SlideShare uma empresa Scribd logo
1 de 82
Corporate
Citizenship

Keeping
Children Safe
Omar Hamdy | Microsoft Egypt CTZ
Worldwide
Internet
Users

2 BILLION+

62 BILLION

Internet users
worldwide

e-mails circulate

95%

DAILY

Some estimates
suggest upwards of
95% of all
e-mail is

“SPAM”
5%

The online world is
“the world” of today’s child; no
separation between “online” and
“offline”
Parents’ Top Concern
Microsoft Survey
Online conversations with strangers

70%

Age 10-12

65%

Age 13-17
How do we
use the
internet in
education?

•Keeping in touch even after
school hours.
•Using the internet to access
studying resources.
•Using the internet for researches.
•An interactive way for students
to communicate .
•No boundaries between the
parents and the teachers.
How this
helps you
as a
teacher?

•Simplifies the way of
communication.
•Helps all the participants
to know that technology
isn’t only for
entertainment.
•Sets you as a role-model
in using technology and
the internet.
The
Connection

In order to use the
technology in education
you must be aware of the
issues that might
encounter you.
•Online Reputation.
•Internet Safety.
Online Security Versus Online Safety

Safety: We must
act in ways that
help protect us
against the risks
that come with
Internet use.
Security: We must
secure our
computers with
technology in the
same way that we
secure the doors to
our homes.
Inappropriate content

Top
Online
Risks
for
Children

Exposure to potentially dangerous
contact
Cyber bullies
1- Beef up computer’s defenses and keep them up to date
2- Beef up computer’s defenses and keep them up to date

Top 10 Tips
For Online
Safety

3- Think first; Click later
4- Be protective of personal information
5- Make sure Web sites protect your personal information
6- Set clear, age-appropriate rules for Internet
use
7- Use family safety software and up-to-date technology
8- Guidance not control for tweens and
teens
9- Keep Communication Open With your
children
10- Use Family Contracts to help protect your kids on
line!
Key Points
• The Internet is both a classroom
and a virtual playground
where children can explore, learn,
and have fun

• Older children use the Internet to
form social networks
• Just as there are places in every
city and town that
are unsafe or inappropriate for
children and teenagers,
there are places online that are not
safe for kids
• Learning about the risks children
may encounter on the Internet,
and how you can reduce those
risks, will help you keep your
family safer online
1- Beef up computer’s defenses and keep them up to date
2- Beef up computer’s defenses and keep them up to date

Top 10 Tips
For Online
Safety

3- Think first; Click later
4- Be protective of personal information
5- Make sure Web sites protect your personal information
6- Set clear, age-appropriate rules for Internet
use
7- Use family safety software and up-to-date technology
8- Guidance not control for tweens and
teens
9- Keep Communication Open With your
children
10- Use Family Contracts to help protect your kids on
line!
Online
Reputatio
n

An online reputation is the
publicly held social
evaluation of a person
based on their behavior;
what they say, and what
others say about them.
Online
Reputatio
n

Online Reputation can affect
child education, career and
social life…
His online actions,
expressions, pictures is his
life-long reputation that he
can not ever remove and will
accompany him to collage,
work and later on when he
himself is a parent.
Online
Reputation
and
professional
life

•Your students watch you
online and consider you a
role model.
•First impression online
and Reputation AT work is
through your social
network pages.
•You represent the school
you work in, online AT ALL
times!
•Bad online reputation can
get you fired!
You see kindness and
cruelty on social networks

78%
88%

of teens surveyed
reported at least
witnessed crueltyone
positive experience
What you do online
doesn’t stay just online

8%
6%
22%
25%

physical
trouble fight
ended aat
face-to-face
school
friendship
argument
The effect
of Online
Reputation

o Can Online Reputation
affect your employment
potential?
o Can it affect your social
life?
Your Online Reputation
can either benefit or harm
you,
it is your choice!
Online
Reputation
impact future
decisions

• 70.5% believe that it is
considered in hiring decisions.
• 30% believe that it is
considered when being
accepted into a school or
college
• 86% believe that affects
friendship decisions
• 80% believes it affects marriage
decisions
Online
Reputation
and
professional
life

• HR managers research job
applicants online
• First impression and
Reputation AT work is
that AT your social
network pages.
• You represent the
company you work in
online AT ALL times!
What you post on the internet
affect you, your family and your
friends.

Online
Reputatio
n and
Social life

• Your pictures and actions on
the internet is a memory you
will keep forever.
• How you behave online is a
reflection on your values and
your family.
• You affect the lives of your
friends whenever you post
anything about them on the
internet
PROTECT your online reputation

Read the privacy policy of any
site before sharing personal
information online

Use privacy settings on social
networking sites that determine
who can access and respond to
your content
Use the alert feature provided by
some websites that automatically
notifies you of any new mention
of your name or other personal
information

Respect others privacy!
Think
before you
post

• Don’t post anything you’d ordinarily say
only to a close friend. This includes
details that could identify you or locate
you in person–your
address, workplace, phone
number, birth date, etc.
• Use caution when sharing feelings–
whether you’re happy, sad, angry, or
have money worries; predators prey on
emotions.
• Talk with family and friends about their
privacy. Remove from your pages any
info that doesn’t conform to their
wishes.
Connect honestly
and carefully
• Express yourself and defend your
position but don’t use any abusive
language.

Guard
Your
Reputatio
n

• Do not post anything in anger.
• Do not share personal Data, Personal
information can put you at RISK!

• Remember your boss, your parents,
and your future kids will see
everything you are posting.
Bullying
Digital Citizen

Being online today is more than
simply surfing the web—it’s a way of
life.
Learning and connecting through
technology is now vital to our daily
routine, which means being a good
digital citizen takes on greater
importance. It means educating
ourselves about both the benefits
and risks of our online world, and
then developing the habits that can
help us stay safer there. Microsoft
offers six essential steps that each of
us can take to help protect our
devices, information, and families as
we learn, explore, and interact
online.
Abusive
Emails
Do not forward what you are not
sure of!

Take
Responsibilit
y!
Pranks can
destroy
lives
Primary Threats to Computer
Security

Viruses/Worms Trojans
Software programs
designed to invade
your computer, and
copy, damage, or
delete your data.

Viruses that pretend
to be helpful
programs while
destroying your
data, damaging your
computer, and
stealing your
personal
information.

Spyware
Software that tracks
your online
activities or
displays endless
ads.
Malware and potentially unwanted software categories in Egypt in 2013, by
percentage of computers reporting detections

Top Threats
Primary Threats to our information

Phishing
E-mail sent by online criminals to trick you
into going to fake Web sites and revealing
personal information

Spam
Unwanted e-mail, instant messages,
and other online communication

Identity Theft
A crime where con artists get your
personal information and access your
cash and/or credit

Hoaxes
E-mail sent by online criminals to trick you
into giving them money
Phishing
sites
Blocked mail volumes in 1H13 were up slightly from 2H12, but remain well below levels seen prior to the end of 2010.
Enjoy private browsing with IE 10 Privacy
Features
• InPrivate Browsing
• InPrivate Filtering
• Browse confidently
with built-in tools like
SmartScreen Filter
and Tracking
Protection that let you
be more aware of
threats to your PC and
your privacy.
• Do Not Track header.
Scam Emails
“Amateurs hack
systems, professionals hack
people.” Bruce Schneier.

Social
Engineerin
g

Ian Mann, (2008) author of
“Hacking the Human,” defines
social engineering as the
following: “To manipulate people
by deception, into giving out
information, or performing an
action”
Example of
social
Engineering
Tools
Identity Theft
Pirated programs
are not a game
Non Geniune
Operating
system
Non Genuine
Operating
system
Cracks
Organized
Crime

Counterfeit
Software

Botnet

Malware, botnets and
organized crime
In a 2013 study, IDC estimated that
consumers would spend $22 billion and
1.5 billion hours dealing with security
issues from counterfeit software that
year alone.
Distribution of Counterfeit and
Pirated Software

Counterfeit Ecommerce

Online Marketplaces

BitTorrent P2P Downloads

One-Click Downloads

PC Malls
What is a botnet?
Attacker

Command and
Control Server

Bots

Victim

Botnets are networks of infected
computers that can be remotely
controlled by an individual or
organization
Social
Engineering &
Social Media
Social
Engineering &
Social Media
Why
Attacks
Occur?

The reasons that network attacks occur
include:

• Revenge
• Espionage
• Publicity
• Personal satisfaction
• Terrorism
Defend
your
Computer

Turn on Windows Internet firewall
Use Microsoft Update to keep Windows
up-to-date automatically
Install and maintain antivirus software
Install and maintain antispyware software
Turn on Windows Internet
Firewall
help protect your
PC from hackers
and malicious
software. It
creates a
protective barrier
between your
computer and
the Internet
Use Automatic Updates to Keep
Software Up-to-date
•Install

all updates
as soon as they
are available
•Automatic

updates provide the
best protection
•Windows

8 Action Center
The new Windows 7 Action
Center
in the Control Panel helps you
make sure that your firewall is on,
your antivirus software is up to
date, and your computer is set to
install updates automatically
Install and Maintain Antivirus
Software
•

Antivirus software
helps to detect and
remove computer
viruses before they
can cause damage.

•

For antivirus software
to be effective, you
must keep it up-todate.
Install and Maintain Antispyware
software
Use antispyware software, like Microsoft Windows Defender, so unknown
software cannot track your online activity and potentially steal your
information.

Windows Defender include:
Spyware detection and removal

Improved Internet browsing safety
Protection against the latest threats
Can you
identify
this
software
?
Defend your computer against viruses, spyware, and other malware

Microsoft Security Essentials is a free download for Windows 7
that helps protect your computer from
viruses, spyware, worms, Trojans, and other malware.
http://www.microsoft.com/security_essentials/default.aspx
#2: Protect
sensitive
data.

• Think before you enter sensitive data

• Be suspicious of attachments and links
• Look out for scams and fraud
• Create strong passwords
Think before you type.
• Look for https (the “s” is for secure)
• A closed padlock means secure, too
• Are there signs the site is trustworthy?
Think
before you
click.

Be suspicious and aware
of:
E-mail and IM
attachments and links
Messages within social
sites
Use the Red “X” to Close Pop-ups
•Always

use the red “X” in the corner of a
pop-up screen.
•Never

click “yes,” “accept,” or even
“cancel,” because it could be a trick that
installs software on your computer.
How to
avoid the
bait.

Confirm that the message is
real
Type the Web address
yourself
Use a browser with safety
features
Passwords
lock data
doors.

• Keep them secret (Don’t
write them Down on
anything)
• Change them often
(Recommended every two
weeks)
• Make a different password
for each password
• Make them strong
Which
passwords
are strong?

1. 555.12.999
2. 06/04/79
3. Exp3d!ti0us
4. Ambl!anc3
5. 135781113
6. MsAw3yOiD
1. 555.12.999

And the
answers
are…

2. 06/04/79
3. Exp3d!ti0us
4. Ambl!anc3
5. 135781113

6. MsAw3yOiD
#3 Protect
devices on
the go.

• Do they have the latest
protection?
• Guard devices like you do
your wallet
• Don’t hand-carry sensitive
data
• Use caution if using a
thumb drive in
another computer
Windows 8
BitLocker
Drive
Encryption

Windows 8 BitLocker Drive
Encryption help you protect your
data from loss, theft, or hackers
BitLocker helps keep everything
from documents to passwords
safer by encrypting the entire
drive that Windows and your
data reside on.
BitLocker To Go—a new feature
of Windows 8—gives the
lockdown treatment to easilymisplaced portable storage
devices like USB flash drives and
external hard drives.
On the go:
wireless
hotspots.

• Connect securely
• Know who you’re
connecting to
• Save sensitive uses for
more trusted
connections
What to
do?

 Contact an IT Professional
 Contact the responsible authorities:
 NTRA hotline : 155
 Police Cyber Crime hotline : 108
© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other
product names are or may be registered trademarks and/or trademarks in the U.S. and/or other
countries.
The information herein is for informational purposes only and represents the current view of Microsoft
Corporation as of the date of this presentation. Because Microsoft must respond to changing market
conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft
cannot guarantee the accuracy of any information provided after the date of this presentation.
MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION
IN THIS PRESENTATION.
Cybercrime costs
consumers $113 billion a
year*

1 in 5 small and medium
enterprises are targeted by
cyber criminals**

Every second, 12 people are
victims of cybercrime –
nearly 400 million every
year*

Cybercriminals have sophisticated
operations to create and distribute malware
50% of online adults have
been victims in the past year

Financial Fraud
53% of the world’s securities exchanges were
targeted in 2012

Online Child Exploitation
The NCMEC has reviewed more than 90 million
images and videos of child pornography.***
* 2013 Norton Report
** National Cyber Security Alliance
*** National Center for Missing and
Exploited Children

The Impact of
Cybercrime

Cybercrime is evolving at lightning speed
The risk to individuals and companies is
growing
Online criminals have global reach
Cybercrime has been embraced by
organized crime
Traditional responses won’t suffice –
proactive, aggressive action is required

Mais conteúdo relacionado

Mais procurados

Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet
Eanes isd
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe online
amulhall
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For Parents
UNC-Greensboro
 
Digital Citizenship: Responsible Behavior in a Digital World
Digital Citizenship: Responsible Behavior in a Digital WorldDigital Citizenship: Responsible Behavior in a Digital World
Digital Citizenship: Responsible Behavior in a Digital World
Debra Hargrove
 

Mais procurados (20)

Cybersafey
Cybersafey Cybersafey
Cybersafey
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet
 
Social Media Safety For High School
Social Media Safety For High SchoolSocial Media Safety For High School
Social Media Safety For High School
 
Online safety Ofsted 2015
Online safety Ofsted 2015Online safety Ofsted 2015
Online safety Ofsted 2015
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe online
 
Top ten-tips
Top ten-tipsTop ten-tips
Top ten-tips
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
 
Digital Literacy
Digital LiteracyDigital Literacy
Digital Literacy
 
Parents guide to technology
Parents guide to technologyParents guide to technology
Parents guide to technology
 
Digital Citizenship 101 ICE2014
Digital Citizenship 101 ICE2014Digital Citizenship 101 ICE2014
Digital Citizenship 101 ICE2014
 
Online Security for Kids
Online Security for KidsOnline Security for Kids
Online Security for Kids
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For Parents
 
Digital wellness and your family internet upload
Digital wellness and your family   internet uploadDigital wellness and your family   internet upload
Digital wellness and your family internet upload
 
Social Media 101 for Parents: Do you know where your children are?
Social Media 101 for Parents:  Do you know where your children are?Social Media 101 for Parents:  Do you know where your children are?
Social Media 101 for Parents: Do you know where your children are?
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...
 
Cyber security for kids
Cyber security for kidsCyber security for kids
Cyber security for kids
 
Digital Citizenship: Responsible Behavior in a Digital World
Digital Citizenship: Responsible Behavior in a Digital WorldDigital Citizenship: Responsible Behavior in a Digital World
Digital Citizenship: Responsible Behavior in a Digital World
 
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...Updated Online Safety 3.0 Talk for Mediterranean Association of International...
Updated Online Safety 3.0 Talk for Mediterranean Association of International...
 
Digital Footprint and Social Media Impact on Time Management
Digital Footprint and Social Media Impact on Time ManagementDigital Footprint and Social Media Impact on Time Management
Digital Footprint and Social Media Impact on Time Management
 

Semelhante a Tot edu eng.

Cybersafety Version1
Cybersafety Version1Cybersafety Version1
Cybersafety Version1
sabrinacotta
 
Hannah dc keynote
Hannah dc keynoteHannah dc keynote
Hannah dc keynote
takahe2
 

Semelhante a Tot edu eng. (20)

Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptx
 
Digital Citizenship Flash Card Deck - A Platform for Good
Digital Citizenship Flash Card Deck - A Platform for GoodDigital Citizenship Flash Card Deck - A Platform for Good
Digital Citizenship Flash Card Deck - A Platform for Good
 
Tech_and_social_media_PF.ppt
Tech_and_social_media_PF.pptTech_and_social_media_PF.ppt
Tech_and_social_media_PF.ppt
 
Dangers of Social Media What we know about teens
Dangers of Social Media What we know about teensDangers of Social Media What we know about teens
Dangers of Social Media What we know about teens
 
Tech_and_social_media_PF.ppt
Tech_and_social_media_PF.pptTech_and_social_media_PF.ppt
Tech_and_social_media_PF.ppt
 
Tech_and_social_media_PF.ppt
Tech_and_social_media_PF.pptTech_and_social_media_PF.ppt
Tech_and_social_media_PF.ppt
 
[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides
 
Digital Literacy Fundamentals.pptx
Digital Literacy Fundamentals.pptxDigital Literacy Fundamentals.pptx
Digital Literacy Fundamentals.pptx
 
Ouch 201705 en
Ouch 201705 enOuch 201705 en
Ouch 201705 en
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
INTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptxINTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptx
 
Cybersafety Version1
Cybersafety Version1Cybersafety Version1
Cybersafety Version1
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Social Networking and Cyberbullying
Social Networking and CyberbullyingSocial Networking and Cyberbullying
Social Networking and Cyberbullying
 
Social Networking What Are The Ramificationsv2
Social Networking What Are The Ramificationsv2Social Networking What Are The Ramificationsv2
Social Networking What Are The Ramificationsv2
 
DIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSDIGITAL FOOTPRINTS
DIGITAL FOOTPRINTS
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & Children
 
Etiquette in the Digital World
Etiquette in the Digital WorldEtiquette in the Digital World
Etiquette in the Digital World
 
Hannah dc keynote
Hannah dc keynoteHannah dc keynote
Hannah dc keynote
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 

Mais de Mohamed ElGabry (13)

Win8
Win8Win8
Win8
 
Ntra a.anis internet recommendations
Ntra a.anis internet recommendationsNtra a.anis internet recommendations
Ntra a.anis internet recommendations
 
Internet safety comp moe
Internet safety comp moeInternet safety comp moe
Internet safety comp moe
 
اللجنة الوطنية للاستخدام الآمن للإنترنت للأطفال
اللجنة الوطنية للاستخدام الآمن للإنترنت للأطفالاللجنة الوطنية للاستخدام الآمن للإنترنت للأطفال
اللجنة الوطنية للاستخدام الآمن للإنترنت للأطفال
 
Egypt moe education collaboration april 2014 arabic 2-1
Egypt moe education collaboration april 2014   arabic 2-1Egypt moe education collaboration april 2014   arabic 2-1
Egypt moe education collaboration april 2014 arabic 2-1
 
Case studies
Case studiesCase studies
Case studies
 
Aup
AupAup
Aup
 
Protecting young-children-online-power point-presentation-security
Protecting young-children-online-power point-presentation-securityProtecting young-children-online-power point-presentation-security
Protecting young-children-online-power point-presentation-security
 
Protecting young-children-online arabic
Protecting young-children-online arabicProtecting young-children-online arabic
Protecting young-children-online arabic
 
Children arabic
Children arabicChildren arabic
Children arabic
 
الهوية
الهويةالهوية
الهوية
 
The pot
The potThe pot
The pot
 
Moe Egypt
Moe EgyptMoe Egypt
Moe Egypt
 

Último

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
ssuserdda66b
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Último (20)

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 

Tot edu eng.

  • 2. Worldwide Internet Users 2 BILLION+ 62 BILLION Internet users worldwide e-mails circulate 95% DAILY Some estimates suggest upwards of 95% of all e-mail is “SPAM” 5% The online world is “the world” of today’s child; no separation between “online” and “offline”
  • 3. Parents’ Top Concern Microsoft Survey Online conversations with strangers 70% Age 10-12 65% Age 13-17
  • 4. How do we use the internet in education? •Keeping in touch even after school hours. •Using the internet to access studying resources. •Using the internet for researches. •An interactive way for students to communicate . •No boundaries between the parents and the teachers.
  • 5. How this helps you as a teacher? •Simplifies the way of communication. •Helps all the participants to know that technology isn’t only for entertainment. •Sets you as a role-model in using technology and the internet.
  • 6. The Connection In order to use the technology in education you must be aware of the issues that might encounter you. •Online Reputation. •Internet Safety.
  • 7. Online Security Versus Online Safety Safety: We must act in ways that help protect us against the risks that come with Internet use. Security: We must secure our computers with technology in the same way that we secure the doors to our homes.
  • 8. Inappropriate content Top Online Risks for Children Exposure to potentially dangerous contact Cyber bullies
  • 9. 1- Beef up computer’s defenses and keep them up to date 2- Beef up computer’s defenses and keep them up to date Top 10 Tips For Online Safety 3- Think first; Click later 4- Be protective of personal information 5- Make sure Web sites protect your personal information 6- Set clear, age-appropriate rules for Internet use 7- Use family safety software and up-to-date technology 8- Guidance not control for tweens and teens 9- Keep Communication Open With your children 10- Use Family Contracts to help protect your kids on line!
  • 10. Key Points • The Internet is both a classroom and a virtual playground where children can explore, learn, and have fun • Older children use the Internet to form social networks • Just as there are places in every city and town that are unsafe or inappropriate for children and teenagers, there are places online that are not safe for kids • Learning about the risks children may encounter on the Internet, and how you can reduce those risks, will help you keep your family safer online
  • 11.
  • 12. 1- Beef up computer’s defenses and keep them up to date 2- Beef up computer’s defenses and keep them up to date Top 10 Tips For Online Safety 3- Think first; Click later 4- Be protective of personal information 5- Make sure Web sites protect your personal information 6- Set clear, age-appropriate rules for Internet use 7- Use family safety software and up-to-date technology 8- Guidance not control for tweens and teens 9- Keep Communication Open With your children 10- Use Family Contracts to help protect your kids on line!
  • 13. Online Reputatio n An online reputation is the publicly held social evaluation of a person based on their behavior; what they say, and what others say about them.
  • 14. Online Reputatio n Online Reputation can affect child education, career and social life… His online actions, expressions, pictures is his life-long reputation that he can not ever remove and will accompany him to collage, work and later on when he himself is a parent.
  • 15. Online Reputation and professional life •Your students watch you online and consider you a role model. •First impression online and Reputation AT work is through your social network pages. •You represent the school you work in, online AT ALL times! •Bad online reputation can get you fired!
  • 16. You see kindness and cruelty on social networks 78% 88% of teens surveyed reported at least witnessed crueltyone positive experience
  • 17. What you do online doesn’t stay just online 8% 6% 22% 25% physical trouble fight ended aat face-to-face school friendship argument
  • 18. The effect of Online Reputation o Can Online Reputation affect your employment potential? o Can it affect your social life? Your Online Reputation can either benefit or harm you, it is your choice!
  • 19. Online Reputation impact future decisions • 70.5% believe that it is considered in hiring decisions. • 30% believe that it is considered when being accepted into a school or college • 86% believe that affects friendship decisions • 80% believes it affects marriage decisions
  • 20. Online Reputation and professional life • HR managers research job applicants online • First impression and Reputation AT work is that AT your social network pages. • You represent the company you work in online AT ALL times!
  • 21. What you post on the internet affect you, your family and your friends. Online Reputatio n and Social life • Your pictures and actions on the internet is a memory you will keep forever. • How you behave online is a reflection on your values and your family. • You affect the lives of your friends whenever you post anything about them on the internet
  • 22. PROTECT your online reputation Read the privacy policy of any site before sharing personal information online Use privacy settings on social networking sites that determine who can access and respond to your content Use the alert feature provided by some websites that automatically notifies you of any new mention of your name or other personal information Respect others privacy!
  • 23. Think before you post • Don’t post anything you’d ordinarily say only to a close friend. This includes details that could identify you or locate you in person–your address, workplace, phone number, birth date, etc. • Use caution when sharing feelings– whether you’re happy, sad, angry, or have money worries; predators prey on emotions. • Talk with family and friends about their privacy. Remove from your pages any info that doesn’t conform to their wishes.
  • 25. • Express yourself and defend your position but don’t use any abusive language. Guard Your Reputatio n • Do not post anything in anger. • Do not share personal Data, Personal information can put you at RISK! • Remember your boss, your parents, and your future kids will see everything you are posting.
  • 27. Digital Citizen Being online today is more than simply surfing the web—it’s a way of life. Learning and connecting through technology is now vital to our daily routine, which means being a good digital citizen takes on greater importance. It means educating ourselves about both the benefits and risks of our online world, and then developing the habits that can help us stay safer there. Microsoft offers six essential steps that each of us can take to help protect our devices, information, and families as we learn, explore, and interact online.
  • 29. Do not forward what you are not sure of! Take Responsibilit y!
  • 31. Primary Threats to Computer Security Viruses/Worms Trojans Software programs designed to invade your computer, and copy, damage, or delete your data. Viruses that pretend to be helpful programs while destroying your data, damaging your computer, and stealing your personal information. Spyware Software that tracks your online activities or displays endless ads.
  • 32. Malware and potentially unwanted software categories in Egypt in 2013, by percentage of computers reporting detections Top Threats
  • 33.
  • 34.
  • 35.
  • 36. Primary Threats to our information Phishing E-mail sent by online criminals to trick you into going to fake Web sites and revealing personal information Spam Unwanted e-mail, instant messages, and other online communication Identity Theft A crime where con artists get your personal information and access your cash and/or credit Hoaxes E-mail sent by online criminals to trick you into giving them money
  • 38.
  • 39. Blocked mail volumes in 1H13 were up slightly from 2H12, but remain well below levels seen prior to the end of 2010.
  • 40.
  • 41.
  • 42.
  • 43. Enjoy private browsing with IE 10 Privacy Features • InPrivate Browsing • InPrivate Filtering • Browse confidently with built-in tools like SmartScreen Filter and Tracking Protection that let you be more aware of threats to your PC and your privacy. • Do Not Track header.
  • 45. “Amateurs hack systems, professionals hack people.” Bruce Schneier. Social Engineerin g Ian Mann, (2008) author of “Hacking the Human,” defines social engineering as the following: “To manipulate people by deception, into giving out information, or performing an action”
  • 52. Organized Crime Counterfeit Software Botnet Malware, botnets and organized crime In a 2013 study, IDC estimated that consumers would spend $22 billion and 1.5 billion hours dealing with security issues from counterfeit software that year alone.
  • 53. Distribution of Counterfeit and Pirated Software Counterfeit Ecommerce Online Marketplaces BitTorrent P2P Downloads One-Click Downloads PC Malls
  • 54. What is a botnet? Attacker Command and Control Server Bots Victim Botnets are networks of infected computers that can be remotely controlled by an individual or organization
  • 55.
  • 56.
  • 59.
  • 60. Why Attacks Occur? The reasons that network attacks occur include: • Revenge • Espionage • Publicity • Personal satisfaction • Terrorism
  • 61. Defend your Computer Turn on Windows Internet firewall Use Microsoft Update to keep Windows up-to-date automatically Install and maintain antivirus software Install and maintain antispyware software
  • 62. Turn on Windows Internet Firewall help protect your PC from hackers and malicious software. It creates a protective barrier between your computer and the Internet
  • 63. Use Automatic Updates to Keep Software Up-to-date •Install all updates as soon as they are available •Automatic updates provide the best protection •Windows 8 Action Center The new Windows 7 Action Center in the Control Panel helps you make sure that your firewall is on, your antivirus software is up to date, and your computer is set to install updates automatically
  • 64. Install and Maintain Antivirus Software • Antivirus software helps to detect and remove computer viruses before they can cause damage. • For antivirus software to be effective, you must keep it up-todate.
  • 65. Install and Maintain Antispyware software Use antispyware software, like Microsoft Windows Defender, so unknown software cannot track your online activity and potentially steal your information. Windows Defender include: Spyware detection and removal Improved Internet browsing safety Protection against the latest threats
  • 67.
  • 68. Defend your computer against viruses, spyware, and other malware Microsoft Security Essentials is a free download for Windows 7 that helps protect your computer from viruses, spyware, worms, Trojans, and other malware. http://www.microsoft.com/security_essentials/default.aspx
  • 69. #2: Protect sensitive data. • Think before you enter sensitive data • Be suspicious of attachments and links • Look out for scams and fraud • Create strong passwords
  • 70. Think before you type. • Look for https (the “s” is for secure) • A closed padlock means secure, too • Are there signs the site is trustworthy?
  • 71. Think before you click. Be suspicious and aware of: E-mail and IM attachments and links Messages within social sites
  • 72. Use the Red “X” to Close Pop-ups •Always use the red “X” in the corner of a pop-up screen. •Never click “yes,” “accept,” or even “cancel,” because it could be a trick that installs software on your computer.
  • 73. How to avoid the bait. Confirm that the message is real Type the Web address yourself Use a browser with safety features
  • 74. Passwords lock data doors. • Keep them secret (Don’t write them Down on anything) • Change them often (Recommended every two weeks) • Make a different password for each password • Make them strong
  • 75. Which passwords are strong? 1. 555.12.999 2. 06/04/79 3. Exp3d!ti0us 4. Ambl!anc3 5. 135781113 6. MsAw3yOiD
  • 76. 1. 555.12.999 And the answers are… 2. 06/04/79 3. Exp3d!ti0us 4. Ambl!anc3 5. 135781113 6. MsAw3yOiD
  • 77. #3 Protect devices on the go. • Do they have the latest protection? • Guard devices like you do your wallet • Don’t hand-carry sensitive data • Use caution if using a thumb drive in another computer
  • 78. Windows 8 BitLocker Drive Encryption Windows 8 BitLocker Drive Encryption help you protect your data from loss, theft, or hackers BitLocker helps keep everything from documents to passwords safer by encrypting the entire drive that Windows and your data reside on. BitLocker To Go—a new feature of Windows 8—gives the lockdown treatment to easilymisplaced portable storage devices like USB flash drives and external hard drives.
  • 79. On the go: wireless hotspots. • Connect securely • Know who you’re connecting to • Save sensitive uses for more trusted connections
  • 80. What to do?  Contact an IT Professional  Contact the responsible authorities:  NTRA hotline : 155  Police Cyber Crime hotline : 108
  • 81. © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
  • 82. Cybercrime costs consumers $113 billion a year* 1 in 5 small and medium enterprises are targeted by cyber criminals** Every second, 12 people are victims of cybercrime – nearly 400 million every year* Cybercriminals have sophisticated operations to create and distribute malware 50% of online adults have been victims in the past year Financial Fraud 53% of the world’s securities exchanges were targeted in 2012 Online Child Exploitation The NCMEC has reviewed more than 90 million images and videos of child pornography.*** * 2013 Norton Report ** National Cyber Security Alliance *** National Center for Missing and Exploited Children The Impact of Cybercrime Cybercrime is evolving at lightning speed The risk to individuals and companies is growing Online criminals have global reach Cybercrime has been embraced by organized crime Traditional responses won’t suffice – proactive, aggressive action is required

Notas do Editor

  1. Slide 10: You see kindness and cruelty on social networksTALKING POINTSThe good news is that most of you who use social media say that in your experience, people your age are generally kind to one another on social networks. The researchers found that 78 percent of teens surveyed reported at least one positive outcome from their interactions on social network sites. [click]However, the researchers also found that 88 percent of you had witnessed someone being mean or cruel to another person on a social network.Just out of curiosity, how many of you have observed someone being mean or cruel on a social network? [click]
  2. Slide 11: What you do online doesn’t stay onlineTALKING POINTSWhen the researchers looked deeper into online cruelty, they found that 69 percent of the teens in the study thought that their peers were mostly kind to each other, but more than a third (41 percent) said they had experienced at least one of the negative experiences the researchers asked about. [click]25 percent of teens who use social media had an experience that resulted in a face-to-face argument or confrontation with someone. [click]22 percent had an experience that ended their friendship with someone. [click]8 percent had a physical fight with someone because of something that happened on a social network site. [click]6 percent got in trouble at school because of an experience on a social site.Clearly, what teens experienced online had a direct impact on their “real” lives. With these statistics in mind: How many of you have had an experience online that affected your real life?What can you do if you see mean behavior on a social network?[The last three questions below are just different ways to elicit the response you’re looking for. You probably won’t need to ask all of them.]What do you think you can do to be a better friend on social sites?What advice would you give to someone about how to reduce online drama?What can you do if you see someone being bullied online?[DISCUSSION TAKES PLACE.]Let’s see the tips Microsoft’s safety experts came up with and how they compare with what you said. [click]NOTES FOR SPEAKERHere are some of the answers to your questions that may come up—you’ll be looking for these to transition to the safety tips on the next slide.Tell the person causing the drama to stop it.Don’t participate in drama—don’t post mean comments or pictures.Don’t ignore bullying or drama.Stand up for your friends. Don’t be a bystander.Don’t make private stuff about others public.What do we mean by “drama?“ This term has already popped up a couple of times in this presentation but is more central to the point here. It is based on studies by Danah Boyd at Microsoft Research, that showed that teenagers “describe many interpersonal conflicts playing out in their lives as drama,” including bullying.To get a glimpse into her ideas, read this opinion piece (that she co-authored with Alice Marwick) in the New York Times (September 2011): “Bullying as True Drama:” www.nytimes.com/2011/09/23/opinion/why-cyberbullying-rhetoric-misses-the-mark.html
  3. Slide 19: Connect honestly and carefullyTALKING POINTSRemember the story of the players who pirated a game and were locked out of playing on Xbox? Download files legally and use web content honestly for school work. [click]
  4. WW average CCM in 3Q12 = 5.3WW average CCM in 4Q12 = 6.0
  5. WW average CCM in 3Q12 = 5.3WW average CCM in 4Q12 = 6.0
  6. The Do Not Track header sends a signal to websites that you prefer not to have information collected about your visit used to track you as you browse the web.
  7. According to SearchSecurity.com DefinitionsSocial engineering is a term that describes a non-technical kind of intrusion thatrelies heavily on human interaction and often involves tricking other people to breaknormal security procedures. A social engineer runs what used to be called a "con game".“I explained that I could often get passwords and other pieces of sensitive information from companies bypretending to be someone else and just asking for it.” (Mitnick, 2002)“Two things are infinite: the universe and human stupidity; and I'm not sure about the universe.” Albert Einstein quotesMurphy’s Law says human error will creep into the most secure security systems.
  8. Now you can use mobile apps to manipulate any one to give you personal information
  9. Copy from an e-mail of young female that was stolen and exploited by a criminal – Egyptian police local case.Identity theft worse more than a car theft
  10. Slide 13: Pirated programs are not a gameTALKING POINTSThe night the Xbox® game “Call of Duty: Modern Warfare 2” went on sale, thousands of gamers lined up hours in advance to snap up the first copies when the game was released at the stroke of midnight.But up to a million other gamers chose the piracy route, modifying their Xbox consoles to bypass the digital rights management features so they could download illegal copies of the game. Now they’re paying for it. Most of those players were banned from Xbox LIVE®—up to a million players!—for playing pirated versions of Microsoft games. These gamers learned the hard way that theft has consequences and that you’re never truly anonymous with digital files and devices. There are other ways you can connect honestly and carefully on the web. [click]NOTES FOR SPEAKERDepending how talkative your group has been, it’s quite possible that you won’t have time to include this point. In that case, skip this slide and the next. When you get to the “recap” slide (slide 15), summarize the points below, to give a slightly more substantive summary than you will on the other slides.
  11. By:VyacheslavZakorzhevsky Kaspersky Lab ExpertWhile the freebie lover is waiting for the result, two pieces of malware that were stealthily installed and launched by the dropper make themselves at home on the PC. One of these is detected by Kaspersky Lab as Trojan.MSIL.Agent.aor. It steals registration data for other programs, as well as passwords, mostly for online games.
  12. Pirated software as a threat vector
  13. Used to conduct a variety of attacksSpamDenial of serviceClick fraudMore malware distribution
  14. Drive-by download means two things, each concerning the unintended download of computersoftware from the Internet:Downloads which a person authorized but without understanding the consequences (e.g. downloads which install an unknown or counterfeit executable program, ActiveX component, or Java applet).Any download that happens without a person's knowledge, often a computer virus, spyware, malware, or crimeware.[1]Wikipedia
  15. Example on how social media apps and quizzes can collect and identify personal information.Information from Allowing Access to ProfileName: Mellissa OurtheE-mail: mali437@Juno.comInformation from QuizzesBasic PersonalHeight: 5’1”Hair: Blonde and WavyEyes: BrownPierced NoseFavoritesFavorite Color: PurpleFavorite Candy: Reese’s Peanut Butter CupsFavorite food: MexicanFavorite drink: SodaFavorite Movie: Wall-E & Finding NemoFavorite Animal: CatsPersonality-Drives a minivan-Most important thing is family-Always carries cell phone with her-Self-proclaimed procrastinatorThere are three ways that the harvested information could be used: SpearPhishing, Impersonation or Identity Theft, and In-Person Attack or Scam.
  16. Each click on any link is will install and activate malicious content.
  17. http://www.microsoft.com/security/resources/videos.aspx
  18. Microsoft Security Essentials provides real-time protection for your home PC that guards against viruses, spyware, and other malicious software.Microsoft Security Essentials is a free* download from Microsoft that is simple to install, easy to use, and always kept up to date so you can be assured your PC is protected by the latest technology. It’s easy to tell if your PC is secure — when you’re green, you’re good. It’s that simple.Microsoft Security Essentials runs quietly and efficiently in the background so that you are free to use your Windows-based PC the way you want—without interruptions or long computer wait times.It’s easy to tell if your PC is secure — when you’re green, you’re good. It’s that simple.When y are red … y have a problem!Windows Defender detects and removes spywareWindows Defender is software that helps protect your computer against pop-ups, slow performance, and security threats caused by spyware and other unwanted software by detecting and removing known spyware from your computer. Windows Defender features Real-Time Protection, a monitoring system that recommends actions against spyware when it's detected, minimizes interruptions, and helps you stay productive.The benefits of installing Windows Defender include:Spyware detection and removalWindows Defender quickly and easily finds spyware and other unwanted programs that can slow down your computer, display annoying pop-up ads, change Internet settings, or use your private information without your consent.Windows Defender eliminates detected spyware easily at your direction, and if you inadvertently remove programs that you actually want, it's easy to get them back.Windows Defender allows you to schedule your scanning and removal times when it's convenient for you, whether it's on-demand or on a schedule that you set.Improved Internet browsing safetyWindows Defender helps stop spyware before it infiltrates your computer. Windows Defender also offers a continuous safeguard designed to target all the ways that spyware can infiltrate your computer.Windows Defender works without distracting you. It runs in the background and automatically handles spyware based on preferences that you set. You can use your computer with minimal interruption.Protection against the latest threatsA dedicated team of Microsoft researchers continuously searches the Internet to discover new spyware and develop methods to counteract it.A voluntary, worldwide network of Windows Defender users helps Microsoft determine which suspicious programs to classify as spyware. Participants help discover new threats quickly and notify Microsoft analysts, so that everyone is better protected. Anyone who uses Windows Defender can join this network and help report potential spyware to Microsoft.To help protect your computer from the latest threats, you can choose to have updates that counteract new spyware automatically downloaded to your computer.
  19. For starters, before you enter sensitive data on a Web form or page, look for two things:1. Signs that the site uses data encryption: https (“s” is for secure).A closed padlock. It must be here, beside the Web address, or in the lower right corner of the window. 2. Signs of a trusted site, such as the green address bar in Windows® Internet Explorer®. The graphic in the slide shows what each of those things looks like in your browser.That’s the first strategy for protecting sensitive information. Another precaution you can take is to think before you click.
  20. BE SUSPICIOUS OF ATTACHMENTS AND LINKS. There are several reasons to use caution: Senders can be phony. A virus (the colds and flu of computing, designed to spread to other computers) may have sent the mail you just received.Spyware can hide in e-mail attachments. Open one and you may download spyware which can track what you do on your computer. It may enable criminals to collect company or personal information, record account numbers and passwords as you type, or bombard you with pop-up ads.Click links or download videos and photos and you could be downloading a virus along with them. Links can go to phony Web sites.Toll-free numbers can go to fraudulent call centers.Keep in mind: If you click, you catch. MESSAGES ON SOCIAL SITES:Just because the e-mail message says it’s a LinkedIn update, doesn’t mean it is.Messages you get when you’re using a social site such as Facebook, LinkedIn, and Twitter can have viruses or be trying to entice you to divulge sensitive information, too. TO REPEAT: “THINK BEFORE YOU CLICK” IS A BEST PRACTICE FOR PROTECTING SENSITIVE DATA, but you also need to be on the lookout for scams and fraud in e-mail and instant messages.
  21. Use the Red “X” to Close Pop-upsWhile you are surfing the Internet, if you see a pop-up window, never click any buttons in the window to close the window. Always use the red “X” in the corner of the pop-up window. Even though the pop-up window shows buttons saying “No,” or “Cancel,” criminals can program these buttons to trigger an action you don’t expect. Clicking any button, or even clicking anywhere in the pop-up window, could cause your computer to download unwanted software. The red “X,” usually found in the upper right corner of the pop-up window, is controlled by the browser program and is a safe way to close pop-up windows. With Internet Explorer 7, you can also press ALT+F4 to manually close a pop-up window.
  22. CONFIRM WITH THE SENDER THAT THE E-MAIL OR INSTANT MESSAGE IS REALCall the company using a number you already have for it.Or check it against what you find on Bing, Google, or an online phone directory.To visit the site, TYPE THE WEB ADDRESS YOURSELF instead of clicking the link in the message.Or, use your own bookmark or favorite.USE A BROWSER WITH SAFETY FEATURESSuch as the anti-phishing feature (SmartScreen® Filter) and the pop-up blocker that’s on by default in Internet Explorer 8.If you’re ever in doubt about a site, consult a Web site that identifies known scams:Such as www.snopes.com.Another way to protect sensitive data is to use strong passwords.
  23. You lock your house, your car, your bike. You also need to lock up corporate assets, client info, accounts, computers, mobile phones, etc. To do this on your computer:KEEP PASSWORDS SECRETIf stolen, everything they protect is at risk. Don’t share them with friends, colleagues, or businesses.Don’t use the same password (or simple variations) for different accounts or services.Don’t store passwords on your phone or in a file on your computer or on a post-it on your computer. It’s okay to store them on a well-hidden sheet of paper.Don’t let someone trick you into revealing them.CHANGE THEM OFTEN: Change the important ones regularly—like the one for your computer or mobile phone.MAKE THEM STRONGAt least eight characters. Upper and lower case letters, numbers, and symbols.Easy for you to remember and hard for others to guess.Avoid number sequences, your pet’s name, birth date, Social Security numbers, and the like. Don’t use words that you can find in the dictionary.Avoid using only look-alike substitutions of numbers or symbols.Choose a sentence that’s easy to remember and difficult for others to guess and use it as the basis of a password. (See below for an idea about how to present this.)CUSTOMIZING THE PRESENTATION: Ask the group to create a phrase that’s eight words or longer—like the first line of a favorite song. Take the first letter of each word to make the password. Substitute numbers or symbols for some of the letters—like “3” for “E” or “!” for “L.”
  24. CUSTOMIZING THIS PRESENTATIONThis is an opportunity for the audience to test their password knowledge. There are several ways you can handle this:If you have a white board or flip chart, you can do this as a group activity: One password at a time, ask the group to decide whether it’s strong or not and discuss why.If people have paper and pen, ask everyone to do this as a task either by themselves or in pairs.Or simply give everyone a minute or two to think about which of these are strong, and which weak. When you’re ready to see the results, go to the next slide.
  25. EXPLAINING THE ANSWERS:WEAK. Only numbers, possibly a Social Security number, which criminals can easily find online.WEAK. A date—birth or anniversary date, for example—can be known and easily found by a criminal.WEAK. Don’t use words you can find in any dictionary in any language (expeditious). Criminals will not be fooled by common look-alike replacements such as “3” for “e”.STRONG. Letters, symbols, numbers, not a word found in the dictionary.WEAK. Only numbers. Avoid sequences (or repeated numbers, like 22222222).STRONG. A sentence that’s easy to remember, but difficult for others to guess. Eight characters or longer.Take the first letters of this sentence: My son Aiden was 3 years Old in December. Add complexity by mixing upper and lower case letters, symbols, and numbers.Having reviewed many ways you can protect sensitive information, let’s look at the third way to avoid a bad day…
  26. …protecting devices when you’re away from workThese include laptops, thumb drives (USB or flash drives), mobile phones.DO YOUR DEVICES HAVE THE LATEST PROTECTION?Make it part of your travel routine. Update before you leave.GUARD YOUR DEVICES LIKE YOU DO YOUR WALLET.For example, lock your mobile phone when you’re not using it. DON’T HAND-CARRY SENSITIVE DATA.On your laptop or thumb drive.It’s not worth the risk. If you lose it, anyone can access it.If you must take sensitive data, encrypt it. However, encryption only slows access to data; it doesn’t prevent access from a determined hacker after really valuable data.IF YOU USE YOUR THUMB DRIVE IN ANOTHER COMPUTER:That computer may be infected and could corrupt the thumb drive and ultimately your computer.When you re-insert the drive into your computer, click the Close button in any message that pops up so you don’t give any malware a chance to run.But you need to do more than protect the physical devices when you’re on the road…
  27. BitLocker helps keep everything from documents to passwords safer by encrypting the entire drive that Windows and your data reside on. Once BitLocker is turned on, any file you save on that drive is encrypted automatically.BitLocker To Go—a new feature of Windows 7—gives the lockdown treatment to easily-misplaced portable storage devices like USB flash drives and external hard drives.
  28. …Wireless hotspots can be risky, so here are ways to connect to the Web more safely: CONNECT SECURELY. Choose:The most secure connection, even if it means paying for it. Ask about it before you connect.WEP (at least) that encrypts (or scrambles) data as it travels between your laptop and the wireless access point. (WEP stands for Wired Equivalent Privacy. It is a system of data encryption that prevents access to a wireless network.) A password-protected connection, ideally one that is unique for your use.KNOW WHO YOU’RE CONNECTING TOConfirm the exact spelling of the network you’re connecting to. Beware of clever (slightly misspelled) fakes. For example: HLTONHOTELSNET vs. HILTONHOTELSNET. (There’s no “I” in the first Hilton.)Check the privacy statement on the network's Web site. No privacy statement? Wait until you return to the office to conduct sensitive business.SAVE SENSITIVE USES FOR MORE TRUSTED CONNECTIONSDon’t bank or make other financial transactions at a wireless hotspot.Don’t download, install, or update software.Use e-mail with the understanding that it can open the door to illegal access to corporate networks and data.Turn off the wireless connection when you’re not using it.