SlideShare a Scribd company logo
Online Protection Plan
   By: Audrey Adair Krouse
PHYSICAL DANGERS
Sources of physical danger:
  Strangers with malicious intentions
  Buglers
  Strangers
SOURCES OF LOCATION
         COMPROMISE
GPS Receivers
  TomTom, Garmin, etc.
Cellphones
Facebook, Twitter, Google+
Foursquare
Instant Messaging
WAYS TO PROTECT YOUR
  LOCATION INFORMATION
Turn off location sharing in the settings
 of your cellular device
Do not make resumes public on job sites
Do not post personal information on
 social websites
Do not share this type of information
 with strangers online or in person
Do not use location apps such as
 Foursquare
FINANCIAL DANGERS
Information to Protect:
  DOB
  Address
  Full name
  Social Security Number
  Bank account numbers
  Credit card numbers
SOURCES OF FINANCIAL
        COMPROMISE
Phishing Emails
Spoofed Websites
Viruses/Spyware
  Keyloggers
  Trojans
Personal information posted on social
 networks
Data breaches
Stolen laptop, computer, or phone
WAYS TO PROTECT YOUR
    FINANCIAL INFORMATION
Password protect your computer, cellular, and
 portable devices
Use strong, unique passwords
  At least 8 characters
      More is better
  At least 1-Lowercase, 1-Uppercase, 1-
   Number, and 1-Symbol
Check validity of websites used to make
 purchases
  HTTPS
  Correct URL
  BBB
EMOTIONAL DANGERS
Stress from bad credit
  Repair process
  Not being able to get a loan
  Pay higher percentages on loans
Feel insecure
SOURCES OF
      EMOTIONAL DISTRESS
Bad Credit
Being attacked
Restoring your identity
Fixing your computer
PROTECTION FROM
      EMOTIONAL DANGERS
Protect your location information
Protect your financial information
Protect your personal information
Monitor your credit scores at least once a
 year

More Related Content

Viewers also liked

Rashomon Final Essay
Rashomon Final EssayRashomon Final Essay
Rashomon Final Essayklowe4156
 
Reunión inicio curso
Reunión inicio cursoReunión inicio curso
Reunión inicio cursoMaria Larruy
 
Video presentation powerpoint
Video presentation powerpointVideo presentation powerpoint
Video presentation powerpointklowe4156
 
comunicato ufficiale n 9
comunicato ufficiale n 9 comunicato ufficiale n 9
comunicato ufficiale n 9 Gabriele Coliva
 
Presentaciocomercial erre english
Presentaciocomercial erre englishPresentaciocomercial erre english
Presentaciocomercial erre englishErre de Vic, 1952
 
Presentation media langauge
Presentation media langaugePresentation media langauge
Presentation media langaugewbello94
 
Final presentation script
Final presentation scriptFinal presentation script
Final presentation scriptklowe4156
 
Painting Reflection
Painting ReflectionPainting Reflection
Painting Reflectionklowe4156
 
Expo.estimulacion temprana
Expo.estimulacion tempranaExpo.estimulacion temprana
Expo.estimulacion temprana
Lorena Luzuriaga
 
Slavery Research Paper
Slavery Research PaperSlavery Research Paper
Slavery Research Paperklowe4156
 
Calendario
CalendarioCalendario
Calendario
Gabriele Coliva
 

Viewers also liked (13)

Rashomon Final Essay
Rashomon Final EssayRashomon Final Essay
Rashomon Final Essay
 
Tmc rebranding
Tmc rebranding Tmc rebranding
Tmc rebranding
 
Reunión inicio curso
Reunión inicio cursoReunión inicio curso
Reunión inicio curso
 
Video presentation powerpoint
Video presentation powerpointVideo presentation powerpoint
Video presentation powerpoint
 
comunicato ufficiale n 9
comunicato ufficiale n 9 comunicato ufficiale n 9
comunicato ufficiale n 9
 
Presentaciocomercial erre english
Presentaciocomercial erre englishPresentaciocomercial erre english
Presentaciocomercial erre english
 
Presentation media langauge
Presentation media langaugePresentation media langauge
Presentation media langauge
 
Final presentation script
Final presentation scriptFinal presentation script
Final presentation script
 
Pancreatitis
Pancreatitis Pancreatitis
Pancreatitis
 
Painting Reflection
Painting ReflectionPainting Reflection
Painting Reflection
 
Expo.estimulacion temprana
Expo.estimulacion tempranaExpo.estimulacion temprana
Expo.estimulacion temprana
 
Slavery Research Paper
Slavery Research PaperSlavery Research Paper
Slavery Research Paper
 
Calendario
CalendarioCalendario
Calendario
 

Similar to Online Protection Plan

Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
mohmd-kutbi
 
Email Security Awareness
Email Security AwarenessEmail Security Awareness
Email Security Awareness
Dale Rapp
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
Gihan Dias
 
Protecting Your Identity Online
Protecting Your Identity OnlineProtecting Your Identity Online
Protecting Your Identity Online
Jon Loyd
 
Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008
FinancialCenter
 
Id Theft
Id TheftId Theft
Id Theft
mojo_5
 
internet_security_and_identity_theft.ppt
internet_security_and_identity_theft.pptinternet_security_and_identity_theft.ppt
internet_security_and_identity_theft.ppt
akhilraj817280
 
ISDD - Security Risks
ISDD - Security RisksISDD - Security Risks
ISDD - Security Risks
Forrester High School
 
Identity theft
Identity theftIdentity theft
Identity theft
bhabagrahi dash
 
Lock It Down, Keep It Safe
Lock It Down, Keep It SafeLock It Down, Keep It Safe
Lock It Down, Keep It Safe
aaberra
 
Online Security & Privacy: Updated
Online Security & Privacy: UpdatedOnline Security & Privacy: Updated
Online Security & Privacy: Updated
Amanda L. Goodman
 
Online Fraud and Identity Theft: Transact Safely - Symantec Corp.
Online Fraud and Identity Theft: Transact Safely - Symantec Corp. Online Fraud and Identity Theft: Transact Safely - Symantec Corp.
Online Fraud and Identity Theft: Transact Safely - Symantec Corp.
mariotoronto
 
Phishing
PhishingPhishing
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
Achu69
 

Similar to Online Protection Plan (20)

Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
 
Email Security Awareness
Email Security AwarenessEmail Security Awareness
Email Security Awareness
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
 
Protecting Your Identity Online
Protecting Your Identity OnlineProtecting Your Identity Online
Protecting Your Identity Online
 
Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Per.fin.7.03 p ptb
Per.fin.7.03 p ptbPer.fin.7.03 p ptb
Per.fin.7.03 p ptb
 
Id Theft
Id TheftId Theft
Id Theft
 
internet_security_and_identity_theft.ppt
internet_security_and_identity_theft.pptinternet_security_and_identity_theft.ppt
internet_security_and_identity_theft.ppt
 
ISDD - Security Risks
ISDD - Security RisksISDD - Security Risks
ISDD - Security Risks
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Lock It Down, Keep It Safe
Lock It Down, Keep It SafeLock It Down, Keep It Safe
Lock It Down, Keep It Safe
 
Aimee on cyber safety
Aimee on cyber safetyAimee on cyber safety
Aimee on cyber safety
 
Online Security & Privacy: Updated
Online Security & Privacy: UpdatedOnline Security & Privacy: Updated
Online Security & Privacy: Updated
 
Jake on cybersafety
Jake on cybersafetyJake on cybersafety
Jake on cybersafety
 
Online Fraud and Identity Theft: Transact Safely - Symantec Corp.
Online Fraud and Identity Theft: Transact Safely - Symantec Corp. Online Fraud and Identity Theft: Transact Safely - Symantec Corp.
Online Fraud and Identity Theft: Transact Safely - Symantec Corp.
 
Computer 4 ict
Computer 4 ictComputer 4 ict
Computer 4 ict
 
Phishing
PhishingPhishing
Phishing
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 

Recently uploaded

Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 

Recently uploaded (20)

Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 

Online Protection Plan

  • 1. Online Protection Plan By: Audrey Adair Krouse
  • 2. PHYSICAL DANGERS Sources of physical danger: Strangers with malicious intentions Buglers Strangers
  • 3. SOURCES OF LOCATION COMPROMISE GPS Receivers TomTom, Garmin, etc. Cellphones Facebook, Twitter, Google+ Foursquare Instant Messaging
  • 4. WAYS TO PROTECT YOUR LOCATION INFORMATION Turn off location sharing in the settings of your cellular device Do not make resumes public on job sites Do not post personal information on social websites Do not share this type of information with strangers online or in person Do not use location apps such as Foursquare
  • 5. FINANCIAL DANGERS Information to Protect: DOB Address Full name Social Security Number Bank account numbers Credit card numbers
  • 6. SOURCES OF FINANCIAL COMPROMISE Phishing Emails Spoofed Websites Viruses/Spyware Keyloggers Trojans Personal information posted on social networks Data breaches Stolen laptop, computer, or phone
  • 7. WAYS TO PROTECT YOUR FINANCIAL INFORMATION Password protect your computer, cellular, and portable devices Use strong, unique passwords At least 8 characters  More is better At least 1-Lowercase, 1-Uppercase, 1- Number, and 1-Symbol Check validity of websites used to make purchases HTTPS Correct URL BBB
  • 8. EMOTIONAL DANGERS Stress from bad credit Repair process Not being able to get a loan Pay higher percentages on loans Feel insecure
  • 9. SOURCES OF EMOTIONAL DISTRESS Bad Credit Being attacked Restoring your identity Fixing your computer
  • 10. PROTECTION FROM EMOTIONAL DANGERS Protect your location information Protect your financial information Protect your personal information Monitor your credit scores at least once a year