SlideShare a Scribd company logo
Personal Information Management
as a tool to protect ourselves
from internet threats
Dominika Strzelec
1 rok II stopień Zarządzanie Informacją
Introduction to the topic
My thesis
How to protect our data and is it enough?
My study:
Law students vs. Computer Science students
Personal Information Management
 refers to the practice and the study of the activities people
perform in order to acquire, organize, maintain, retrieve and
use personal information items
 people should always have the right information in the
right place, in the right form, and of sufficient completeness
and quality to meet their current needs
Understanding security and
safe computing
Firewall
Virus protection
Spyware and other malware
protection
Windows Update
Using social network - useful tips:
 Privacy and security settings exist for a reason
 Once posted, always posted
 Your online reputation can be a good thing
 Keep personal info personal
 Know and manage your friends
 Know what action to take
Protect Yourself with these
STOP. THINK. CONNECT. Tips:
 Keep a clean machine
 Own your online presence
 Make passwords long and strong
 Unique account, unique password
 When in doubt, throw it out
The 25 Most Popular Passwords of 2014
1. 123456 (Unchanged)
2. password (Unchanged)
3. 12345 (Up 17)
4. 12345678 (Down 1)
5. qwerty (Down 1)
6. 123456789 (Unchanged)
7. 1234 (Up 9)
8. baseball (New)
9. dragon (New)
10. football (New)
11. 1234567 (Down 4)
12. monkey (Up 5)
13. letmein (Up 1)
14. abc123 (Down 9)
15. 111111 (Down 8)
16.mustang (New)
17. access (New)
18. shadow (Unchanged)
19. master (New)
20. michael (New)
21. superman (New)
22. 696969 (New)
23. 123123 (Down 12)
24. batman (New)
25. trustno1 (Down 1)
Move Beyond Antivirus With Symantec
https://www.youtube.com/watch?v=RMkg4wygZRQ
Did You Know? Internet Security Threat Report
2013, Volume 18
https://www.youtube.com/watch?v=183BJoXzuLw
Discussion questions:
1. Have you ever been hacked or had suspicions of a
virus on your computer?
2. Do you think you are protecting your data well/
keep your social profile private?
Thank you
for your attention
Bibliography
1. http://windows.microsoft.com/en-us/windows/understanding-
security-safe-computing#1TC=windows-7
2. https://www.staysafeonline.org/stay-safe-online/protect-your-
personal-information/social-networks
3. http://gizmodo.com/the-25-most-popular-passwords-of-2014-
were-all-doomed-1680596951
4. http://www.wikipedia.org/
Backgrounds from: usa.kaspersky.com , www.7-themes.com

More Related Content

What's hot

Cyber security
Cyber securityCyber security
Cyber security
MurugesanMurugesan12
 
NormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk BriefNormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk Brief
NormShield
 
Cybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-convertedCybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-converted
Prof .Pragati Khade
 
Cyber security
Cyber securityCyber security
Cyber security
manoj duli
 
Cyber security & awareness
Cyber security & awarenessCyber security & awareness
Cyber security & awareness
Rishab garg
 
Cybersecurity technology adoption survey
Cybersecurity technology adoption surveyCybersecurity technology adoption survey
Cybersecurity technology adoption survey
Paperjam_redaction
 
Understanding the Risk & Challenges of Cyber Security
Understanding the Risk & Challenges of Cyber SecurityUnderstanding the Risk & Challenges of Cyber Security
Understanding the Risk & Challenges of Cyber Security
Neil Parker
 
Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information security
AYESHA JAVED
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
HaniyaMaha
 
Cyber security
Cyber securityCyber security
Cyber security
Samsil Arefin
 
Cyber security
Cyber securityCyber security
Cyber security
Shivaani srinivas iyer
 
Home cyber security
Home cyber securityHome cyber security
Home cyber security
Michael File
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
RaviPrashant5
 
Cyber security
Cyber securityCyber security
Cyber security
TaimoorArshad5
 
Web Security
Web SecurityWeb Security
Web Security
Tripad M
 
Introduction to Information security
Introduction to Information securityIntroduction to Information security
Introduction to Information security
Rashad Aliyev
 
Cyber awareness program
Cyber awareness programCyber awareness program
Cyber awareness program
Avanzo net
 
Digital Security Slide Show
Digital Security Slide ShowDigital Security Slide Show
Digital Security Slide Show
zed_o07
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
ritik shukla
 

What's hot (20)

Cyber security
Cyber securityCyber security
Cyber security
 
NormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk BriefNormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk Brief
 
Cybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-convertedCybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-converted
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security & awareness
Cyber security & awarenessCyber security & awareness
Cyber security & awareness
 
Cybersecurity technology adoption survey
Cybersecurity technology adoption surveyCybersecurity technology adoption survey
Cybersecurity technology adoption survey
 
Understanding the Risk & Challenges of Cyber Security
Understanding the Risk & Challenges of Cyber SecurityUnderstanding the Risk & Challenges of Cyber Security
Understanding the Risk & Challenges of Cyber Security
 
Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information security
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Home cyber security
Home cyber securityHome cyber security
Home cyber security
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Web Security
Web SecurityWeb Security
Web Security
 
Introduction to Information security
Introduction to Information securityIntroduction to Information security
Introduction to Information security
 
Cyber awareness program
Cyber awareness programCyber awareness program
Cyber awareness program
 
Digital Security Slide Show
Digital Security Slide ShowDigital Security Slide Show
Digital Security Slide Show
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 

Viewers also liked

Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
Quick Heal Technologies Ltd.
 
Think Before You Post
Think Before You PostThink Before You Post
Think Before You Post
frostburg
 
Think before you click active Information Literacy in the classroom
Think before you click active Information Literacy in the classroomThink before you click active Information Literacy in the classroom
Think before you click active Information Literacy in the classroom
Anthony Beal
 
Think before you click
Think before you clickThink before you click
Think before you click
Erkin Polat
 
Chapter 2 program-security
Chapter 2 program-securityChapter 2 program-security
Chapter 2 program-security
Vamsee Krishna Kiran
 
Threats to a computer
Threats to a computer Threats to a computer
Threats to a computer
FCA - Future Chartered Accountants
 
Program security chapter 3
Program security chapter 3Program security chapter 3
Program security chapter 3
Education
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5
AfiqEfendy Zaen
 
Security threats
Security threatsSecurity threats
Security threats
Qamar Farooq
 
Types of Operating System
Types of Operating SystemTypes of Operating System
Types of Operating System
Sayam Asjad
 
Types Of Operating Systems
Types Of Operating SystemsTypes Of Operating Systems
Types Of Operating Systems
عطاءالمنعم اثیل شیخ
 
Lesson 4 Types Of Operating Systems
Lesson 4 Types Of Operating SystemsLesson 4 Types Of Operating Systems
Lesson 4 Types Of Operating Systems
Laguna State Polytechnic University
 
Types of os
Types of osTypes of os
Types of os
J.T.A.JONES
 
Operating system and its types
Operating system and its types Operating system and its types
Operating system and its types
vimal kumar arora
 
Types of Operating System
Types of Operating SystemTypes of Operating System
Types of Operating System
Priya Patra
 
Types of operating system
Types of operating systemTypes of operating system
Types of operating system
Jesus Obenita Jr.
 
types of operating system
types of operating systemtypes of operating system
types of operating system
Mahira Rashdi
 
Types of operating system
Types of operating systemTypes of operating system
Types of operating system
Mohammad Alam
 
Types of Operating System
Types of Operating SystemTypes of Operating System
Types of Operating System
Hemant Raj
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
Colin058
 

Viewers also liked (20)

Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 
Think Before You Post
Think Before You PostThink Before You Post
Think Before You Post
 
Think before you click active Information Literacy in the classroom
Think before you click active Information Literacy in the classroomThink before you click active Information Literacy in the classroom
Think before you click active Information Literacy in the classroom
 
Think before you click
Think before you clickThink before you click
Think before you click
 
Chapter 2 program-security
Chapter 2 program-securityChapter 2 program-security
Chapter 2 program-security
 
Threats to a computer
Threats to a computer Threats to a computer
Threats to a computer
 
Program security chapter 3
Program security chapter 3Program security chapter 3
Program security chapter 3
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5
 
Security threats
Security threatsSecurity threats
Security threats
 
Types of Operating System
Types of Operating SystemTypes of Operating System
Types of Operating System
 
Types Of Operating Systems
Types Of Operating SystemsTypes Of Operating Systems
Types Of Operating Systems
 
Lesson 4 Types Of Operating Systems
Lesson 4 Types Of Operating SystemsLesson 4 Types Of Operating Systems
Lesson 4 Types Of Operating Systems
 
Types of os
Types of osTypes of os
Types of os
 
Operating system and its types
Operating system and its types Operating system and its types
Operating system and its types
 
Types of Operating System
Types of Operating SystemTypes of Operating System
Types of Operating System
 
Types of operating system
Types of operating systemTypes of operating system
Types of operating system
 
types of operating system
types of operating systemtypes of operating system
types of operating system
 
Types of operating system
Types of operating systemTypes of operating system
Types of operating system
 
Types of Operating System
Types of Operating SystemTypes of Operating System
Types of Operating System
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 

Similar to Internet Threats

Information security
Information securityInformation security
Information security
AlaaMahmoud108
 
Practical Threat Modeling - WorldParty 2k23 HackMadrid.pdf
Practical Threat Modeling - WorldParty 2k23 HackMadrid.pdfPractical Threat Modeling - WorldParty 2k23 HackMadrid.pdf
Practical Threat Modeling - WorldParty 2k23 HackMadrid.pdf
Juan Vicente Herrera Ruiz de Alejo
 
Kaspersky 2017 Thailand Launch
Kaspersky 2017 Thailand LaunchKaspersky 2017 Thailand Launch
Kaspersky 2017 Thailand Launch
Worapol Limsiriwong (Nex)
 
Monday Keynote: Librarians in the Wild - Thinking About Security, Privacy, an...
Monday Keynote: Librarians in the Wild - Thinking About Security, Privacy, an...Monday Keynote: Librarians in the Wild - Thinking About Security, Privacy, an...
Monday Keynote: Librarians in the Wild - Thinking About Security, Privacy, an...
Electronic Resources & Libraries
 
Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning
Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine LearningTackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning
Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning
Symantec
 
Lkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & SanjayLkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & Sanjay
Quek Lilian
 
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about CybersecurityMark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
centralohioissa
 
Cyber security Guide
Cyber security GuideCyber security Guide
Cyber security Guide
Ila Group
 
Defending Against Ransomware.pdf
Defending Against Ransomware.pdfDefending Against Ransomware.pdf
Defending Against Ransomware.pdf
Jenna Murray
 
Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data Protection
MarketingArrowECS_CZ
 
Talk1 esc7 muscl-dataprotection_v1_2
Talk1 esc7 muscl-dataprotection_v1_2Talk1 esc7 muscl-dataprotection_v1_2
Talk1 esc7 muscl-dataprotection_v1_2
Sylvain Martinez
 
Security Transformation
Security TransformationSecurity Transformation
Security Transformation
Faisal Yahya
 
Data, Privacy and the Cloud: Oh my!
Data, Privacy and the Cloud: Oh my!Data, Privacy and the Cloud: Oh my!
Data, Privacy and the Cloud: Oh my!
Jason Neiffer
 
How Unisys and Dell EMC Together Head Off Backup Storage Cyber Security Vulne...
How Unisys and Dell EMC Together Head Off Backup Storage Cyber Security Vulne...How Unisys and Dell EMC Together Head Off Backup Storage Cyber Security Vulne...
How Unisys and Dell EMC Together Head Off Backup Storage Cyber Security Vulne...
Dana Gardner
 
Jan Stöver (Rubrik Germany)
Jan Stöver (Rubrik Germany)Jan Stöver (Rubrik Germany)
Jan Stöver (Rubrik Germany)
Praxistage
 
Tech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapTech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event Recap
Dominic Vogel
 
20171207 we are moving to the cloud what about security
20171207 we are moving to the cloud what about security20171207 we are moving to the cloud what about security
20171207 we are moving to the cloud what about security
Arjan Cornelissen
 
Cultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurityCultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurity
David X Martin
 
20180120 spsbre - we are moving to the cloud what about security
20180120   spsbre - we are moving to the cloud what about security20180120   spsbre - we are moving to the cloud what about security
20180120 spsbre - we are moving to the cloud what about security
Arjan Cornelissen
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
Shreedevi Tharanidharan
 

Similar to Internet Threats (20)

Information security
Information securityInformation security
Information security
 
Practical Threat Modeling - WorldParty 2k23 HackMadrid.pdf
Practical Threat Modeling - WorldParty 2k23 HackMadrid.pdfPractical Threat Modeling - WorldParty 2k23 HackMadrid.pdf
Practical Threat Modeling - WorldParty 2k23 HackMadrid.pdf
 
Kaspersky 2017 Thailand Launch
Kaspersky 2017 Thailand LaunchKaspersky 2017 Thailand Launch
Kaspersky 2017 Thailand Launch
 
Monday Keynote: Librarians in the Wild - Thinking About Security, Privacy, an...
Monday Keynote: Librarians in the Wild - Thinking About Security, Privacy, an...Monday Keynote: Librarians in the Wild - Thinking About Security, Privacy, an...
Monday Keynote: Librarians in the Wild - Thinking About Security, Privacy, an...
 
Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning
Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine LearningTackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning
Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning
 
Lkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & SanjayLkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & Sanjay
 
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about CybersecurityMark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
 
Cyber security Guide
Cyber security GuideCyber security Guide
Cyber security Guide
 
Defending Against Ransomware.pdf
Defending Against Ransomware.pdfDefending Against Ransomware.pdf
Defending Against Ransomware.pdf
 
Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data Protection
 
Talk1 esc7 muscl-dataprotection_v1_2
Talk1 esc7 muscl-dataprotection_v1_2Talk1 esc7 muscl-dataprotection_v1_2
Talk1 esc7 muscl-dataprotection_v1_2
 
Security Transformation
Security TransformationSecurity Transformation
Security Transformation
 
Data, Privacy and the Cloud: Oh my!
Data, Privacy and the Cloud: Oh my!Data, Privacy and the Cloud: Oh my!
Data, Privacy and the Cloud: Oh my!
 
How Unisys and Dell EMC Together Head Off Backup Storage Cyber Security Vulne...
How Unisys and Dell EMC Together Head Off Backup Storage Cyber Security Vulne...How Unisys and Dell EMC Together Head Off Backup Storage Cyber Security Vulne...
How Unisys and Dell EMC Together Head Off Backup Storage Cyber Security Vulne...
 
Jan Stöver (Rubrik Germany)
Jan Stöver (Rubrik Germany)Jan Stöver (Rubrik Germany)
Jan Stöver (Rubrik Germany)
 
Tech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapTech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event Recap
 
20171207 we are moving to the cloud what about security
20171207 we are moving to the cloud what about security20171207 we are moving to the cloud what about security
20171207 we are moving to the cloud what about security
 
Cultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurityCultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurity
 
20180120 spsbre - we are moving to the cloud what about security
20180120   spsbre - we are moving to the cloud what about security20180120   spsbre - we are moving to the cloud what about security
20180120 spsbre - we are moving to the cloud what about security
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 

Recently uploaded

原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
harveenkaur52
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
cuobya
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
nhiyenphan2005
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
ukwwuq
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
zoowe
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
SEO Article Boost
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
Trish Parr
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 

Recently uploaded (20)

原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 

Internet Threats

  • 1. Personal Information Management as a tool to protect ourselves from internet threats Dominika Strzelec 1 rok II stopień Zarządzanie Informacją
  • 2. Introduction to the topic My thesis How to protect our data and is it enough? My study: Law students vs. Computer Science students
  • 3. Personal Information Management  refers to the practice and the study of the activities people perform in order to acquire, organize, maintain, retrieve and use personal information items  people should always have the right information in the right place, in the right form, and of sufficient completeness and quality to meet their current needs
  • 4. Understanding security and safe computing Firewall Virus protection Spyware and other malware protection Windows Update
  • 5. Using social network - useful tips:  Privacy and security settings exist for a reason  Once posted, always posted  Your online reputation can be a good thing  Keep personal info personal  Know and manage your friends  Know what action to take
  • 6. Protect Yourself with these STOP. THINK. CONNECT. Tips:  Keep a clean machine  Own your online presence  Make passwords long and strong  Unique account, unique password  When in doubt, throw it out
  • 7. The 25 Most Popular Passwords of 2014 1. 123456 (Unchanged) 2. password (Unchanged) 3. 12345 (Up 17) 4. 12345678 (Down 1) 5. qwerty (Down 1) 6. 123456789 (Unchanged) 7. 1234 (Up 9) 8. baseball (New) 9. dragon (New) 10. football (New) 11. 1234567 (Down 4) 12. monkey (Up 5) 13. letmein (Up 1) 14. abc123 (Down 9) 15. 111111 (Down 8) 16.mustang (New) 17. access (New) 18. shadow (Unchanged) 19. master (New) 20. michael (New) 21. superman (New) 22. 696969 (New) 23. 123123 (Down 12) 24. batman (New) 25. trustno1 (Down 1)
  • 8. Move Beyond Antivirus With Symantec https://www.youtube.com/watch?v=RMkg4wygZRQ Did You Know? Internet Security Threat Report 2013, Volume 18 https://www.youtube.com/watch?v=183BJoXzuLw
  • 9. Discussion questions: 1. Have you ever been hacked or had suspicions of a virus on your computer? 2. Do you think you are protecting your data well/ keep your social profile private?
  • 10. Thank you for your attention
  • 11. Bibliography 1. http://windows.microsoft.com/en-us/windows/understanding- security-safe-computing#1TC=windows-7 2. https://www.staysafeonline.org/stay-safe-online/protect-your- personal-information/social-networks 3. http://gizmodo.com/the-25-most-popular-passwords-of-2014- were-all-doomed-1680596951 4. http://www.wikipedia.org/ Backgrounds from: usa.kaspersky.com , www.7-themes.com