SlideShare una empresa de Scribd logo
1 de 4
CYBER PRIVACY
AND
PASSWORD
PROTECTION
CYBER PRIVACY
Internet privacy involves the right or mandate of personal privacy concerning the storing, re-purposing,
provision to third parties, and displaying of information pertaining to oneself via Internet.
Internet privacy is a subset of data privacy. Privacy concerns have been articulated from the
beginnings of large-scale computer sharing
Risks of Internet privacy
CYBER TERRORISM
DON’T GIVE PERSONAL INFORMATIONS
DON’T GIVE ANY PERSONAL INFORMATION TO A THIRD PARTY APPLICATION
SUCH AS :ACCESS TO GALLERY,LOCATION,PERMISSION TO GALLERY,
DON’T DISCLUSE ANY PERSONAL INFORMATION FOR AN WEB SERVICE
IF THEY ARE ASKING PERSONAL DETAILS IN A PUBLIC PLATFORM YOU DON’T WANT TO SHARE ANY
DETAILS FOR ANY TYPE OF WEB SERVICES ITS AGAINST CYBER PRIVACY
CYBER PRIVACY IS CONNECTED TO PASSWORD PROTECTON
PASSWORD PROTECTION
Don’t Be Complacent
Even if you keep your passwords and devices secure, the companies with which
you do business might not. Assume the worst and always take every precaution.
precaution.
Yahoo, Equifax, Target, Microsoft, Facebook, Instagram…
Keep Your Passwords Unique
If you re-use the same password everywhere, your accounts will fall like dominoes if even one of
dominoes if even one of them is breached. Never re-use passwords from one site to another.
one site to another.
Avoid Common Passwords
Besides using different passwords on each of your accounts, take care to avoid passwords other
avoid passwords other people typically use. Don’t use “password123”, “qwerty”, or “123456”.
“qwerty”, or “123456”. Anything that is really obvious to you is also obvious to everyone else, so
obvious to everyone else, so you have to dig deeper to come up with something uncommon.
something uncommon.
Be Careful with the Password Length
Good passwords should be at least 8 characters long, but 10 characters is better.
As passwords get longer and longer, it gets harder to remember them, so don’t make it
long to easily remember and type—if your password is really lengthy and complicated,
site you’re logging into might “time out” before you finish entering it, and you’re m
to have typos that will potentially lock you out of the account. Come up with a good
for your passwords, but not so long that it’s impossible to enter.
Don’t Change Them Too Often
Many workplaces make people change their passwords every few months; this practice
just makes it more likely people will forget their passwords or write them down on a
note. Better to keep strong, unique passwords for longer than to change them too fre
Use a Password Manager
Since none of us can remember unique passwords for all of our accounts, software tool
available to create strong, unique passwords and fill them in for you when you log i
It’s possible the web browser you use has built-in password management tools you can
.

Más contenido relacionado

Similar a Cyber privacy PJ Blog

Why is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewWhy is password protection a fallacy a point of view
Why is password protection a fallacy a point of view
STO STRATEGY
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
amiinaaa
 
TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptx
HAYDEECAYDA
 

Similar a Cyber privacy PJ Blog (20)

Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness Infographics
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewWhy is password protection a fallacy a point of view
Why is password protection a fallacy a point of view
 
How to choose a password that’s hard to crack
How to choose a password that’s hard to crackHow to choose a password that’s hard to crack
How to choose a password that’s hard to crack
 
Network Security
Network SecurityNetwork Security
Network Security
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
How to protect your digital footprint
How to protect your digital footprintHow to protect your digital footprint
How to protect your digital footprint
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your users
 
itEraLesson3. .pptx
itEraLesson3.                       .pptxitEraLesson3.                       .pptx
itEraLesson3. .pptx
 
Cyber privacy and password protection
Cyber privacy and password protectionCyber privacy and password protection
Cyber privacy and password protection
 
Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World Safety
 
Cyber Security for REALTORS®
Cyber Security for REALTORS®Cyber Security for REALTORS®
Cyber Security for REALTORS®
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptx
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
Masterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy BasicsMasterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy Basics
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 
Password management
Password managementPassword management
Password management
 

Último

Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
ssuserdda66b
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Último (20)

Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 

Cyber privacy PJ Blog

  • 2. CYBER PRIVACY Internet privacy involves the right or mandate of personal privacy concerning the storing, re-purposing, provision to third parties, and displaying of information pertaining to oneself via Internet. Internet privacy is a subset of data privacy. Privacy concerns have been articulated from the beginnings of large-scale computer sharing Risks of Internet privacy CYBER TERRORISM DON’T GIVE PERSONAL INFORMATIONS DON’T GIVE ANY PERSONAL INFORMATION TO A THIRD PARTY APPLICATION SUCH AS :ACCESS TO GALLERY,LOCATION,PERMISSION TO GALLERY, DON’T DISCLUSE ANY PERSONAL INFORMATION FOR AN WEB SERVICE IF THEY ARE ASKING PERSONAL DETAILS IN A PUBLIC PLATFORM YOU DON’T WANT TO SHARE ANY DETAILS FOR ANY TYPE OF WEB SERVICES ITS AGAINST CYBER PRIVACY CYBER PRIVACY IS CONNECTED TO PASSWORD PROTECTON
  • 3. PASSWORD PROTECTION Don’t Be Complacent Even if you keep your passwords and devices secure, the companies with which you do business might not. Assume the worst and always take every precaution. precaution. Yahoo, Equifax, Target, Microsoft, Facebook, Instagram… Keep Your Passwords Unique If you re-use the same password everywhere, your accounts will fall like dominoes if even one of dominoes if even one of them is breached. Never re-use passwords from one site to another. one site to another. Avoid Common Passwords Besides using different passwords on each of your accounts, take care to avoid passwords other avoid passwords other people typically use. Don’t use “password123”, “qwerty”, or “123456”. “qwerty”, or “123456”. Anything that is really obvious to you is also obvious to everyone else, so obvious to everyone else, so you have to dig deeper to come up with something uncommon. something uncommon.
  • 4. Be Careful with the Password Length Good passwords should be at least 8 characters long, but 10 characters is better. As passwords get longer and longer, it gets harder to remember them, so don’t make it long to easily remember and type—if your password is really lengthy and complicated, site you’re logging into might “time out” before you finish entering it, and you’re m to have typos that will potentially lock you out of the account. Come up with a good for your passwords, but not so long that it’s impossible to enter. Don’t Change Them Too Often Many workplaces make people change their passwords every few months; this practice just makes it more likely people will forget their passwords or write them down on a note. Better to keep strong, unique passwords for longer than to change them too fre Use a Password Manager Since none of us can remember unique passwords for all of our accounts, software tool available to create strong, unique passwords and fill them in for you when you log i It’s possible the web browser you use has built-in password management tools you can .