SlideShare una empresa de Scribd logo
1 de 35
WATCH YOUR BACK Let’s Talk Web Safety and Personal Identity Theft
Overview ,[object Object],[object Object],[object Object],[object Object],[object Object]
PASSWORD SECURITY
Best Practices  ,[object Object],[object Object]
Best Practices  ,[object Object]
Best Practices  ,[object Object]
Best Practices  ,[object Object]
Best Practices  ,[object Object]
Best Practices  ,[object Object]
Strong Passwords ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Common Password
Common Password Themes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
EMAIL SECURITY
Email Spoofing ,[object Object],[object Object]
Top 10 Spam Subject Lines ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Do Not Download These Types of Files Source:  http://www.novatone.net/mag/mailsec.htm File Extension Description File Extension Description ADE Microsoft Access Project Extension MDB Microsoft Access Application ADP Microsoft Access Project MDE Microsoft Access MDE Database BAS Visual Basic® Class Module MSC Microsoft Common Console Document BAT Batch File MSI Windows Installer Package CHM Compiled HTML Help File MSP Windows Installer Patch CMD Windows NT® Command Scrip MST Visual Test Source File COM MS-DOS® Application PCD Photo CD Image CPL Control Panel Extension PIF Shortcut to MS-DOS Program CRT Security Certificate REG Registration Entries EXE Application SCR Screen Saver HLP Windows® Help File SCT Windows Script Component HTA HTML Applications SHS Shell Scrap Object INF Setup Information File URL Internet Shortcut (Uniform Resource Locator) INS Internet Communication Settings VB VBScript File ISP Internet Communication Settings VBE VBScript Encoded Script File JS JScript® File VBS VBScript Script File JSE JScript Encoded Script File WSC Windows Script Component LNK Shortcut WSF Windows Script File WSH Windows Scripting Host Settings File
Safe File Extensions for Email Downloads Source:  http://www.novatone.net/mag/mailsec.htm File Extension Description GIF Picture - Graphics Interchange Format (ConmuServe) JPG or JPEG Picture - Joint Photographic Expert Group TIF or TIFF Picture - Tagged Image File Format (Adobe) MPG or MPEG Movie - Motion Picture Expert Group MP3 Sound – MPEG compressed audio WAV Sound – Audio (Microsoft)
VIRUS SCANNERS
AVG Free Get a free virus scanner at:  http://free.avg.com/ Hint: Don’t install the tool bar!
Current Virus Threats ,[object Object],[object Object],[object Object]
What to do with a Virus ,[object Object],[object Object],[object Object]
SOCIAL ENGINEERING
Phone Calls ,[object Object],[object Object],[object Object]
Phishing ,[object Object],[object Object],Source:  http://en.wikipedia.org/wiki/Phishing
Top 10 Phishing Scams ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Top Brands Exploited by Phishing Scams http://www.mcafee.com/us/threat_center/anti_phishing/phishing_top10.html
Flash Drive Example ,[object Object]
HOME/WIRELESS SECURITY
Set-Up ,[object Object],[object Object],[object Object]
Password/Encryption ,[object Object],[object Object]
Definition: Firewall ,[object Object]
Definition: IP Address ,[object Object]
Photo Credits ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
RODNEY SABRSULA Schipul ,[object Object],[object Object],[object Object]
JENNIFER BROOKS Schipul ,[object Object],[object Object],[object Object],[object Object]

Más contenido relacionado

La actualidad más candente

Most Common Application Level Attacks
Most Common Application Level AttacksMost Common Application Level Attacks
Most Common Application Level AttacksEC-Council
 
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...wajug
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)EC-Council
 
Types of Cyber Attacks
Types of Cyber AttacksTypes of Cyber Attacks
Types of Cyber AttacksRubal Sagwal
 
Internet threats and issues in korea 120325 eng_slideshare
Internet threats and issues in korea 120325 eng_slideshareInternet threats and issues in korea 120325 eng_slideshare
Internet threats and issues in korea 120325 eng_slideshareYoungjun Chang
 
Chapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet SecurityChapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet SecurityPatty Ramsey
 
Types of Cyber-Attacks
Types of Cyber-AttacksTypes of Cyber-Attacks
Types of Cyber-Attackstechexpert2345
 
8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catchiYogi
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internetdpd
 
this is test for today
this is test for todaythis is test for today
this is test for todayDreamMalar
 
Client server security threats
Client server security threatsClient server security threats
Client server security threatsrahul kundu
 

La actualidad más candente (20)

Most Common Application Level Attacks
Most Common Application Level AttacksMost Common Application Level Attacks
Most Common Application Level Attacks
 
Network security
Network securityNetwork security
Network security
 
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)
 
Security threats
Security threatsSecurity threats
Security threats
 
Network security
Network securityNetwork security
Network security
 
Types of Cyber Attacks
Types of Cyber AttacksTypes of Cyber Attacks
Types of Cyber Attacks
 
Code protection
Code protectionCode protection
Code protection
 
Internet threats and issues in korea 120325 eng_slideshare
Internet threats and issues in korea 120325 eng_slideshareInternet threats and issues in korea 120325 eng_slideshare
Internet threats and issues in korea 120325 eng_slideshare
 
Cyber attacks
Cyber attacks Cyber attacks
Cyber attacks
 
Internet security
Internet securityInternet security
Internet security
 
Chapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet SecurityChapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet Security
 
PACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of MalwarePACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of Malware
 
Types of Cyber-Attacks
Types of Cyber-AttacksTypes of Cyber-Attacks
Types of Cyber-Attacks
 
Network Security
Network SecurityNetwork Security
Network Security
 
8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internet
 
this is test for today
this is test for todaythis is test for today
this is test for today
 
Client server security threats
Client server security threatsClient server security threats
Client server security threats
 

Destacado

Driving Traffic to your Website with Paid Advertising - AMA UHD Conference
Driving Traffic to your Website with Paid Advertising - AMA UHD ConferenceDriving Traffic to your Website with Paid Advertising - AMA UHD Conference
Driving Traffic to your Website with Paid Advertising - AMA UHD ConferenceSchipul - The Web Marketing Company
 
Social Media for Health Care Organizations - Hubmed Health Care Communication...
Social Media for Health Care Organizations - Hubmed Health Care Communication...Social Media for Health Care Organizations - Hubmed Health Care Communication...
Social Media for Health Care Organizations - Hubmed Health Care Communication...Schipul - The Web Marketing Company
 
Best Business Email Ever Written - Katrina Esco - Ignite Houston 2012 Present...
Best Business Email Ever Written - Katrina Esco - Ignite Houston 2012 Present...Best Business Email Ever Written - Katrina Esco - Ignite Houston 2012 Present...
Best Business Email Ever Written - Katrina Esco - Ignite Houston 2012 Present...Schipul - The Web Marketing Company
 

Destacado (15)

Facebook Fanpage Optimization Webinar Training
Facebook Fanpage Optimization Webinar TrainingFacebook Fanpage Optimization Webinar Training
Facebook Fanpage Optimization Webinar Training
 
Understanding Memberships in Tendenci
Understanding Memberships in TendenciUnderstanding Memberships in Tendenci
Understanding Memberships in Tendenci
 
Hands On Drupal: Funny Name, Serious CMS
Hands On Drupal: Funny Name, Serious CMSHands On Drupal: Funny Name, Serious CMS
Hands On Drupal: Funny Name, Serious CMS
 
Web Analytics: Insights into Numbers is Exciting!
Web Analytics: Insights into Numbers is Exciting!Web Analytics: Insights into Numbers is Exciting!
Web Analytics: Insights into Numbers is Exciting!
 
Don't Forget the Milk
Don't Forget the MilkDon't Forget the Milk
Don't Forget the Milk
 
The Future & Non-Profit Organizations
The Future & Non-Profit OrganizationsThe Future & Non-Profit Organizations
The Future & Non-Profit Organizations
 
Driving Traffic to your Website with Paid Advertising - AMA UHD Conference
Driving Traffic to your Website with Paid Advertising - AMA UHD ConferenceDriving Traffic to your Website with Paid Advertising - AMA UHD Conference
Driving Traffic to your Website with Paid Advertising - AMA UHD Conference
 
Storytelling through Social Media
Storytelling through Social MediaStorytelling through Social Media
Storytelling through Social Media
 
TACCM 2013 DIY Email Marketing
TACCM 2013 DIY Email MarketingTACCM 2013 DIY Email Marketing
TACCM 2013 DIY Email Marketing
 
Social Media for Health Care Organizations - Hubmed Health Care Communication...
Social Media for Health Care Organizations - Hubmed Health Care Communication...Social Media for Health Care Organizations - Hubmed Health Care Communication...
Social Media for Health Care Organizations - Hubmed Health Care Communication...
 
The Personal Brand Era Cometh
The Personal Brand Era ComethThe Personal Brand Era Cometh
The Personal Brand Era Cometh
 
Best Business Email Ever Written - Katrina Esco - Ignite Houston 2012 Present...
Best Business Email Ever Written - Katrina Esco - Ignite Houston 2012 Present...Best Business Email Ever Written - Katrina Esco - Ignite Houston 2012 Present...
Best Business Email Ever Written - Katrina Esco - Ignite Houston 2012 Present...
 
The Next Generation Website
The Next Generation WebsiteThe Next Generation Website
The Next Generation Website
 
What do I do with this blog?? Blogging With Sharks
What do I do with this blog?? Blogging With SharksWhat do I do with this blog?? Blogging With Sharks
What do I do with this blog?? Blogging With Sharks
 
Trends in Communication Technology for Associations | ACCE 2013
Trends in Communication Technology for Associations | ACCE 2013Trends in Communication Technology for Associations | ACCE 2013
Trends in Communication Technology for Associations | ACCE 2013
 

Similar a Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft

Dark Alleys/Internet Security
Dark Alleys/Internet SecurityDark Alleys/Internet Security
Dark Alleys/Internet SecurityJohn Dorner
 
The Safest Way To Interact Online
The Safest Way To Interact OnlineThe Safest Way To Interact Online
The Safest Way To Interact Onlinepcsafe
 
Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
Protecting Your Key Asset – Data Protection Best Practices V2.0   FinalProtecting Your Key Asset – Data Protection Best Practices V2.0   Final
Protecting Your Key Asset – Data Protection Best Practices V2.0 FinalVinod Kumar
 
Dark Alleys Part1740
Dark Alleys Part1740Dark Alleys Part1740
Dark Alleys Part1740guest2bd2b2
 
Dark Alleys Part1
Dark Alleys Part1Dark Alleys Part1
Dark Alleys Part1Anne Adrian
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundaryDean Iacovelli
 
Internet Security
Internet SecurityInternet Security
Internet SecurityAnne Adrian
 
Word press security 101
Word press security 101  Word press security 101
Word press security 101 Kojac801
 
Passwords & security
Passwords & securityPasswords & security
Passwords & securityPer Thorsheim
 
Addressing the Top 3 Real-world Security Challenges for Your IBM i Systems
Addressing the Top 3 Real-world Security Challenges for Your IBM i SystemsAddressing the Top 3 Real-world Security Challenges for Your IBM i Systems
Addressing the Top 3 Real-world Security Challenges for Your IBM i SystemsPrecisely
 
Cyber Security 101 – A Practical Guide for Small Businesses
Cyber Security 101 – A Practical Guide for Small BusinessesCyber Security 101 – A Practical Guide for Small Businesses
Cyber Security 101 – A Practical Guide for Small BusinessesPECB
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businessesB2BPlanner Ltd.
 
302 Content Server Security Challenges And Best Practices
302   Content Server Security   Challenges And Best Practices302   Content Server Security   Challenges And Best Practices
302 Content Server Security Challenges And Best Practicesphanleson
 

Similar a Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft (20)

Dark Alleys/Internet Security
Dark Alleys/Internet SecurityDark Alleys/Internet Security
Dark Alleys/Internet Security
 
The Safest Way To Interact Online
The Safest Way To Interact OnlineThe Safest Way To Interact Online
The Safest Way To Interact Online
 
Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
Protecting Your Key Asset – Data Protection Best Practices V2.0   FinalProtecting Your Key Asset – Data Protection Best Practices V2.0   Final
Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
 
Dark Alleys Part1740
Dark Alleys Part1740Dark Alleys Part1740
Dark Alleys Part1740
 
Dark Alleys Part1
Dark Alleys Part1Dark Alleys Part1
Dark Alleys Part1
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Word press security 101
Word press security 101  Word press security 101
Word press security 101
 
Passwords & security
Passwords & securityPasswords & security
Passwords & security
 
Addressing the Top 3 Real-world Security Challenges for Your IBM i Systems
Addressing the Top 3 Real-world Security Challenges for Your IBM i SystemsAddressing the Top 3 Real-world Security Challenges for Your IBM i Systems
Addressing the Top 3 Real-world Security Challenges for Your IBM i Systems
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network security
Network security Network security
Network security
 
Cyber Security 101 – A Practical Guide for Small Businesses
Cyber Security 101 – A Practical Guide for Small BusinessesCyber Security 101 – A Practical Guide for Small Businesses
Cyber Security 101 – A Practical Guide for Small Businesses
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businesses
 
Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety
 
information security and backup system
information security and backup systeminformation security and backup system
information security and backup system
 
Network security
Network securityNetwork security
Network security
 
NetworkSecurity
NetworkSecurityNetworkSecurity
NetworkSecurity
 
302 Content Server Security Challenges And Best Practices
302   Content Server Security   Challenges And Best Practices302   Content Server Security   Challenges And Best Practices
302 Content Server Security Challenges And Best Practices
 
Desktop Security 8 9 07
Desktop Security 8 9 07Desktop Security 8 9 07
Desktop Security 8 9 07
 

Más de Schipul - The Web Marketing Company (9)

TACCM 2013 Web Marketing Tool Kit - Texas Association of Community College Ma...
TACCM 2013 Web Marketing Tool Kit - Texas Association of Community College Ma...TACCM 2013 Web Marketing Tool Kit - Texas Association of Community College Ma...
TACCM 2013 Web Marketing Tool Kit - Texas Association of Community College Ma...
 
Social Media Strategy - Presented to the Louisiana Food Processor's Conference
Social Media Strategy - Presented to the Louisiana Food Processor's ConferenceSocial Media Strategy - Presented to the Louisiana Food Processor's Conference
Social Media Strategy - Presented to the Louisiana Food Processor's Conference
 
Facebook Fanpage Optimization
Facebook Fanpage OptimizationFacebook Fanpage Optimization
Facebook Fanpage Optimization
 
Hands On Filmmaking
Hands On FilmmakingHands On Filmmaking
Hands On Filmmaking
 
Your Brand is Out of Control
Your Brand is Out of ControlYour Brand is Out of Control
Your Brand is Out of Control
 
Unleash The SEO Beast
Unleash The SEO BeastUnleash The SEO Beast
Unleash The SEO Beast
 
Do’s and Don’ts of Online Newsletter Marketing
Do’s and Don’ts of Online Newsletter MarketingDo’s and Don’ts of Online Newsletter Marketing
Do’s and Don’ts of Online Newsletter Marketing
 
Tendenci 101 & Beyond
Tendenci 101 & BeyondTendenci 101 & Beyond
Tendenci 101 & Beyond
 
Evernote - Taking Notes
Evernote - Taking NotesEvernote - Taking Notes
Evernote - Taking Notes
 

Último

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 

Último (20)

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 

Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft

  • 1. WATCH YOUR BACK Let’s Talk Web Safety and Personal Identity Theft
  • 2.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 12.
  • 14.
  • 15.
  • 16. Do Not Download These Types of Files Source: http://www.novatone.net/mag/mailsec.htm File Extension Description File Extension Description ADE Microsoft Access Project Extension MDB Microsoft Access Application ADP Microsoft Access Project MDE Microsoft Access MDE Database BAS Visual Basic® Class Module MSC Microsoft Common Console Document BAT Batch File MSI Windows Installer Package CHM Compiled HTML Help File MSP Windows Installer Patch CMD Windows NT® Command Scrip MST Visual Test Source File COM MS-DOS® Application PCD Photo CD Image CPL Control Panel Extension PIF Shortcut to MS-DOS Program CRT Security Certificate REG Registration Entries EXE Application SCR Screen Saver HLP Windows® Help File SCT Windows Script Component HTA HTML Applications SHS Shell Scrap Object INF Setup Information File URL Internet Shortcut (Uniform Resource Locator) INS Internet Communication Settings VB VBScript File ISP Internet Communication Settings VBE VBScript Encoded Script File JS JScript® File VBS VBScript Script File JSE JScript Encoded Script File WSC Windows Script Component LNK Shortcut WSF Windows Script File WSH Windows Scripting Host Settings File
  • 17. Safe File Extensions for Email Downloads Source: http://www.novatone.net/mag/mailsec.htm File Extension Description GIF Picture - Graphics Interchange Format (ConmuServe) JPG or JPEG Picture - Joint Photographic Expert Group TIF or TIFF Picture - Tagged Image File Format (Adobe) MPG or MPEG Movie - Motion Picture Expert Group MP3 Sound – MPEG compressed audio WAV Sound – Audio (Microsoft)
  • 19. AVG Free Get a free virus scanner at: http://free.avg.com/ Hint: Don’t install the tool bar!
  • 20.
  • 21.
  • 23.
  • 24.
  • 25.
  • 26. Top Brands Exploited by Phishing Scams http://www.mcafee.com/us/threat_center/anti_phishing/phishing_top10.html
  • 27.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.

Notas del editor

  1. Pic source: http://www.flickr.com/photos/35034348736@N01/6091103/
  2. http://www.flickr.com/photos/30055137@N05/2874818735/
  3. Pic Source Ducks http://www.flickr.com/photos/71038389@N00/2335148856/
  4. Pic source: Glass http://www.flickr.com/photos/80682954@N00/3168425434/ Head http://www.flickr.com/photos/26811362@N05/3169491395/
  5. Pic Source: http://www.braswellcomputers.com/images/hackers.jpg
  6. Pic source: http://www.flickr.com/photos/9483141@N02/1043482672/
  7. Pic Source: Christmas http://www.flickr.com/photos/26260213@N05/3093056683/ Preg mom http://www.flickr.com/photos/34957438@N05/3416525003/