Robert Crawford, MBA West Middle School.  Describe ways criminals obtain passwords  Discuss ways to protect your computer from being accessed by others.

Slides:



Advertisements
Similar presentations
Point3r$. Password Introduction Passwords are a key part of any security system : –Work or Personal Strong passwords make your personal and work.
Advertisements

Chapter 1: Fundamentals of Security JV Note: Images may not be relevant to information on slide.
Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access and attacks delivered.
James Sees Senior Network Administrator Management Analyst Cyber Protection Strategies White Hall Business Association - Cyber Security & Awareness Conference.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Network & Computer Security Training.  Prevents unauthorized access to our network and your computer  Helps keep unwanted viruses and malware from entering.
Robert Crawford, MBA West Middle School
August 15 click! 1 Basics Kitsap Regional Library.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
What is E-commerce Safety Precautions Password Strengths
SACHIN DEDHIA Cyber Crime Investigator Cert. Ethical Hacker(USA)
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
PAGE 1 Company Proprietary and Confidential Internet Safety and Security Presented January 13, 2014.
Staying Safe Online Keep your Information Secure.
Personal Safety Unit - Level 7. The Internet is not anonymous. Your address, screen name, and password serve as barriers between you and others.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Digital Citizenship Grade Why are we here and what is Digital Citizenship? Part 1: What is Private Online? Part 2: Passwords Part 3: Responsibilities.
P ROTECTING D ATA Threats to your privacy and the integrity of your computer’s data come from a number of sources. Understanding how to protect yourself.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Protecting Students on the School Computer Network Enfield High School.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
How to be Safe Online. Online Access How many of you go online? What are your favorite things to do online? Who accesses the Internet from their smart.
Online Safety and You!. Introduction The good and the bad about the internet Protecting your Personal Information –Password protection Safety.
 Introduction to Computing  Computer Programming  Terrorisom.
STRONG PASSWORDS = SELF-PROTECTION. Why are passwords essential for self protection? Passwords protect hackers from accessing personal information (birthday,
INTERNET SAFETY FOR KIDS
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
 Make sure you are near an adult so that you can ask questions and report anything suspicious.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Activity 4 Protecting Ourselves. Keeping Safe There are lots of different ways we can be at risk on the Internet. How can we protect ourselves and keep.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
How to set up an account- Non-Technical Aimee Lilley.
Any criminal action perpetrated primarily through the use of a computer.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Issues for Computer Users, Electronic Devices, Computer and Safety.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Branch of computer security specifically related to the Internet. Security for transactions made over the Internet. Internet security encompasses browser.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Technological Awareness for Teens and Young Adults.
Protection of Data 31 Protection of Data 31. Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers.
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
Internet Safety.
Dove science academy Cyber Club
Protecting What’s Yours: Your Identity
Information Security 101 Richard Davis, Rob Laltrello.
Navigating the Internet
Lesson 2- Protecting Yourself Online
Cybersecurity Awareness
Information Technology Services Education and Awareness Team
DOVE SCIENCE ACADEMY CYBER CLUB
Starter What is identity theft?
9 ways to avoid viruses and spyware
Follow safety rules so that YOU: Avoid getting HURT.
Information Technology Services Education and Awareness Team
InformatiOn Technology Services
What is Phishing? Pronounced “Fishing”
Lesson 2- Protecting Yourself Online
Presentation transcript:

Robert Crawford, MBA West Middle School

 Describe ways criminals obtain passwords  Discuss ways to protect your computer from being accessed by others  Explain the criteria of a strong password  Summarize ways to stay safe online Essential Question To be Discussed

◦ Packet sniffer  Not in Text ◦ Proxy server ◦ Social Engineering

 In many cases, to attack a network, the attacker will use a password. ◦ There are several ways that the password can be obtained. ◦ Last week we talked about password scanning. ◦ There are other ways to obtain passwords

 In many cases, to attack a network, the attacker will use a password. ◦ Guessing ◦ Finding ◦ Sniffing

 A packet sniffer is a program that examines data streams on networks.

 In many cases, to attack a network, the attacker will use a password. ◦ Guessing ◦ Finding ◦ Sniffing ◦ Pretending  Also known as “Social Engineering” ◦ Modifying  Superuser  Admin  etc/shadow

 Use strong passwords ◦ Do not use!  Family names  Nicknames  Birthdates ◦ Instead, use a combination of at least six:  Uppercase characters  Lowercase characters  Numbers  Symbols

 Use strong passwords ◦ And practice good password security.  When registering at a website, be sure to follow the advise for making a “strong” password.  Change your password on a regular basis  Do not record your password on paper near your computer.  Never share your password  Be careful when entering your password

 Use strong passwords  Browse Anonymously ◦ We have already discussed how websites track you as a user. ◦ Anonymizer (not accessible from school network)  Other proxy servers  a proxy server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers.

 Use strong passwords  Browse Anonymously  Use different addresses  Avoid site registration

 You can avoid most computer crime: ◦ Understand your browsers security settings ◦ Don’t open attachments unless it is from someone you know and seems like something they would send  When in doubt, verify before opening ◦ Deal only with reputable companies  When in doubt, Google the company ◦ Never share personal or financial information  Safe Social Networking

 Describe ways criminals obtain passwords  Discuss ways to protect your computer form being accessed by others  Explain the criteria of a strong password  Summarize ways to stay safe online Essential Question What do you think it should be? Discuss... Words and terms  Packet sniffer  Not in Text  Proxy server  Social Engineering