SlideShare uma empresa Scribd logo
1 de 39
Computer / Internet Security
West Haven Public Library
www.westhavenlibrary.org
Computer / Internet Security
• Use of internet services are unavoidable
▫ Job applications, school applications, taxes, credit,
banking, DMV forms, personal communication
(email), social networking (facebook), shopping,
research, entertainment
• All parts of your life potentially have an online
counterpart
Computer / Internet Security
• Everything you do online…
▫ Every account you make
▫ Every purchase
▫ Every job application
• Creates data about you
Computer / Internet Security
• Not always a bad thing… BUT
▫ Danger in losing control of your data (accounts)
▫ Danger in over sharing
▫ Danger in important data being destroyed
(photos, records, documents)
Good News
It’s easy to stay safe and protect yourself
Computer / Internet Security
Goals
• Secure your data
• Keep what’s private
PRIVATE
• Prevent attack/ intrusion
• Prepare for the worst,
prevent loss
Computer / Internet Security
Goals Action
• Secure your data
• Keep what’s private PRIVATE
• Prevent attack/ intrusion
• Prepare for the worst, prevent
loss
• Use better password practices
• Be aware of what/how you
share
• Be proactive- use protective
software- be vigilant
• BACKUP, BACKUP, BACKUP
Data?
• Your data is anything on your computer or
information stored in online accounts
▫ Documents, files, photos
▫ Online shopping sites
▫ Banking, credit card
▫ Social networking profiles
• Data that you own/control
• Private (banking info)
• Public (online profiles)
Why bother?
• Whether public (online profiles) or private
(financial info) you need to stay in control
• Ensure that only authorized people can access
your data, accounts, files
Web-based accounts and services are increasingly
important
Dangers
•Breaches can come from
▫ Leaked/ stolen data
 Leaked by a company or organization
 Stolen via virus on a computer you use
▫ Targeted attacks
▫ Automated attacks- cracks
Dangers
• Virus, Malware, Spyware, Adware, Trojans
▫ Software created to steal information, change
settings, destroy files, take control of your system
▫ Most commonly contracted online unbeknownst
to the user
 Email attachments, malicious websites, software
downloads, toolbars
Secure Your Data
• Biggest step is use better password
practices
▫ more difficult to guess
▫ Harder to crack (longer in length)
▫ Make it easier to deal with if username/passwords
are leaked
Better Passwords
• Don't use passwords that are based on personal
information that can be easily accessed or
guessed.
▫ It may be easier than you think to guess your pet’s
name, birthday, child’s name, favorite
color, mother’s maiden name, etc.
▫ “password” “love” are extremely common and
easily guessed
25 Worst Passwords of 2011
1. password
2. 123456
3.12345678
4. qwerty
5. abc123
6. monkey
7. 1234567
8. letmein
9. trustno1
10. dragon
11. baseball
12. 111111
13. iloveyou
14. master
15. sunshine
16. ashley
17. bailey
18. passw0rd
19. shadow
20. 123123
21. 654321
22. superman
23. qazwsx
24. michael
25. football
http://mashable.com/2011/11/17/worst-internet-
passwords/
Better Passwords
• Don't use words that can be found in any
dictionary of any language.
▫ A single word, spelled correctly, is easy to check
against a dictionary
▫ Single words are also short, easy to break using
random guesses.
Stronger Passwords
• Use both lowercase and capital letters.
• Use a combination of letters, numbers, and
special characters.
▫ Maine96knees@MtSnow
• Develop a mnemonic for remembering complex
passwords.
Stronger Passwords
• Use passphrases when you can.
▫ Longer in length- harder to guess/ crack
▫ Easier to remember
▫ puppytograndmasforsummervacation
Stronger Passwords
• Use different passwords on different systems
▫ If you use the same password at one site that is
broken into- then attackers can access your data at
other sites using that same username/password.
Use different
passwords on
different systems
Keep what’s private PRIVATE
• Be aware of what you share
• When creating an account consider who you are
giving your data to
• Any site asking for banking, social security, or
login information for a different site should be
closely examined.
Keep what’s private PRIVATE
• When creating accounts consider what you are
entering and how it will be used
• You decide your comfort level with what you
share
Email
• Email is more like a postcard than a letter
• Chances are no one other than the recipient will
see it BUT it is possible for others see its content
along the way (just like a postcard)
• Do not email: credit card #, logins/passwords
Web Addresses- URL
URL (Uniform Resource Locator)
The address that connects you with a website.
Parts of the URL
http://www.google.com
http:// = protocol [Hypertext Transfer Protocol]
www. = World Wide Web
google = domain name
.com = domain type
Domain Types
.com = commercial
.org = generally nonprofit organizations
.edu = higher education
.gov = U.S. government agency
Browsing the Web- Secure Sites
• Any site asking for sensitive info should be
encrypted (Banks, Insurance, etc.)
• Encrypted site addresses begin with
▫ https://www.google.com- ENCRYPTED
▫ http://www.google.com- NOT encrypted
Browsing the Web- Secure Sites
Browsing the Web
• As you browse the web- websites collect info
about you
• Your web browser keeps a history and collects
cookies from websites
• Use your browser settings to:
▫ Clear your browser cache/history/cookies
▫ Limit 3rd party cookies
Keep what’s private PRIVATE
• If you have WiFi at home, set a password
▫ Keep your neighbors off your network (unless you
want them there)
▫ Refer to the directions that came with your
Router/Modem/Wifi
Prevent attack/ intrusion
• A Virus will get in through an open door or you
unwillingly open the door yourself
Anti-Virus
• A program that scans your files and actively
monitors to prevent infection
• Once installed, anti-virus monitors for virus
activity, quarantines, and deletes
• Be sure to frequently run the virus scan
• Be sure that “definitions” are updated
Anti-Virus
• Free
▫ AVG
▫ Avast
▫ Microsoft Security Essentials
 www.windows.microsoft.com/mse
• Commercial
▫ McAffee
▫ Symantec Norton
▫ Bit Defender
Prevent attack/ intrusion
• Be vigilant
• Don’t download email attachments that you
don’t trust
• If something from someone you trust looks
suspicious check with them before opening
Prevent attack/ intrusion
• Scareware
▫ Virus/Malware that looks like an anti-virus
program
▫ Popup while browsing the web
• Know what Anti-virus you have and how to use it
Fake Anti-Virus Warning
Prepare for the worst
• Backup your important files
▫ Keep duplicate copies
• Worst case scenario: you will still have what’s
important to you
• Keep your backup current
Prepare for the worst
• Backup files locally
▫ Copy to cdr
▫ Flash drive
▫ external hard drive
• Paper copies
▫ tax returns
▫ Important photos
Prepare for the worst
• Cloud storage- files copied to a secure site over
the internet
▫ Be sure that service is reputable, safe, stable
▫ Backup regularly
Resources
• http://www.us-cert.gov/cas/tips/
• http://www.ftc.gov/bcp/edu/microsites/onguard/
westhavenlibrary.org
David Cirella, decirella@gmail.com - 2012-03-01

Mais conteúdo relacionado

Mais procurados

An Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereAn Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereBlake Carver
 
An Introduction To IT Security And Privacy In Libraries
 An Introduction To IT Security And Privacy In Libraries An Introduction To IT Security And Privacy In Libraries
An Introduction To IT Security And Privacy In LibrariesBlake Carver
 
Keeping you and your library safe and secure
Keeping you and your library safe and secureKeeping you and your library safe and secure
Keeping you and your library safe and secureLYRASIS
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesBlake Carver
 
An Introduction To IT Security And Privacy - Servers And More
An Introduction To IT Security And Privacy - Servers And MoreAn Introduction To IT Security And Privacy - Servers And More
An Introduction To IT Security And Privacy - Servers And MoreBlake Carver
 
Protect digital content before upload to Facebook, Utube and Flickr
Protect digital content before upload to Facebook, Utube and FlickrProtect digital content before upload to Facebook, Utube and Flickr
Protect digital content before upload to Facebook, Utube and FlickrStrategic Business & IT Services
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety Sadaf Walliyani
 
Password protection
Password protectionPassword protection
Password protectionpost_it
 
Online reputation
Online reputationOnline reputation
Online reputationesl2m
 
Ten Important Rules
Ten Important RulesTen Important Rules
Ten Important Rulesritz482
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteAngelito Quiambao
 
NHC Tips - Secure your ID Theft - By Bijay Acharya
NHC Tips - Secure your ID Theft - By Bijay AcharyaNHC Tips - Secure your ID Theft - By Bijay Acharya
NHC Tips - Secure your ID Theft - By Bijay AcharyaBijay Acharya
 
CyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_WatsonCyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_WatsonPatricia M Watson
 
Safe Internet Banking Cyber Security
Safe  Internet Banking Cyber SecuritySafe  Internet Banking Cyber Security
Safe Internet Banking Cyber SecurityKushantha Gunawardana
 
CYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWCYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWBilly Warero
 
Confidentiality in a Digital World
Confidentiality in a Digital WorldConfidentiality in a Digital World
Confidentiality in a Digital WorldDavid Whelan
 

Mais procurados (20)

An Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereAn Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & Anywhere
 
An Introduction To IT Security And Privacy In Libraries
 An Introduction To IT Security And Privacy In Libraries An Introduction To IT Security And Privacy In Libraries
An Introduction To IT Security And Privacy In Libraries
 
Keeping you and your library safe and secure
Keeping you and your library safe and secureKeeping you and your library safe and secure
Keeping you and your library safe and secure
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and Libraries
 
An Introduction To IT Security And Privacy - Servers And More
An Introduction To IT Security And Privacy - Servers And MoreAn Introduction To IT Security And Privacy - Servers And More
An Introduction To IT Security And Privacy - Servers And More
 
Protect digital content before upload to Facebook, Utube and Flickr
Protect digital content before upload to Facebook, Utube and FlickrProtect digital content before upload to Facebook, Utube and Flickr
Protect digital content before upload to Facebook, Utube and Flickr
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Password protection
Password protectionPassword protection
Password protection
 
Internet safety presentation sv
Internet safety presentation svInternet safety presentation sv
Internet safety presentation sv
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Ten Important Rules
Ten Important RulesTen Important Rules
Ten Important Rules
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
 
001 ho basic computer
001 ho basic computer001 ho basic computer
001 ho basic computer
 
NHC Tips - Secure your ID Theft - By Bijay Acharya
NHC Tips - Secure your ID Theft - By Bijay AcharyaNHC Tips - Secure your ID Theft - By Bijay Acharya
NHC Tips - Secure your ID Theft - By Bijay Acharya
 
CyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_WatsonCyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_Watson
 
Safe Internet Banking Cyber Security
Safe  Internet Banking Cyber SecuritySafe  Internet Banking Cyber Security
Safe Internet Banking Cyber Security
 
CYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWCYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEW
 
Confidentiality in a Digital World
Confidentiality in a Digital WorldConfidentiality in a Digital World
Confidentiality in a Digital World
 
Personal security
Personal securityPersonal security
Personal security
 

Destaque

Questions to consider
Questions to considerQuestions to consider
Questions to considerja02074
 
Account-Based Literacy A New Focus in Library Computer Instruction
Account-Based Literacy A New Focus in Library Computer InstructionAccount-Based Literacy A New Focus in Library Computer Instruction
Account-Based Literacy A New Focus in Library Computer InstructionDavid Cirella
 
M-ETH: Man in the Middle Ethernet - LaCon'09
M-ETH: Man in the Middle Ethernet - LaCon'09M-ETH: Man in the Middle Ethernet - LaCon'09
M-ETH: Man in the Middle Ethernet - LaCon'09Wintercore
 
Insights u kreiranje online medija kampanje
Insights u kreiranje online medija kampanjeInsights u kreiranje online medija kampanje
Insights u kreiranje online medija kampanjeBojan Rendulic
 
Jeopardy watsons
Jeopardy watsonsJeopardy watsons
Jeopardy watsonsja02074
 

Destaque (6)

Questions to consider
Questions to considerQuestions to consider
Questions to consider
 
Account-Based Literacy A New Focus in Library Computer Instruction
Account-Based Literacy A New Focus in Library Computer InstructionAccount-Based Literacy A New Focus in Library Computer Instruction
Account-Based Literacy A New Focus in Library Computer Instruction
 
M-ETH: Man in the Middle Ethernet - LaCon'09
M-ETH: Man in the Middle Ethernet - LaCon'09M-ETH: Man in the Middle Ethernet - LaCon'09
M-ETH: Man in the Middle Ethernet - LaCon'09
 
Wave 5 Srbija
Wave 5   SrbijaWave 5   Srbija
Wave 5 Srbija
 
Insights u kreiranje online medija kampanje
Insights u kreiranje online medija kampanjeInsights u kreiranje online medija kampanje
Insights u kreiranje online medija kampanje
 
Jeopardy watsons
Jeopardy watsonsJeopardy watsons
Jeopardy watsons
 

Semelhante a Computer / Internet Security

TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxKevinRiley83
 
Internet Security
Internet SecurityInternet Security
Internet Securitymjelson
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptxCharithraaAR
 
Security Best Practices for Regular Users
Security Best Practices for Regular UsersSecurity Best Practices for Regular Users
Security Best Practices for Regular UsersSecurity Innovation
 
Security best practices for regular users
Security best practices for regular usersSecurity best practices for regular users
Security best practices for regular usersGeoffrey Vaughan
 
Cyber security
Cyber security Cyber security
Cyber security ZwebaButt
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital AgeMarian Merritt
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProRonald Soh
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online PrivacyKazi Sarwar Hossain
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Abzetdin Adamov
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcareNicholas Davis
 
securityawareness.pptx
securityawareness.pptxsecurityawareness.pptx
securityawareness.pptxbinowe
 
securityawareness.pptx
securityawareness.pptxsecurityawareness.pptx
securityawareness.pptxreagan sapul
 
Securityawareness
SecurityawarenessSecurityawareness
SecurityawarenessJayfErika
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupBrian Pichman
 

Semelhante a Computer / Internet Security (20)

TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
Lesson 5 protecting yourself on the internet
Lesson 5 protecting yourself on the internetLesson 5 protecting yourself on the internet
Lesson 5 protecting yourself on the internet
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Security Best Practices for Regular Users
Security Best Practices for Regular UsersSecurity Best Practices for Regular Users
Security Best Practices for Regular Users
 
Security best practices for regular users
Security best practices for regular usersSecurity best practices for regular users
Security best practices for regular users
 
Cyber security
Cyber security Cyber security
Cyber security
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
Personal Threat Models
Personal Threat ModelsPersonal Threat Models
Personal Threat Models
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcare
 
securityawareness.pptx
securityawareness.pptxsecurityawareness.pptx
securityawareness.pptx
 
securityawareness.pptx
securityawareness.pptxsecurityawareness.pptx
securityawareness.pptx
 
Securityawareness
SecurityawarenessSecurityawareness
Securityawareness
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library Setup
 

Último

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 

Último (20)

INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 

Computer / Internet Security

  • 1. Computer / Internet Security West Haven Public Library www.westhavenlibrary.org
  • 2. Computer / Internet Security • Use of internet services are unavoidable ▫ Job applications, school applications, taxes, credit, banking, DMV forms, personal communication (email), social networking (facebook), shopping, research, entertainment • All parts of your life potentially have an online counterpart
  • 3. Computer / Internet Security • Everything you do online… ▫ Every account you make ▫ Every purchase ▫ Every job application • Creates data about you
  • 4. Computer / Internet Security • Not always a bad thing… BUT ▫ Danger in losing control of your data (accounts) ▫ Danger in over sharing ▫ Danger in important data being destroyed (photos, records, documents)
  • 5. Good News It’s easy to stay safe and protect yourself
  • 6. Computer / Internet Security Goals • Secure your data • Keep what’s private PRIVATE • Prevent attack/ intrusion • Prepare for the worst, prevent loss
  • 7. Computer / Internet Security Goals Action • Secure your data • Keep what’s private PRIVATE • Prevent attack/ intrusion • Prepare for the worst, prevent loss • Use better password practices • Be aware of what/how you share • Be proactive- use protective software- be vigilant • BACKUP, BACKUP, BACKUP
  • 8. Data? • Your data is anything on your computer or information stored in online accounts ▫ Documents, files, photos ▫ Online shopping sites ▫ Banking, credit card ▫ Social networking profiles • Data that you own/control • Private (banking info) • Public (online profiles)
  • 9. Why bother? • Whether public (online profiles) or private (financial info) you need to stay in control • Ensure that only authorized people can access your data, accounts, files Web-based accounts and services are increasingly important
  • 10. Dangers •Breaches can come from ▫ Leaked/ stolen data  Leaked by a company or organization  Stolen via virus on a computer you use ▫ Targeted attacks ▫ Automated attacks- cracks
  • 11. Dangers • Virus, Malware, Spyware, Adware, Trojans ▫ Software created to steal information, change settings, destroy files, take control of your system ▫ Most commonly contracted online unbeknownst to the user  Email attachments, malicious websites, software downloads, toolbars
  • 12. Secure Your Data • Biggest step is use better password practices ▫ more difficult to guess ▫ Harder to crack (longer in length) ▫ Make it easier to deal with if username/passwords are leaked
  • 13. Better Passwords • Don't use passwords that are based on personal information that can be easily accessed or guessed. ▫ It may be easier than you think to guess your pet’s name, birthday, child’s name, favorite color, mother’s maiden name, etc. ▫ “password” “love” are extremely common and easily guessed
  • 14. 25 Worst Passwords of 2011 1. password 2. 123456 3.12345678 4. qwerty 5. abc123 6. monkey 7. 1234567 8. letmein 9. trustno1 10. dragon 11. baseball 12. 111111 13. iloveyou 14. master 15. sunshine 16. ashley 17. bailey 18. passw0rd 19. shadow 20. 123123 21. 654321 22. superman 23. qazwsx 24. michael 25. football http://mashable.com/2011/11/17/worst-internet- passwords/
  • 15. Better Passwords • Don't use words that can be found in any dictionary of any language. ▫ A single word, spelled correctly, is easy to check against a dictionary ▫ Single words are also short, easy to break using random guesses.
  • 16. Stronger Passwords • Use both lowercase and capital letters. • Use a combination of letters, numbers, and special characters. ▫ Maine96knees@MtSnow • Develop a mnemonic for remembering complex passwords.
  • 17. Stronger Passwords • Use passphrases when you can. ▫ Longer in length- harder to guess/ crack ▫ Easier to remember ▫ puppytograndmasforsummervacation
  • 18. Stronger Passwords • Use different passwords on different systems ▫ If you use the same password at one site that is broken into- then attackers can access your data at other sites using that same username/password.
  • 20. Keep what’s private PRIVATE • Be aware of what you share • When creating an account consider who you are giving your data to • Any site asking for banking, social security, or login information for a different site should be closely examined.
  • 21. Keep what’s private PRIVATE • When creating accounts consider what you are entering and how it will be used • You decide your comfort level with what you share
  • 22. Email • Email is more like a postcard than a letter • Chances are no one other than the recipient will see it BUT it is possible for others see its content along the way (just like a postcard) • Do not email: credit card #, logins/passwords
  • 24. URL (Uniform Resource Locator) The address that connects you with a website. Parts of the URL http://www.google.com http:// = protocol [Hypertext Transfer Protocol] www. = World Wide Web google = domain name .com = domain type Domain Types .com = commercial .org = generally nonprofit organizations .edu = higher education .gov = U.S. government agency
  • 25. Browsing the Web- Secure Sites • Any site asking for sensitive info should be encrypted (Banks, Insurance, etc.) • Encrypted site addresses begin with ▫ https://www.google.com- ENCRYPTED ▫ http://www.google.com- NOT encrypted
  • 26. Browsing the Web- Secure Sites
  • 27. Browsing the Web • As you browse the web- websites collect info about you • Your web browser keeps a history and collects cookies from websites • Use your browser settings to: ▫ Clear your browser cache/history/cookies ▫ Limit 3rd party cookies
  • 28.
  • 29. Keep what’s private PRIVATE • If you have WiFi at home, set a password ▫ Keep your neighbors off your network (unless you want them there) ▫ Refer to the directions that came with your Router/Modem/Wifi
  • 30. Prevent attack/ intrusion • A Virus will get in through an open door or you unwillingly open the door yourself
  • 31. Anti-Virus • A program that scans your files and actively monitors to prevent infection • Once installed, anti-virus monitors for virus activity, quarantines, and deletes • Be sure to frequently run the virus scan • Be sure that “definitions” are updated
  • 32. Anti-Virus • Free ▫ AVG ▫ Avast ▫ Microsoft Security Essentials  www.windows.microsoft.com/mse • Commercial ▫ McAffee ▫ Symantec Norton ▫ Bit Defender
  • 33. Prevent attack/ intrusion • Be vigilant • Don’t download email attachments that you don’t trust • If something from someone you trust looks suspicious check with them before opening
  • 34. Prevent attack/ intrusion • Scareware ▫ Virus/Malware that looks like an anti-virus program ▫ Popup while browsing the web • Know what Anti-virus you have and how to use it
  • 36. Prepare for the worst • Backup your important files ▫ Keep duplicate copies • Worst case scenario: you will still have what’s important to you • Keep your backup current
  • 37. Prepare for the worst • Backup files locally ▫ Copy to cdr ▫ Flash drive ▫ external hard drive • Paper copies ▫ tax returns ▫ Important photos
  • 38. Prepare for the worst • Cloud storage- files copied to a secure site over the internet ▫ Be sure that service is reputable, safe, stable ▫ Backup regularly