SlideShare a Scribd company logo
1 of 20
Protecting Yourself Online A Short Guide
Being victimized online feels like lightening hit you.
Ways Lightening Strikes Email Online Accounts Websites Social Networking File Sharing Mobile Devices Wireless Home Networks
How to Deflect Lightening EMAIL Don't email personal or financial information. Be cautious about opening any attachment or downloading any files from emails you receive, regardless of who sent them. Forward phishing emails to spam@uce.gov – and to the company, bank, or organization impersonated in the phishing email.  You also may report phishing email to reportphishing@antiphishing.org. The Anti-Phishing Working Group, a consortium of ISPs, security vendors, financial institutions and law enforcement agencies, uses these reports to fight phishing. Information from: http://www.onguardonline.gov/topics/phishing.aspx
How to Deflect Lightening EMAIL Don't reply to email or pop-up messages that ask for personal or financial information, and don't click on links in the message.  Don't cut and paste a link from the message into your Web browser — phishers can make links look like they go one place, but that actually send you to a different site.  Some scammers send an email that appears to be from a legitimate business and ask you to call a phone number to update your account or access a "refund."  Because they use Voice over Internet Protocol (VOIP) technology, the area code you call does not reflect where the scammers really are. If you need to reach an organization you do business with, call the number on your financial statements or on the back of your credit card. Information from: http://www.onguardonline.gov/topics/phishing.aspx
How to Deflect Lightening ONLINE ACCOUNTS Educate yourself about online financial transactions, banking and shopping by reading the information at the following link: http://www.ftc.gov/bcp/menus/consumer/tech/online.shtm Don't email personal or financial information. Review credit card and bank account statements as soon as you receive them to check for unauthorized charges. Some of the information from: http://www.ftc.gov/bcp/edu/pubs/consumer/tech/tec01.shtm
How to Deflect Lightening ONLINE ACCOUNTS Use a secure browser. Check the site’s privacy policy. Keep records of your online transactions and check your email. Idea: if you frequently shop online, open a separate account with it’s own debit card and put only the amount of money you will shop with in the account (separate from your main account for direct deposits of your paychecks, etc.). Some of the information from: http://www.ftc.gov/bcp/edu/pubs/consumer/tech/tec01.shtm
How to Deflect Lightening WEBSITES Educate yourself about website cons by reading the information at the following link: http://www.ftc.gov/bcp/edu/pubs/consumer/tech/tec09.shtm Use the free service from the website “Web of Trust” which provides a free software downloaded into your browser so while you are browsing, you can avoid websites that are unsafe.  To learn more, go to: http://www.mywot.com/ When using an open web connection such as a free wireless access point (internet cafes, etc.), use a free operating system loaded on a CD or flash drive that still allows you to access your files but secures your computer’s operating system from spyware, malware, viruses, etc. because its not in use while you are using the CD or flashdrive.  For more information read: http://ezinearticles.com/?Protecting-Yourself-on-an-Open-Internet-Connection&id=4172381  One example of a free operating system to use in this manner: http://www.ubuntu.com/desktop/get-ubuntu/download
How to Deflect Lightening SOCIAL NETWORKING Adults have to practice safety while networking online as well.  Practice what you preach to your children. While limiting access to close friends and relatives may seem safe, a user cannot be certain that one of those friends or relatives didn’t decide to “share” the information by reposting it to their friends and relatives? “I really envy Sally Smith. She’s going to a taping of Oprah on Wednesday and then she’s going shopping for her daughter’s prom dress.” Information from: http://www.suite101.com/content/safety-tips-for-adults-using-social-media-a279037
How to Deflect Lightening SOCIAL NETWORKING Many adults don’t practice safety by:  ,[object Object]
List employer, job title, and even work schedule (the latter by posting just before leaving for work and again right after returning).
Post pictures of their home on social media sites. This provides criminals with location of doors and windows. Shrubbery where they can hide if necessary.
Post pictures of their possessions. A new car in the garage or driveway, a recently acquired work of art with other items of interest as background in the picture.
Posting times when the home will be vacant—going on vacation, going to a movie, sporting event, night on the town, etc.MORE TO LEARN!!!  See the last link on this slide! For teaching kids: educate yourself about social networking by reading the information at the following link: http://www.onguardonline.gov/topics/social-networking-sites.aspx Information from: http://www.suite101.com/content/safety-tips-for-adults-using-social-media-a279037
How to Deflect Lightening FILE SHARING Peer-to-peer (P2P) file-sharing allows users to share files online through an informal network of computers running the same software. File-sharing can give you access to a wealth of information, but it also has a number of risks. If you're considering P2P file-sharing: Install file-sharing software carefully, so that you know what's being shared. Changes you make to the default settings of the "save" or "shared" folder might cause you to share folders and subfolders you don't want to share. Check the proper settings so that other users of the file-sharing network won't have access to your private files, folders, or sub-folders. Use a security program from a vendor you know and trust; keep that software and your operating system up-to-date. Some file-sharing software may install malware or adware, and some files may include unwanted content. Information from: http://www.onguardonline.gov/topics/p2p-security.aspx
How to Deflect Lightening FILE SHARING If you're considering P2P file-sharing (continued): You may want to adjust the file-sharing program's controls so that it is not connected to the P2P network all the time. Some file-sharing programs automatically open every time you turn on your computer and continue to operate even when you "close" them. Consider setting up separate user accounts, in addition to the administrator's account, if your computer has multiple users. Limiting rights on user accounts may help protect your computer from unwanted software and your data from unwelcome sharing. Back up data you don't want to lose in case of a computer crash, and use a password to protect any files that contain sensitive information. Information from: http://www.onguardonline.gov/topics/p2p-security.aspx
How to Deflect Lightening MOBILE DEVICES Smart phones, cell phones, and handheld PCs can also be infected with viruses. Your mobile device can be infected when you download programs or files that are already infected. In the case of mobile phones, that might mean downloading photos, video clips, ring tones, cell phone themes, or other programs. Mobile viruses can also spread through cell phones that are equipped with Bluetooth.  If you have Bluetooth enabled on your mobile device and in "discoverable mode" (see the manual that came with your device for more information), and you come within 30 feet of another infected device that also has Bluetooth enabled and is running the same operating system as your mobile device, then you might get infected. Only download or accept programs and content (including photos, video clips, ring tones, mobile device themes, and games) from a source you trust.  Information from: http://www.onguardonline.gov/topics/p2p-security.aspx
How to Deflect Lightening MOBILE DEVICES If your phone is equipped with Bluetooth, turn it off or set it to non-discoverable mode when you're not using it. If your phone is equipped with Infrared beam, only allow it to receive incoming beams when you're receiving data from a source you trust. Download and install antivirus software for your mobile device. Remember to treat your phone or other handheld device as carefully you would your wallet, especially in places that are prone to theft. Lock or protect your mobile device with a password, so if you do lose your mobile device, a thief will have a more difficult time using it to make phone calls or access personal information you may have stored on it. Information from: http://www.onguardonline.gov/topics/p2p-security.aspx
How to Deflect Lightening MOBILE DEVICES Make sure you know how to block others from calling your phone. Using caller id you can block all incoming calls or block individual names and numbers.  Make a record of your Electronic Serial Number (ESN) and/or your International Mobile Equipment Identity (IMEI) number.  Note: You can find out your IMEI number by pressing *#06# on your mobile phone's keypad, it will display a 15 digit number - that is your IMEI number.  Information from: http://its.uah.edu/security/SEC_Mobile_Device_Safety.pdf
How to Deflect Lightening MOBILE DEVICES (continued) Beware of the GPS location feature in your mobile device and the applications that use it, such as Google Latitude and Facebook’s friend-finder. These tracking “features” that advertise where you are and where you are not can be used for crimes from stalking to robbery.  Do not allow others to take pictures or videos of you without your permission. Remember – these pictures and videos can be posted to the Internet.  Be careful if you meet someone in real life who you only "know" through text messaging. Even though text messaging is often the "next step" after online chatting, that does not mean that it is safer.  Information from: http://its.uah.edu/security/SEC_Mobile_Device_Safety.pdf

More Related Content

What's hot

online spying tools
online spying toolsonline spying tools
online spying toolsDeepa Jacob
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is DangerousGihan Dias
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
 
Cyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalCyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalResham Acharya
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security riskK. A. M Lutfullah
 
5 a module online privacy
5 a module online privacy5 a module online privacy
5 a module online privacyRozell Sneede
 
The Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyThe Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyJonathan Bacon
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet- Mark - Fullbright
 
CYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWCYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWBilly Warero
 
Technology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreTechnology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreWilliam Mann
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself OnlineGary Wagnon
 

What's hot (20)

online spying tools
online spying toolsonline spying tools
online spying tools
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Cyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalCyber security tips in Banking in Nepal
Cyber security tips in Banking in Nepal
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 
5 a module online privacy
5 a module online privacy5 a module online privacy
5 a module online privacy
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Online Safety
Online Safety Online Safety
Online Safety
 
The Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyThe Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and Privacy
 
Keeping Your Kids Safe Online Smart Card
Keeping Your Kids Safe Online Smart CardKeeping Your Kids Safe Online Smart Card
Keeping Your Kids Safe Online Smart Card
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet
 
Pad 750 podcast
Pad 750 podcastPad 750 podcast
Pad 750 podcast
 
Securityguide
SecurityguideSecurityguide
Securityguide
 
CYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWCYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEW
 
Technology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreTechnology Training - Security, Passwords & More
Technology Training - Security, Passwords & More
 
Users guide
Users guideUsers guide
Users guide
 
Emp tech las-week-2
Emp tech las-week-2Emp tech las-week-2
Emp tech las-week-2
 
Guide to pc_security
Guide to pc_securityGuide to pc_security
Guide to pc_security
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself Online
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 

Viewers also liked

GRAMMAR: Idioms 1
GRAMMAR: Idioms 1GRAMMAR: Idioms 1
GRAMMAR: Idioms 1Natalia
 
Unit 6 Evaluating Elearning Practice 30 Nov09 1
Unit 6 Evaluating Elearning Practice 30 Nov09 1Unit 6 Evaluating Elearning Practice 30 Nov09 1
Unit 6 Evaluating Elearning Practice 30 Nov09 1Catherine El-Bez
 
Pedagocical Agents
Pedagocical AgentsPedagocical Agents
Pedagocical AgentsFIT Ltd
 
Intro Lake Nichada
Intro Lake NichadaIntro Lake Nichada
Intro Lake Nichadaguest969f41
 
Stagegatesummit J Ic
Stagegatesummit J IcStagegatesummit J Ic
Stagegatesummit J IcJohnIrven
 
U Johannesburg Knowledge Presentation
U Johannesburg Knowledge PresentationU Johannesburg Knowledge Presentation
U Johannesburg Knowledge Presentationguest457a87
 
Effective b2 b link building optify
Effective b2 b link building   optifyEffective b2 b link building   optify
Effective b2 b link building optifyOptify
 
Understanding Chemical Reactions Revision
Understanding Chemical Reactions RevisionUnderstanding Chemical Reactions Revision
Understanding Chemical Reactions Revisionamr hassaan
 
Social Media Success
Social Media SuccessSocial Media Success
Social Media SuccessJuan Pittau
 
Preparing For The Mi Phy 2010
Preparing For The Mi Phy 2010Preparing For The Mi Phy 2010
Preparing For The Mi Phy 2010Kim Kovalchick
 
Logística Empresarial Noticias
Logística Empresarial NoticiasLogística Empresarial Noticias
Logística Empresarial NoticiasWeNova Consulting
 
Landing page A/B testing with Google and Optify
Landing page A/B testing with Google and OptifyLanding page A/B testing with Google and Optify
Landing page A/B testing with Google and OptifyOptify
 
A tribute to simon gillespie by dr. jeffrey lant master marketer and also col...
A tribute to simon gillespie by dr. jeffrey lant master marketer and also col...A tribute to simon gillespie by dr. jeffrey lant master marketer and also col...
A tribute to simon gillespie by dr. jeffrey lant master marketer and also col...howie martell
 
Social Media in the digitalmediamix
Social Media in the digitalmediamix Social Media in the digitalmediamix
Social Media in the digitalmediamix Juan Pittau
 

Viewers also liked (20)

GRAMMAR: Idioms 1
GRAMMAR: Idioms 1GRAMMAR: Idioms 1
GRAMMAR: Idioms 1
 
Unit 6 Evaluating Elearning Practice 30 Nov09 1
Unit 6 Evaluating Elearning Practice 30 Nov09 1Unit 6 Evaluating Elearning Practice 30 Nov09 1
Unit 6 Evaluating Elearning Practice 30 Nov09 1
 
Id
IdId
Id
 
Pedagocical Agents
Pedagocical AgentsPedagocical Agents
Pedagocical Agents
 
Intro Lake Nichada
Intro Lake NichadaIntro Lake Nichada
Intro Lake Nichada
 
Stagegatesummit J Ic
Stagegatesummit J IcStagegatesummit J Ic
Stagegatesummit J Ic
 
U Johannesburg Knowledge Presentation
U Johannesburg Knowledge PresentationU Johannesburg Knowledge Presentation
U Johannesburg Knowledge Presentation
 
Effective b2 b link building optify
Effective b2 b link building   optifyEffective b2 b link building   optify
Effective b2 b link building optify
 
Understanding Chemical Reactions Revision
Understanding Chemical Reactions RevisionUnderstanding Chemical Reactions Revision
Understanding Chemical Reactions Revision
 
Social Media Success
Social Media SuccessSocial Media Success
Social Media Success
 
Zmot handbook
Zmot handbookZmot handbook
Zmot handbook
 
Vu Kd Pristatymas
Vu Kd PristatymasVu Kd Pristatymas
Vu Kd Pristatymas
 
Preparing For The Mi Phy 2010
Preparing For The Mi Phy 2010Preparing For The Mi Phy 2010
Preparing For The Mi Phy 2010
 
Social media
Social mediaSocial media
Social media
 
Logística Empresarial Noticias
Logística Empresarial NoticiasLogística Empresarial Noticias
Logística Empresarial Noticias
 
synartiseis
synartiseissynartiseis
synartiseis
 
Landing page A/B testing with Google and Optify
Landing page A/B testing with Google and OptifyLanding page A/B testing with Google and Optify
Landing page A/B testing with Google and Optify
 
Pisuvanje za na web
Pisuvanje za na webPisuvanje za na web
Pisuvanje za na web
 
A tribute to simon gillespie by dr. jeffrey lant master marketer and also col...
A tribute to simon gillespie by dr. jeffrey lant master marketer and also col...A tribute to simon gillespie by dr. jeffrey lant master marketer and also col...
A tribute to simon gillespie by dr. jeffrey lant master marketer and also col...
 
Social Media in the digitalmediamix
Social Media in the digitalmediamix Social Media in the digitalmediamix
Social Media in the digitalmediamix
 

Similar to Presentation for class

October 2012 is_national_cyber_security_awareness_month
October 2012 is_national_cyber_security_awareness_monthOctober 2012 is_national_cyber_security_awareness_month
October 2012 is_national_cyber_security_awareness_monthEvelyn Berrier
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014B2BPlanner Ltd.
 
Cyber crime awareness
Cyber crime awarenessCyber crime awareness
Cyber crime awarenessArjun Chetry
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guideNguyen Xuan Quang
 
How to protect your digital footprint
How to protect your digital footprintHow to protect your digital footprint
How to protect your digital footprintCybermaterial
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101mateenzero
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptxAchu69
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS
 
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureSmartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureHeimdal Security
 
Cybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsCybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsKevin Fream
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1Rozell Sneede
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraDevsena Mishra
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02amiinaaa
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things The Center for Identity
 
InfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security TipsInfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security TipsLiberteks
 

Similar to Presentation for class (20)

October 2012 is_national_cyber_security_awareness_month
October 2012 is_national_cyber_security_awareness_monthOctober 2012 is_national_cyber_security_awareness_month
October 2012 is_national_cyber_security_awareness_month
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 
Canadian Consumer Handbook
Canadian Consumer HandbookCanadian Consumer Handbook
Canadian Consumer Handbook
 
Cyber crime awareness
Cyber crime awarenessCyber crime awareness
Cyber crime awareness
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guide
 
How to protect your digital footprint
How to protect your digital footprintHow to protect your digital footprint
How to protect your digital footprint
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurity
 
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureSmartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
 
Cybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsCybersecurity Awareness Month Tips
Cybersecurity Awareness Month Tips
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena Mishra
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 
InfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security TipsInfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security Tips
 

Recently uploaded

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 

Recently uploaded (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 

Presentation for class

  • 2. Being victimized online feels like lightening hit you.
  • 3. Ways Lightening Strikes Email Online Accounts Websites Social Networking File Sharing Mobile Devices Wireless Home Networks
  • 4. How to Deflect Lightening EMAIL Don't email personal or financial information. Be cautious about opening any attachment or downloading any files from emails you receive, regardless of who sent them. Forward phishing emails to spam@uce.gov – and to the company, bank, or organization impersonated in the phishing email. You also may report phishing email to reportphishing@antiphishing.org. The Anti-Phishing Working Group, a consortium of ISPs, security vendors, financial institutions and law enforcement agencies, uses these reports to fight phishing. Information from: http://www.onguardonline.gov/topics/phishing.aspx
  • 5. How to Deflect Lightening EMAIL Don't reply to email or pop-up messages that ask for personal or financial information, and don't click on links in the message. Don't cut and paste a link from the message into your Web browser — phishers can make links look like they go one place, but that actually send you to a different site. Some scammers send an email that appears to be from a legitimate business and ask you to call a phone number to update your account or access a "refund." Because they use Voice over Internet Protocol (VOIP) technology, the area code you call does not reflect where the scammers really are. If you need to reach an organization you do business with, call the number on your financial statements or on the back of your credit card. Information from: http://www.onguardonline.gov/topics/phishing.aspx
  • 6. How to Deflect Lightening ONLINE ACCOUNTS Educate yourself about online financial transactions, banking and shopping by reading the information at the following link: http://www.ftc.gov/bcp/menus/consumer/tech/online.shtm Don't email personal or financial information. Review credit card and bank account statements as soon as you receive them to check for unauthorized charges. Some of the information from: http://www.ftc.gov/bcp/edu/pubs/consumer/tech/tec01.shtm
  • 7. How to Deflect Lightening ONLINE ACCOUNTS Use a secure browser. Check the site’s privacy policy. Keep records of your online transactions and check your email. Idea: if you frequently shop online, open a separate account with it’s own debit card and put only the amount of money you will shop with in the account (separate from your main account for direct deposits of your paychecks, etc.). Some of the information from: http://www.ftc.gov/bcp/edu/pubs/consumer/tech/tec01.shtm
  • 8. How to Deflect Lightening WEBSITES Educate yourself about website cons by reading the information at the following link: http://www.ftc.gov/bcp/edu/pubs/consumer/tech/tec09.shtm Use the free service from the website “Web of Trust” which provides a free software downloaded into your browser so while you are browsing, you can avoid websites that are unsafe. To learn more, go to: http://www.mywot.com/ When using an open web connection such as a free wireless access point (internet cafes, etc.), use a free operating system loaded on a CD or flash drive that still allows you to access your files but secures your computer’s operating system from spyware, malware, viruses, etc. because its not in use while you are using the CD or flashdrive. For more information read: http://ezinearticles.com/?Protecting-Yourself-on-an-Open-Internet-Connection&id=4172381 One example of a free operating system to use in this manner: http://www.ubuntu.com/desktop/get-ubuntu/download
  • 9. How to Deflect Lightening SOCIAL NETWORKING Adults have to practice safety while networking online as well. Practice what you preach to your children. While limiting access to close friends and relatives may seem safe, a user cannot be certain that one of those friends or relatives didn’t decide to “share” the information by reposting it to their friends and relatives? “I really envy Sally Smith. She’s going to a taping of Oprah on Wednesday and then she’s going shopping for her daughter’s prom dress.” Information from: http://www.suite101.com/content/safety-tips-for-adults-using-social-media-a279037
  • 10.
  • 11. List employer, job title, and even work schedule (the latter by posting just before leaving for work and again right after returning).
  • 12. Post pictures of their home on social media sites. This provides criminals with location of doors and windows. Shrubbery where they can hide if necessary.
  • 13. Post pictures of their possessions. A new car in the garage or driveway, a recently acquired work of art with other items of interest as background in the picture.
  • 14. Posting times when the home will be vacant—going on vacation, going to a movie, sporting event, night on the town, etc.MORE TO LEARN!!! See the last link on this slide! For teaching kids: educate yourself about social networking by reading the information at the following link: http://www.onguardonline.gov/topics/social-networking-sites.aspx Information from: http://www.suite101.com/content/safety-tips-for-adults-using-social-media-a279037
  • 15. How to Deflect Lightening FILE SHARING Peer-to-peer (P2P) file-sharing allows users to share files online through an informal network of computers running the same software. File-sharing can give you access to a wealth of information, but it also has a number of risks. If you're considering P2P file-sharing: Install file-sharing software carefully, so that you know what's being shared. Changes you make to the default settings of the "save" or "shared" folder might cause you to share folders and subfolders you don't want to share. Check the proper settings so that other users of the file-sharing network won't have access to your private files, folders, or sub-folders. Use a security program from a vendor you know and trust; keep that software and your operating system up-to-date. Some file-sharing software may install malware or adware, and some files may include unwanted content. Information from: http://www.onguardonline.gov/topics/p2p-security.aspx
  • 16. How to Deflect Lightening FILE SHARING If you're considering P2P file-sharing (continued): You may want to adjust the file-sharing program's controls so that it is not connected to the P2P network all the time. Some file-sharing programs automatically open every time you turn on your computer and continue to operate even when you "close" them. Consider setting up separate user accounts, in addition to the administrator's account, if your computer has multiple users. Limiting rights on user accounts may help protect your computer from unwanted software and your data from unwelcome sharing. Back up data you don't want to lose in case of a computer crash, and use a password to protect any files that contain sensitive information. Information from: http://www.onguardonline.gov/topics/p2p-security.aspx
  • 17. How to Deflect Lightening MOBILE DEVICES Smart phones, cell phones, and handheld PCs can also be infected with viruses. Your mobile device can be infected when you download programs or files that are already infected. In the case of mobile phones, that might mean downloading photos, video clips, ring tones, cell phone themes, or other programs. Mobile viruses can also spread through cell phones that are equipped with Bluetooth. If you have Bluetooth enabled on your mobile device and in "discoverable mode" (see the manual that came with your device for more information), and you come within 30 feet of another infected device that also has Bluetooth enabled and is running the same operating system as your mobile device, then you might get infected. Only download or accept programs and content (including photos, video clips, ring tones, mobile device themes, and games) from a source you trust. Information from: http://www.onguardonline.gov/topics/p2p-security.aspx
  • 18. How to Deflect Lightening MOBILE DEVICES If your phone is equipped with Bluetooth, turn it off or set it to non-discoverable mode when you're not using it. If your phone is equipped with Infrared beam, only allow it to receive incoming beams when you're receiving data from a source you trust. Download and install antivirus software for your mobile device. Remember to treat your phone or other handheld device as carefully you would your wallet, especially in places that are prone to theft. Lock or protect your mobile device with a password, so if you do lose your mobile device, a thief will have a more difficult time using it to make phone calls or access personal information you may have stored on it. Information from: http://www.onguardonline.gov/topics/p2p-security.aspx
  • 19. How to Deflect Lightening MOBILE DEVICES Make sure you know how to block others from calling your phone. Using caller id you can block all incoming calls or block individual names and numbers. Make a record of your Electronic Serial Number (ESN) and/or your International Mobile Equipment Identity (IMEI) number. Note: You can find out your IMEI number by pressing *#06# on your mobile phone's keypad, it will display a 15 digit number - that is your IMEI number. Information from: http://its.uah.edu/security/SEC_Mobile_Device_Safety.pdf
  • 20. How to Deflect Lightening MOBILE DEVICES (continued) Beware of the GPS location feature in your mobile device and the applications that use it, such as Google Latitude and Facebook’s friend-finder. These tracking “features” that advertise where you are and where you are not can be used for crimes from stalking to robbery. Do not allow others to take pictures or videos of you without your permission. Remember – these pictures and videos can be posted to the Internet. Be careful if you meet someone in real life who you only "know" through text messaging. Even though text messaging is often the "next step" after online chatting, that does not mean that it is safer. Information from: http://its.uah.edu/security/SEC_Mobile_Device_Safety.pdf
  • 21. How to Deflect Lightening WIRELESS HOME NETWORKS Wireless internet access can offer convenience and mobility. But there are steps you should take to protect your wireless network and the computers on it. Use encryption to scramble communications over the network. If you have a choice, WiFi Protected Access (especially WPA2) is stronger than Wired Equivalent Privacy (WEP). Use anti-virus and anti-spyware software, and a firewall. Most wireless routers have a mechanism called identifier broadcasting. Turn it off so your computer won't send a signal to any device in the vicinity announcing its presence. Information from: http://www.onguardonline.gov/topics/wireless-security.aspx
  • 22. How to Deflect Lightening WIRELESS HOME NETWORKS Change the identifier on your router from the default so a hacker can't use the manufacturer's default identifier to try to access your network. Change your router's pre-set password for administration to something only you know. The longer the password, the tougher it is to crack. Allow only specific computers to access your wireless network. Information from: http://www.onguardonline.gov/topics/wireless-security.aspx
  • 23. For Extra Lightening Protection http://www.cybercrime.gov/ http://www.usa.gov/Citizen/Topics/Internet_Fraud.shtml http://www.onguardonline.gov/ http://www.usa.gov/Citizen/Topics/Internet_Fraud.shtml