SlideShare a Scribd company logo
1 of 32
©2009CarnegieMellonUniversity:1
Staying Safe Online
iTeams 2013
Jason Hong
©2013CarnegieMellonUniversity:2
©2013CarnegieMellonUniversity:3
What do you do here?
©2013CarnegieMellonUniversity:4
How to Tell It’s a Fake?
©2013CarnegieMellonUniversity:5
©2013CarnegieMellonUniversity:6
URLs tell you what web site
you are really on
• Let’s say we want to know if we are at
Wombank.com
©2013CarnegieMellonUniversity:7
©2013CarnegieMellonUniversity:8
©2013CarnegieMellonUniversity:9
How to Tell It’s a Fake?
©2013CarnegieMellonUniversity:10
Fake or not?
• http://ellsped.org/.google-docs.com/docs/
• http://facebook-info.ucoz.pl/Facedook-bde/
• https://www.facebook.com/
• http://www3.nationalgeographic.com
• http://www.skype7.com/it
• http://192.232.251.34/~cdslocal/paypal.com
Takeaway 1: Learn where URLs are in
the browser and how to read them
©2013CarnegieMellonUniversity:11
When in Doubt, Don’t Click!
Search for it online
Takeaway 2: Use search engines to
look up information if not sure
©2013CarnegieMellonUniversity:12
Scammers can’t fake this part
Takeaway 3: Scammers can put anything in the browser content area
Takeaway 4: It’s easy to create fake web sites
©2013CarnegieMellonUniversity:13
©2013CarnegieMellonUniversity:14
©2013CarnegieMellonUniversity:15
Takeaway 5: Be suspicious of any site
that asks you for too much info,
especially your password
©2013CarnegieMellonUniversity:16
Who is Attacking, and Why?
©2013CarnegieMellonUniversity:17
Who is Attacking, and Why?
• Mainly computer hackers, all around
the world (some organized crime)
• Reason is mainly money
– Spread spam on Facebook
– Trick you into sending money
• “Stuck in London scam”
– Trick your friends into installing malware
Takeaway 6: Anyone can be a target
©2013CarnegieMellonUniversity:18
Malware
• General term for
“malicious software”
– Viruses, worms, adware
• Attack other computers
• Attack your friends
• Steal your parents’ bank accounts
• Steal your virtual goods
– Ex. World of Warcraft and other MMORPGs
©2013CarnegieMellonUniversity:19
Looks legitimate, but it’s not! This is
known as Fake Anti-Virus. Don’t click it!
Just close the window.
©2013CarnegieMellonUniversity:20
Other Examples of Fake AV
Takeaway 7: Never install software you
weren’t expecting to install
©2013CarnegieMellonUniversity:21
©2013CarnegieMellonUniversity:22
This is fake. Don’t ever install software
this way. Go to Adobe’s site and update.
©2013CarnegieMellonUniversity:23
Another Example of
Fake Software
©2013CarnegieMellonUniversity:24
Fake. Never install
software you
weren’t expecting.
Also, look at the URL
©2013CarnegieMellonUniversity:25
Also fake, look at the URL. Also,
all web browsers auto-update now.
©2013CarnegieMellonUniversity:26
Summary
• Being online can be fun, but there are
also a lot of bad people out there
– Want you to click on things
– Want you to give them your password
– Want you to install malware
©2013CarnegieMellonUniversity:27
You can protect yourself with
basic precautions
1. Learn how to read URLs
2. Use search engines when in doubt
3. Scammers can put anything in the
browser content area
4. It’s easy to create fake web sites
5. Be suspicious of any site that asks you for
too much info, especially your password
6. Anyone can be a target
7. Never install software you weren’t
expecting to install
©2013CarnegieMellonUniversity:28
More Information
• Cybersecurity for young adults
https://www.mysecurecyberspace.com/
– Good passwords
– Password reuse (don’t reuse passwords!)
– Cyberbullying
– Safe social networking
©2013CarnegieMellonUniversity:29
More Information
Commercially
• Products for training people about
cybersecurity
http://wombatsecurity.com/
(Note: I’m a co-founder of Wombat)
©2013CarnegieMellonUniversity:30
Extra backup slides
©2013CarnegieMellonUniversity:31
Most Common Passwords
(These are bad passwords)
©2013CarnegieMellonUniversity:32

More Related Content

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 

Featured

Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 

Staying Safe Online (for kids)

Editor's Notes

  1. These slides are by Jason Hong, a professor of computer science at Carnegie Mellon University.These slides were used at iTeams 2013, a camp for kids to learn about technology and entrepreneurship.Teaching kids cybersecurity was the main goal of my short 20 minute talk.Feel free to reuse and modify.
  2. Picture from http://nakedsecurity.sophos.com/2012/06/12/beware-fake-facebook-notifications/
  3. Picture from a real fake web site (via PhishTank).At this point, most kids will say that they will login, which is the wrong thing to do because the screens we just saw were fake.
  4. How can you tell that it’s fake? Well, the only real hints you have are highlighted here, in terms of the email address and the URL (or web address). So let’s teach you how to read these email addresses and web addresses, so you can avoid these kinds of attacks.
  5. Screenshot courtesy of Wombat Security Technologies, from Anti-Phishing Phil.Anti-Phishing Phil is a game that teaches people how to identify phishing scams.(Note: for disclosure purposes, Jason Hong is also a co-founder of Wombat Security)
  6. Screenshot courtesy of Wombat Security Technologies, from Anti-Phishing Phil
  7. Screenshot courtesy of Wombat Security Technologies, from Anti-Phishing Phil
  8. Screenshot courtesy of Wombat Security Technologies, from Anti-Phishing Phil
  9. The only real tricky one here is the 4th one, National Geographic. Usually, about half of people will get it right, the other half won’t.It’s actually legitimate. This point actually leads nicely to the next slide, which is that if you aren’t sure, then use a search engine instead.Don’t click on strange links in email or Facebook, look up your destination instead.
  10. It’s important to emphasize that bad guys can put any content they want in the browser content area.It’s also really easy to create a fake web page that looks legitimate.But it’s hard for them to fake the web address part.
  11. I included this screenshot because Blizzard games are popular (World of Warcraft, Diablo, Starcraft, etc). Can emphasize that this is how a lot of gamers get hacked.
  12. Here, I ask the kids about who is attacking, and why do they care?The basic answer is that there are a range of bad guys (small time to professional), and most of them care about making money off of you.
  13. Takeaway 6 is trying to make sure that the kids understand that anyone can be a target. It’s not just rich people, it’s not just executives, it really can be anyone.Only a handful of kids seem to have heard of malware before too.
  14. Good to emphasize that learning this material can help the kids protect themselves as well as their parents, siblings, and friends.
  15. Here’s one example of malware, which is fake anti-virus.
  16. Some more fake anti-virus. Simple lesson here is don’t install software that you weren’t expecting to install.http://oregonstate.edu/helpdocs/safety-and-security/computer-viruses-fraud/computer-viruses/fake-antivirus-warnings
  17. Koobface example. These are fake messages that try to get you to install fake video software.http://news.cnet.com/koobface-virus-hits-facebook/
  18. Koobface example, trying to trick you into “updating” your video software.
  19. http://www.tomshardware.com/news/imperva-rockyou-most-common-passwords,9486.html
  20. From Wall Street Journal about how Facebook spam works.