SlideShare una empresa de Scribd logo
1 de 35
WATCH YOUR BACK Let’s Talk Web Safety and Personal Identity Theft
Overview ,[object Object],[object Object],[object Object],[object Object],[object Object]
PASSWORD SECURITY
Best Practices  ,[object Object],[object Object]
Best Practices  ,[object Object]
Best Practices  ,[object Object]
Best Practices  ,[object Object]
Best Practices  ,[object Object]
Best Practices  ,[object Object]
Strong Passwords ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Common Password
Common Password Themes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
EMAIL SECURITY
Email Spoofing ,[object Object],[object Object]
Top 10 Spam Subject Lines ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Do Not Download These Types of Files Source:  http://www.novatone.net/mag/mailsec.htm File Extension Description File Extension Description ADE Microsoft Access Project Extension MDB Microsoft Access Application ADP Microsoft Access Project MDE Microsoft Access MDE Database BAS Visual Basic® Class Module MSC Microsoft Common Console Document BAT Batch File MSI Windows Installer Package CHM Compiled HTML Help File MSP Windows Installer Patch CMD Windows NT® Command Scrip MST Visual Test Source File COM MS-DOS® Application PCD Photo CD Image CPL Control Panel Extension PIF Shortcut to MS-DOS Program CRT Security Certificate REG Registration Entries EXE Application SCR Screen Saver HLP Windows® Help File SCT Windows Script Component HTA HTML Applications SHS Shell Scrap Object INF Setup Information File URL Internet Shortcut (Uniform Resource Locator) INS Internet Communication Settings VB VBScript File ISP Internet Communication Settings VBE VBScript Encoded Script File JS JScript® File VBS VBScript Script File JSE JScript Encoded Script File WSC Windows Script Component LNK Shortcut WSF Windows Script File WSH Windows Scripting Host Settings File
Safe File Extensions for Email Downloads Source:  http://www.novatone.net/mag/mailsec.htm File Extension Description GIF Picture - Graphics Interchange Format (ConmuServe) JPG or JPEG Picture - Joint Photographic Expert Group TIF or TIFF Picture - Tagged Image File Format (Adobe) MPG or MPEG Movie - Motion Picture Expert Group MP3 Sound – MPEG compressed audio WAV Sound – Audio (Microsoft)
VIRUS SCANNERS
AVG Free Get a free virus scanner at:  http://free.avg.com/ Hint: Don’t install the tool bar!
Current Virus Threats ,[object Object],[object Object],[object Object]
What to do with a Virus ,[object Object],[object Object],[object Object]
SOCIAL ENGINEERING
Phone Calls ,[object Object],[object Object],[object Object]
Phishing ,[object Object],[object Object],Source:  http://en.wikipedia.org/wiki/Phishing
Top 10 Phishing Scams ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Top Brands Exploited by Phishing Scams http://www.mcafee.com/us/threat_center/anti_phishing/phishing_top10.html
Flash Drive Example ,[object Object]
HOME/WIRELESS SECURITY
Set-Up ,[object Object],[object Object],[object Object]
Password/Encryption ,[object Object],[object Object]
Definition: Firewall ,[object Object]
Definition: IP Address ,[object Object]
Photo Credits ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
RODNEY SABRSULA Schipul ,[object Object],[object Object],[object Object]
JENNIFER BROOKS Schipul ,[object Object],[object Object],[object Object],[object Object]

Más contenido relacionado

La actualidad más candente

Most Common Application Level Attacks
Most Common Application Level AttacksMost Common Application Level Attacks
Most Common Application Level AttacksEC-Council
 
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...wajug
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)EC-Council
 
Types of Cyber Attacks
Types of Cyber AttacksTypes of Cyber Attacks
Types of Cyber AttacksRubal Sagwal
 
Internet threats and issues in korea 120325 eng_slideshare
Internet threats and issues in korea 120325 eng_slideshareInternet threats and issues in korea 120325 eng_slideshare
Internet threats and issues in korea 120325 eng_slideshareYoungjun Chang
 
Chapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet SecurityChapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet SecurityPatty Ramsey
 
Types of Cyber-Attacks
Types of Cyber-AttacksTypes of Cyber-Attacks
Types of Cyber-Attackstechexpert2345
 
8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catchiYogi
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internetdpd
 
this is test for today
this is test for todaythis is test for today
this is test for todayDreamMalar
 
Client server security threats
Client server security threatsClient server security threats
Client server security threatsrahul kundu
 

La actualidad más candente (20)

Most Common Application Level Attacks
Most Common Application Level AttacksMost Common Application Level Attacks
Most Common Application Level Attacks
 
Network security
Network securityNetwork security
Network security
 
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)
 
Security threats
Security threatsSecurity threats
Security threats
 
Network security
Network securityNetwork security
Network security
 
Types of Cyber Attacks
Types of Cyber AttacksTypes of Cyber Attacks
Types of Cyber Attacks
 
Code protection
Code protectionCode protection
Code protection
 
Internet threats and issues in korea 120325 eng_slideshare
Internet threats and issues in korea 120325 eng_slideshareInternet threats and issues in korea 120325 eng_slideshare
Internet threats and issues in korea 120325 eng_slideshare
 
Cyber attacks
Cyber attacks Cyber attacks
Cyber attacks
 
Internet security
Internet securityInternet security
Internet security
 
Chapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet SecurityChapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet Security
 
PACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of MalwarePACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of Malware
 
Types of Cyber-Attacks
Types of Cyber-AttacksTypes of Cyber-Attacks
Types of Cyber-Attacks
 
Network Security
Network SecurityNetwork Security
Network Security
 
8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internet
 
this is test for today
this is test for todaythis is test for today
this is test for today
 
Client server security threats
Client server security threatsClient server security threats
Client server security threats
 

Destacado

Driving Traffic to your Website with Paid Advertising - AMA UHD Conference
Driving Traffic to your Website with Paid Advertising - AMA UHD ConferenceDriving Traffic to your Website with Paid Advertising - AMA UHD Conference
Driving Traffic to your Website with Paid Advertising - AMA UHD ConferenceSchipul - The Web Marketing Company
 
Social Media for Health Care Organizations - Hubmed Health Care Communication...
Social Media for Health Care Organizations - Hubmed Health Care Communication...Social Media for Health Care Organizations - Hubmed Health Care Communication...
Social Media for Health Care Organizations - Hubmed Health Care Communication...Schipul - The Web Marketing Company
 
Best Business Email Ever Written - Katrina Esco - Ignite Houston 2012 Present...
Best Business Email Ever Written - Katrina Esco - Ignite Houston 2012 Present...Best Business Email Ever Written - Katrina Esco - Ignite Houston 2012 Present...
Best Business Email Ever Written - Katrina Esco - Ignite Houston 2012 Present...Schipul - The Web Marketing Company
 

Destacado (15)

Facebook Fanpage Optimization Webinar Training
Facebook Fanpage Optimization Webinar TrainingFacebook Fanpage Optimization Webinar Training
Facebook Fanpage Optimization Webinar Training
 
Understanding Memberships in Tendenci
Understanding Memberships in TendenciUnderstanding Memberships in Tendenci
Understanding Memberships in Tendenci
 
Hands On Drupal: Funny Name, Serious CMS
Hands On Drupal: Funny Name, Serious CMSHands On Drupal: Funny Name, Serious CMS
Hands On Drupal: Funny Name, Serious CMS
 
Web Analytics: Insights into Numbers is Exciting!
Web Analytics: Insights into Numbers is Exciting!Web Analytics: Insights into Numbers is Exciting!
Web Analytics: Insights into Numbers is Exciting!
 
Don't Forget the Milk
Don't Forget the MilkDon't Forget the Milk
Don't Forget the Milk
 
The Future & Non-Profit Organizations
The Future & Non-Profit OrganizationsThe Future & Non-Profit Organizations
The Future & Non-Profit Organizations
 
Driving Traffic to your Website with Paid Advertising - AMA UHD Conference
Driving Traffic to your Website with Paid Advertising - AMA UHD ConferenceDriving Traffic to your Website with Paid Advertising - AMA UHD Conference
Driving Traffic to your Website with Paid Advertising - AMA UHD Conference
 
Storytelling through Social Media
Storytelling through Social MediaStorytelling through Social Media
Storytelling through Social Media
 
TACCM 2013 DIY Email Marketing
TACCM 2013 DIY Email MarketingTACCM 2013 DIY Email Marketing
TACCM 2013 DIY Email Marketing
 
Social Media for Health Care Organizations - Hubmed Health Care Communication...
Social Media for Health Care Organizations - Hubmed Health Care Communication...Social Media for Health Care Organizations - Hubmed Health Care Communication...
Social Media for Health Care Organizations - Hubmed Health Care Communication...
 
The Personal Brand Era Cometh
The Personal Brand Era ComethThe Personal Brand Era Cometh
The Personal Brand Era Cometh
 
Best Business Email Ever Written - Katrina Esco - Ignite Houston 2012 Present...
Best Business Email Ever Written - Katrina Esco - Ignite Houston 2012 Present...Best Business Email Ever Written - Katrina Esco - Ignite Houston 2012 Present...
Best Business Email Ever Written - Katrina Esco - Ignite Houston 2012 Present...
 
The Next Generation Website
The Next Generation WebsiteThe Next Generation Website
The Next Generation Website
 
What do I do with this blog?? Blogging With Sharks
What do I do with this blog?? Blogging With SharksWhat do I do with this blog?? Blogging With Sharks
What do I do with this blog?? Blogging With Sharks
 
Trends in Communication Technology for Associations | ACCE 2013
Trends in Communication Technology for Associations | ACCE 2013Trends in Communication Technology for Associations | ACCE 2013
Trends in Communication Technology for Associations | ACCE 2013
 

Similar a Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft

Dark Alleys/Internet Security
Dark Alleys/Internet SecurityDark Alleys/Internet Security
Dark Alleys/Internet SecurityJohn Dorner
 
The Safest Way To Interact Online
The Safest Way To Interact OnlineThe Safest Way To Interact Online
The Safest Way To Interact Onlinepcsafe
 
Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
Protecting Your Key Asset – Data Protection Best Practices V2.0   FinalProtecting Your Key Asset – Data Protection Best Practices V2.0   Final
Protecting Your Key Asset – Data Protection Best Practices V2.0 FinalVinod Kumar
 
Dark Alleys Part1740
Dark Alleys Part1740Dark Alleys Part1740
Dark Alleys Part1740guest2bd2b2
 
Dark Alleys Part1
Dark Alleys Part1Dark Alleys Part1
Dark Alleys Part1Anne Adrian
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundaryDean Iacovelli
 
Internet Security
Internet SecurityInternet Security
Internet SecurityAnne Adrian
 
Word press security 101
Word press security 101  Word press security 101
Word press security 101 Kojac801
 
Passwords & security
Passwords & securityPasswords & security
Passwords & securityPer Thorsheim
 
Addressing the Top 3 Real-world Security Challenges for Your IBM i Systems
Addressing the Top 3 Real-world Security Challenges for Your IBM i SystemsAddressing the Top 3 Real-world Security Challenges for Your IBM i Systems
Addressing the Top 3 Real-world Security Challenges for Your IBM i SystemsPrecisely
 
Cyber Security 101 – A Practical Guide for Small Businesses
Cyber Security 101 – A Practical Guide for Small BusinessesCyber Security 101 – A Practical Guide for Small Businesses
Cyber Security 101 – A Practical Guide for Small BusinessesPECB
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businessesB2BPlanner Ltd.
 
302 Content Server Security Challenges And Best Practices
302   Content Server Security   Challenges And Best Practices302   Content Server Security   Challenges And Best Practices
302 Content Server Security Challenges And Best Practicesphanleson
 

Similar a Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft (20)

Dark Alleys/Internet Security
Dark Alleys/Internet SecurityDark Alleys/Internet Security
Dark Alleys/Internet Security
 
The Safest Way To Interact Online
The Safest Way To Interact OnlineThe Safest Way To Interact Online
The Safest Way To Interact Online
 
Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
Protecting Your Key Asset – Data Protection Best Practices V2.0   FinalProtecting Your Key Asset – Data Protection Best Practices V2.0   Final
Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
 
Dark Alleys Part1740
Dark Alleys Part1740Dark Alleys Part1740
Dark Alleys Part1740
 
Dark Alleys Part1
Dark Alleys Part1Dark Alleys Part1
Dark Alleys Part1
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Word press security 101
Word press security 101  Word press security 101
Word press security 101
 
Passwords & security
Passwords & securityPasswords & security
Passwords & security
 
Addressing the Top 3 Real-world Security Challenges for Your IBM i Systems
Addressing the Top 3 Real-world Security Challenges for Your IBM i SystemsAddressing the Top 3 Real-world Security Challenges for Your IBM i Systems
Addressing the Top 3 Real-world Security Challenges for Your IBM i Systems
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network security
Network security Network security
Network security
 
Cyber Security 101 – A Practical Guide for Small Businesses
Cyber Security 101 – A Practical Guide for Small BusinessesCyber Security 101 – A Practical Guide for Small Businesses
Cyber Security 101 – A Practical Guide for Small Businesses
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businesses
 
Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety
 
information security and backup system
information security and backup systeminformation security and backup system
information security and backup system
 
Network security
Network securityNetwork security
Network security
 
NetworkSecurity
NetworkSecurityNetworkSecurity
NetworkSecurity
 
302 Content Server Security Challenges And Best Practices
302   Content Server Security   Challenges And Best Practices302   Content Server Security   Challenges And Best Practices
302 Content Server Security Challenges And Best Practices
 
Desktop Security 8 9 07
Desktop Security 8 9 07Desktop Security 8 9 07
Desktop Security 8 9 07
 

Más de Schipul - The Web Marketing Company (9)

TACCM 2013 Web Marketing Tool Kit - Texas Association of Community College Ma...
TACCM 2013 Web Marketing Tool Kit - Texas Association of Community College Ma...TACCM 2013 Web Marketing Tool Kit - Texas Association of Community College Ma...
TACCM 2013 Web Marketing Tool Kit - Texas Association of Community College Ma...
 
Social Media Strategy - Presented to the Louisiana Food Processor's Conference
Social Media Strategy - Presented to the Louisiana Food Processor's ConferenceSocial Media Strategy - Presented to the Louisiana Food Processor's Conference
Social Media Strategy - Presented to the Louisiana Food Processor's Conference
 
Facebook Fanpage Optimization
Facebook Fanpage OptimizationFacebook Fanpage Optimization
Facebook Fanpage Optimization
 
Hands On Filmmaking
Hands On FilmmakingHands On Filmmaking
Hands On Filmmaking
 
Your Brand is Out of Control
Your Brand is Out of ControlYour Brand is Out of Control
Your Brand is Out of Control
 
Unleash The SEO Beast
Unleash The SEO BeastUnleash The SEO Beast
Unleash The SEO Beast
 
Do’s and Don’ts of Online Newsletter Marketing
Do’s and Don’ts of Online Newsletter MarketingDo’s and Don’ts of Online Newsletter Marketing
Do’s and Don’ts of Online Newsletter Marketing
 
Tendenci 101 & Beyond
Tendenci 101 & BeyondTendenci 101 & Beyond
Tendenci 101 & Beyond
 
Evernote - Taking Notes
Evernote - Taking NotesEvernote - Taking Notes
Evernote - Taking Notes
 

Último

What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 

Último (20)

What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 

Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft

  • 1. WATCH YOUR BACK Let’s Talk Web Safety and Personal Identity Theft
  • 2.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 12.
  • 14.
  • 15.
  • 16. Do Not Download These Types of Files Source: http://www.novatone.net/mag/mailsec.htm File Extension Description File Extension Description ADE Microsoft Access Project Extension MDB Microsoft Access Application ADP Microsoft Access Project MDE Microsoft Access MDE Database BAS Visual Basic® Class Module MSC Microsoft Common Console Document BAT Batch File MSI Windows Installer Package CHM Compiled HTML Help File MSP Windows Installer Patch CMD Windows NT® Command Scrip MST Visual Test Source File COM MS-DOS® Application PCD Photo CD Image CPL Control Panel Extension PIF Shortcut to MS-DOS Program CRT Security Certificate REG Registration Entries EXE Application SCR Screen Saver HLP Windows® Help File SCT Windows Script Component HTA HTML Applications SHS Shell Scrap Object INF Setup Information File URL Internet Shortcut (Uniform Resource Locator) INS Internet Communication Settings VB VBScript File ISP Internet Communication Settings VBE VBScript Encoded Script File JS JScript® File VBS VBScript Script File JSE JScript Encoded Script File WSC Windows Script Component LNK Shortcut WSF Windows Script File WSH Windows Scripting Host Settings File
  • 17. Safe File Extensions for Email Downloads Source: http://www.novatone.net/mag/mailsec.htm File Extension Description GIF Picture - Graphics Interchange Format (ConmuServe) JPG or JPEG Picture - Joint Photographic Expert Group TIF or TIFF Picture - Tagged Image File Format (Adobe) MPG or MPEG Movie - Motion Picture Expert Group MP3 Sound – MPEG compressed audio WAV Sound – Audio (Microsoft)
  • 19. AVG Free Get a free virus scanner at: http://free.avg.com/ Hint: Don’t install the tool bar!
  • 20.
  • 21.
  • 23.
  • 24.
  • 25.
  • 26. Top Brands Exploited by Phishing Scams http://www.mcafee.com/us/threat_center/anti_phishing/phishing_top10.html
  • 27.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.

Notas del editor

  1. Pic source: http://www.flickr.com/photos/35034348736@N01/6091103/
  2. http://www.flickr.com/photos/30055137@N05/2874818735/
  3. Pic Source Ducks http://www.flickr.com/photos/71038389@N00/2335148856/
  4. Pic source: Glass http://www.flickr.com/photos/80682954@N00/3168425434/ Head http://www.flickr.com/photos/26811362@N05/3169491395/
  5. Pic Source: http://www.braswellcomputers.com/images/hackers.jpg
  6. Pic source: http://www.flickr.com/photos/9483141@N02/1043482672/
  7. Pic Source: Christmas http://www.flickr.com/photos/26260213@N05/3093056683/ Preg mom http://www.flickr.com/photos/34957438@N05/3416525003/