SlideShare a Scribd company logo
Protecting Yourself Online A Short Guide
Being victimized online feels like lightening hit you.
Ways Lightening Strikes Email Online Accounts Websites Social Networking File Sharing Mobile Devices Wireless Home Networks
How to Deflect Lightening EMAIL Don't email personal or financial information. Be cautious about opening any attachment or downloading any files from emails you receive, regardless of who sent them. Forward phishing emails to spam@uce.gov – and to the company, bank, or organization impersonated in the phishing email.  You also may report phishing email to reportphishing@antiphishing.org. The Anti-Phishing Working Group, a consortium of ISPs, security vendors, financial institutions and law enforcement agencies, uses these reports to fight phishing. Information from: http://www.onguardonline.gov/topics/phishing.aspx
How to Deflect Lightening EMAIL Don't reply to email or pop-up messages that ask for personal or financial information, and don't click on links in the message.  Don't cut and paste a link from the message into your Web browser — phishers can make links look like they go one place, but that actually send you to a different site.  Some scammers send an email that appears to be from a legitimate business and ask you to call a phone number to update your account or access a "refund."  Because they use Voice over Internet Protocol (VOIP) technology, the area code you call does not reflect where the scammers really are. If you need to reach an organization you do business with, call the number on your financial statements or on the back of your credit card. Information from: http://www.onguardonline.gov/topics/phishing.aspx
How to Deflect Lightening ONLINE ACCOUNTS Educate yourself about online financial transactions, banking and shopping by reading the information at the following link: http://www.ftc.gov/bcp/menus/consumer/tech/online.shtm Don't email personal or financial information. Review credit card and bank account statements as soon as you receive them to check for unauthorized charges. Some of the information from: http://www.ftc.gov/bcp/edu/pubs/consumer/tech/tec01.shtm
How to Deflect Lightening ONLINE ACCOUNTS Use a secure browser. Check the site’s privacy policy. Keep records of your online transactions and check your email. Idea: if you frequently shop online, open a separate account with it’s own debit card and put only the amount of money you will shop with in the account (separate from your main account for direct deposits of your paychecks, etc.). Some of the information from: http://www.ftc.gov/bcp/edu/pubs/consumer/tech/tec01.shtm
How to Deflect Lightening WEBSITES Educate yourself about website cons by reading the information at the following link: http://www.ftc.gov/bcp/edu/pubs/consumer/tech/tec09.shtm Use the free service from the website “Web of Trust” which provides a free software downloaded into your browser so while you are browsing, you can avoid websites that are unsafe.  To learn more, go to: http://www.mywot.com/ When using an open web connection such as a free wireless access point (internet cafes, etc.), use a free operating system loaded on a CD or flash drive that still allows you to access your files but secures your computer’s operating system from spyware, malware, viruses, etc. because its not in use while you are using the CD or flashdrive.  For more information read: http://ezinearticles.com/?Protecting-Yourself-on-an-Open-Internet-Connection&id=4172381  One example of a free operating system to use in this manner: http://www.ubuntu.com/desktop/get-ubuntu/download
How to Deflect Lightening SOCIAL NETWORKING Adults have to practice safety while networking online as well.  Practice what you preach to your children. While limiting access to close friends and relatives may seem safe, a user cannot be certain that one of those friends or relatives didn’t decide to “share” the information by reposting it to their friends and relatives? “I really envy Sally Smith. She’s going to a taping of Oprah on Wednesday and then she’s going shopping for her daughter’s prom dress.” Information from: http://www.suite101.com/content/safety-tips-for-adults-using-social-media-a279037
How to Deflect Lightening SOCIAL NETWORKING Many adults don’t practice safety by:  ,[object Object]
List employer, job title, and even work schedule (the latter by posting just before leaving for work and again right after returning).
Post pictures of their home on social media sites. This provides criminals with location of doors and windows. Shrubbery where they can hide if necessary.
Post pictures of their possessions. A new car in the garage or driveway, a recently acquired work of art with other items of interest as background in the picture.
Posting times when the home will be vacant—going on vacation, going to a movie, sporting event, night on the town, etc.MORE TO LEARN!!!  See the last link on this slide! For teaching kids: educate yourself about social networking by reading the information at the following link: http://www.onguardonline.gov/topics/social-networking-sites.aspx Information from: http://www.suite101.com/content/safety-tips-for-adults-using-social-media-a279037
How to Deflect Lightening FILE SHARING Peer-to-peer (P2P) file-sharing allows users to share files online through an informal network of computers running the same software. File-sharing can give you access to a wealth of information, but it also has a number of risks. If you're considering P2P file-sharing: Install file-sharing software carefully, so that you know what's being shared. Changes you make to the default settings of the "save" or "shared" folder might cause you to share folders and subfolders you don't want to share. Check the proper settings so that other users of the file-sharing network won't have access to your private files, folders, or sub-folders. Use a security program from a vendor you know and trust; keep that software and your operating system up-to-date. Some file-sharing software may install malware or adware, and some files may include unwanted content. Information from: http://www.onguardonline.gov/topics/p2p-security.aspx
How to Deflect Lightening FILE SHARING If you're considering P2P file-sharing (continued): You may want to adjust the file-sharing program's controls so that it is not connected to the P2P network all the time. Some file-sharing programs automatically open every time you turn on your computer and continue to operate even when you "close" them. Consider setting up separate user accounts, in addition to the administrator's account, if your computer has multiple users. Limiting rights on user accounts may help protect your computer from unwanted software and your data from unwelcome sharing. Back up data you don't want to lose in case of a computer crash, and use a password to protect any files that contain sensitive information. Information from: http://www.onguardonline.gov/topics/p2p-security.aspx
How to Deflect Lightening MOBILE DEVICES Smart phones, cell phones, and handheld PCs can also be infected with viruses. Your mobile device can be infected when you download programs or files that are already infected. In the case of mobile phones, that might mean downloading photos, video clips, ring tones, cell phone themes, or other programs. Mobile viruses can also spread through cell phones that are equipped with Bluetooth.  If you have Bluetooth enabled on your mobile device and in "discoverable mode" (see the manual that came with your device for more information), and you come within 30 feet of another infected device that also has Bluetooth enabled and is running the same operating system as your mobile device, then you might get infected. Only download or accept programs and content (including photos, video clips, ring tones, mobile device themes, and games) from a source you trust.  Information from: http://www.onguardonline.gov/topics/p2p-security.aspx
How to Deflect Lightening MOBILE DEVICES If your phone is equipped with Bluetooth, turn it off or set it to non-discoverable mode when you're not using it. If your phone is equipped with Infrared beam, only allow it to receive incoming beams when you're receiving data from a source you trust. Download and install antivirus software for your mobile device. Remember to treat your phone or other handheld device as carefully you would your wallet, especially in places that are prone to theft. Lock or protect your mobile device with a password, so if you do lose your mobile device, a thief will have a more difficult time using it to make phone calls or access personal information you may have stored on it. Information from: http://www.onguardonline.gov/topics/p2p-security.aspx
How to Deflect Lightening MOBILE DEVICES Make sure you know how to block others from calling your phone. Using caller id you can block all incoming calls or block individual names and numbers.  Make a record of your Electronic Serial Number (ESN) and/or your International Mobile Equipment Identity (IMEI) number.  Note: You can find out your IMEI number by pressing *#06# on your mobile phone's keypad, it will display a 15 digit number - that is your IMEI number.  Information from: http://its.uah.edu/security/SEC_Mobile_Device_Safety.pdf
How to Deflect Lightening MOBILE DEVICES (continued) Beware of the GPS location feature in your mobile device and the applications that use it, such as Google Latitude and Facebook’s friend-finder. These tracking “features” that advertise where you are and where you are not can be used for crimes from stalking to robbery.  Do not allow others to take pictures or videos of you without your permission. Remember – these pictures and videos can be posted to the Internet.  Be careful if you meet someone in real life who you only "know" through text messaging. Even though text messaging is often the "next step" after online chatting, that does not mean that it is safer.  Information from: http://its.uah.edu/security/SEC_Mobile_Device_Safety.pdf

More Related Content

What's hot

online spying tools
online spying toolsonline spying tools
online spying toolsDeepa Jacob
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
Gihan Dias
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
peterhitch
 
Cyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalCyber security tips in Banking in Nepal
Cyber security tips in Banking in Nepal
Resham Acharya
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
K. A. M Lutfullah
 
5 a module online privacy
5 a module online privacy5 a module online privacy
5 a module online privacyRozell Sneede
 
Internet safety
Internet safetyInternet safety
Internet safety
Dan Tomlinson
 
Online Safety
Online Safety Online Safety
Online Safety
Janetta Garton
 
The Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyThe Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and Privacy
Jonathan Bacon
 
Keeping Your Kids Safe Online Smart Card
Keeping Your Kids Safe Online Smart CardKeeping Your Kids Safe Online Smart Card
Keeping Your Kids Safe Online Smart Card
Alpha Company, AFNORTH Battalion SFRG
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet
- Mark - Fullbright
 
Securityguide
SecurityguideSecurityguide
Securityguide
Oleg Kostyukevich
 
CYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWCYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEW
Billy Warero
 
Technology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreTechnology Training - Security, Passwords & More
Technology Training - Security, Passwords & More
William Mann
 
Users guide
Users guideUsers guide
Users guide
Darren Thomas
 
Emp tech las-week-2
Emp tech las-week-2Emp tech las-week-2
Emp tech las-week-2
Joemer Mabagos
 
Guide to pc_security
Guide to pc_securityGuide to pc_security
Guide to pc_security
Flora Runyenje
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself Online
Gary Wagnon
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
JoshuaWisniewski3
 

What's hot (20)

online spying tools
online spying toolsonline spying tools
online spying tools
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Cyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalCyber security tips in Banking in Nepal
Cyber security tips in Banking in Nepal
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 
5 a module online privacy
5 a module online privacy5 a module online privacy
5 a module online privacy
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Online Safety
Online Safety Online Safety
Online Safety
 
The Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyThe Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and Privacy
 
Keeping Your Kids Safe Online Smart Card
Keeping Your Kids Safe Online Smart CardKeeping Your Kids Safe Online Smart Card
Keeping Your Kids Safe Online Smart Card
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet
 
Pad 750 podcast
Pad 750 podcastPad 750 podcast
Pad 750 podcast
 
Securityguide
SecurityguideSecurityguide
Securityguide
 
CYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWCYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEW
 
Technology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreTechnology Training - Security, Passwords & More
Technology Training - Security, Passwords & More
 
Users guide
Users guideUsers guide
Users guide
 
Emp tech las-week-2
Emp tech las-week-2Emp tech las-week-2
Emp tech las-week-2
 
Guide to pc_security
Guide to pc_securityGuide to pc_security
Guide to pc_security
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself Online
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 

Viewers also liked

GRAMMAR: Idioms 1
GRAMMAR: Idioms 1GRAMMAR: Idioms 1
GRAMMAR: Idioms 1Natalia
 
Unit 6 Evaluating Elearning Practice 30 Nov09 1
Unit 6 Evaluating Elearning Practice 30 Nov09 1Unit 6 Evaluating Elearning Practice 30 Nov09 1
Unit 6 Evaluating Elearning Practice 30 Nov09 1Catherine El-Bez
 
Pedagocical Agents
Pedagocical AgentsPedagocical Agents
Pedagocical AgentsFIT Ltd
 
Intro Lake Nichada
Intro Lake NichadaIntro Lake Nichada
Intro Lake Nichadaguest969f41
 
Stagegatesummit J Ic
Stagegatesummit J IcStagegatesummit J Ic
Stagegatesummit J Ic
JohnIrven
 
U Johannesburg Knowledge Presentation
U Johannesburg Knowledge PresentationU Johannesburg Knowledge Presentation
U Johannesburg Knowledge Presentation
guest457a87
 
Effective b2 b link building optify
Effective b2 b link building   optifyEffective b2 b link building   optify
Effective b2 b link building optify
Optify
 
Understanding Chemical Reactions Revision
Understanding Chemical Reactions RevisionUnderstanding Chemical Reactions Revision
Understanding Chemical Reactions Revisionamr hassaan
 
Social Media Success
Social Media SuccessSocial Media Success
Social Media SuccessJuan Pittau
 
Preparing For The Mi Phy 2010
Preparing For The Mi Phy 2010Preparing For The Mi Phy 2010
Preparing For The Mi Phy 2010Kim Kovalchick
 
Social media
Social mediaSocial media
Social media
Yaneli Cruz
 
Logística Empresarial Noticias
Logística Empresarial NoticiasLogística Empresarial Noticias
Logística Empresarial Noticias
WeNova Consulting
 
Landing page A/B testing with Google and Optify
Landing page A/B testing with Google and OptifyLanding page A/B testing with Google and Optify
Landing page A/B testing with Google and Optify
Optify
 
A tribute to simon gillespie by dr. jeffrey lant master marketer and also col...
A tribute to simon gillespie by dr. jeffrey lant master marketer and also col...A tribute to simon gillespie by dr. jeffrey lant master marketer and also col...
A tribute to simon gillespie by dr. jeffrey lant master marketer and also col...howie martell
 
Social Media in the digitalmediamix
Social Media in the digitalmediamix Social Media in the digitalmediamix
Social Media in the digitalmediamix Juan Pittau
 

Viewers also liked (20)

GRAMMAR: Idioms 1
GRAMMAR: Idioms 1GRAMMAR: Idioms 1
GRAMMAR: Idioms 1
 
Unit 6 Evaluating Elearning Practice 30 Nov09 1
Unit 6 Evaluating Elearning Practice 30 Nov09 1Unit 6 Evaluating Elearning Practice 30 Nov09 1
Unit 6 Evaluating Elearning Practice 30 Nov09 1
 
Id
IdId
Id
 
Pedagocical Agents
Pedagocical AgentsPedagocical Agents
Pedagocical Agents
 
Intro Lake Nichada
Intro Lake NichadaIntro Lake Nichada
Intro Lake Nichada
 
Stagegatesummit J Ic
Stagegatesummit J IcStagegatesummit J Ic
Stagegatesummit J Ic
 
U Johannesburg Knowledge Presentation
U Johannesburg Knowledge PresentationU Johannesburg Knowledge Presentation
U Johannesburg Knowledge Presentation
 
Effective b2 b link building optify
Effective b2 b link building   optifyEffective b2 b link building   optify
Effective b2 b link building optify
 
Understanding Chemical Reactions Revision
Understanding Chemical Reactions RevisionUnderstanding Chemical Reactions Revision
Understanding Chemical Reactions Revision
 
Social Media Success
Social Media SuccessSocial Media Success
Social Media Success
 
Zmot handbook
Zmot handbookZmot handbook
Zmot handbook
 
Vu Kd Pristatymas
Vu Kd PristatymasVu Kd Pristatymas
Vu Kd Pristatymas
 
Preparing For The Mi Phy 2010
Preparing For The Mi Phy 2010Preparing For The Mi Phy 2010
Preparing For The Mi Phy 2010
 
Social media
Social mediaSocial media
Social media
 
Logística Empresarial Noticias
Logística Empresarial NoticiasLogística Empresarial Noticias
Logística Empresarial Noticias
 
synartiseis
synartiseissynartiseis
synartiseis
 
Landing page A/B testing with Google and Optify
Landing page A/B testing with Google and OptifyLanding page A/B testing with Google and Optify
Landing page A/B testing with Google and Optify
 
Pisuvanje za na web
Pisuvanje za na webPisuvanje za na web
Pisuvanje za na web
 
A tribute to simon gillespie by dr. jeffrey lant master marketer and also col...
A tribute to simon gillespie by dr. jeffrey lant master marketer and also col...A tribute to simon gillespie by dr. jeffrey lant master marketer and also col...
A tribute to simon gillespie by dr. jeffrey lant master marketer and also col...
 
Social Media in the digitalmediamix
Social Media in the digitalmediamix Social Media in the digitalmediamix
Social Media in the digitalmediamix
 

Similar to Presentation for class

October 2012 is_national_cyber_security_awareness_month
October 2012 is_national_cyber_security_awareness_monthOctober 2012 is_national_cyber_security_awareness_month
October 2012 is_national_cyber_security_awareness_month
Evelyn Berrier
 
Identity theft
Identity theftIdentity theft
Identity theft
bhabagrahi dash
 
Safe Computing
Safe ComputingSafe Computing
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
B2BPlanner Ltd.
 
Canadian Consumer Handbook
Canadian Consumer HandbookCanadian Consumer Handbook
Canadian Consumer Handbook
- Mark - Fullbright
 
Cyber crime awareness
Cyber crime awarenessCyber crime awareness
Cyber crime awareness
Arjun Chetry
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guide
Nguyen Xuan Quang
 
How to protect your digital footprint
How to protect your digital footprintHow to protect your digital footprint
How to protect your digital footprint
Cybermaterial
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
mateenzero
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
Achu69
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS
 
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureSmartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Heimdal Security
 
Cybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsCybersecurity Awareness Month Tips
Cybersecurity Awareness Month Tips
Kevin Fream
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1Rozell Sneede
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena Mishra
Devsena Mishra
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02amiinaaa
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
The Center for Identity
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
Courion Corporation
 
InfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security TipsInfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security TipsLiberteks
 

Similar to Presentation for class (20)

October 2012 is_national_cyber_security_awareness_month
October 2012 is_national_cyber_security_awareness_monthOctober 2012 is_national_cyber_security_awareness_month
October 2012 is_national_cyber_security_awareness_month
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 
Canadian Consumer Handbook
Canadian Consumer HandbookCanadian Consumer Handbook
Canadian Consumer Handbook
 
Cyber crime awareness
Cyber crime awarenessCyber crime awareness
Cyber crime awareness
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guide
 
How to protect your digital footprint
How to protect your digital footprintHow to protect your digital footprint
How to protect your digital footprint
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurity
 
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureSmartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
 
Cybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsCybersecurity Awareness Month Tips
Cybersecurity Awareness Month Tips
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena Mishra
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 
InfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security TipsInfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security Tips
 

Recently uploaded

Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 

Recently uploaded (20)

Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 

Presentation for class

  • 2. Being victimized online feels like lightening hit you.
  • 3. Ways Lightening Strikes Email Online Accounts Websites Social Networking File Sharing Mobile Devices Wireless Home Networks
  • 4. How to Deflect Lightening EMAIL Don't email personal or financial information. Be cautious about opening any attachment or downloading any files from emails you receive, regardless of who sent them. Forward phishing emails to spam@uce.gov – and to the company, bank, or organization impersonated in the phishing email. You also may report phishing email to reportphishing@antiphishing.org. The Anti-Phishing Working Group, a consortium of ISPs, security vendors, financial institutions and law enforcement agencies, uses these reports to fight phishing. Information from: http://www.onguardonline.gov/topics/phishing.aspx
  • 5. How to Deflect Lightening EMAIL Don't reply to email or pop-up messages that ask for personal or financial information, and don't click on links in the message. Don't cut and paste a link from the message into your Web browser — phishers can make links look like they go one place, but that actually send you to a different site. Some scammers send an email that appears to be from a legitimate business and ask you to call a phone number to update your account or access a "refund." Because they use Voice over Internet Protocol (VOIP) technology, the area code you call does not reflect where the scammers really are. If you need to reach an organization you do business with, call the number on your financial statements or on the back of your credit card. Information from: http://www.onguardonline.gov/topics/phishing.aspx
  • 6. How to Deflect Lightening ONLINE ACCOUNTS Educate yourself about online financial transactions, banking and shopping by reading the information at the following link: http://www.ftc.gov/bcp/menus/consumer/tech/online.shtm Don't email personal or financial information. Review credit card and bank account statements as soon as you receive them to check for unauthorized charges. Some of the information from: http://www.ftc.gov/bcp/edu/pubs/consumer/tech/tec01.shtm
  • 7. How to Deflect Lightening ONLINE ACCOUNTS Use a secure browser. Check the site’s privacy policy. Keep records of your online transactions and check your email. Idea: if you frequently shop online, open a separate account with it’s own debit card and put only the amount of money you will shop with in the account (separate from your main account for direct deposits of your paychecks, etc.). Some of the information from: http://www.ftc.gov/bcp/edu/pubs/consumer/tech/tec01.shtm
  • 8. How to Deflect Lightening WEBSITES Educate yourself about website cons by reading the information at the following link: http://www.ftc.gov/bcp/edu/pubs/consumer/tech/tec09.shtm Use the free service from the website “Web of Trust” which provides a free software downloaded into your browser so while you are browsing, you can avoid websites that are unsafe. To learn more, go to: http://www.mywot.com/ When using an open web connection such as a free wireless access point (internet cafes, etc.), use a free operating system loaded on a CD or flash drive that still allows you to access your files but secures your computer’s operating system from spyware, malware, viruses, etc. because its not in use while you are using the CD or flashdrive. For more information read: http://ezinearticles.com/?Protecting-Yourself-on-an-Open-Internet-Connection&id=4172381 One example of a free operating system to use in this manner: http://www.ubuntu.com/desktop/get-ubuntu/download
  • 9. How to Deflect Lightening SOCIAL NETWORKING Adults have to practice safety while networking online as well. Practice what you preach to your children. While limiting access to close friends and relatives may seem safe, a user cannot be certain that one of those friends or relatives didn’t decide to “share” the information by reposting it to their friends and relatives? “I really envy Sally Smith. She’s going to a taping of Oprah on Wednesday and then she’s going shopping for her daughter’s prom dress.” Information from: http://www.suite101.com/content/safety-tips-for-adults-using-social-media-a279037
  • 10.
  • 11. List employer, job title, and even work schedule (the latter by posting just before leaving for work and again right after returning).
  • 12. Post pictures of their home on social media sites. This provides criminals with location of doors and windows. Shrubbery where they can hide if necessary.
  • 13. Post pictures of their possessions. A new car in the garage or driveway, a recently acquired work of art with other items of interest as background in the picture.
  • 14. Posting times when the home will be vacant—going on vacation, going to a movie, sporting event, night on the town, etc.MORE TO LEARN!!! See the last link on this slide! For teaching kids: educate yourself about social networking by reading the information at the following link: http://www.onguardonline.gov/topics/social-networking-sites.aspx Information from: http://www.suite101.com/content/safety-tips-for-adults-using-social-media-a279037
  • 15. How to Deflect Lightening FILE SHARING Peer-to-peer (P2P) file-sharing allows users to share files online through an informal network of computers running the same software. File-sharing can give you access to a wealth of information, but it also has a number of risks. If you're considering P2P file-sharing: Install file-sharing software carefully, so that you know what's being shared. Changes you make to the default settings of the "save" or "shared" folder might cause you to share folders and subfolders you don't want to share. Check the proper settings so that other users of the file-sharing network won't have access to your private files, folders, or sub-folders. Use a security program from a vendor you know and trust; keep that software and your operating system up-to-date. Some file-sharing software may install malware or adware, and some files may include unwanted content. Information from: http://www.onguardonline.gov/topics/p2p-security.aspx
  • 16. How to Deflect Lightening FILE SHARING If you're considering P2P file-sharing (continued): You may want to adjust the file-sharing program's controls so that it is not connected to the P2P network all the time. Some file-sharing programs automatically open every time you turn on your computer and continue to operate even when you "close" them. Consider setting up separate user accounts, in addition to the administrator's account, if your computer has multiple users. Limiting rights on user accounts may help protect your computer from unwanted software and your data from unwelcome sharing. Back up data you don't want to lose in case of a computer crash, and use a password to protect any files that contain sensitive information. Information from: http://www.onguardonline.gov/topics/p2p-security.aspx
  • 17. How to Deflect Lightening MOBILE DEVICES Smart phones, cell phones, and handheld PCs can also be infected with viruses. Your mobile device can be infected when you download programs or files that are already infected. In the case of mobile phones, that might mean downloading photos, video clips, ring tones, cell phone themes, or other programs. Mobile viruses can also spread through cell phones that are equipped with Bluetooth. If you have Bluetooth enabled on your mobile device and in "discoverable mode" (see the manual that came with your device for more information), and you come within 30 feet of another infected device that also has Bluetooth enabled and is running the same operating system as your mobile device, then you might get infected. Only download or accept programs and content (including photos, video clips, ring tones, mobile device themes, and games) from a source you trust. Information from: http://www.onguardonline.gov/topics/p2p-security.aspx
  • 18. How to Deflect Lightening MOBILE DEVICES If your phone is equipped with Bluetooth, turn it off or set it to non-discoverable mode when you're not using it. If your phone is equipped with Infrared beam, only allow it to receive incoming beams when you're receiving data from a source you trust. Download and install antivirus software for your mobile device. Remember to treat your phone or other handheld device as carefully you would your wallet, especially in places that are prone to theft. Lock or protect your mobile device with a password, so if you do lose your mobile device, a thief will have a more difficult time using it to make phone calls or access personal information you may have stored on it. Information from: http://www.onguardonline.gov/topics/p2p-security.aspx
  • 19. How to Deflect Lightening MOBILE DEVICES Make sure you know how to block others from calling your phone. Using caller id you can block all incoming calls or block individual names and numbers. Make a record of your Electronic Serial Number (ESN) and/or your International Mobile Equipment Identity (IMEI) number. Note: You can find out your IMEI number by pressing *#06# on your mobile phone's keypad, it will display a 15 digit number - that is your IMEI number. Information from: http://its.uah.edu/security/SEC_Mobile_Device_Safety.pdf
  • 20. How to Deflect Lightening MOBILE DEVICES (continued) Beware of the GPS location feature in your mobile device and the applications that use it, such as Google Latitude and Facebook’s friend-finder. These tracking “features” that advertise where you are and where you are not can be used for crimes from stalking to robbery. Do not allow others to take pictures or videos of you without your permission. Remember – these pictures and videos can be posted to the Internet. Be careful if you meet someone in real life who you only "know" through text messaging. Even though text messaging is often the "next step" after online chatting, that does not mean that it is safer. Information from: http://its.uah.edu/security/SEC_Mobile_Device_Safety.pdf
  • 21. How to Deflect Lightening WIRELESS HOME NETWORKS Wireless internet access can offer convenience and mobility. But there are steps you should take to protect your wireless network and the computers on it. Use encryption to scramble communications over the network. If you have a choice, WiFi Protected Access (especially WPA2) is stronger than Wired Equivalent Privacy (WEP). Use anti-virus and anti-spyware software, and a firewall. Most wireless routers have a mechanism called identifier broadcasting. Turn it off so your computer won't send a signal to any device in the vicinity announcing its presence. Information from: http://www.onguardonline.gov/topics/wireless-security.aspx
  • 22. How to Deflect Lightening WIRELESS HOME NETWORKS Change the identifier on your router from the default so a hacker can't use the manufacturer's default identifier to try to access your network. Change your router's pre-set password for administration to something only you know. The longer the password, the tougher it is to crack. Allow only specific computers to access your wireless network. Information from: http://www.onguardonline.gov/topics/wireless-security.aspx
  • 23. For Extra Lightening Protection http://www.cybercrime.gov/ http://www.usa.gov/Citizen/Topics/Internet_Fraud.shtml http://www.onguardonline.gov/ http://www.usa.gov/Citizen/Topics/Internet_Fraud.shtml