruction
WHPL iCONN instructionWHPL iCONN instruction
WHPL iCONN instruction
 
WHPL Internet and Searching Basics
WHPL Internet and Searching BasicsWHPL Internet and Searching Basics
WHPL Internet and Searching Basics
 

Recently uploaded

Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 

Recently uploaded (20)

Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 

Computer / Internet Security WHPL

  • 1. Computer / Internet Security West Haven Public Library www.westhavenlibrary.org
  • 2. Computer / Internet Security • Use of internet services are unavoidable ▫ Job applications, school applications, taxes, credit, banking, DMV forms, personal communication (email), social networking (facebook), shopping, research, entertainment • All parts of your life potentially have an online counterpart
  • 3. Computer / Internet Security • Everything you do online… ▫ Every account you make ▫ Every purchase ▫ Every job application • Creates data about you
  • 4. Computer / Internet Security • Not always a bad thing… BUT ▫ Danger in losing control of your data (accounts) ▫ Danger in over sharing ▫ Danger in important data being destroyed (photos, records, documents)
  • 5. Good News It’s easy to stay safe and protect yourself
  • 6. Computer / Internet Security Goals • Secure your data • Keep what’s private PRIVATE • Prevent attack/ intrusion • Prepare for the worst, prevent loss
  • 7. Computer / Internet Security Goals Action • Secure your data • Use better password practices • Keep what’s private PRIVATE • Be aware of what/how you share • Prevent attack/ intrusion • Be proactive- use protective software- be vigilant • Prepare for the worst, prevent • BACKUP, BACKUP, BACKUP loss
  • 8. Data? • Your data is anything on your computer or information stored in online accounts ▫ Documents, files, photos ▫ Online shopping sites ▫ Banking, credit card ▫ Social networking profiles • Data that you own/control • Private (banking info) • Public (online profiles)
  • 9. Why bother? • Whether public (online profiles) or private (financial info) you need to stay in control • Ensure that only authorized people can access your data, accounts, files Web-based accounts and services are increasingly important
  • 10. Dangers • Breaches can come from ▫ Leaked/ stolen data  Leaked by a company or organization  Stolen via virus on a computer you use ▫ Targeted attacks ▫ Automated attacks- cracks
  • 11. Dangers • Virus, Malware, Spyware, Adware, Trojans ▫ Software created to steal information, change settings, destroy files, take control of your system ▫ Most commonly contracted online unbeknownst to the user  Email attachments, malicious websites, software downloads, toolbars
  • 12. Secure Your Data • Biggest step is use better password practices ▫ more difficult to guess ▫ Harder to crack (longer in length) ▫ Make it easier to deal with if username/passwords are leaked
  • 13. Better Passwords • Don't use passwords that are based on personal information that can be easily accessed or guessed. ▫ It may be easier than you think to guess your pet’s name, birthday, child’s name, favorite color, mother’s maiden name, etc. ▫ “password” “love” are extremely common and easily guessed
  • 14. 25 Worst Passwords of 2011 1. password 14. master 2. 123456 15. sunshine 3.12345678 16. ashley 4. qwerty 17. bailey 5. abc123 18. passw0rd 6. monkey 19. shadow 7. 1234567 20. 123123 8. letmein 21. 654321 9. trustno1 22. superman 10. dragon 23. qazwsx 11. baseball 24. michael 12. 111111 25. football 13. iloveyou http://mashable.com/2011/11/17/worst-internet- passwords/
  • 15. Better Passwords • Don't use words that can be found in any dictionary of any language. ▫ A single word, spelled correctly, is easy to check against a dictionary ▫ Single words are also short, easy to break using random guesses.
  • 16. Stronger Passwords • Use both lowercase and capital letters. • Use a combination of letters, numbers, and special characters. ▫ Maine96knees@MtSnow • Develop a mnemonic for remembering complex passwords.
  • 17. Stronger Passwords • Use passphrases when you can. ▫ Longer in length- harder to guess/ crack ▫ Easier to remember ▫ puppytograndmasforsummervacation
  • 18. Stronger Passwords • Use different passwords on different systems ▫ If you use the same password at one site that is broken into- then attackers can access your data at other sites using that same username/password.
  • 20. Keep what’s private PRIVATE • Be aware of what you share • When creating an account consider who you are giving your data to • Any site asking for banking, social security, or login information for a different site should be closely examined.
  • 21. Keep what’s private PRIVATE • When creating accounts consider what you are entering and how it will be used • You decide your comfort level with what you share
  • 22. Email • Email is more like a postcard than a letter • Chances are no one other than the recipient will see it BUT it is possible for others see its content along the way (just like a postcard) • Do not email: credit card #, logins/passwords
  • 24. URL (Uniform Resource Locator) The address that connects you with a website. Parts of the URL http://www.google.com http:// = protocol [Hypertext Transfer Protocol] www. = World Wide Web google = domain name .com = domain type Domain Types .com = commercial .org = generally nonprofit organizations .edu = higher education .gov = U.S. government agency
  • 25. Browsing the Web- Secure Sites • Any site asking for sensitive info should be encrypted (Banks, Insurance, etc.) • Encrypted site addresses begin with ▫ https://www.google.com- ENCRYPTED ▫ http://www.google.com- NOT encrypted
  • 26. Browsing the Web- Secure Sites
  • 27. Browsing the Web • As you browse the web- websites collect info about you • Your web browser keeps a history and collects cookies from websites • Use your browser settings to: ▫ Clear your browser cache/history/cookies ▫ Limit 3rd party cookies
  • 28.
  • 29. Keep what’s private PRIVATE • If you have WiFi at home, set a password ▫ Keep your neighbors off your network (unless you want them there) ▫ Refer to the directions that came with your Router/Modem/Wifi
  • 30. Prevent attack/ intrusion • A Virus will get in through an open door or you unwillingly open the door yourself
  • 31. Anti-Virus • A program that scans your files and actively monitors to prevent infection • Once installed, anti-virus monitors for virus activity, quarantines, and deletes • Be sure to frequently run the virus scan • Be sure that “definitions” are updated
  • 32. Anti-Virus • Free ▫ AVG ▫ Avast ▫ Microsoft Security Essentials  www.windows.microsoft.com/mse • Commercial ▫ McAffee ▫ Symantec Norton ▫ Bit Defender
  • 33. Prevent attack/ intrusion • Be vigilant • Don’t download email attachments that you don’t trust • If something from someone you trust looks suspicious check with them before opening
  • 34. Prevent attack/ intrusion • Scareware ▫ Virus/Malware that looks like an anti-virus program ▫ Popup while browsing the web • Know what Anti-virus you have and how to use it
  • 36. Prepare for the worst • Backup your important files ▫ Keep duplicate copies • Worst case scenario: you will still have what’s important to you • Keep your backup current
  • 37. Prepare for the worst • Backup files locally ▫ Copy to cdr ▫ Flash drive ▫ external hard drive • Paper copies ▫ tax returns ▫ Important photos
  • 38. Prepare for the worst • Cloud storage- files copied to a secure site over the internet ▫ Be sure that service is reputable, safe, stable ▫ Backup regularly
  • 39. Resources • http://www.us-cert.gov/cas/tips/ • http://www.ftc.gov/bcp/edu/microsites/onguard/ westhavenlibrary.org David Cirella- dcirella@westhavenlibrary.org, 2012-03-01