Presentation is loading. Please wait.

Presentation is loading. Please wait.

Personal Online Safety Florida Department of Law Enforcement Computer Crime Center Mary McLaughlin Cyber Security Analyst.

Similar presentations


Presentation on theme: "Personal Online Safety Florida Department of Law Enforcement Computer Crime Center Mary McLaughlin Cyber Security Analyst."— Presentation transcript:

1 Personal Online Safety Florida Department of Law Enforcement Computer Crime Center Mary McLaughlin Cyber Security Analyst

2 Protecting Your Computer Anti-Virus Firewalls Protecting Your Computer Anti-Virus Firewalls Protecting Your Information Strong passwords Downloading Websites Email Online shopping Protecting Your Information Strong passwords Downloading Websites Email Online shopping Protecting Yourself Social Networking Identity Theft Public computers Protecting Yourself Social Networking Identity Theft Public computers Overview

3 The Changing Internet 1994 – 2004: The Internet Content presented to us for our information, education, and amusement

4 2005 – 2010 (and beyond): Web 2.0 Internet that facilitates (and depends on) collaboration and sharing The Changing Internet

5 Controlling and shaping people's attitudes and behavior by using knowledge of who they are and where they are from A term used among criminals for exploiting weaknesses in people, rather than software-- tricking someone into giving out information that will compromise system security Reformed hacker Mitnick exposes the tricks of ‘social engineering’ Social Engineering

6 Due Diligence The process of checking and verifying information

7 Defense in Depth Layered Security

8 Protecting Your Computer, Your Information, Yourself Protecting Your Computer, Your Information, Yourself

9 Use Anti-Virus Software A program installed on a computer to prevent the introduction of malicious software. It can also find it, remove it, and often repair infected files. Protect Your Computer: Anti-Virus Software

10 Install anti-virus software Immediately update it –Regularly update it thereafter Review the settings carefully –Make sure it is scans “real time” –Scan ALL FILES, not just program files Run a scan regularly –Every day is not too often Protect Your Computer: Anti-Virus Software

11 Install a software firewall A firewall is a program that protects a network from unwelcome traffic by enforcing an access control policy between the local network and the Internet Protect Your Computer: Firewalls

12 Firewalls CAN protect against –Network intrusions (Hackers) –Sending personal information Firewalls CANNOT protect against –Email attacks –Internal attacks (such as a CD) Protect Your Computer: Firewalls Do your homework – make sure your firewall is set up properly

13 Protect Your Information: Passwords Create a password appropriate for the information you want to control You probably have accounts at many websites that do not contain confidential information – newspapers, games, etc. Don’t waste effort creating a strong password that you don’t need

14 Protect Your Information: Passwords How to have a strong password Use at least 15 characters: numbers, letters, etc. Don’t make it anything guessable Don’t store it where someone can see it or find it Use a “passphrase:” It looks random…but it makes sense to you A&Bh3fcnJ,P,&E. Ann and Bob have three fine children named Jason, Paul, and Elizabeth. A&Bh3fcnJ,P,&E. Ann and Bob have three fine children named Jason, Paul, and Elizabeth.

15 Protect Your Information: Downloads Research before you download Malicious software often hides in free downloads Trojan horses allow attackers to take over your computer, and operate it in secret Be cautious of email attachments 70% of spam contains malicious software Check any downloaded file with your anti-virus scanner before installing it!

16 Protect Your Information: Websites Be suspicious of websites that: Are from a link in spam Are linked to ads that are tailored just for you Call you “customer” or “friend” Try to give you something *free* Ask for any personal information – for ANY reason

17 Protect Your Information: Websites Always read the address carefully –“bankofamerica” vs. “bankofamerca” Set up your browser to warn you –Internet Explorer, Firefox, Chrome, and Safari all include tools for flagging suspect sites Configure your browser to warn you when it detects a possible problem!

18 Protect Your Information Patches & Backups Install patches –Patches usually are for improved security –Check for updates regularly –Turn on the “auto-update” feature Create backup files –It takes only a few minutes –Use a CD, a flash drive, or external drive –Copy those files that you care about losing

19 Beware phishing scams! –They pretend to be from a business you know –They claim there is an account problem –They insist you respond immediately –They threaten your account privileges Protect Your Information: Email Email is the number one way that most people get scammed

20 Protect Your Information: Email Don’t –Read email from persons you don’t know –“Opt out” of spam (just delete it) –Click on any links in unfamiliar email –Give out any personal information in emails Do –Scan any attachments for viruses before opening –Delete suspicious looking emails Sometimes just reading the email is enough to infect your computer

21 Use a credit card –Fair Credit Billing Act limits consumer liability –Debit cards: Electronic Fund Transfer Act limits consumer liability with stipulations Buy only from businesses you know Check the seller’s reputation (Auctions) Always use a secure connection Protect Your Information: Online shopping

22 A secure connection

23 Social Networking Sites that connect friends, business partners, and other individuals together using a variety of tools.

24 More than 400 million active users 50% log on to Facebook in any given day 35 million users update their status each day 3 billion photos uploaded to the site each month 1.5 million local businesses have active Pages Average user has 130 friends on the site Average user spends more than 55 minutes per day on Facebook 70% users are outside the United States 65 million active users access it through their mobile devices Social Networking: Facebook Dominates

25 Protect Yourself: Social Networking Make your profile PRIVATE Limit the information you put into your profile Make sure you know your friends The less you know your “friends,” the less information you should have in your profile

26 Protect Yourself: Posting Images Be selective when posting a picture On the Internet pictures are forever. Be cautious when posting an image on a public site – one that can be seen by all Know where you have pictures of your children and grandchildren Check the images that friends have posted too

27 Be careful when meeting an online friend in person Protect Yourself: In-person Meetings Make your meeting in a place public – popular restaurant, public park, ball game Tell friends where you will be Take a friend with you, and ask them to stay for the entire meeting Once you are back home, evaluate the encounter You have “gut feelings” for a reason – Pay attention to them! You have “gut feelings” for a reason – Pay attention to them!

28 Protect Yourself: Identity Theft You can never completely prevent ID theft, so be vigilant Get a free credit report annually –www.annualcreditreport.com Review all bank and account statements Beware of sites that ask for personal information; make sure they need it Keep your anti-virus updated Use a shredder

29 Don't save your logon information Always click "log out" on the site. Disable automatic login features Never check "Remember me" or "Keep me logged in." Don't leave the computer unattended Log out of all programs and close all windows. Erase your tracks Delete your temporary Internet files and your history. Use Google/Bing/Yahoo! if you need help with this. Watch for over-the-shoulder snoops They can watch as you enter sensitive information. From http://www.microsoft.com/protect/mobile/public/publicpc.aspx Protect Yourself: Public Computers

30 For more information about any of these topics…

31 http://www.secureflorida.org

32 Contact Information Mary McLaughlin Computer Crime Center Florida Dept of Law Enforcement 2331 Phillips Rd. Tallahassee, FL 32308 (850) 617-1350 ComputerCrimeCenter@fdle.state.fl.us


Download ppt "Personal Online Safety Florida Department of Law Enforcement Computer Crime Center Mary McLaughlin Cyber Security Analyst."

Similar presentations


Ads by Google