surf with the pros!

Download Surf with the Pros!

If you can't read please download the document

Upload: gaia

Post on 09-Jan-2016

30 views

Category:

Documents


2 download

DESCRIPTION

Surf with the Pros!. by Martha Raup. A student’s report on research about Security and Privacy while using the Internet. Surfing the Internet is FUN!. Enjoy it! Surf often But don’t forget…. 1. Dangers Lurk!. 2. Surfing Can Be Dangerous!. Beware of viruses Watch out for sharks - PowerPoint PPT Presentation

TRANSCRIPT

  • Surf with the Pros!by Martha RaupA students report on research about Security and Privacy while using the Internet

  • Surfing the Internet is FUN!Enjoy it! Surf often

    But dont forget1

  • Dangers Lurk!2

  • Surfing Can Be Dangerous!Beware of viruses Watch out for sharks Follow these tips 33

  • Tips from the ProsUse common sense Secure your passwords Secure your computer Get a lock on your life4

  • Remember!Keep your head above waterHang on to your stuffEnjoy the ride!

    5

  • Use Common SenseDon't download files sent by strangers. Dont click on links from people you don't know. Don't give out personal information6

  • Secure Your Passwords

    Use passwords for sensitive information Make them hard! Manage them well7

  • What are Secure Passwords?Use 6 characters LettersNumbersSymbols Avoid common words

  • Secure Your ComputerUpdate anti-virus software Use a firewall Recycle safely

    58

  • Get a Lock on Your Life!Lock up sensitive data Look up good surfing practices Look out for suspicious circumstances 9

  • What Did I Learn from Classmates?Internet safety depends on us all.

    Keep current with security demands.

    Theres more

    1510

  • Parisa saysUpdate Your Anti-Virus Software Often

    Increase Your Password Security11

  • Patricia saysWatch What You Download!!

    Remove Spyware

    Cover Your Tracks!12

  • Randy saysGet Rid of Spyware

    Keep Your Security Software Current

    Schedule Backups Regularly

    13

  • Sylvia says

    Use Passwords

    Not too easy

    Not too hard

    Use Encryption 1415

  • What Have We Learned?Lets Take a Test!

    Try your hand at the following questionsChoose your answer and then ring the bellYou will be rewarded if you are right!

    Good Luck!

  • What Makes a Strong Password?Something easy to remember, like 123

    Something short, like cat

    Something obvious, like your address Something with at least 6 letters, numbers, and characters.Answer

  • Which statement is most true? a. Its easy to know who the internet enemy is.

    b. There are many ways one can protect oneself against dangers on the Internet.

    c. Computer security is best left for the experts.

    d. Students are too smart to get hacked.Answer

  • ANSWER KEYQuiz 1 What makes a strong password?d. Something with at least 6 letters, numbers, and characters. Quiz 2 - Which statement is most true?b. There are many ways one can protect oneself against dangers on the Internet.

  • Summary Slide - Marthas ResearchUse Common Sense Secure Your Passwords Secure Your Computer Get a Lock on Your Life!

  • Summary of Students TipsWatch what you download!Keep security software updatedRemove spywareEncrypt dataSchedule regular backupsCover your tracks!

  • ConclusionInternet surfing is fun! It can be DANGEROUS!! Follow our Student Tips so you can

  • Surf with the Pros!But Be Wary of Sharks!!

    This presentation is based on research conducted by the students of Verley ONeals CAST 93: PowerPoint. It was conducted during the summer quarter of 2007 at Foothill College. The class is taught entirely online. The topic of internet security and privacy therefore had immense and immediate interest. We hope you share our interest in learning how to Surf the Internet Safely.Even the smartest surfers need to follow the rules.

    NOTE: The font has been standardized. Thanks for the tip, Patricia!

    NOTE 2: Randy points out that this slide has two #1s on it. However, I cannot find where the extra number is! Ive viewed the Header and Footer, and the Master Slide, and nowhere does that number appear. Its not visible in the normal view, just on screen. So its a mystery! I decided to remove my subscripted #1, which should solve the problemMy research taught me that password security is one of the keys to maintaining ones security when using the Internet and web. By keeping your identity and your data safe, you will prevent hackers from accessing passwords stored on your computer, and prevent them from using your personal information online. CNET has an excellent video that identifies 5 steps to picking a secure password. This video describes how you can generate secure passwords, and how you can manage those passwords.

    The video is viewable at: http://reviews.cnet.com/Pick_secure_passwords/4660-10165_7-6625630.html?tag=vid. The Internet can give you access to information, entertainment, financial offers, and countless other services but at the same time, it can leave you vulnerable to online scammers, identity thieves and more. For practical tips to help you be on guard against Internet fraud, secure your computer, and protect your personal information, visit www.OnGuardOnline.gov. SOURCE: http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/deter.html#BeonguardwhenusingtheInternet

    This presentation summarizes a few Tips from the Pros that I found especially relevant to students.

    NOTE: The background design has been changed as per Patricias suggestion that it was too conservative. This design may not be any less conservative, but I thought the them of the ocean might add to the unity of the presentation. Thanks for the suggestion, Pat!To surf safely, everyone needs to follow the advice presented here.

    NOTE: Elizabeth noticed that slides 6, 7, and 8 had different color font for some words, and suggested they be made bold. When I changed the design format, this problem went away. Thanks for the heads up, Elizabeth!Don't give out personal information on the phone, through the mail, or on the Internet unless you've initiated the contact and are sure you know who you're dealing with. Identity thieves are clever, and may pose as representatives of banks, Internet service providers (ISPs), and even government agencies to get people to reveal their Social Security number, mother's maiden name, account numbers, and other identifying information.

    Before you share any personal information, confirm that you are dealing with a legitimate organization. Check an organization's website by typing its URL in the address line, rather than cutting and pasting it. Many companies post scam alerts when their name is used improperly. Or call customer service using the number listed on your account statement or in the telephone book.

    SOURCE: http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/deter.html#VerifyasourcebeforesharinginformationPlace passwords on your credit card, bank, and phone accounts. Avoid using easily available information like your mother's maiden name, your birth date, the last four digits of your Social Security number or your phone number, a series of consecutive numbers, or a single word that would appear in a dictionary.Combinations of letters, numbers, and special characters make the strongest passwords. When opening new accounts, you may find that many businesses still ask for your mother's maiden name. Find out if you can use a password instead.

    SOURCE: http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/deter.html#Selectintricatepasswords

    The most important part of securing your passwords is to pick a secure password. What is a secure password? It is one that uses at least 6 characters; uses letters, numbers, and symbols; and does NOT use common, dictionary-defined words. The advantage of using a secure password is that hackers will not be able to access your identity online. Without knowledge of your password, they cannot impersonate you, nor can they compromise your online security. Many sites will give you ideas for how to generate a secure password. SOURCE: Authors CAST 93 research from: http://reviews.cnet.com/Pick_secure_passwords/4660-10165_7-6625630.html?tag=vid

    To thwart an identity thief who may pick through your trash or recycling bins to capture your personal information, always shred your charge receipts, copies of credit applications, insurance forms, physician statements, checks and bank statements, expired charge cards that you're discarding, and credit offers you get in the mail.

    SOURCE: http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/deter.html#TreatyourtrashandmailcarefullyKeep your personal information in a secure place at home, especially if you have roommates, employ outside help, or are having work done in your house. Share your personal information only with those family members who have a legitimate need for it. Keep your purse or wallet in a safe place at work; do the same with copies of administrative forms that have your sensitive personal information.

    SOURCE: http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/deter.html#TreatyourtrashandmailcarefullyMy classmates also researched Internet Security and Privacy, and their suggestions will help you to surf safely. Marisa says: A major source of viruses is through e-mail attachments. To prevent a virus from affecting your computer you must do a virus scan on all attachments you receive. The best program to use is something that is famous and well known so you know that the program works.

    Patricia says: We arent often aware of it but the fact is that spyware programs are silently running in the background monitoring your internet habits. While some spyware programs monitor your internet habits in the name of market research others might use information gathered such as passwords, account numbers, and other personal information for illegal activities.

    This is an ad for Spring Cleaning software. The product advertises that it helps you cover your computer tracks. It cleans your cache and history files and will also delete cookies from spam producing websites. This product costs $29.95.Randy says: Software that is installed on your computer without your consent, it tracks your Internet actvitiy. Spyware sends your surfing information to marketing agencies that add you to mailing lists related to websites you have visited or run searches on from your search engine. Spyware can be designed to record your keystrokes, making it easier to acquire access to your email and other online business activities. The spyware may be downloaded as part of free software or by clicking on advertising links.

    Keep you computer current with software patches and updates that harness vulnerabilities permitting access to your computer. There are frequent updates for your operating system and other installed software programs. Most software can be configured to automatically check for updates. Create scheduled backups of your computer files and folders so that you may recover your important data. Viruses can damages files or disable your computer. Backup important files to an external hard drive or other media (CDs or DVDs). The backup files can be restored to your computer once it is operationally secure. http://www.staysafeonline.info/practices/six.html Sylvia says: If your password is too hard to remember, you will write it down so that any action movie bad guy can find it on the post it note next to your hard drive, or you will lock yourself out of the system.

    SOURCE: http://www.cl.cam.ac.uk/%7Erja14/book.html - click on chapter 3, passwords This is an image that represents the idea of encryption. Unencrypted numbers go into a system, and a code, presumably meaningless to those who lack the key, but useful to those who have it, comes out the other end. Heres a quiz that will test what you know. Remember the Tips from the Pros that weve shared with you!This first question asks about passwords. It may be the most important topic we studied!The second quiz question is a reminder that security and privacy online depends on ALL of us doing our part. Its not enough to rely on the experts; we may not know who the enemy is, or where he lurks; and even the smart ones need to follow the Tips from the Pros. Thats why this topic is so important!NOTE: Inclusion of an answer key was suggested by Parisa. Thank you, classmate!These are the topics I found most important to maintaining security and privacy of ones identity online. Follow them regularly, and you will glad you did!These are the additional tips suggested by my classmates. Its never too late to implement good habits! These are a few that are well-worth your while.Internet surfing can add immeasurably to our lives, but it can be hazardous. Thats why weve assembled these Tips from the Pros, and offer them to you. Use them, and your surfing habits will keep you secure and your data private.Using these tips, youll be able to Surf with the Pros!

    We hope youve benefited from the results of our research, and I hope you enjoyed the show!!