Presentation is loading. Please wait.

Presentation is loading. Please wait.

© C. Kerry Ltd. 2011 - The Internet – It is not as safe as most of us think … Safe(r) Surfing C. Kerry Nemovicher, Ph.D. However … Understanding the Internet.

Similar presentations


Presentation on theme: "© C. Kerry Ltd. 2011 - The Internet – It is not as safe as most of us think … Safe(r) Surfing C. Kerry Nemovicher, Ph.D. However … Understanding the Internet."— Presentation transcript:

1

2 © C. Kerry Ltd. 2011 - The Internet – It is not as safe as most of us think … Safe(r) Surfing C. Kerry Nemovicher, Ph.D. However … Understanding the Internet and the use of Common Sense Safety Can render the Internet reasonably Safe Common Sense Safety For Internet Usage and Browsing

3 © C. Kerry Ltd. 2011 What is the Internet? 2

4 © C. Kerry Ltd. 2011 What is the Internet? 3 The Internet

5 © C. Kerry Ltd. 2011 The Internet What is the Internet? 4 ISP

6 © C. Kerry Ltd. 2011 What is the Internet? How eMail works 5 Alice Bob ISP

7 © C. Kerry Ltd. 2011 What is the Internet? How browsing works 6 Alice Bob ISP

8 © C. Kerry Ltd. 2011 What are the Dangers The malefactors and what they want 7 Originally, the malefactors were pranksters and mischief makers Now, Internet Crime is Organized Crime … Big Business. Internet Crime Online scams, ID theft, and undelivered goods made up most of the 300,000 complaints [received by the FBIs Internet Crime Complaint Center] in 2010 (http://www.fbi.gov) U.S. Internet crime loss complaints almost doubled in value from $265 million in 2008 to reach $560 million [in 2009], according to official figures. (http://homelandsecuritynewswire.com) The Primary Goals: Extortion Identity Theft Intellectual Property Theft

9 © C. Kerry Ltd. 2011 What are the Dangers? Where the eMail sharks hide 8 Alice Bob ISP

10 © C. Kerry Ltd. 2011 What are the Dangers? Where the browser sharks hide 9 Alice Bob ISP

11 © C. Kerry Ltd. 2011 What are the Dangers? … and … What you need to know 10 With whom are you communicating? Who is listening to the communication? What information do the malefactors want? What will the malefactors do with the information they obtain?

12 © C. Kerry Ltd. 2011 What are the Dangers? What you need to know about eMail 11 Bogus eMails – with embedded malicious links Bogus eMails – with scam contents Bogus eMails – with embedded or attached malware Legitimate eMails – with anti-social tendencies Legitimate eMails – with confidential information in the content Legitimate eMails – with risky content

13 © C. Kerry Ltd. 2011 What are the Dangers? Bogus eMails – with malicious links 12 http://85.185.174.116:75/citi.us/check.php For IP Address: 85.185.174.116 www.citibank.com http://85.185.174.116:75/citi.us/check.php

14 © C. Kerry Ltd. 2011 What are the Dangers? Bogus eMails – with scam contents 13

15 © C. Kerry Ltd. 2011 What are the Dangers? Bogus eMails – embedded malware 14

16 © C. Kerry Ltd. 2011 What are the Dangers? Legitimate eMails – anti-social behavior 15 3 21 = 10,460,353,203 2 44 = 17,592,186,044,416 sheets 2 44 /1,000 = 17,592,186,044 inches 17,792,186,044/12 = 1,466,015,503 feet 1,466,015,503/5,280 = 276,544 miles Average distance to the moon = 238,854 miles 3 21 = ?

17 © C. Kerry Ltd. 2011 What are the Dangers? Legitimate eMails – with confidential data 16

18 © C. Kerry Ltd. 2011 What are the Dangers? Legitimate eMails – with risky content 17

19 © C. Kerry Ltd. 2011 What are the Dangers? Legitimate? eMails – with risky content 18

20 © C. Kerry Ltd. 2011 What are the Dangers? … and … How to protect yourself 19 Bogus eMails – with embedded malicious links Never click on embedded links in an email … retype them into your browser Bogus eMails – with scam contents Be wary of offers too good to be true or those that play on your good nature Bogus eMails – with embedded or attached malware Never open an email with an attached executable file (.exe,.zip et cetera) Legitimate eMails – with anti-social tendencies Do NOT pass along mass mailings (Do NOT become a computer virus) Legitimate eMails – with confidential information in the content Complain to any vendor that does not practice safe computing Legitimate eMails – with risky content When sending and/or forwarding emails, clean out the To & cc lists And NEVER open eMails which do not have a Subject or have an unusual Subject

21 © C. Kerry Ltd. 2011 What are the Dangers? Definition of terms - Browser 20 A web browser or Internet browser is a software application for retrieving, presenting, and traversing information resources on the World Wide Web (WWW). An information resource is identified by a Uniform Resource Identifier (URI) and may be a webpage, image, video, or other piece of content. (http://en.wikipedia.org/wiki/Web_browser) Important: A browser is software that runs on YOUR computer, and therefore has access to everything on your computer. Yet, it executes instructions received from a remote website.

22 © C. Kerry Ltd. 2011 What are the Dangers? Definition of terms - Cookies 21 A cookie, also known as a web cookie, browser cookie, and HTTP cookie, is a piece of text stored on a user's computer by their web browser. A cookie can be used for authentication, storing site preferences, shopping cart contents, the identifier for a server-based session, or anything else that can be accomplished through storing text data. (http://en.wikipedia.org/wiki/HTTP_cookie) Important: Cookies can contain private information (e.g., Passwords) that are accessible to Browsers, as well as instructions for Browsers to execute. Important: In a computer, text is stored as a series of binary codes (1s and 0s). Therefore in a computer there is no way to distinguish between text and a set of instructions for the computer to execute.

23 © C. Kerry Ltd. 2011 What are the Dangers? Definition of terms - EULA 22 Personally Relevant Experiences Yahoo! provides personally relevant product features, content, advertising, spam and malware detection by analyzing your email. Some of these features and advertising will be based on our understanding of the content and meaning of your emails. For instance, we analyze email messages to identify key elements of meaning and then categorize this information for immediate and future use. [emphasis in red added] Please read our FAQ to learn more. This information may also be used for interest-based advertising. To learn more, you can visit Yahoo!s control tool for interest-based advertising. Yahoo! Mail may include interactive mail features from 3rd parties as well. Your personally identifiable information is not directly shared with the 3rd party without your consent. Yahoo! Privacy Policy

24 © C. Kerry Ltd. 2011 What are the Dangers? What you need to know about Websites 23 Bogus sites – that download malware Bogus sites – that mimic legitimate sites Legitimate sites – that intentionally track your browsing behavior Legitimate sites – that intentionally violate your privacy Legitimate sites – that intentionally download spyware Legitimate sites – that have been compromised Sniffers that monitor web traffic for private information

25 © C. Kerry Ltd. 2011 What are the Dangers? … and … How to protect yourself 24 Bogus sites – Look for telltale inconsistencies Check the sites geographic location (if you can get it) at, e.g.,: http://www.geobytes.com/iplocator.htm?getlocation http://www.ipligence.com/geolocation When there is ANY doubt, do NOT download files and/or click on any actions Legitimate sites Know and understand a sites Privacy Policy and then disclose accordingly Try not to send confidential info over an unsecured line Do NOT permit the site to remember you or remember your password Do NOT permit cookies from third party sites Do NOT permit persistent cookies & periodically delete cookies

26 © C. Kerry Ltd. 2011 The Dangers – They Exist But does that mean we must stay away? 25 Alice Bob ISP

27 © C. Kerry Ltd. 2011 Even if the Dangers exist … It IS possible to swim with the sharks 26

28 © C. Kerry Ltd. 2011 Even if the Dangers exist … It IS possible to swim with the sharks 27

29 © C. Kerry Ltd. 2011 It IS possible to swim with the sharks We do, however, need to exercise caution 28

30 © C. Kerry Ltd. 2011 Safe Surfing Can web surfing be 100% safe? No. … There are definitely dangers and for many of them we have no real counter-measures

31 © C. Kerry Ltd. 2011 Safe(r) Surfing That IS possible! … IF we take the appropriate precautions. The Internet is like the ocean. Its value and allure cannot be ignored. Our safety lies in its vastness and in our respect for, and understanding of, its dangers.

32 © C. Kerry Ltd. 2011 Safe(r) Surfing Post Script

33 © C. Kerry Ltd. 2011 In the news recently … 32

34 © C. Kerry Ltd. 2011 Safe(r) Surfing Questions?


Download ppt "© C. Kerry Ltd. 2011 - The Internet – It is not as safe as most of us think … Safe(r) Surfing C. Kerry Nemovicher, Ph.D. However … Understanding the Internet."

Similar presentations


Ads by Google