SlideShare a Scribd company logo
1 of 61
Download to read offline
INTERNET SAFETY
FOR ADULTS
(includes Facebook and WhatsApp)
#Crowdsourcing #InternetSafety
Rajesh Soundararajan
@rajeshsound
rajeshsound@outlook.in
WHAT’S UP? LET’S FACE IT!
What do you understand about
Internet Safety?
Do you love your neighbour? Do
you lock your door?
How uncommon is common
sense?
HOW MUCH
SAFETY IS TOO
MUCH SAFETY?
HOW MUCH
PANIC IS TOO
MUCH PANIC?
We will talk about these today…
• Passwords
• Online Banking, Secure Shopping
• Hoax and Rumours on Facebook, WhatsApp, SMS
• Safe Browsing on Internet
• Email Caution
• ATM and Internet Banking
• Protecting with Anti-Virus and Spam Filters
• Home Wi-Fi Safety
• Filter Bubble
PASSWORD BASICS
A password is a word or string of
characters used for user
authentication to prove identity
or access approval to gain access
to a resource (example: an access
code is a type of password), which
should be kept secret from those
not allowed access.
Password strength is a measure of the
effectiveness of a password in resisting
guessing and brute-force attacks. In its
usual form, it estimates how many
trials an attacker who does not have
direct access to the password would
need, on average, to guess it correctly.
This website is interestingly useful
https://howsecureismypassword.net
tips for a strong password
• DO Change your password – (1) every 90 days
(2) when it is compromised (3) More frequently
for banking and social sites
• DO Write down Passwords in a small Diary/
Notebook. While there is password
management software available, it may lead to
more compromise than safety if you are a
novice user. Please do share the details on
where you stored with at least one or a
maximum of two trusted people. Spouse or
Children
• DO NOT *save* your passwords on your mobile
phone or laptop. If lost, you are giving away a
lottery to the thief.
• Do not key in your password on your mobile
phone/ desktop / kiosk that is not your
personal private.
• DO NOT share your password ever, ever. If you
even have the slightest doubt that it is
compromised, please change it immediately.
ONLINE BANKING, SECURE
SHOPPING
THERE
ARE A
ZILLION
SHARKS
OUT
THERE
BANKING BLUES
• Think twice may be even 5 times over two days, before you click anyting to do
with Money
• Never, Ever, share banking information(account numbers) Cheque numbers and
credit card information via email.
• Change PIN for debit cards as soon as you receive them from the bank - Do not
write PIN down and keep it next to the card in a "safe" place
• If someone from the bank calls you and asks for information, as for a number to
call them back on and call them back on a landline that is a bank number.
• Your bank will never contact you via email if your credit card is "compromised".
Never click on such emails.
• Use e-banking and update your cellphone numbers for SMS updates.
• Do not give your ATM card and PIN to anyone (maid, driver, fuel pump attender)
to withdraw money for you.
Can you compare and contrast
real life safety and online safety?
tips for Online Transactions
• ALWAYS Check for https whenever doing any banking transaction,
online shopping or even for a mobile re-charge (example -
https://www.icicibank.com)
• DO Close that Window/ Tab or Browser ‘each time’ after finishing the
banking transactions
• DO NOT login to an internet links from your mobile unless you are
doubly and triply sure that it is secure and authentic. If in doubt,
avoid.
• DO use Virtual Keyboards where possible.
• DO use Two Factor Authentication (2FA) and Mobile OTP
• LOOK for padlock symbols in the URL
SAFE FACEBOOK/
WHATSAPP/ SMS
Are you a rumour monger? A hoax
perpetrator?
How credible are those
incredulous WhatsApp forwards?
tips for Facebook/ WhatsApp/ SMS
• ALWAYS Google and check before forwarding anything. You do
not want to be a rumour monger. Do you?
• ALWAYS be very careful about the security / privacy settings
before uploading pictures and videos on Facebook
ALWAYS refer to the dozens of sites
share the hoaxes on Internet–
• Hoax-Slayer: Latest Email Hoaxes - Current Internet Scams
• Best WhatsApp Hoax messages: 5 new irritating ... - India
• 25 Hilarious Hoax WhatsApp Texts and Forwarded messages
• 11 weird health rumours on Facebook, WhatsApp and ...
BEWARE Internet is NOT Gospel
Truth.
• A high % of WhatsApp Forwards are unconfirmed rumours
• Almost ALL rumours have malicious intent
• WhatsApp and Facebook take advantage of simplicity, speed and ignorance
to mass forward texts inside their CLOSED groups.
• Most of today’s digital audience wouldn’t sift out the facts.
• DO NOT accept unknown friend requests. If in doubt, ignore. If no display
picture, you must not accept that request.
• DO NOT REACT when you reading emotional charged posts
There is a big difference
between posting a social
media post and a private
message. Discuss private
matters face to face or
on phone if it can be
helped, not on
electronic media.
BROWSING THE INTERNET
tips for Browsing the Internet
• ALWAYS hover the mouse on URL links and
check (in the status bar) if the site it is
pointing to seems reasonably safe. When in
doubt completely avoid clicking something.
• ALWAYS AVOID clicking on pop-ups
• browsing the internet relentlessly and
finding crazy suggestions for fitness and
health. Often, people are ready to try
anything without pausing to think.
• Clear you Cache
EMAILS
tips on Email Safety
• Emails have become by-far the most ubiquitous means of
communication. Gone are the days of post-cards and inland letters.
With such emails come s its own pain of being careful.
• ALWAYS Be extra cautious with when you open emails on Mobile
and tablets
• ALWAYS Check the email address is veritable - sometimes the name
reads like these - Facebook Team <noreply@acenzi.com>, Gmail Team
<xyz@abc.com>, ICICI Bank <acds@in.icici.org>, YouTube Support
<egnan@goosu.com>. You would never be able to see these in the
mobile phones.
• For a more detailed discussion please refer to the topic ‘Phishing’
below
Dos and DON’Ts
• DO add safe contacts in Junk Mail and vice versa
• Do login to your mail systems on your desktop (Gmail/ yahoo/ Hotmail) and check the
junk mail box.
• DO NOT open any emails where the sender is not familiar. At the slightest doubt and you
delete them rather than open a can of worms.
• Downloading Attachments and Clicking Hyper-Links
• DO NOT click on links in emails unless you are 200% sure that it is from verifiable source.
Just as you would be careful to welcome an unknown carton from an unknown entity in
your house, you would need to treat attachments on email as such.
• DO NOT download suspicious attachments. If the attachment is not a *pdf or *.vcf, just be
doubly careful. You might want to verify for attachments like *.doc and *ppt and *.xls and
*.zip. If it is an *.exe or anything else just DO NOT click that attachment. Call the Sender.
WINNING LOTTERY AND
FREEBIES
Winning Lottery and Freebies
• THERE ARE NO FREE LUNCHES. PERIOD.
• If you had relatives in Africa who had $50 million you would have
known. Nor will a rich influential Chinese or Nigerian business may
be willing to bequeath you with their $100Million wealth.
• If you are not a gambler and an online lottery player, there is NO
way you will win a lottery of $8 Million.
• And, neither Apple, or Rolls Royce are fools to give away a 1000
iPads or 100 Cars for the first bunch of fools that Like a website link,
answer a silly question or share their contact details.
• Well, if Greed drives it, then this chapter is not for you!
PHISHING EMAILS
PHISHING EMAILS
• "Phishing" (also known as "carding" or "spoofing") refers to email that attempts to fraudulently acquire
personal information from you, such as your account password or credit card information. On the
surface, the email may appear to be from a legitimate company or individual, but it's not.
• As a general rule, never send credit card information, account passwords, or extensive personal
information in an email unless you verify that the recipient is who they claim to be. Many
companies have policies that state they will never solicit such information from customers by email.
• Find out who the email is really from. View the email headers to see where the message really
originated from. A typical email header displays several lines that begin with "Received." If the
"Received from" information does not match the email address of the sender or the company being
represented in the email, it usually means that the message did not truly come from that individual
or company.
• Be cautious of links in the email. One common phishing technique is to include links in an email
that look like they go to a legitimate website. Upon closer inspection, the link may actually take you
to a website that has nothing to do with the company the email is pretending to be from, even
though the resulting website may be designed to look exactly the same.
PHISHING EMAILS (CONT)
• Note the email greeting. Phishing emails tend to start with generic phrases like "Dear valued customer" or your email
account name, such as "Dear snookums123," instead of your name ("Dear Raghav" for example). Most legitimate
companies include your name in their correspondence because companies will have it on record (if you've dealt with
them before).
• Keep previous history in mind: If you've had previous, valid correspondence with the company, compare those messages
to the email in question. If you have never done business with a particular company, and you receive an email that
appears to be from that company requesting account information, it could be an attempt at phishing. Again, never email
account information or credit card information if you are in doubt.
• Never provide personal account information through email. if you receive an unsolicited commercial email requesting
personal information, do not provide any information without first checking directly with the company that appears to be
the one requesting this information. Do not reply to the message or click any of the links in the message. Instead, visit
the company's website and find an email address to contact regarding this issue, or call the company. Many companies
appreciate being notified about fraudulent attempts to gain information about their customers.
• Be cautious of attachments. If you receive an unsolicited message that contains an attachment, do not open it. Contact
the company directly to verify the contents of the email and the attachment before opening it.
ATM AND INTERNET
BANKING PIN
tips for ATM and Internet
Banking
• NEVER do write ATM pins or passwords in a text file or back of
ATM card.
• NEVER add personal information like phone number, address on
your ATM card
ANTI-VIRUS SOFTWARE AND
SPAM FILTERS
tips for Antivirus
• ALWAYS use the online Mail access and spam filters. The ones
used by major providers like Gmail, Hotmail and Yahoo are
pretty decent.
• DO get a good anti-virus and spam filter.
Spam And Spam-Filters
• Email spam, also known as unsolicited bulk email (UBE), junk
mail, or unsolicited commercial email (UCE), is the practice of
sending unwanted email messages, frequently with commercial
content, in large quantities to an indiscriminate set of recipients
• Spam Filters are the best way to stop spam.
• You can also unsubscribe to unwanted email lists, if you have
inadvertently subscribed or had found that sender’s email useful
in the past, but not anymore.
• Online mail applications and most mail clients can also do help
you with intelligent spam options that can get sorted into
appropriate spam folders boxes or junk email folders. Since they
are based on intelligence of usage, it would help if you guide
these by a few actions on your desktop or web-experience. Your
mobile sorting would not help these systems learn much.
HACKERS AND HOME WI-FI
Account Hacking
• In the computer security context, a hacker is someone who
seeks and exploits weaknesses in a computer system or
computer network. Hackers may be motivated by a multitude of
reasons, such as profit, protest, challenge, enjoyment, or to
evaluate those weaknesses to assist in removing them.
• When you believe your account is hacked, please contact the
service provider immediately.
• Share the information with a few friends or family who are
technically savvy, so that they can raise an alert on your behalf.
tips Home Wi-Fi
• Wi-Fi routers at homes have usernames and passwords often
handed down by service provider or the router manufacturer.
Usually unknown users (free riders) gain access and use up your
bandwidth. Not only does it cost you heavily in broadband bills,
but it also leads to potential hacking through their connections
and devices.
• ALWAYS change this to a more personalised name and have a
new password
• ALWAYS use a new WPA2 password or equivalent and make
sure you note down the same on the router lest you lose it.
Be Aware of Filter Bubble
• A filter bubble is a result of a personalized search in which a
website algorithm selectively guesses what information a user
would like to see based on information about the user (such
as location, past click behaviour and search history) and, as a
result, users become separated from information ...
• http://www.goodreads.com/book/show/10596103-the-filter-
bubble
http://www.amazon.com/The-Filter-Bubble-Personalized-
Changing/dp/0143121235
In Summary
• Passwords
• Online Banking, Secure Shopping
• Hoax and Rumours on Facebook, WhatsApp, SMS
• Safe Browsing on Internet
• Email Caution
• ATM and Internet Banking
• Protecting with Anti-Virus and Spam Filters
• Home Wi-Fi Safety
• Filter Bubble
Rajesh Soundararajan
@rajeshsound
rajeshsound@outlook.in
Some Additional References
• http://www.wikipedia.org
• www.google.com
• www.bing.com
• Securing The Human Newsletters: Securing Your New Tablet,
January 2016
• Securing Your New Tablet, January 2016
• Phishing, December 2015
• Shopping Online Securely, November 2015
• Password Managers, October 2015
• Two-Step Verification, September 2015
• Backup & Recovery, August 2015
• Social Media, July 2015
• Educating Kids on Cyber Safety, June 2015
• Securing the Cyber Generation Gap, May 2015
• Passphrases, April 2015
• Gaming Online Safely & Securely, March 2015
• Staying Secure on the Road, February 2015
• Securely Using Mobile Apps, January 2015
• What Is Anti-Virus?, December 2014
• Social Engineering, November 2014
• Five Steps to Staying Secure, October 2014
• Using the Cloud Securely, September 2014
• Encryption, August 2014
• Email Do's and Don'ts, July 2014
• Disposing of Your Mobile Device, June 2014
• I’m Hacked, Now What?, May 2014
• Yes, You Actually Are a Target, April 2014
• The End of Windows XP, March 2014
• What Is Malware, February 2014
• Securing Your Home Network, January 2014
#Crowdsourcing Contributions
(Thank you)
Ajit Iyer
Anju Raja
Anuja Singh
Arati, Santhosh
David D'Costa
Deepika Zingade
Krishnendu Laha
Madhu Lakshmanan
Ratnaprabha Kibe
Sadha Shiv
Santhanam Krishnamachari
Shailendra Singh
Shobha Sampath
Shreya Bhagwanth
Uthra Srinivasan
Vivek Singh
• Madhukar Shukla
• Manjunath
Revenasiddappa
• Mukesh Rao Engla Syam
• Murli Iyer
• Preethi Bashyam Sriganesh
• Rahul Sharma
• Rajagpalan AR
• Ramesh Rangan
Glossary
• A password is a word or string of characters used for user authentication to prove identity or access approval to gain
access to a resource (example: an access code is a type of password), which should be kept secret from those not
allowed access.
• Password strength is a measure of the effectiveness of a password in resisting guessing and brute-force attacks. In its
usual form, it estimates how many trials an attacker who does not have direct access to the password would need, on
average, to guess it correctly.
• HTTPS (also called HTTP over TLS, [1] [2] HTTP over SSL, [3] and HTTP Secure [4] [5]) is a protocol for secure
communication over a computer network which is widely used on the Internet.
• Two-factor authentication is a security process in which the user provides two means of identification from separate
categories of credentials; one is typically a physical token, such as a card, and the other is typically something
memorized, such as a security code.
• A one-time password (OTP) is a password that is valid for only one login session or transaction, on a computer system or
other digital device.
• Check if you see a lock on the web browser address bar then you should also see that the website starts with HTTPS as
opposed to HTTP in which case the page is using secure socket layer and is secure from a third party being able to
see your information as it is being transmitted.
• A hoax is a deliberately fabricated falsehood made to masquerade as truth. It is distinguishable from errors in
observation or judgment, or rumours, urban legends, pseudoscience or April Fools' Day events that are passed along in
good faith by believers or as jokes.
GLOSSARY (2)
• Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and
sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic
communication. The word is a neologism created as a homophone of fishing due to the similarity of using fake bait in
an attempt to catch a victim.
• A personal identification number (PIN, pronounced "pin"; often redundantly PIN number) is a numeric password used to
authenticate a user to a system, in particular in association with an ATM card.
• Anti-virus software can attempt to scan for rootkits. A rootkit is a type of malware designed to gain administrative-level
control over a computer system without being detected.
• Email spam, also known as unsolicited bulk email (UBE), junk mail, or unsolicited commercial email (UCE), is the practice
of sending unwanted email messages, frequently with commercial content, in large quantities to an indiscriminate set of
recipients.
• In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or
computer network. Hackers may be motivated by a multitude of reasons, such as profit, protest, challenge, enjoyment, or
to evaluate those weaknesses to assist in removing them.
• A filter bubble is a result of a personalized search in which a website algorithm selectively guesses what information a
user would like to see based on information about the user (such as location, past click behaviour and search history)
and, as a result, users become separated from information ...
Internet Safety for 1950s Adults and Beginners

More Related Content

What's hot

Cyber safety
Cyber safetyCyber safety
Cyber safetyYash Jain
 
Cyber safety
Cyber safetyCyber safety
Cyber safetysmartins7
 
Online privacy
Online privacyOnline privacy
Online privacyjo-jo23
 
Internet safety presentation 2019
Internet safety presentation 2019Internet safety presentation 2019
Internet safety presentation 2019KanelandSvihlik
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetymcgeet
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety pptmcmullan
 
Presentation to parents
Presentation to parentsPresentation to parents
Presentation to parentssirchriss
 
Cyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and SextingCyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and SextingMatt Britland
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guidemjtheman
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquetterowenick
 

What's hot (19)

Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
CYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESHCYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESH
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Safety @ Cyber
Safety @ CyberSafety @ Cyber
Safety @ Cyber
 
Online privacy
Online privacyOnline privacy
Online privacy
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet safety presentation 2019
Internet safety presentation 2019Internet safety presentation 2019
Internet safety presentation 2019
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Presentation to parents
Presentation to parentsPresentation to parents
Presentation to parents
 
Digital+safety+powerpoint
Digital+safety+powerpointDigital+safety+powerpoint
Digital+safety+powerpoint
 
Cyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and SextingCyber Safety: Social Media, Cyberbullying and Sexting
Cyber Safety: Social Media, Cyberbullying and Sexting
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guide
 
Internet safety
Internet safety Internet safety
Internet safety
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 

Viewers also liked

Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety PresentationPamela Moeai
 
Cybersafety basics.ppt cs
Cybersafety basics.ppt csCybersafety basics.ppt cs
Cybersafety basics.ppt csVinay Soni
 
Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpointMsCCostello
 
Successfully Outsourcing Your Accounting Function
Successfully Outsourcing Your Accounting FunctionSuccessfully Outsourcing Your Accounting Function
Successfully Outsourcing Your Accounting Function4Good.org
 
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?iosrjce
 
On Today's Menu: Your Successful Grant Proposal
On Today's Menu: Your Successful Grant ProposalOn Today's Menu: Your Successful Grant Proposal
On Today's Menu: Your Successful Grant Proposal4Good.org
 
Childhood Factors that influence success in later life
Childhood Factors that influence success in later lifeChildhood Factors that influence success in later life
Childhood Factors that influence success in later lifeiosrjce
 
Internet Safety for Kids and Parents
Internet Safety for Kids and Parents Internet Safety for Kids and Parents
Internet Safety for Kids and Parents Rajesh Soundararajan
 
English 101. Antecedent & Referent
English 101. Antecedent & ReferentEnglish 101. Antecedent & Referent
English 101. Antecedent & ReferentJo Ål
 
Internet safety slides
Internet safety slidesInternet safety slides
Internet safety slidesEric Castro
 
Comp I Section 33 Ppt
Comp I Section 33 PptComp I Section 33 Ppt
Comp I Section 33 Pptcasanchez
 
Level2 lesson11 v2
Level2 lesson11 v2Level2 lesson11 v2
Level2 lesson11 v2Angela Wolfe
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivAl Rowell
 
Successful writing. Lecture three.
Successful writing. Lecture three.Successful writing. Lecture three.
Successful writing. Lecture three.TamaraMontgomery
 
Cross cultural communication
Cross  cultural      communicationCross  cultural      communication
Cross cultural communicationChandan Baruah
 
Community Engagement Governance 1
Community Engagement Governance 1Community Engagement Governance 1
Community Engagement Governance 14Good.org
 
Integrating 360 degree feedback in to performance appraisal tool and developm...
Integrating 360 degree feedback in to performance appraisal tool and developm...Integrating 360 degree feedback in to performance appraisal tool and developm...
Integrating 360 degree feedback in to performance appraisal tool and developm...iosrjce
 

Viewers also liked (20)

Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Cybersafety basics.ppt cs
Cybersafety basics.ppt csCybersafety basics.ppt cs
Cybersafety basics.ppt cs
 
Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpoint
 
Cyber saftey
Cyber safteyCyber saftey
Cyber saftey
 
Successfully Outsourcing Your Accounting Function
Successfully Outsourcing Your Accounting FunctionSuccessfully Outsourcing Your Accounting Function
Successfully Outsourcing Your Accounting Function
 
Online safety and malwares
Online safety and malwaresOnline safety and malwares
Online safety and malwares
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
 
On Today's Menu: Your Successful Grant Proposal
On Today's Menu: Your Successful Grant ProposalOn Today's Menu: Your Successful Grant Proposal
On Today's Menu: Your Successful Grant Proposal
 
Childhood Factors that influence success in later life
Childhood Factors that influence success in later lifeChildhood Factors that influence success in later life
Childhood Factors that influence success in later life
 
Internet Safety for Kids and Parents
Internet Safety for Kids and Parents Internet Safety for Kids and Parents
Internet Safety for Kids and Parents
 
English 101. Antecedent & Referent
English 101. Antecedent & ReferentEnglish 101. Antecedent & Referent
English 101. Antecedent & Referent
 
Internet safety slides
Internet safety slidesInternet safety slides
Internet safety slides
 
Comp I Section 33 Ppt
Comp I Section 33 PptComp I Section 33 Ppt
Comp I Section 33 Ppt
 
Level2 lesson11 v2
Level2 lesson11 v2Level2 lesson11 v2
Level2 lesson11 v2
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent Univ
 
Successful writing. Lecture three.
Successful writing. Lecture three.Successful writing. Lecture three.
Successful writing. Lecture three.
 
Cross cultural communication
Cross  cultural      communicationCross  cultural      communication
Cross cultural communication
 
Community Engagement Governance 1
Community Engagement Governance 1Community Engagement Governance 1
Community Engagement Governance 1
 
Integrating 360 degree feedback in to performance appraisal tool and developm...
Integrating 360 degree feedback in to performance appraisal tool and developm...Integrating 360 degree feedback in to performance appraisal tool and developm...
Integrating 360 degree feedback in to performance appraisal tool and developm...
 

Similar to Internet Safety for 1950s Adults and Beginners

Spam & Phishing
Spam & PhishingSpam & Phishing
Spam & PhishingGrittyCC
 
ISSA - Security Awareness 2016-1
ISSA - Security Awareness 2016-1ISSA - Security Awareness 2016-1
ISSA - Security Awareness 2016-1Pedro Serrano
 
WISE KIDS Leaflet: Junk Mail and Misleading Advertisements
WISE KIDS Leaflet: Junk Mail and Misleading AdvertisementsWISE KIDS Leaflet: Junk Mail and Misleading Advertisements
WISE KIDS Leaflet: Junk Mail and Misleading AdvertisementsWISE KIDS
 
Internet Safety: I
Internet Safety: IInternet Safety: I
Internet Safety: Imlegan31
 
Cyber peace for youth tanta
Cyber peace for youth tantaCyber peace for youth tanta
Cyber peace for youth tantaSamir Deutsch
 
Respite Now's Senior Scam Alert presentation
Respite Now's Senior Scam Alert presentationRespite Now's Senior Scam Alert presentation
Respite Now's Senior Scam Alert presentationRespiteNowGreg
 
2016 Secure World Expo - Security Awareness
2016 Secure World Expo - Security Awareness2016 Secure World Expo - Security Awareness
2016 Secure World Expo - Security AwarenessPedro Serrano
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptxTanvir Amin
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayanehaz
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxKevinRiley83
 
Cybersecurity additional activities
Cybersecurity additional activitiesCybersecurity additional activities
Cybersecurity additional activitiesYumonomics
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital AgeMarian Merritt
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Cyber Safety Month summary
 Cyber Safety Month summary Cyber Safety Month summary
Cyber Safety Month summaryicts-uct
 
Fraud Awareness Guide for Individuals
Fraud Awareness Guide for IndividualsFraud Awareness Guide for Individuals
Fraud Awareness Guide for IndividualsShred Station
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTTeacherNicaPrintable
 

Similar to Internet Safety for 1950s Adults and Beginners (20)

Spam & Phishing
Spam & PhishingSpam & Phishing
Spam & Phishing
 
S_A_T.pptx
S_A_T.pptxS_A_T.pptx
S_A_T.pptx
 
Security-Awareness-Training.pptx
Security-Awareness-Training.pptxSecurity-Awareness-Training.pptx
Security-Awareness-Training.pptx
 
Phishing
PhishingPhishing
Phishing
 
ISSA - Security Awareness 2016-1
ISSA - Security Awareness 2016-1ISSA - Security Awareness 2016-1
ISSA - Security Awareness 2016-1
 
WISE KIDS Leaflet: Junk Mail and Misleading Advertisements
WISE KIDS Leaflet: Junk Mail and Misleading AdvertisementsWISE KIDS Leaflet: Junk Mail and Misleading Advertisements
WISE KIDS Leaflet: Junk Mail and Misleading Advertisements
 
Internet Safety: I
Internet Safety: IInternet Safety: I
Internet Safety: I
 
Cyber peace for youth tanta
Cyber peace for youth tantaCyber peace for youth tanta
Cyber peace for youth tanta
 
Respite Now's Senior Scam Alert presentation
Respite Now's Senior Scam Alert presentationRespite Now's Senior Scam Alert presentation
Respite Now's Senior Scam Alert presentation
 
2016 Secure World Expo - Security Awareness
2016 Secure World Expo - Security Awareness2016 Secure World Expo - Security Awareness
2016 Secure World Expo - Security Awareness
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
Cybersecurity additional activities
Cybersecurity additional activitiesCybersecurity additional activities
Cybersecurity additional activities
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Cyber Safety Month summary
 Cyber Safety Month summary Cyber Safety Month summary
Cyber Safety Month summary
 
Fraud Awareness Guide for Individuals
Fraud Awareness Guide for IndividualsFraud Awareness Guide for Individuals
Fraud Awareness Guide for Individuals
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
 

More from Rajesh Soundararajan

Why making mistakes is important in life
Why making mistakes is important in lifeWhy making mistakes is important in life
Why making mistakes is important in lifeRajesh Soundararajan
 
Six things to remember while writing feedback 2020
Six things to remember while writing feedback 2020Six things to remember while writing feedback 2020
Six things to remember while writing feedback 2020Rajesh Soundararajan
 
Six things to remember while writing feedback
Six things to remember while writing feedbackSix things to remember while writing feedback
Six things to remember while writing feedbackRajesh Soundararajan
 
Why Product Management is the New Black?
Why Product Management is the New Black?Why Product Management is the New Black?
Why Product Management is the New Black?Rajesh Soundararajan
 
4 breakthrough tips to be a Rockstar Speaker
4 breakthrough tips to be a Rockstar Speaker4 breakthrough tips to be a Rockstar Speaker
4 breakthrough tips to be a Rockstar SpeakerRajesh Soundararajan
 
How to kill your marketing in 12 ways
How to kill your marketing in 12 waysHow to kill your marketing in 12 ways
How to kill your marketing in 12 waysRajesh Soundararajan
 
Why i loved, loathed and learned from facebook
Why i loved, loathed and learned from facebookWhy i loved, loathed and learned from facebook
Why i loved, loathed and learned from facebookRajesh Soundararajan
 
Is 2014 the year of aviation disasters?
Is 2014 the year of aviation disasters?Is 2014 the year of aviation disasters?
Is 2014 the year of aviation disasters?Rajesh Soundararajan
 
Six Things to Remember While Receiving Feedback
Six Things to Remember While Receiving FeedbackSix Things to Remember While Receiving Feedback
Six Things to Remember While Receiving FeedbackRajesh Soundararajan
 
Six Things to Remember While Writing Feedback
Six Things to Remember While Writing FeedbackSix Things to Remember While Writing Feedback
Six Things to Remember While Writing FeedbackRajesh Soundararajan
 
Words that get content shared on social media
Words that get content shared on social mediaWords that get content shared on social media
Words that get content shared on social mediaRajesh Soundararajan
 

More from Rajesh Soundararajan (18)

Why making mistakes is important in life
Why making mistakes is important in lifeWhy making mistakes is important in life
Why making mistakes is important in life
 
Six things to remember while writing feedback 2020
Six things to remember while writing feedback 2020Six things to remember while writing feedback 2020
Six things to remember while writing feedback 2020
 
Time management hacks
Time management hacksTime management hacks
Time management hacks
 
Six things to remember while writing feedback
Six things to remember while writing feedbackSix things to remember while writing feedback
Six things to remember while writing feedback
 
Demonetization Myths Debunked
Demonetization Myths DebunkedDemonetization Myths Debunked
Demonetization Myths Debunked
 
Why Product Management is the New Black?
Why Product Management is the New Black?Why Product Management is the New Black?
Why Product Management is the New Black?
 
4 breakthrough tips to be a Rockstar Speaker
4 breakthrough tips to be a Rockstar Speaker4 breakthrough tips to be a Rockstar Speaker
4 breakthrough tips to be a Rockstar Speaker
 
How to kill your marketing in 12 ways
How to kill your marketing in 12 waysHow to kill your marketing in 12 ways
How to kill your marketing in 12 ways
 
5 HOT TECHNOLOGY TRENDS
5 HOT TECHNOLOGY TRENDS5 HOT TECHNOLOGY TRENDS
5 HOT TECHNOLOGY TRENDS
 
#MustRead #Flipkart #ApologyEmail
#MustRead #Flipkart #ApologyEmail#MustRead #Flipkart #ApologyEmail
#MustRead #Flipkart #ApologyEmail
 
Why i loved, loathed and learned from facebook
Why i loved, loathed and learned from facebookWhy i loved, loathed and learned from facebook
Why i loved, loathed and learned from facebook
 
Is 2014 the year of aviation disasters?
Is 2014 the year of aviation disasters?Is 2014 the year of aviation disasters?
Is 2014 the year of aviation disasters?
 
8 Selling Virtues
8 Selling Virtues8 Selling Virtues
8 Selling Virtues
 
Six Things to Remember While Receiving Feedback
Six Things to Remember While Receiving FeedbackSix Things to Remember While Receiving Feedback
Six Things to Remember While Receiving Feedback
 
Six Things to Remember While Writing Feedback
Six Things to Remember While Writing FeedbackSix Things to Remember While Writing Feedback
Six Things to Remember While Writing Feedback
 
8 Selling Sins
8 Selling Sins8 Selling Sins
8 Selling Sins
 
Words that get content shared on social media
Words that get content shared on social mediaWords that get content shared on social media
Words that get content shared on social media
 
12 laws of the new marketing
12 laws of the new marketing12 laws of the new marketing
12 laws of the new marketing
 

Recently uploaded

原版定制英国赫瑞瓦特大学毕业证原件一模一样
原版定制英国赫瑞瓦特大学毕业证原件一模一样原版定制英国赫瑞瓦特大学毕业证原件一模一样
原版定制英国赫瑞瓦特大学毕业证原件一模一样AS
 
一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理F
 
一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理AS
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrHenryBriggs2
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdfMatthew Sinclair
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理F
 
如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证
如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证
如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证hfkmxufye
 
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理apekaom
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制pxcywzqs
 
一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理F
 
一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书F
 
Research Assignment - NIST SP800 [172 A] - Presentation.pptx
Research Assignment - NIST SP800 [172 A] - Presentation.pptxResearch Assignment - NIST SP800 [172 A] - Presentation.pptx
Research Assignment - NIST SP800 [172 A] - Presentation.pptxi191686
 
Down bad crying at the gym t shirtsDown bad crying at the gym t shirts
Down bad crying at the gym t shirtsDown bad crying at the gym t shirtsDown bad crying at the gym t shirtsDown bad crying at the gym t shirts
Down bad crying at the gym t shirtsDown bad crying at the gym t shirtsrahman018755
 
一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样
一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样
一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样AS
 
一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样
一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样
一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样ayvbos
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdfMatthew Sinclair
 
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书c6eb683559b3
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
 
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0APNIC
 
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样AS
 

Recently uploaded (20)

原版定制英国赫瑞瓦特大学毕业证原件一模一样
原版定制英国赫瑞瓦特大学毕业证原件一模一样原版定制英国赫瑞瓦特大学毕业证原件一模一样
原版定制英国赫瑞瓦特大学毕业证原件一模一样
 
一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理
 
一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理
 
如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证
如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证
如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证
 
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理
 
一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书
 
Research Assignment - NIST SP800 [172 A] - Presentation.pptx
Research Assignment - NIST SP800 [172 A] - Presentation.pptxResearch Assignment - NIST SP800 [172 A] - Presentation.pptx
Research Assignment - NIST SP800 [172 A] - Presentation.pptx
 
Down bad crying at the gym t shirtsDown bad crying at the gym t shirts
Down bad crying at the gym t shirtsDown bad crying at the gym t shirtsDown bad crying at the gym t shirtsDown bad crying at the gym t shirts
Down bad crying at the gym t shirtsDown bad crying at the gym t shirts
 
一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样
一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样
一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样
 
一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样
一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样
一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
 
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
 

Internet Safety for 1950s Adults and Beginners

  • 1. INTERNET SAFETY FOR ADULTS (includes Facebook and WhatsApp) #Crowdsourcing #InternetSafety
  • 4. What do you understand about Internet Safety?
  • 5. Do you love your neighbour? Do you lock your door?
  • 6.
  • 7. How uncommon is common sense?
  • 8. HOW MUCH SAFETY IS TOO MUCH SAFETY?
  • 9. HOW MUCH PANIC IS TOO MUCH PANIC?
  • 10.
  • 11. We will talk about these today… • Passwords • Online Banking, Secure Shopping • Hoax and Rumours on Facebook, WhatsApp, SMS • Safe Browsing on Internet • Email Caution • ATM and Internet Banking • Protecting with Anti-Virus and Spam Filters • Home Wi-Fi Safety • Filter Bubble
  • 13. A password is a word or string of characters used for user authentication to prove identity or access approval to gain access to a resource (example: an access code is a type of password), which should be kept secret from those not allowed access.
  • 14.
  • 15. Password strength is a measure of the effectiveness of a password in resisting guessing and brute-force attacks. In its usual form, it estimates how many trials an attacker who does not have direct access to the password would need, on average, to guess it correctly. This website is interestingly useful https://howsecureismypassword.net
  • 16. tips for a strong password • DO Change your password – (1) every 90 days (2) when it is compromised (3) More frequently for banking and social sites • DO Write down Passwords in a small Diary/ Notebook. While there is password management software available, it may lead to more compromise than safety if you are a novice user. Please do share the details on where you stored with at least one or a maximum of two trusted people. Spouse or Children • DO NOT *save* your passwords on your mobile phone or laptop. If lost, you are giving away a lottery to the thief. • Do not key in your password on your mobile phone/ desktop / kiosk that is not your personal private. • DO NOT share your password ever, ever. If you even have the slightest doubt that it is compromised, please change it immediately.
  • 19. BANKING BLUES • Think twice may be even 5 times over two days, before you click anyting to do with Money • Never, Ever, share banking information(account numbers) Cheque numbers and credit card information via email. • Change PIN for debit cards as soon as you receive them from the bank - Do not write PIN down and keep it next to the card in a "safe" place • If someone from the bank calls you and asks for information, as for a number to call them back on and call them back on a landline that is a bank number. • Your bank will never contact you via email if your credit card is "compromised". Never click on such emails. • Use e-banking and update your cellphone numbers for SMS updates. • Do not give your ATM card and PIN to anyone (maid, driver, fuel pump attender) to withdraw money for you.
  • 20. Can you compare and contrast real life safety and online safety?
  • 21. tips for Online Transactions • ALWAYS Check for https whenever doing any banking transaction, online shopping or even for a mobile re-charge (example - https://www.icicibank.com) • DO Close that Window/ Tab or Browser ‘each time’ after finishing the banking transactions • DO NOT login to an internet links from your mobile unless you are doubly and triply sure that it is secure and authentic. If in doubt, avoid. • DO use Virtual Keyboards where possible. • DO use Two Factor Authentication (2FA) and Mobile OTP • LOOK for padlock symbols in the URL
  • 22.
  • 23.
  • 25. Are you a rumour monger? A hoax perpetrator?
  • 26.
  • 27. How credible are those incredulous WhatsApp forwards?
  • 28. tips for Facebook/ WhatsApp/ SMS • ALWAYS Google and check before forwarding anything. You do not want to be a rumour monger. Do you? • ALWAYS be very careful about the security / privacy settings before uploading pictures and videos on Facebook
  • 29. ALWAYS refer to the dozens of sites share the hoaxes on Internet– • Hoax-Slayer: Latest Email Hoaxes - Current Internet Scams • Best WhatsApp Hoax messages: 5 new irritating ... - India • 25 Hilarious Hoax WhatsApp Texts and Forwarded messages • 11 weird health rumours on Facebook, WhatsApp and ...
  • 30. BEWARE Internet is NOT Gospel Truth. • A high % of WhatsApp Forwards are unconfirmed rumours • Almost ALL rumours have malicious intent • WhatsApp and Facebook take advantage of simplicity, speed and ignorance to mass forward texts inside their CLOSED groups. • Most of today’s digital audience wouldn’t sift out the facts. • DO NOT accept unknown friend requests. If in doubt, ignore. If no display picture, you must not accept that request. • DO NOT REACT when you reading emotional charged posts
  • 31. There is a big difference between posting a social media post and a private message. Discuss private matters face to face or on phone if it can be helped, not on electronic media.
  • 33. tips for Browsing the Internet • ALWAYS hover the mouse on URL links and check (in the status bar) if the site it is pointing to seems reasonably safe. When in doubt completely avoid clicking something. • ALWAYS AVOID clicking on pop-ups • browsing the internet relentlessly and finding crazy suggestions for fitness and health. Often, people are ready to try anything without pausing to think. • Clear you Cache
  • 34.
  • 36. tips on Email Safety • Emails have become by-far the most ubiquitous means of communication. Gone are the days of post-cards and inland letters. With such emails come s its own pain of being careful. • ALWAYS Be extra cautious with when you open emails on Mobile and tablets • ALWAYS Check the email address is veritable - sometimes the name reads like these - Facebook Team <noreply@acenzi.com>, Gmail Team <xyz@abc.com>, ICICI Bank <acds@in.icici.org>, YouTube Support <egnan@goosu.com>. You would never be able to see these in the mobile phones. • For a more detailed discussion please refer to the topic ‘Phishing’ below
  • 37. Dos and DON’Ts • DO add safe contacts in Junk Mail and vice versa • Do login to your mail systems on your desktop (Gmail/ yahoo/ Hotmail) and check the junk mail box. • DO NOT open any emails where the sender is not familiar. At the slightest doubt and you delete them rather than open a can of worms. • Downloading Attachments and Clicking Hyper-Links • DO NOT click on links in emails unless you are 200% sure that it is from verifiable source. Just as you would be careful to welcome an unknown carton from an unknown entity in your house, you would need to treat attachments on email as such. • DO NOT download suspicious attachments. If the attachment is not a *pdf or *.vcf, just be doubly careful. You might want to verify for attachments like *.doc and *ppt and *.xls and *.zip. If it is an *.exe or anything else just DO NOT click that attachment. Call the Sender.
  • 39.
  • 40. Winning Lottery and Freebies • THERE ARE NO FREE LUNCHES. PERIOD. • If you had relatives in Africa who had $50 million you would have known. Nor will a rich influential Chinese or Nigerian business may be willing to bequeath you with their $100Million wealth. • If you are not a gambler and an online lottery player, there is NO way you will win a lottery of $8 Million. • And, neither Apple, or Rolls Royce are fools to give away a 1000 iPads or 100 Cars for the first bunch of fools that Like a website link, answer a silly question or share their contact details. • Well, if Greed drives it, then this chapter is not for you!
  • 42. PHISHING EMAILS • "Phishing" (also known as "carding" or "spoofing") refers to email that attempts to fraudulently acquire personal information from you, such as your account password or credit card information. On the surface, the email may appear to be from a legitimate company or individual, but it's not. • As a general rule, never send credit card information, account passwords, or extensive personal information in an email unless you verify that the recipient is who they claim to be. Many companies have policies that state they will never solicit such information from customers by email. • Find out who the email is really from. View the email headers to see where the message really originated from. A typical email header displays several lines that begin with "Received." If the "Received from" information does not match the email address of the sender or the company being represented in the email, it usually means that the message did not truly come from that individual or company. • Be cautious of links in the email. One common phishing technique is to include links in an email that look like they go to a legitimate website. Upon closer inspection, the link may actually take you to a website that has nothing to do with the company the email is pretending to be from, even though the resulting website may be designed to look exactly the same.
  • 43. PHISHING EMAILS (CONT) • Note the email greeting. Phishing emails tend to start with generic phrases like "Dear valued customer" or your email account name, such as "Dear snookums123," instead of your name ("Dear Raghav" for example). Most legitimate companies include your name in their correspondence because companies will have it on record (if you've dealt with them before). • Keep previous history in mind: If you've had previous, valid correspondence with the company, compare those messages to the email in question. If you have never done business with a particular company, and you receive an email that appears to be from that company requesting account information, it could be an attempt at phishing. Again, never email account information or credit card information if you are in doubt. • Never provide personal account information through email. if you receive an unsolicited commercial email requesting personal information, do not provide any information without first checking directly with the company that appears to be the one requesting this information. Do not reply to the message or click any of the links in the message. Instead, visit the company's website and find an email address to contact regarding this issue, or call the company. Many companies appreciate being notified about fraudulent attempts to gain information about their customers. • Be cautious of attachments. If you receive an unsolicited message that contains an attachment, do not open it. Contact the company directly to verify the contents of the email and the attachment before opening it.
  • 45.
  • 46. tips for ATM and Internet Banking • NEVER do write ATM pins or passwords in a text file or back of ATM card. • NEVER add personal information like phone number, address on your ATM card
  • 48. tips for Antivirus • ALWAYS use the online Mail access and spam filters. The ones used by major providers like Gmail, Hotmail and Yahoo are pretty decent. • DO get a good anti-virus and spam filter.
  • 49. Spam And Spam-Filters • Email spam, also known as unsolicited bulk email (UBE), junk mail, or unsolicited commercial email (UCE), is the practice of sending unwanted email messages, frequently with commercial content, in large quantities to an indiscriminate set of recipients • Spam Filters are the best way to stop spam. • You can also unsubscribe to unwanted email lists, if you have inadvertently subscribed or had found that sender’s email useful in the past, but not anymore. • Online mail applications and most mail clients can also do help you with intelligent spam options that can get sorted into appropriate spam folders boxes or junk email folders. Since they are based on intelligence of usage, it would help if you guide these by a few actions on your desktop or web-experience. Your mobile sorting would not help these systems learn much.
  • 51.
  • 52. Account Hacking • In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network. Hackers may be motivated by a multitude of reasons, such as profit, protest, challenge, enjoyment, or to evaluate those weaknesses to assist in removing them. • When you believe your account is hacked, please contact the service provider immediately. • Share the information with a few friends or family who are technically savvy, so that they can raise an alert on your behalf.
  • 53. tips Home Wi-Fi • Wi-Fi routers at homes have usernames and passwords often handed down by service provider or the router manufacturer. Usually unknown users (free riders) gain access and use up your bandwidth. Not only does it cost you heavily in broadband bills, but it also leads to potential hacking through their connections and devices. • ALWAYS change this to a more personalised name and have a new password • ALWAYS use a new WPA2 password or equivalent and make sure you note down the same on the router lest you lose it.
  • 54. Be Aware of Filter Bubble • A filter bubble is a result of a personalized search in which a website algorithm selectively guesses what information a user would like to see based on information about the user (such as location, past click behaviour and search history) and, as a result, users become separated from information ... • http://www.goodreads.com/book/show/10596103-the-filter- bubble http://www.amazon.com/The-Filter-Bubble-Personalized- Changing/dp/0143121235
  • 55. In Summary • Passwords • Online Banking, Secure Shopping • Hoax and Rumours on Facebook, WhatsApp, SMS • Safe Browsing on Internet • Email Caution • ATM and Internet Banking • Protecting with Anti-Virus and Spam Filters • Home Wi-Fi Safety • Filter Bubble
  • 57. Some Additional References • http://www.wikipedia.org • www.google.com • www.bing.com • Securing The Human Newsletters: Securing Your New Tablet, January 2016 • Securing Your New Tablet, January 2016 • Phishing, December 2015 • Shopping Online Securely, November 2015 • Password Managers, October 2015 • Two-Step Verification, September 2015 • Backup & Recovery, August 2015 • Social Media, July 2015 • Educating Kids on Cyber Safety, June 2015 • Securing the Cyber Generation Gap, May 2015 • Passphrases, April 2015 • Gaming Online Safely & Securely, March 2015 • Staying Secure on the Road, February 2015 • Securely Using Mobile Apps, January 2015 • What Is Anti-Virus?, December 2014 • Social Engineering, November 2014 • Five Steps to Staying Secure, October 2014 • Using the Cloud Securely, September 2014 • Encryption, August 2014 • Email Do's and Don'ts, July 2014 • Disposing of Your Mobile Device, June 2014 • I’m Hacked, Now What?, May 2014 • Yes, You Actually Are a Target, April 2014 • The End of Windows XP, March 2014 • What Is Malware, February 2014 • Securing Your Home Network, January 2014
  • 58. #Crowdsourcing Contributions (Thank you) Ajit Iyer Anju Raja Anuja Singh Arati, Santhosh David D'Costa Deepika Zingade Krishnendu Laha Madhu Lakshmanan Ratnaprabha Kibe Sadha Shiv Santhanam Krishnamachari Shailendra Singh Shobha Sampath Shreya Bhagwanth Uthra Srinivasan Vivek Singh • Madhukar Shukla • Manjunath Revenasiddappa • Mukesh Rao Engla Syam • Murli Iyer • Preethi Bashyam Sriganesh • Rahul Sharma • Rajagpalan AR • Ramesh Rangan
  • 59. Glossary • A password is a word or string of characters used for user authentication to prove identity or access approval to gain access to a resource (example: an access code is a type of password), which should be kept secret from those not allowed access. • Password strength is a measure of the effectiveness of a password in resisting guessing and brute-force attacks. In its usual form, it estimates how many trials an attacker who does not have direct access to the password would need, on average, to guess it correctly. • HTTPS (also called HTTP over TLS, [1] [2] HTTP over SSL, [3] and HTTP Secure [4] [5]) is a protocol for secure communication over a computer network which is widely used on the Internet. • Two-factor authentication is a security process in which the user provides two means of identification from separate categories of credentials; one is typically a physical token, such as a card, and the other is typically something memorized, such as a security code. • A one-time password (OTP) is a password that is valid for only one login session or transaction, on a computer system or other digital device. • Check if you see a lock on the web browser address bar then you should also see that the website starts with HTTPS as opposed to HTTP in which case the page is using secure socket layer and is secure from a third party being able to see your information as it is being transmitted. • A hoax is a deliberately fabricated falsehood made to masquerade as truth. It is distinguishable from errors in observation or judgment, or rumours, urban legends, pseudoscience or April Fools' Day events that are passed along in good faith by believers or as jokes.
  • 60. GLOSSARY (2) • Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication. The word is a neologism created as a homophone of fishing due to the similarity of using fake bait in an attempt to catch a victim. • A personal identification number (PIN, pronounced "pin"; often redundantly PIN number) is a numeric password used to authenticate a user to a system, in particular in association with an ATM card. • Anti-virus software can attempt to scan for rootkits. A rootkit is a type of malware designed to gain administrative-level control over a computer system without being detected. • Email spam, also known as unsolicited bulk email (UBE), junk mail, or unsolicited commercial email (UCE), is the practice of sending unwanted email messages, frequently with commercial content, in large quantities to an indiscriminate set of recipients. • In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network. Hackers may be motivated by a multitude of reasons, such as profit, protest, challenge, enjoyment, or to evaluate those weaknesses to assist in removing them. • A filter bubble is a result of a personalized search in which a website algorithm selectively guesses what information a user would like to see based on information about the user (such as location, past click behaviour and search history) and, as a result, users become separated from information ...