Computer / Internet SecurityWest Haven Public Librarywww.westhavenlibrary.org
Computer / Internet Security• Use of internet services are unavoidable  ▫ Job applications, school    applications, taxes,...
Computer / Internet Security• Everything you do online… ▫ Every account you make ▫ Every purchase ▫ Every job application•...
Computer / Internet Security• Not always a bad thing… BUT ▫ Danger in losing control of your data (accounts) ▫ Danger in o...
Good NewsIt’s easy to stay safe and protect yourself
Computer / Internet SecurityGoals    • Secure your data    • Keep what’s private      PRIVATE    • Prevent attack/ intrusi...
Computer / Internet SecurityGoals                              Action• Secure your data                 • Use better passw...
Data?• Your data is anything on your computer or  information stored in online accounts ▫   Documents, files, photos ▫   O...
Why bother?• Whether public (online profiles) or private  (financial info) you need to stay in control• Ensure that only a...
Dangers• Breaches can come from ▫ Leaked/ stolen data   Leaked by a company or organization   Stolen via virus on a comp...
Dangers• Virus, Malware, Spyware, Adware, Trojans ▫ Software created to steal information, change   settings, destroy file...
Secure Your Data• Biggest step is use better password  practices ▫ more difficult to guess ▫ Harder to crack (longer in le...
Better Passwords• Dont use passwords that are based on personal  information that can be easily accessed or  guessed. ▫ It...
25 Worst Passwords of 20111. password       14. master2. 123456         15. sunshine3.12345678        16. ashley4. qwerty ...
Better Passwords• Dont use words that can be found in any  dictionary of any language. ▫ A single word, spelled correctly,...
Stronger Passwords• Use both lowercase and capital letters.• Use a combination of letters, numbers, and  special character...
Stronger Passwords• Use passphrases when you can. ▫ Longer in length- harder to guess/ crack ▫ Easier to remember ▫ puppyt...
Stronger Passwords• Use different passwords on different systems ▫ If you use the same password at one site that is   brok...
Use differentpasswords ondifferent systems
Keep what’s private PRIVATE• Be aware of what you share• When creating an account consider who you are  giving your data t...
Keep what’s private PRIVATE• When creating accounts consider what you are  entering and how it will be used• You decide yo...
Email• Email is more like a postcard than a letter• Chances are no one other than the recipient will  see it BUT it is pos...
Web Addresses- URL
URL (Uniform Resource Locator)           The address that connects you with a website.Parts of the URLhttp://www.google.co...
Browsing the Web- Secure Sites• Any site asking for sensitive info should be  encrypted (Banks, Insurance, etc.)• Encrypte...
Browsing the Web- Secure Sites
Browsing the Web• As you browse the web- websites collect info  about you• Your web browser keeps a history and collects  ...
Keep what’s private PRIVATE• If you have WiFi at home, set a password ▫ Keep your neighbors off your network (unless you  ...
Prevent attack/ intrusion• A Virus will get in through an open door or you  unwillingly open the door yourself
Anti-Virus• A program that scans your files and actively  monitors to prevent infection• Once installed, anti-virus monito...
Anti-Virus• Free ▫ AVG ▫ Avast ▫ Microsoft Security Essentials     www.windows.microsoft.com/mse• Commercial ▫ McAffee ▫ ...
Prevent attack/ intrusion• Be vigilant• Don’t download email attachments that you  don’t trust• If something from someone ...
Prevent attack/ intrusion• Scareware ▫ Virus/Malware that looks like an anti-virus   program ▫ Popup while browsing the we...
Fake Anti-Virus Warning
Prepare for the worst• Backup your important files  ▫ Keep duplicate copies• Worst case scenario: you will still have what...
Prepare for the worst• Backup files locally  ▫ Copy to cdr  ▫ Flash drive  ▫ external hard drive• Paper copies  ▫ tax retu...
Prepare for the worst• Cloud storage- files copied to a secure site over  the internet  ▫ Be sure that service is reputabl...
Resources• http://www.us-cert.gov/cas/tips/• http://www.ftc.gov/bcp/edu/microsites/onguard/                  westhavenlibr...
Computer / Internet Security WHPL
Upcoming SlideShare
Loading in …5
×

Computer / Internet Security WHPL

1,002 views

Published on

Computer class taught at the West Haven Public Library.

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,002
On SlideShare
0
From Embeds
0
Number of Embeds
78
Actions
Shares
0
Downloads
14
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Computer / Internet Security WHPL

  1. 1. Computer / Internet SecurityWest Haven Public Librarywww.westhavenlibrary.org
  2. 2. Computer / Internet Security• Use of internet services are unavoidable ▫ Job applications, school applications, taxes, credit, banking, DMV forms, personal communication (email), social networking (facebook), shopping, research, entertainment• All parts of your life potentially have an online counterpart
  3. 3. Computer / Internet Security• Everything you do online… ▫ Every account you make ▫ Every purchase ▫ Every job application• Creates data about you
  4. 4. Computer / Internet Security• Not always a bad thing… BUT ▫ Danger in losing control of your data (accounts) ▫ Danger in over sharing ▫ Danger in important data being destroyed (photos, records, documents)
  5. 5. Good NewsIt’s easy to stay safe and protect yourself
  6. 6. Computer / Internet SecurityGoals • Secure your data • Keep what’s private PRIVATE • Prevent attack/ intrusion • Prepare for the worst, prevent loss
  7. 7. Computer / Internet SecurityGoals Action• Secure your data • Use better password practices• Keep what’s private PRIVATE • Be aware of what/how you share• Prevent attack/ intrusion • Be proactive- use protective software- be vigilant• Prepare for the worst, prevent • BACKUP, BACKUP, BACKUP loss
  8. 8. Data?• Your data is anything on your computer or information stored in online accounts ▫ Documents, files, photos ▫ Online shopping sites ▫ Banking, credit card ▫ Social networking profiles• Data that you own/control• Private (banking info)• Public (online profiles)
  9. 9. Why bother?• Whether public (online profiles) or private (financial info) you need to stay in control• Ensure that only authorized people can access your data, accounts, files Web-based accounts and services are increasingly important
  10. 10. Dangers• Breaches can come from ▫ Leaked/ stolen data  Leaked by a company or organization  Stolen via virus on a computer you use ▫ Targeted attacks ▫ Automated attacks- cracks
  11. 11. Dangers• Virus, Malware, Spyware, Adware, Trojans ▫ Software created to steal information, change settings, destroy files, take control of your system ▫ Most commonly contracted online unbeknownst to the user  Email attachments, malicious websites, software downloads, toolbars
  12. 12. Secure Your Data• Biggest step is use better password practices ▫ more difficult to guess ▫ Harder to crack (longer in length) ▫ Make it easier to deal with if username/passwords are leaked
  13. 13. Better Passwords• Dont use passwords that are based on personal information that can be easily accessed or guessed. ▫ It may be easier than you think to guess your pet’s name, birthday, child’s name, favorite color, mother’s maiden name, etc. ▫ “password” “love” are extremely common and easily guessed
  14. 14. 25 Worst Passwords of 20111. password 14. master2. 123456 15. sunshine3.12345678 16. ashley4. qwerty 17. bailey5. abc123 18. passw0rd6. monkey 19. shadow7. 1234567 20. 1231238. letmein 21. 6543219. trustno1 22. superman10. dragon 23. qazwsx11. baseball 24. michael12. 111111 25. football13. iloveyou http://mashable.com/2011/11/17/worst-internet- passwords/
  15. 15. Better Passwords• Dont use words that can be found in any dictionary of any language. ▫ A single word, spelled correctly, is easy to check against a dictionary ▫ Single words are also short, easy to break using random guesses.
  16. 16. Stronger Passwords• Use both lowercase and capital letters.• Use a combination of letters, numbers, and special characters. ▫ Maine96knees@MtSnow• Develop a mnemonic for remembering complex passwords.
  17. 17. Stronger Passwords• Use passphrases when you can. ▫ Longer in length- harder to guess/ crack ▫ Easier to remember ▫ puppytograndmasforsummervacation
  18. 18. Stronger Passwords• Use different passwords on different systems ▫ If you use the same password at one site that is broken into- then attackers can access your data at other sites using that same username/password.
  19. 19. Use differentpasswords ondifferent systems
  20. 20. Keep what’s private PRIVATE• Be aware of what you share• When creating an account consider who you are giving your data to• Any site asking for banking, social security, or login information for a different site should be closely examined.
  21. 21. Keep what’s private PRIVATE• When creating accounts consider what you are entering and how it will be used• You decide your comfort level with what you share
  22. 22. Email• Email is more like a postcard than a letter• Chances are no one other than the recipient will see it BUT it is possible for others see its content along the way (just like a postcard)• Do not email: credit card #, logins/passwords
  23. 23. Web Addresses- URL
  24. 24. URL (Uniform Resource Locator) The address that connects you with a website.Parts of the URLhttp://www.google.com http:// = protocol [Hypertext Transfer Protocol] www. = World Wide Web google = domain name .com = domain typeDomain Types .com = commercial .org = generally nonprofit organizations .edu = higher education .gov = U.S. government agency
  25. 25. Browsing the Web- Secure Sites• Any site asking for sensitive info should be encrypted (Banks, Insurance, etc.)• Encrypted site addresses begin with ▫ https://www.google.com- ENCRYPTED ▫ http://www.google.com- NOT encrypted
  26. 26. Browsing the Web- Secure Sites
  27. 27. Browsing the Web• As you browse the web- websites collect info about you• Your web browser keeps a history and collects cookies from websites• Use your browser settings to: ▫ Clear your browser cache/history/cookies ▫ Limit 3rd party cookies
  28. 28. Keep what’s private PRIVATE• If you have WiFi at home, set a password ▫ Keep your neighbors off your network (unless you want them there) ▫ Refer to the directions that came with your Router/Modem/Wifi
  29. 29. Prevent attack/ intrusion• A Virus will get in through an open door or you unwillingly open the door yourself
  30. 30. Anti-Virus• A program that scans your files and actively monitors to prevent infection• Once installed, anti-virus monitors for virus activity, quarantines, and deletes• Be sure to frequently run the virus scan• Be sure that “definitions” are updated
  31. 31. Anti-Virus• Free ▫ AVG ▫ Avast ▫ Microsoft Security Essentials  www.windows.microsoft.com/mse• Commercial ▫ McAffee ▫ Symantec Norton ▫ Bit Defender
  32. 32. Prevent attack/ intrusion• Be vigilant• Don’t download email attachments that you don’t trust• If something from someone you trust looks suspicious check with them before opening
  33. 33. Prevent attack/ intrusion• Scareware ▫ Virus/Malware that looks like an anti-virus program ▫ Popup while browsing the web• Know what Anti-virus you have and how to use it
  34. 34. Fake Anti-Virus Warning
  35. 35. Prepare for the worst• Backup your important files ▫ Keep duplicate copies• Worst case scenario: you will still have what’s important to you• Keep your backup current
  36. 36. Prepare for the worst• Backup files locally ▫ Copy to cdr ▫ Flash drive ▫ external hard drive• Paper copies ▫ tax returns ▫ Important photos
  37. 37. Prepare for the worst• Cloud storage- files copied to a secure site over the internet ▫ Be sure that service is reputable, safe, stable ▫ Backup regularly
  38. 38. Resources• http://www.us-cert.gov/cas/tips/• http://www.ftc.gov/bcp/edu/microsites/onguard/ westhavenlibrary.org David Cirella- dcirella@westhavenlibrary.org, 2012-03-01

×