Seen these slides before? Skip to slide 33 to see the new content. I presented these slides to an Online Security Workshop for Parents.
Property of Darien Library
3. The Bad News
Source: http://www.darientimes.com/22805/darien-residents-identity-stolen-to-buy-online-goods
4. The Good News
Protecting yourself is easy!
Know the signs of a
scam, use strong
passwords, and
protect your
computer from
hackers.
Source: http://www.flickr.com/photos/seandreilinger/5739375222
5. Your Online User Account
Be fake!
Create a fake persona for
yourself and use its
information when creating
accounts online.
Ease to do:
Moderately easy
Source: http://www.flickr.com/photos/whiteboard_dave/8462689688/
6. Your Online User Account
Be fake!
Protect yourself:
Do not use your real personal data
I.e. not your mom’s maiden name
Create a story for yourself
Love a book character to death? Use their story
information for your account
Remember your fake details
Source: http://www.flickr.com/photos/librarygoblin/6888540425
7. Scam Messages
Do not click!
Scammers and spammers
want to take your identity
and money.
Shows up on:
All social networks
Instant messaging
Text messages
Difficulty to spot:
Very easy
8. Scam Messages
Do not click!
Giveaways of a scam:
No photo
No text but just a URL
Beware of messages like:
~ “You won’t believe what they
said about you!”
~ “Check out this video of you.”
Nonsense username
9. Scam Emails
Do not click!
Email scammers prey on
gullibility, greed, empathy,
and loneliness.
Shows up on:
All email providers
Difficulty to spot:
Depends
Source: http://www.flickr.com/photos/nbr/3705010877
10. Scam Emails
Do not click!
Giveaways of a scam:
Unreasonably high salary
Looking for no experience
or says you can work
from home.
11. Scam Emails
Do not click!
Giveaways of a scam:
Wants to transfer you money
From a foreign prince
A dead family member
Someone trying to leave a dangerous situation
Language is unusual
English grammar is very weak
Urges urgency
Source: http://www.flickr.com/photos/librarygoblin/6888540425
12. Phishing
Do not click!
Phisers want to hack
your account and steal
your information.
Shows up on:
All social networks
Emails
Difficulty to spot:
Moderately difficult
Source: http://www.flickr.com/photos/djwaldow/4679640891
13. Phishing
Do not click!
Giveaways of a scam:
Claims there’s an issue with
your account
Wants you to click on a link to
log in or reactivate account
Warnings of doom if you do not
immediately comply
14. Phishing
Do not click!
How to check if real:
Hover over the URL
See if it really goes to the exact URL the email
claims to be from
Check the email address of
the sender
Beware of close URLs like gmale instead of gmail
Know who will not send you such
an email
AKA your bank, the IRS, the FBI, etc.
If in doubt, go the website directly and log in
15. Romance Scam Emails
Do not click!
Giveaways of a scam:
Wants you to transfer money
For goods, services, plane tickets
Sweet talks you
“Love of my life”
“No one has made me feel like this before”
Avoids meeting you
Source: http://dailym.ai/17zMPKm
16. Scams
Protect yourself!
To learn more:
Wikipedia
en.wikipedia.org/wiki/Nigerian_scam
5 Common Email Scams
1.usa.gov/1fzsdCS
Urban Legends
snopes.com
Latest Email Hoaxes
www.hoax-slayer.com
Source: http://dailym.ai/17zMPKm
17. Email Attachments
Do not open unless you are expecting an attachment!
Email hackers send
damaging attachments via
email to take over your
computer.
Shows up on:
All email providers
Difficulty to spot:
Easy
Source: http://www.flickr.com/photos/ari-herzog/3346927141
18. Email Attachments
Do not open unless you are expecting an attachment!
Giveaways of a scam:
Attachment(s) from a friend but
no text in the email body
Attachment(s) from a stranger
Attachment file ends in .exe or .rar
19. Passwords
Keep ‘em fresh!
Changing your passwords
frequently is the best
security measure.
Shows up:
Everywhere you go online
Easy level:
Very easy
**********
21. Passwords
Keep ‘em fresh!
Protect yourself:
Use different passwords for
important sites
E.g. bank, email, shopping sites
Do not leave your password
cheat sheet lying around
Keep your password to yourself
Use a password manager
E.g. LastPass, Dashlane, KeePass
**********
22. Two Factor Authentication
Add an extra level of protection!
Use a second layer of
authentication when
accessing your online
accounts.
Shows up:
Gmail
Twitter
Facebook
Dropbox
Easy level:
Easy after setting up
PayPal
And more
23. Two Factor Authentication
Add an extra level of protection!
Protect yourself:
Enable two factor authentication
You will need a code, a password, or answer a
question to log into a site where you have
enabled two factor authentication
Remember how to access your
accounts
Or you will not be able to log into the site
You may need your mobile phone if your site
uses an app to generate the access code
More information
http://bit.ly/17zkjEy
24. WiFi & Public Computer Safety
Be aware!
When on public WiFi
networks or computers, be
careful to not give away
your personal
information.
Ease to do:
Moderately easy
25. WiFi & Public Computer Safety
Be aware!
Protect yourself:
Stay off sensitive information sites
E.g. bank, email, shopping sites
If on public WiFi, know that
someone could be “sniffing” and
stealing your data
Student recommended using Hotspot Shield
Always sign off all sites you log
into on a public computer
26. HTTPS
Use secure connections!
Encrypt your data as you
browse the web.
Shows up:
Many popular, major websites already offer
HTTPS security so your data is encrypted.
Easy level:
Very easy
27. HTTPS
Use secure connections!
Protect yourself:
Download a browser extension that
tries to use HTTPS everywhere it is
available on the web
https://www.eff.org/https-everywhere
Available for Firefox and Chrome browsers
Check for HTTPS in the URL
If a site which is handling sensitive data like financial
information or Social Security Numbers does not use
HTTPS, do not input your information
28. Web Browser
Use a secure browser!
Keeping your browser up
to date is essential for safe
online usage.
Easy level:
Very easy
29. Web Browser
Use a secure browser!
Protect yourself:
Choose a better browser
My recommended browsers are Google
Chrome and Firefox (my bias)
Add protective features to the
browser
AdBlock Plus
HTTPS Everywhere
Disconnect extension
Keep My Opt-Outs
Do Not Track
Disable third party cookies
http://bit.ly/14mVK2Q
30. Read Your Credit Report
It’s free!
Federal law guarantees
your access to an online
copy of your credit report.
Easy level:
Moderately easy
Source: http://www.experian.com/assistance/free-annual-credit-report.html
123-45-6789
31. Read Your Credit Report
It’s free!
Protect yourself:
Get your free credit reports
https://www.annualcreditreport.com
Reports are from three major
reporting agencies
Experian
Equifax
TransUnion
Get a single report from a single
agency every 4 months
This way you can watch your credit report
throughout the year
123-45-6789
32. Viruses
Get yourself some anti-virus software.
Free
Paid
avast! Free Antivirus
Norton
avast.com/index
us.norton.com/antivirus
AVG Free
Bitdefender Antivirus Plus
free.avg.com
bitdeferender.com
34. COPPA
The Children’s Online Privacy Protection Act
The purpose of the law: How parental permission
Children under 13 cannot give out
is gathered:
personal information without the
consent of their parents
~ Signature via postal mail or email
~ A credit card for a transaction
~ A 1-800 number for parents to call
Be aware:
Children who have online accounts like email and social media can lose
their accounts if its discovered that they’re younger than 13.
Source: http://www.ftc.gov/news-events/media-resources/protecting-consumer-privacy/kids-privacy-coppa & http://www.coppa.org/comply.htm
35. CIPA
Children’s Internet Protection Act
Benefits to schools
The purpose of the law:
& libraries:
“to address concerns about
children’s access to obscene or
harmful content over the Internet”
especially in schools and libraries
~ Reduced rates for Internet access
What schools & libraries must do:
~ Implement filtering software
~ Create an Internet safety policy in regards to minors
Source: http://www.fcc.gov/guides/childrens-internet-protection-act
36. Protecting Children in the 21st Century Act
Works alongside CIPA
The purpose of the law:
To educate minors on appropriate
online behavior
Education outline:
~ Posting responsibly
~ Cyberbullying
~ Creating a positive online profile
~ Consider the consequences of your actions
Source: http://www.fcc.gov/guides/childrens-internet-protection-act & Michael Oide of OITP
37. Cyberbullying
24/7/365 access to the victim
Online bullying is worse
than traditional bullying.
Violent & sexual crimes
against the victim are shared
via social media.
38. Child Pornography Laws
Minors get charged too.
The PROTECT Act of 2003 & 18 U.S. Code §
1466A
criminalizes “knowingly or distributing ‘an obscene visual depiction of a
minor engaging in sexually explicit conduct; or a visual depiction of an actual
minor engaging in sexually explicit conduct.’”
Source: http://www.law.cornell.edu/uscode/text/18/1466A & http://en.wikipedia.org/wiki/PROTECT_Act_of_2003
39. Teens & Online Privacy
They can hide it better.
Wrong assumption:
Teens don’t care about privacy
Truth:
60% of teens have private Facebook
profiles & 26% post fake information about
themselves
Source: http://www.theguardian.com/technology/2013/oct/21/teenagers-careless-about-online-privacy
40. Erasable History
Let it go. Let it go.
Delete, delete, delete.
Teens are learning to leave no trace of their
online presence for others to find.
Self-destructing services:
Secretink.co
Snapchat
Wickr
Source: http://www.theguardian.com/technology/2013/oct/21/teenagers-careless-about-online-privacy
41. Other Tips
Pay attention!
Protect yourself:
Follow the news to learn which
sites were hacked
Be mindful of others’ privacy
Do not give your password or
PIN to your child
No such thing as a free lunch
Change your password immediately on that
site
They could run up charges by making
purchasing on your iPad or iPhone
Family and friends may not want their name,
photo, or other information posted online
Visiting pornography or free download sites (i.e.
movies, music, etc.) may expose your computer to
viruses
42. You are responsible for your online
security.
By being aware of what’s happening online and how your data
can be compromised, you are now ready to protect yourself!