1. Computer / Internet Security
West Haven Public Library
www.westhavenlibrary.org
2. Computer / Internet Security
• Use of internet services are unavoidable
▫ Job applications, school applications, taxes, credit,
banking, DMV forms, personal communication
(email), social networking (facebook), shopping,
research, entertainment
• All parts of your life potentially have an online
counterpart
3. Computer / Internet Security
• Everything you do online…
▫ Every account you make
▫ Every purchase
▫ Every job application
• Creates data about you
4. Computer / Internet Security
• Not always a bad thing… BUT
▫ Danger in losing control of your data (accounts)
▫ Danger in over sharing
▫ Danger in important data being destroyed
(photos, records, documents)
6. Computer / Internet Security
Goals
• Secure your data
• Keep what’s private
PRIVATE
• Prevent attack/ intrusion
• Prepare for the worst,
prevent loss
7. Computer / Internet Security
Goals Action
• Secure your data
• Keep what’s private PRIVATE
• Prevent attack/ intrusion
• Prepare for the worst, prevent
loss
• Use better password practices
• Be aware of what/how you
share
• Be proactive- use protective
software- be vigilant
• BACKUP, BACKUP, BACKUP
8. Data?
• Your data is anything on your computer or
information stored in online accounts
▫ Documents, files, photos
▫ Online shopping sites
▫ Banking, credit card
▫ Social networking profiles
• Data that you own/control
• Private (banking info)
• Public (online profiles)
9. Why bother?
• Whether public (online profiles) or private
(financial info) you need to stay in control
• Ensure that only authorized people can access
your data, accounts, files
Web-based accounts and services are increasingly
important
10. Dangers
•Breaches can come from
▫ Leaked/ stolen data
Leaked by a company or organization
Stolen via virus on a computer you use
▫ Targeted attacks
▫ Automated attacks- cracks
11. Dangers
• Virus, Malware, Spyware, Adware, Trojans
▫ Software created to steal information, change
settings, destroy files, take control of your system
▫ Most commonly contracted online unbeknownst
to the user
Email attachments, malicious websites, software
downloads, toolbars
12. Secure Your Data
• Biggest step is use better password
practices
▫ more difficult to guess
▫ Harder to crack (longer in length)
▫ Make it easier to deal with if username/passwords
are leaked
13. Better Passwords
• Don't use passwords that are based on personal
information that can be easily accessed or
guessed.
▫ It may be easier than you think to guess your pet’s
name, birthday, child’s name, favorite
color, mother’s maiden name, etc.
▫ “password” “love” are extremely common and
easily guessed
15. Better Passwords
• Don't use words that can be found in any
dictionary of any language.
▫ A single word, spelled correctly, is easy to check
against a dictionary
▫ Single words are also short, easy to break using
random guesses.
16. Stronger Passwords
• Use both lowercase and capital letters.
• Use a combination of letters, numbers, and
special characters.
▫ Maine96knees@MtSnow
• Develop a mnemonic for remembering complex
passwords.
17. Stronger Passwords
• Use passphrases when you can.
▫ Longer in length- harder to guess/ crack
▫ Easier to remember
▫ puppytograndmasforsummervacation
18. Stronger Passwords
• Use different passwords on different systems
▫ If you use the same password at one site that is
broken into- then attackers can access your data at
other sites using that same username/password.
20. Keep what’s private PRIVATE
• Be aware of what you share
• When creating an account consider who you are
giving your data to
• Any site asking for banking, social security, or
login information for a different site should be
closely examined.
21. Keep what’s private PRIVATE
• When creating accounts consider what you are
entering and how it will be used
• You decide your comfort level with what you
share
22. Email
• Email is more like a postcard than a letter
• Chances are no one other than the recipient will
see it BUT it is possible for others see its content
along the way (just like a postcard)
• Do not email: credit card #, logins/passwords
24. URL (Uniform Resource Locator)
The address that connects you with a website.
Parts of the URL
http://www.google.com
http:// = protocol [Hypertext Transfer Protocol]
www. = World Wide Web
google = domain name
.com = domain type
Domain Types
.com = commercial
.org = generally nonprofit organizations
.edu = higher education
.gov = U.S. government agency
25. Browsing the Web- Secure Sites
• Any site asking for sensitive info should be
encrypted (Banks, Insurance, etc.)
• Encrypted site addresses begin with
▫ https://www.google.com- ENCRYPTED
▫ http://www.google.com- NOT encrypted
27. Browsing the Web
• As you browse the web- websites collect info
about you
• Your web browser keeps a history and collects
cookies from websites
• Use your browser settings to:
▫ Clear your browser cache/history/cookies
▫ Limit 3rd party cookies
28.
29. Keep what’s private PRIVATE
• If you have WiFi at home, set a password
▫ Keep your neighbors off your network (unless you
want them there)
▫ Refer to the directions that came with your
Router/Modem/Wifi
30. Prevent attack/ intrusion
• A Virus will get in through an open door or you
unwillingly open the door yourself
31. Anti-Virus
• A program that scans your files and actively
monitors to prevent infection
• Once installed, anti-virus monitors for virus
activity, quarantines, and deletes
• Be sure to frequently run the virus scan
• Be sure that “definitions” are updated
33. Prevent attack/ intrusion
• Be vigilant
• Don’t download email attachments that you
don’t trust
• If something from someone you trust looks
suspicious check with them before opening
34. Prevent attack/ intrusion
• Scareware
▫ Virus/Malware that looks like an anti-virus
program
▫ Popup while browsing the web
• Know what Anti-virus you have and how to use it
36. Prepare for the worst
• Backup your important files
▫ Keep duplicate copies
• Worst case scenario: you will still have what’s
important to you
• Keep your backup current
37. Prepare for the worst
• Backup files locally
▫ Copy to cdr
▫ Flash drive
▫ external hard drive
• Paper copies
▫ tax returns
▫ Important photos
38. Prepare for the worst
• Cloud storage- files copied to a secure site over
the internet
▫ Be sure that service is reputable, safe, stable
▫ Backup regularly