SlideShare a Scribd company logo
How to manage your accounts and
yourself, in order to socialize and surf
safely on the internet.
How Safe Are You?
Most people who utilize the internet today, probably think that they are able to do so while still
maintaining their privacy. So lets take a quick little test to see if you are at risk:
1. Do you use the internet for any of the
following:
A. Posting on social media sites, blogging, etc.
B. Web browsing, shopping, newsfeeds, etc.
C. Emails/texts only
D. All of the above
2. You feel safe posting on the internet
because:
A. You have added proper privacy settings to
your accounts
B. Most of your posts are innocent in nature
C. You trust others to not post/repost things
about you
D. All of the above
3. Do you think your privacy is protected
because:
A. My computer has spyware
B. I only use secured sites
C. Laws protect your right to privacy
D. All of the above
4. You feel safe communicating through
emails and texts because:
A. I do not use these forums to conduct any
illegal activity.
B. My email site is able to protect me because
it’s a secured site.
C. I only email and text friends and family.
D. All of the above.
How Did You Do?
FACTS
• Companies today utilize your time on the internet to gather and accumulate information
about you so they can sell it to businesses.
• Companies can extract data from your smartphone to get personal information such as;
your email, where you live, your contact list and your phone number.
• Even if you are using a ‘secured site’, old operating systems can have ‘leaks’ through which
your information will find its way around.
• Privacy settings do not provide you with absolute privacy; Facebook and other social media
sites sell your information for profit.
• Once you post something on the Internet, it becomes a permanent fixture.
• Your own personal practices, may be making it easier for you to become a target.
If you were able to find a suitable answer to any of the questions on the previous tile,
then chances are you are at risk of being; scraped, mined, gathered and raked for your
data. But the good news is you are not alone.
Through social media
Surfing the
internet
Online shopping
Online gaming
Texting
EmailsWork
Blogging
Image posting
Apps
Dating sites
Banking
Data is mined from the things we do
online as part of our normal routine.
Music
• Your location
• Your address
• Your income/what you do for work
• Places you like to shop
• Your friends/family
• Your image/photo
• Your name
• Your phone number
• Your email address
• Your habits/hobbies
• Your SSN
• Your banking and medical information
• Your political/religious affiliations…..
Where Is My Info Going?
 As mentioned earlier, most companies want your information so they can make you a better, more frequent consumer
of products. Media sites such as Facebook, MySpace, Twitter, etc., sell your data to business and they in turn use this
information to determine your interests, your lifestyle and your partialities to assist with product/ad placement.
 Your work: information is used by potential employers to identify the type of individual you are external from your
resume.
 Businesses gather your information to determine if you have any impending ‘life events’; if you are getting married,
graduating, have a birthday coming….people want to know.
 The NSA (National Security Agency) uses it for surveillance; your information can be used to track you, where you have
been and where you are going.
 The NSA also wants to know what you look like, in as many different ways as is possible.
 Netflix and iTunes want to know your music and movie/TV preferences to help them know what you like so they can
inform you of potential matches.
 Your communications let others know who is in your network; your friends, family and even, friends of friends of
friends.
 Thieves want to gain access to your accounts, your personal facts and your identity.
Why are companies/people allowed to
‘steal’ my information?
First of all, we need to acknowledge that a majority of information we willingly place onto the
Internet, is not stolen, because well….we put it there. Regardless of your intention, the Internet
as a whole is not set up to protect you, its there to gather and share information; some of that
information, just happens to be yours.
• Data mining is part of our nation’s defense plan. Some information is used to
‘protect’ us.
• People assume they are safe because they are using ‘reliable’ sites on line that
indicate that they are a ‘secure’; the reality is that many sites use dated systems that
can’t protect you from information leaks.
• Another reason companies are able to steal your information is because people, as a
whole, do not do enough as consumers of the Internet product to protect themselves
from theft.
• Currently there are no laws that prohibit the practice of data mining in the USA.
• Your right to privacy, is really now your responsibility for privacy.
So…lets explore a few things we can do to protect ourselves…..from…..ourselves.
Most of us use it every day to communicate with others….but what are we really saying
and who are we saying it to?
First rule when posting on the
Internet….remember your ‘extended’ audience
Not just your friends/family have access to
your posts/information.
What/who is my extended or ‘invisible
audience?
Along comes your
friend,
who comments on
the picture,
Blah
Blah
Blah
The comment
and the picture
now goes out
to her group of
friends
One of her ‘friends’ likes the
comment, sending the image to her
group of friends.
Say you post on Facebook,
a photo of yourself on
vacation
And so
on……
Until this guy gets
it; and he now
knows your name,
your address and
that you are away
on vacation.
Your invisible audience can be a
lot of other people who aren’t
one of your ‘friends’….like, your
boss
No not this
boss…
This boss….
And he is less than
amused that your ‘illness’
is really an extended
weekend at the beach
So….before you post anything…..
Why Be So Secretive?
Its not about keeping secrets, its acknowledging that the information you give
out freely may seem to be innocent comments and pictures at first, but they
can easily be taken out of context and/or used by someone in a way you did
not intend.
Jenny is having a party?
Why wasn’t I invited?
Phat party Saturday
at Jenny’s house!
Did she just call me fat?
I thought we couldn’t hang out
Saturday because she was going
to see her mom?
I hate it when people
use outdated slang!
Mary sure does
party a lot.
The first thing people need to do when posting online is to stop and consider what it
is they are about to post and the potential current and future implications of that
post.
• Will it offend anyone?
• Will it effect my cultural currency? (How will people view my online personality? This
includes: employers, family, groups, co-workers and the invisible audience of potentially millions of
viewers)
• Do I really want this photo/text to be online forever?
• Will this post be taken in the right context? (not everyone reads the same information, the
same way)
• Am I posting out of emotion? (emotions change, but posts are forever)
• What does this post/image say about me as a person?
• What do the posts my family and friends, say about me as a person?
• Will my post allow someone else to exploit me? (through theft or slander)
Be your own best privacy setting
The fact is, you have ultimate control over what others can access, its up to you to take the proper
precautions to ensure you’re own online safety.
Have open discussions with friends and family who use social media sites. Talk about what you are
comfortable and not comfortable with posting online. Make certain they follow the don’t tag/don’t post
rule, without checking in first. Offer the same safeguard to them in return.
Here are a few more recommendations on things you should avoid posting online:
• Birthdates of friends and family- Why give away free data that helps thieves to know you better and/or steal your identity?
• Your home address- Again, free personal information that can be used for a variety of reasons.
• Your current location-People often give away their location when ‘tagging’ in at certain spots, this will only attract thieves
Risky photos of yourself- Sure you are adorable when you are drunk standing in a fountain, but your boss might not think
so, or a potential employer. Remember, you are creating an image of yourself for others to see, make it a good one.
• Pictures of children- Photos often get passed around on the internet without thought. Posting pictures of children can
present them as potential targets for those who might do them harm
• If you are going away for vacation/event- this tells thieves the best time to strike
• The layout of your home- This can also make you a bigger target for theft, people can see not only what you own, but the
best way into your home
• Complaints about work/boss- Yes, your boss is probably a jerk but don’t let him know you think that, unless you want
another job.
• Political or religious preference- Good advice at a party as well. Hot topics online create a lot of attention and can result
in strong debate, not always having a positive affect.
• Profanity- Sure people do it all the time, but words vanish…when you post it, you make your language immortal and they
become a reflection of you.
Privacy Settings
If you are going to use social media, aside from self monitoring, using privacy settings can help
you to narrow your invisible audience (people you don’t know, who have access to your page)
Remember that the messaging systems on social media, can also be scraped for information.
Here are a few links to get you started on your way:
• http://www.facebook.com/help/445588775451827
• https://twitter.com/privacy
• http://www.techlicious.com/guide/the-guide-to-facebook-privacy-settings-2013/
• http://www.cio.com/article/2413757/social-media/5-linkedin-privacy-settings-you-need-to-
know.html
• http://www.ehow.com/how_2303697_change-settings-myspace.html
Just remember that these settings will not provide 100% protection; in the world of
social media, there is no such thing!!!
Other Ways We Can Protect Ourselves
We also provide a lot of free information and access while using the Internet for other
aspects of our lives. Whether its; banking, surfing, shopping or sending an email to a
friend, without protection, our personal information is at risk of being stolen.
How many of us:
 Use the same user names and passwords on multiple accounts?
 Give intuitive answers to security questions such as; What is your mothers
maiden name? In what city were you born? (Easy information to find
online)
 Have weak passwords? (123456 or birth dates)
 Don’t change your passwords frequently? (or at all)
 Click on email links even if you’re not certain of the content of the link?
 Keep critical information on your computer without protecting it?
 Trust sites to maintain/hold personal information? (Online storage)
All of these practices provide an open door for those wishing to get personal
information from you. Whether they are trying to sell you something or take
something; we often leave a key out to make it easy for them to come right
in.
Encrypting Your Life
When we first start talking about encryption, people might
instantly start thinking of espionage, as in:
What do I have that’s worth stealing?
Your personal identity and your privacy are the biggest thing you have
to lose.
For this reason it is important to:
 Encrypt the data you store on your computer
 Encrypt your smart phone data
 Encrypt your online data storage/iCloud
 Encrypt your data transmissions
 Encrypt your browser
 Encrypt your email
First thing to remember,
encryption is a two way street
In order for your encryptions to work, you need the receiver/sender to also
be using these techniques. How encryption works:
Encrypting your
hard drive:
These products help to keep the data you
store on your computer safe.
• FileVault-
– http://filevaultusa.com
• BitLocker
– http://windows.microsoft.com/en
-
US/windows7/products/features/
bitlocker
Encrypting your
Smartphone:
Unfortunately there are limited programs to
Encrypt smartphones, but here are some sites to
help you make it harder for others to steal your
information.
• http://www.wired.com/2013/10/keep-your-
smartphone-locked/
• http://www.makeuseof.com/tag/how-to-
encrypt-data-on-your-smartphone/
Saphos is an App for your Android Phone that can
assist you in protection-
• https://play.google.com/store/apps/details?id
=com.sophos.smsec&hl=en_GB
Encrypt the
information on
your cloud:
Many people forget about the data
they have stored in data banks like
the iCloud. This program will help
to protect that information.
• Spider Oak
– https://spideroak.com
Encrypt your texts
and messages:
Texts and the messages you send through messaging systems
on your computer, can also be scraped. Protect your right to
chat with these links.
TEXTING:
iPhone-
• Silent Circle -https://silentcircle.com
• Wickr -https://www.mywickr.com
Android-
• Text Secure-
https://securityinabox.org/en/textsecure_main
MESSAGING:
Macs –
• Aduim -https://adium.im
Windows-
• Pidgin -http://pidgin.im
Emails have replaced a majority of our written correspondence
(with the exception of texts). They also can contain a lot of
private information that we might not wish to share openly.
Here are some of the encryption tools that can be used to
secure your emails:
• GPG Tools- https://gpgtools.org
• Enigmail- https://www.enigmail.net/home/index.php
• GNU Privacy Guards- https://www.gnupg.org
To protect Emails on your Smartphone:
• Mailvelope- https://mailvelope.com
If you are going to post things on the internet, remember that they have
sustainability and searchability: meaning that they are going to be there for
a very long time and people can find it if they look.
There are tools available to help you to protect yourself; use them and make
sure the people you are corresponding with, use them too.
Be part of your own defense: Talk to friends and family, let them know what
you do not want posted in open forums. Explain the risk and ask that they
respect your choice to keep some things private.
Conduct yourself as you wish to be viewed by a variety of people; friendly,
professional and otherwise.
There is no such thing as absolute privacy when using the internet. Everyday
new products are being developed to grab up your information. Your best
protection is being an active part in your own security.
Today’s Information Was Stolen
From
Site Reference:
• http://www.postplanner.com/9-things-you-should-never-share-on-facebook/
• http://www.citifmonline.com/2014/04/02/5-things-you-should-never-post-on-facebook/
• http://www.theatlantic.com/technology/archive/2012/04/everything-you-wanted-to-know-about-
data-mining-but-were-afraid-to-ask/255388/
• http://blog.sgrouples.com/delete-your-private-information-people-search-databases/
• http://www.websitedatascraping.com
• http://www.poynter.org/how-tos/digital-strategies/e-media-tidbits/102589/how-to-scrape-
websites-for-data-without-programming-skills/
• http://www.propublica.org/article/privacy-tools-encrypt-what-you-can
• http://journalistsresource.org/skills/research/chat-peter-singer-brookings-cybersecurity-
media?utm_source=JR-email&utm_medium=email&utm_campaign=JR-email

More Related Content

What's hot

Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
Erica Reid
 
Social Media Tips In A Non-Deletable World
Social Media Tips In A Non-Deletable WorldSocial Media Tips In A Non-Deletable World
Social Media Tips In A Non-Deletable WorldTricia Lawrence
 
Responsible social media usage
Responsible social media usageResponsible social media usage
Responsible social media usage
demiboyazis
 
Facebook101 personal usage for GCSC Education Encore Course
Facebook101 personal usage for GCSC Education Encore CourseFacebook101 personal usage for GCSC Education Encore Course
Facebook101 personal usage for GCSC Education Encore Course
Kristi Kirkland
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
DonikaLici
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingst josephs
 
Social media parent night
Social media parent nightSocial media parent night
Social media parent night
Jenny Jongste
 
Social media etiquette
Social media etiquetteSocial media etiquette
Social media etiquette
Mahershi ACT
 
Social Media Etiquette Presentation
Social Media Etiquette PresentationSocial Media Etiquette Presentation
Social Media Etiquette Presentation
tkay1017
 
Pinterest for Beginners
Pinterest for BeginnersPinterest for Beginners
Pinterest for Beginners
Social Status
 
How to Ruin Your Life with Your Online
How to Ruin Your Life with Your OnlineHow to Ruin Your Life with Your Online
How to Ruin Your Life with Your Online
Michael Carnell
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
sharon7111
 
MySpace, Facebook and Other Social Network Sites
MySpace, Facebook and Other Social Network SitesMySpace, Facebook and Other Social Network Sites
MySpace, Facebook and Other Social Network SitesTechnoArmor Consulting
 
Pinterest tos presentation (final)
Pinterest tos presentation (final)Pinterest tos presentation (final)
Pinterest tos presentation (final)
13323606
 
Blake Morgan's SEO brand seminar - reputational risk
Blake Morgan's SEO brand seminar - reputational riskBlake Morgan's SEO brand seminar - reputational risk
Blake Morgan's SEO brand seminar - reputational risk
Blake Morgan LLP
 
Using Skype, Facebook, and email to communicate with family and friends
Using Skype, Facebook, and email to communicate with family and friendsUsing Skype, Facebook, and email to communicate with family and friends
Using Skype, Facebook, and email to communicate with family and friends
Social Status
 

What's hot (19)

Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Social Media Tips In A Non-Deletable World
Social Media Tips In A Non-Deletable WorldSocial Media Tips In A Non-Deletable World
Social Media Tips In A Non-Deletable World
 
Responsible social media usage
Responsible social media usageResponsible social media usage
Responsible social media usage
 
Facebook101 personal usage for GCSC Education Encore Course
Facebook101 personal usage for GCSC Education Encore CourseFacebook101 personal usage for GCSC Education Encore Course
Facebook101 personal usage for GCSC Education Encore Course
 
Test
TestTest
Test
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Social media parent night
Social media parent nightSocial media parent night
Social media parent night
 
Social media etiquette
Social media etiquetteSocial media etiquette
Social media etiquette
 
Social media etiquette
Social media etiquetteSocial media etiquette
Social media etiquette
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Social Media Etiquette Presentation
Social Media Etiquette PresentationSocial Media Etiquette Presentation
Social Media Etiquette Presentation
 
Pinterest for Beginners
Pinterest for BeginnersPinterest for Beginners
Pinterest for Beginners
 
How to Ruin Your Life with Your Online
How to Ruin Your Life with Your OnlineHow to Ruin Your Life with Your Online
How to Ruin Your Life with Your Online
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
MySpace, Facebook and Other Social Network Sites
MySpace, Facebook and Other Social Network SitesMySpace, Facebook and Other Social Network Sites
MySpace, Facebook and Other Social Network Sites
 
Pinterest tos presentation (final)
Pinterest tos presentation (final)Pinterest tos presentation (final)
Pinterest tos presentation (final)
 
Blake Morgan's SEO brand seminar - reputational risk
Blake Morgan's SEO brand seminar - reputational riskBlake Morgan's SEO brand seminar - reputational risk
Blake Morgan's SEO brand seminar - reputational risk
 
Using Skype, Facebook, and email to communicate with family and friends
Using Skype, Facebook, and email to communicate with family and friendsUsing Skype, Facebook, and email to communicate with family and friends
Using Skype, Facebook, and email to communicate with family and friends
 

Similar to Internet safety guide

2.1 social media awareness
2.1 social media awareness2.1 social media awareness
2.1 social media awareness
MentorIT
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
Karan Veer Singh
 
Student book key unit3
Student book key unit3Student book key unit3
Student book key unit3
jesusmlaz
 
digital-footprint.pptx
digital-footprint.pptxdigital-footprint.pptx
digital-footprint.pptx
Catherine Seo
 
What Parents need to know about social media in 2014
What Parents need to know about social media in 2014What Parents need to know about social media in 2014
What Parents need to know about social media in 2014
Pepper It Marketing ~ Time on Task Virtual Assistant Services
 
ECSM 2021 - Sfaturi pentru a te proteja în mediul online
ECSM 2021 - Sfaturi pentru a te proteja în mediul online ECSM 2021 - Sfaturi pentru a te proteja în mediul online
ECSM 2021 - Sfaturi pentru a te proteja în mediul online
One-IT
 
Your Digital Footprint
Your Digital FootprintYour Digital Footprint
Your Digital FootprintMike Fisher
 
April27 dyc
April27 dycApril27 dyc
April27 dyc
Alex Wills
 
Using Social Media Professionally
Using Social Media ProfessionallyUsing Social Media Professionally
Using Social Media Professionally
Allison Carr Waechter
 
Safely Traveling the Web 2015
Safely Traveling the Web 2015Safely Traveling the Web 2015
Safely Traveling the Web 2015
Staci Trekles
 
Social Media and Law Schools
Social Media and Law Schools Social Media and Law Schools
Social Media and Law Schools
Michele Pistone
 
Cyber bullying by National Republican Guard
Cyber bullying by National Republican GuardCyber bullying by National Republican Guard
Cyber bullying by National Republican Guard
Apostolos Syropoulos
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...
Justin Denton
 
Social Media Marketing Boost.pdf
Social Media Marketing Boost.pdfSocial Media Marketing Boost.pdf
Social Media Marketing Boost.pdf
home
 
Digital Media in Our Lives
Digital Media in Our LivesDigital Media in Our Lives
Digital Media in Our Lives
Sarah Granger
 
Heads up!
Heads up!Heads up!
How to Succeed in Social Media... For College Students
How to Succeed in Social Media... For College StudentsHow to Succeed in Social Media... For College Students
How to Succeed in Social Media... For College Students
Logan Boggs
 

Similar to Internet safety guide (20)

2.1 social media awareness
2.1 social media awareness2.1 social media awareness
2.1 social media awareness
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
Student book key unit3
Student book key unit3Student book key unit3
Student book key unit3
 
digital-footprint.pptx
digital-footprint.pptxdigital-footprint.pptx
digital-footprint.pptx
 
What Parents need to know about social media in 2014
What Parents need to know about social media in 2014What Parents need to know about social media in 2014
What Parents need to know about social media in 2014
 
ECSM 2021 - Sfaturi pentru a te proteja în mediul online
ECSM 2021 - Sfaturi pentru a te proteja în mediul online ECSM 2021 - Sfaturi pentru a te proteja în mediul online
ECSM 2021 - Sfaturi pentru a te proteja în mediul online
 
Your Digital Footprint
Your Digital FootprintYour Digital Footprint
Your Digital Footprint
 
April27 dyc
April27 dycApril27 dyc
April27 dyc
 
Using Social Media Professionally
Using Social Media ProfessionallyUsing Social Media Professionally
Using Social Media Professionally
 
Safely Traveling the Web 2015
Safely Traveling the Web 2015Safely Traveling the Web 2015
Safely Traveling the Web 2015
 
Social Media and Law Schools
Social Media and Law Schools Social Media and Law Schools
Social Media and Law Schools
 
Cyber bullying by National Republican Guard
Cyber bullying by National Republican GuardCyber bullying by National Republican Guard
Cyber bullying by National Republican Guard
 
Project
ProjectProject
Project
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...
 
Social Media Marketing Boost.pdf
Social Media Marketing Boost.pdfSocial Media Marketing Boost.pdf
Social Media Marketing Boost.pdf
 
Digital Media in Our Lives
Digital Media in Our LivesDigital Media in Our Lives
Digital Media in Our Lives
 
Heads up!
Heads up!Heads up!
Heads up!
 
How to Succeed in Social Media... For College Students
How to Succeed in Social Media... For College StudentsHow to Succeed in Social Media... For College Students
How to Succeed in Social Media... For College Students
 
10things
10things10things
10things
 
Socialmediatips
SocialmediatipsSocialmediatips
Socialmediatips
 

Recently uploaded

Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 

Recently uploaded (20)

Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 

Internet safety guide

  • 1. How to manage your accounts and yourself, in order to socialize and surf safely on the internet.
  • 2. How Safe Are You? Most people who utilize the internet today, probably think that they are able to do so while still maintaining their privacy. So lets take a quick little test to see if you are at risk: 1. Do you use the internet for any of the following: A. Posting on social media sites, blogging, etc. B. Web browsing, shopping, newsfeeds, etc. C. Emails/texts only D. All of the above 2. You feel safe posting on the internet because: A. You have added proper privacy settings to your accounts B. Most of your posts are innocent in nature C. You trust others to not post/repost things about you D. All of the above 3. Do you think your privacy is protected because: A. My computer has spyware B. I only use secured sites C. Laws protect your right to privacy D. All of the above 4. You feel safe communicating through emails and texts because: A. I do not use these forums to conduct any illegal activity. B. My email site is able to protect me because it’s a secured site. C. I only email and text friends and family. D. All of the above.
  • 3. How Did You Do? FACTS • Companies today utilize your time on the internet to gather and accumulate information about you so they can sell it to businesses. • Companies can extract data from your smartphone to get personal information such as; your email, where you live, your contact list and your phone number. • Even if you are using a ‘secured site’, old operating systems can have ‘leaks’ through which your information will find its way around. • Privacy settings do not provide you with absolute privacy; Facebook and other social media sites sell your information for profit. • Once you post something on the Internet, it becomes a permanent fixture. • Your own personal practices, may be making it easier for you to become a target. If you were able to find a suitable answer to any of the questions on the previous tile, then chances are you are at risk of being; scraped, mined, gathered and raked for your data. But the good news is you are not alone.
  • 4. Through social media Surfing the internet Online shopping Online gaming Texting EmailsWork Blogging Image posting Apps Dating sites Banking Data is mined from the things we do online as part of our normal routine. Music
  • 5. • Your location • Your address • Your income/what you do for work • Places you like to shop • Your friends/family • Your image/photo • Your name • Your phone number • Your email address • Your habits/hobbies • Your SSN • Your banking and medical information • Your political/religious affiliations…..
  • 6. Where Is My Info Going?  As mentioned earlier, most companies want your information so they can make you a better, more frequent consumer of products. Media sites such as Facebook, MySpace, Twitter, etc., sell your data to business and they in turn use this information to determine your interests, your lifestyle and your partialities to assist with product/ad placement.  Your work: information is used by potential employers to identify the type of individual you are external from your resume.  Businesses gather your information to determine if you have any impending ‘life events’; if you are getting married, graduating, have a birthday coming….people want to know.  The NSA (National Security Agency) uses it for surveillance; your information can be used to track you, where you have been and where you are going.  The NSA also wants to know what you look like, in as many different ways as is possible.  Netflix and iTunes want to know your music and movie/TV preferences to help them know what you like so they can inform you of potential matches.  Your communications let others know who is in your network; your friends, family and even, friends of friends of friends.  Thieves want to gain access to your accounts, your personal facts and your identity.
  • 7. Why are companies/people allowed to ‘steal’ my information? First of all, we need to acknowledge that a majority of information we willingly place onto the Internet, is not stolen, because well….we put it there. Regardless of your intention, the Internet as a whole is not set up to protect you, its there to gather and share information; some of that information, just happens to be yours. • Data mining is part of our nation’s defense plan. Some information is used to ‘protect’ us. • People assume they are safe because they are using ‘reliable’ sites on line that indicate that they are a ‘secure’; the reality is that many sites use dated systems that can’t protect you from information leaks. • Another reason companies are able to steal your information is because people, as a whole, do not do enough as consumers of the Internet product to protect themselves from theft. • Currently there are no laws that prohibit the practice of data mining in the USA. • Your right to privacy, is really now your responsibility for privacy. So…lets explore a few things we can do to protect ourselves…..from…..ourselves.
  • 8. Most of us use it every day to communicate with others….but what are we really saying and who are we saying it to?
  • 9. First rule when posting on the Internet….remember your ‘extended’ audience
  • 10. Not just your friends/family have access to your posts/information. What/who is my extended or ‘invisible audience? Along comes your friend, who comments on the picture, Blah Blah Blah The comment and the picture now goes out to her group of friends One of her ‘friends’ likes the comment, sending the image to her group of friends. Say you post on Facebook, a photo of yourself on vacation And so on…… Until this guy gets it; and he now knows your name, your address and that you are away on vacation.
  • 11. Your invisible audience can be a lot of other people who aren’t one of your ‘friends’….like, your boss No not this boss… This boss…. And he is less than amused that your ‘illness’ is really an extended weekend at the beach So….before you post anything…..
  • 12. Why Be So Secretive? Its not about keeping secrets, its acknowledging that the information you give out freely may seem to be innocent comments and pictures at first, but they can easily be taken out of context and/or used by someone in a way you did not intend. Jenny is having a party? Why wasn’t I invited? Phat party Saturday at Jenny’s house! Did she just call me fat? I thought we couldn’t hang out Saturday because she was going to see her mom? I hate it when people use outdated slang! Mary sure does party a lot.
  • 13. The first thing people need to do when posting online is to stop and consider what it is they are about to post and the potential current and future implications of that post. • Will it offend anyone? • Will it effect my cultural currency? (How will people view my online personality? This includes: employers, family, groups, co-workers and the invisible audience of potentially millions of viewers) • Do I really want this photo/text to be online forever? • Will this post be taken in the right context? (not everyone reads the same information, the same way) • Am I posting out of emotion? (emotions change, but posts are forever) • What does this post/image say about me as a person? • What do the posts my family and friends, say about me as a person? • Will my post allow someone else to exploit me? (through theft or slander)
  • 14. Be your own best privacy setting The fact is, you have ultimate control over what others can access, its up to you to take the proper precautions to ensure you’re own online safety. Have open discussions with friends and family who use social media sites. Talk about what you are comfortable and not comfortable with posting online. Make certain they follow the don’t tag/don’t post rule, without checking in first. Offer the same safeguard to them in return. Here are a few more recommendations on things you should avoid posting online: • Birthdates of friends and family- Why give away free data that helps thieves to know you better and/or steal your identity? • Your home address- Again, free personal information that can be used for a variety of reasons. • Your current location-People often give away their location when ‘tagging’ in at certain spots, this will only attract thieves Risky photos of yourself- Sure you are adorable when you are drunk standing in a fountain, but your boss might not think so, or a potential employer. Remember, you are creating an image of yourself for others to see, make it a good one. • Pictures of children- Photos often get passed around on the internet without thought. Posting pictures of children can present them as potential targets for those who might do them harm • If you are going away for vacation/event- this tells thieves the best time to strike • The layout of your home- This can also make you a bigger target for theft, people can see not only what you own, but the best way into your home • Complaints about work/boss- Yes, your boss is probably a jerk but don’t let him know you think that, unless you want another job. • Political or religious preference- Good advice at a party as well. Hot topics online create a lot of attention and can result in strong debate, not always having a positive affect. • Profanity- Sure people do it all the time, but words vanish…when you post it, you make your language immortal and they become a reflection of you.
  • 15. Privacy Settings If you are going to use social media, aside from self monitoring, using privacy settings can help you to narrow your invisible audience (people you don’t know, who have access to your page) Remember that the messaging systems on social media, can also be scraped for information. Here are a few links to get you started on your way: • http://www.facebook.com/help/445588775451827 • https://twitter.com/privacy • http://www.techlicious.com/guide/the-guide-to-facebook-privacy-settings-2013/ • http://www.cio.com/article/2413757/social-media/5-linkedin-privacy-settings-you-need-to- know.html • http://www.ehow.com/how_2303697_change-settings-myspace.html Just remember that these settings will not provide 100% protection; in the world of social media, there is no such thing!!!
  • 16. Other Ways We Can Protect Ourselves We also provide a lot of free information and access while using the Internet for other aspects of our lives. Whether its; banking, surfing, shopping or sending an email to a friend, without protection, our personal information is at risk of being stolen.
  • 17.
  • 18. How many of us:  Use the same user names and passwords on multiple accounts?  Give intuitive answers to security questions such as; What is your mothers maiden name? In what city were you born? (Easy information to find online)  Have weak passwords? (123456 or birth dates)  Don’t change your passwords frequently? (or at all)  Click on email links even if you’re not certain of the content of the link?  Keep critical information on your computer without protecting it?  Trust sites to maintain/hold personal information? (Online storage) All of these practices provide an open door for those wishing to get personal information from you. Whether they are trying to sell you something or take something; we often leave a key out to make it easy for them to come right in.
  • 20. When we first start talking about encryption, people might instantly start thinking of espionage, as in: What do I have that’s worth stealing? Your personal identity and your privacy are the biggest thing you have to lose. For this reason it is important to:  Encrypt the data you store on your computer  Encrypt your smart phone data  Encrypt your online data storage/iCloud  Encrypt your data transmissions  Encrypt your browser  Encrypt your email
  • 21. First thing to remember, encryption is a two way street In order for your encryptions to work, you need the receiver/sender to also be using these techniques. How encryption works:
  • 22. Encrypting your hard drive: These products help to keep the data you store on your computer safe. • FileVault- – http://filevaultusa.com • BitLocker – http://windows.microsoft.com/en - US/windows7/products/features/ bitlocker Encrypting your Smartphone: Unfortunately there are limited programs to Encrypt smartphones, but here are some sites to help you make it harder for others to steal your information. • http://www.wired.com/2013/10/keep-your- smartphone-locked/ • http://www.makeuseof.com/tag/how-to- encrypt-data-on-your-smartphone/ Saphos is an App for your Android Phone that can assist you in protection- • https://play.google.com/store/apps/details?id =com.sophos.smsec&hl=en_GB
  • 23. Encrypt the information on your cloud: Many people forget about the data they have stored in data banks like the iCloud. This program will help to protect that information. • Spider Oak – https://spideroak.com Encrypt your texts and messages: Texts and the messages you send through messaging systems on your computer, can also be scraped. Protect your right to chat with these links. TEXTING: iPhone- • Silent Circle -https://silentcircle.com • Wickr -https://www.mywickr.com Android- • Text Secure- https://securityinabox.org/en/textsecure_main MESSAGING: Macs – • Aduim -https://adium.im Windows- • Pidgin -http://pidgin.im
  • 24. Emails have replaced a majority of our written correspondence (with the exception of texts). They also can contain a lot of private information that we might not wish to share openly. Here are some of the encryption tools that can be used to secure your emails: • GPG Tools- https://gpgtools.org • Enigmail- https://www.enigmail.net/home/index.php • GNU Privacy Guards- https://www.gnupg.org To protect Emails on your Smartphone: • Mailvelope- https://mailvelope.com
  • 25. If you are going to post things on the internet, remember that they have sustainability and searchability: meaning that they are going to be there for a very long time and people can find it if they look. There are tools available to help you to protect yourself; use them and make sure the people you are corresponding with, use them too. Be part of your own defense: Talk to friends and family, let them know what you do not want posted in open forums. Explain the risk and ask that they respect your choice to keep some things private. Conduct yourself as you wish to be viewed by a variety of people; friendly, professional and otherwise. There is no such thing as absolute privacy when using the internet. Everyday new products are being developed to grab up your information. Your best protection is being an active part in your own security.
  • 26. Today’s Information Was Stolen From Site Reference: • http://www.postplanner.com/9-things-you-should-never-share-on-facebook/ • http://www.citifmonline.com/2014/04/02/5-things-you-should-never-post-on-facebook/ • http://www.theatlantic.com/technology/archive/2012/04/everything-you-wanted-to-know-about- data-mining-but-were-afraid-to-ask/255388/ • http://blog.sgrouples.com/delete-your-private-information-people-search-databases/ • http://www.websitedatascraping.com • http://www.poynter.org/how-tos/digital-strategies/e-media-tidbits/102589/how-to-scrape- websites-for-data-without-programming-skills/ • http://www.propublica.org/article/privacy-tools-encrypt-what-you-can • http://journalistsresource.org/skills/research/chat-peter-singer-brookings-cybersecurity- media?utm_source=JR-email&utm_medium=email&utm_campaign=JR-email

Editor's Notes

  1. http://www.visioncritical.com/blog/sharers-and-lurkers-your-invisible-social-media-audience