SlideShare a Scribd company logo
1 of 7
your library of you - socialsafe.net
How to stay safe
online
(eSecurity)
your library of you - socialsafe.net
Aim
• Just a starter today covering main points of eSecurity
– Privacy, Passwords, and Computer Security
• There are many layers of actions you can take
– Just like securing your home
• A simple door lock
• A 5 lever door lock
• Window locks
• Alarm system
• CCTV
• The internet offers huge advantages for everyone –
and simple precautions will keep you safe
your library of you - socialsafe.net
Digital
World
Self
Harm
Permanence
Ease of Search
Ethical Grey Unethical Illegal
Harm
Spectrum
Gossip
Public Interest
Privacy Invasion
List
Selling
Unsolicited
Calls
Mug
Targeting
Phone
Tapping
Libel
ID
Theft
Fraud
Assault
Physical
World
Privacy – know your settings
your library of you - socialsafe.net
Social networks & Online privacy
• Are you a person of interest?
– Maybe not to national media
– But always the answer is yes
• Current & future employers
• Friends and acquaintances
• Partners and ex partners
• Understand what is public, private or semi-private
– Twitter is public, but has private Direct messages
– Facebook defaults to public, but can by private
– Be careful what you reveal publically online
• Hard to pull back your personal reputation
• Understand & use Privacy settings
– Default to Friends only where possible
– Network defaults are rarely very private
– You can often (but not always) delete posts/photos
your library of you - socialsafe.net
Passwords
• Passwords are you main line of defence
– Hackers DO try and guess
– Your (ex)partner, “friends”, others may try too
• Fraping – “When a friend or family member
pretends to be you and uses your Facebook
account (for example) to post funny (or
supposedly funny) updates”
• Use safe passwords
– Relatively easy to get details about you
• So don’t use birthdates, names, schools, anything
personal
• Safe passwords can be hard to remember
– Tools to help such as 1Password
• Security questions to recover passwords
– Lie, but do so in a way you can remember
Strong password
Long (8+ characters)
Upper & lower case
Include numbers (0..9)
Include special chars
(@£$%^&*:;….)
Different from site to site
your library of you - socialsafe.net
• Think before you click
– But we all get caught at some
point
– Have computer security
program
• & enable firewall
– (Stops people entering by the
back door)
– Keep your computer system
and phone system up to date
with latest software - by default
keep updates on
Computer security - viruses,
spyware, malware
your library of you - socialsafe.net
Exercises
• What password(s) do you Use?
• Check your Facebook privacy settings
• Has you computer got Virus Protection/Frewall
– Is it up to date?

More Related Content

Similar to E security

Lesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxLesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxJoy Dugayo
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Hannah Jane del Castillo
 
Don't Get Hacked
Don't Get HackedDon't Get Hacked
Don't Get HackedYTH
 
Password protection
Password protectionPassword protection
Password protectionpost_it
 
An Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereAn Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereBlake Carver
 
Using Skype, Facebook, and email to communicate with family and friends
Using Skype, Facebook, and email to communicate with family and friendsUsing Skype, Facebook, and email to communicate with family and friends
Using Skype, Facebook, and email to communicate with family and friendsSocial Status
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self DefenseBarry Caplin
 
password.ppt
password.pptpassword.ppt
password.pptKaxa5
 
Computer / Internet Security
Computer / Internet SecurityComputer / Internet Security
Computer / Internet SecurityDavid Cirella
 
An Introduction To IT Security And Privacy In Libraries
 An Introduction To IT Security And Privacy In Libraries An Introduction To IT Security And Privacy In Libraries
An Introduction To IT Security And Privacy In LibrariesBlake Carver
 
Online reputation
Online reputationOnline reputation
Online reputationesl2m
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awarenessKaran Veer Singh
 

Similar to E security (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Lesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxLesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptx
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Threats
ThreatsThreats
Threats
 
Don't Get Hacked
Don't Get HackedDon't Get Hacked
Don't Get Hacked
 
Web2.0 Class Guidelines
Web2.0 Class Guidelines Web2.0 Class Guidelines
Web2.0 Class Guidelines
 
Password protection
Password protectionPassword protection
Password protection
 
An Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereAn Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & Anywhere
 
Judy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 PresentationJudy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 Presentation
 
Tablets, Apps and Cybersecurity
Tablets, Apps and CybersecurityTablets, Apps and Cybersecurity
Tablets, Apps and Cybersecurity
 
Using Skype, Facebook, and email to communicate with family and friends
Using Skype, Facebook, and email to communicate with family and friendsUsing Skype, Facebook, and email to communicate with family and friends
Using Skype, Facebook, and email to communicate with family and friends
 
Web2.0 Class Safety Guidelines
Web2.0 Class Safety GuidelinesWeb2.0 Class Safety Guidelines
Web2.0 Class Safety Guidelines
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
 
password.ppt
password.pptpassword.ppt
password.ppt
 
Computer / Internet Security
Computer / Internet SecurityComputer / Internet Security
Computer / Internet Security
 
An Introduction To IT Security And Privacy In Libraries
 An Introduction To IT Security And Privacy In Libraries An Introduction To IT Security And Privacy In Libraries
An Introduction To IT Security And Privacy In Libraries
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Carver IT Security for Librarians
Carver IT Security for LibrariansCarver IT Security for Librarians
Carver IT Security for Librarians
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 

More from Sue Black

Mumsnet techmums social media share
Mumsnet techmums social media shareMumsnet techmums social media share
Mumsnet techmums social media shareSue Black
 
Techmums social media
Techmums social mediaTechmums social media
Techmums social mediaSue Black
 
From Bletchley Park to modern computing: the value of Twitter
From Bletchley Park to modern computing: the value of TwitterFrom Bletchley Park to modern computing: the value of Twitter
From Bletchley Park to modern computing: the value of TwitterSue Black
 
goto sue black computer weekly
goto sue black computer weeklygoto sue black computer weekly
goto sue black computer weeklySue Black
 
Newcastle july2012sueblack
Newcastle july2012sueblackNewcastle july2012sueblack
Newcastle july2012sueblackSue Black
 
Did twitter save bletchley park?
Did twitter save bletchley park? Did twitter save bletchley park?
Did twitter save bletchley park? Sue Black
 
Turingslegacy
TuringslegacyTuringslegacy
TuringslegacySue Black
 
Sueblack overtheair2011
Sueblack overtheair2011Sueblack overtheair2011
Sueblack overtheair2011Sue Black
 
Google Feb 2011 - My life as a geek
Google Feb 2011 - My life as a geekGoogle Feb 2011 - My life as a geek
Google Feb 2011 - My life as a geekSue Black
 
Bpark guardian feb2011
Bpark guardian feb2011Bpark guardian feb2011
Bpark guardian feb2011Sue Black
 
Areusocialorantisocial old
Areusocialorantisocial oldAreusocialorantisocial old
Areusocialorantisocial oldSue Black
 
Opentech2010 Slideshare
Opentech2010 SlideshareOpentech2010 Slideshare
Opentech2010 SlideshareSue Black
 
Web2se Black et al
Web2se Black et alWeb2se Black et al
Web2se Black et alSue Black
 

More from Sue Black (14)

Mumsnet techmums social media share
Mumsnet techmums social media shareMumsnet techmums social media share
Mumsnet techmums social media share
 
Techmums social media
Techmums social mediaTechmums social media
Techmums social media
 
From Bletchley Park to modern computing: the value of Twitter
From Bletchley Park to modern computing: the value of TwitterFrom Bletchley Park to modern computing: the value of Twitter
From Bletchley Park to modern computing: the value of Twitter
 
goto sue black computer weekly
goto sue black computer weeklygoto sue black computer weekly
goto sue black computer weekly
 
Newcastle july2012sueblack
Newcastle july2012sueblackNewcastle july2012sueblack
Newcastle july2012sueblack
 
Turing2012
Turing2012Turing2012
Turing2012
 
Did twitter save bletchley park?
Did twitter save bletchley park? Did twitter save bletchley park?
Did twitter save bletchley park?
 
Turingslegacy
TuringslegacyTuringslegacy
Turingslegacy
 
Sueblack overtheair2011
Sueblack overtheair2011Sueblack overtheair2011
Sueblack overtheair2011
 
Google Feb 2011 - My life as a geek
Google Feb 2011 - My life as a geekGoogle Feb 2011 - My life as a geek
Google Feb 2011 - My life as a geek
 
Bpark guardian feb2011
Bpark guardian feb2011Bpark guardian feb2011
Bpark guardian feb2011
 
Areusocialorantisocial old
Areusocialorantisocial oldAreusocialorantisocial old
Areusocialorantisocial old
 
Opentech2010 Slideshare
Opentech2010 SlideshareOpentech2010 Slideshare
Opentech2010 Slideshare
 
Web2se Black et al
Web2se Black et alWeb2se Black et al
Web2se Black et al
 

Recently uploaded

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 

Recently uploaded (20)

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 

E security

  • 1. your library of you - socialsafe.net How to stay safe online (eSecurity)
  • 2. your library of you - socialsafe.net Aim • Just a starter today covering main points of eSecurity – Privacy, Passwords, and Computer Security • There are many layers of actions you can take – Just like securing your home • A simple door lock • A 5 lever door lock • Window locks • Alarm system • CCTV • The internet offers huge advantages for everyone – and simple precautions will keep you safe
  • 3. your library of you - socialsafe.net Digital World Self Harm Permanence Ease of Search Ethical Grey Unethical Illegal Harm Spectrum Gossip Public Interest Privacy Invasion List Selling Unsolicited Calls Mug Targeting Phone Tapping Libel ID Theft Fraud Assault Physical World Privacy – know your settings
  • 4. your library of you - socialsafe.net Social networks & Online privacy • Are you a person of interest? – Maybe not to national media – But always the answer is yes • Current & future employers • Friends and acquaintances • Partners and ex partners • Understand what is public, private or semi-private – Twitter is public, but has private Direct messages – Facebook defaults to public, but can by private – Be careful what you reveal publically online • Hard to pull back your personal reputation • Understand & use Privacy settings – Default to Friends only where possible – Network defaults are rarely very private – You can often (but not always) delete posts/photos
  • 5. your library of you - socialsafe.net Passwords • Passwords are you main line of defence – Hackers DO try and guess – Your (ex)partner, “friends”, others may try too • Fraping – “When a friend or family member pretends to be you and uses your Facebook account (for example) to post funny (or supposedly funny) updates” • Use safe passwords – Relatively easy to get details about you • So don’t use birthdates, names, schools, anything personal • Safe passwords can be hard to remember – Tools to help such as 1Password • Security questions to recover passwords – Lie, but do so in a way you can remember Strong password Long (8+ characters) Upper & lower case Include numbers (0..9) Include special chars (@£$%^&*:;….) Different from site to site
  • 6. your library of you - socialsafe.net • Think before you click – But we all get caught at some point – Have computer security program • & enable firewall – (Stops people entering by the back door) – Keep your computer system and phone system up to date with latest software - by default keep updates on Computer security - viruses, spyware, malware
  • 7. your library of you - socialsafe.net Exercises • What password(s) do you Use? • Check your Facebook privacy settings • Has you computer got Virus Protection/Frewall – Is it up to date?