Online Privacy A Module of the CYC Course – Personal Security 8-9-10.

Slides:



Advertisements
Similar presentations
1 Web Based A Module of the CYC Course – Internet Basics
Advertisements

1 Evaluating Online Sources A Module of the CYC Course – Computer Basics
Interactive Teaching For CYC Instructors
Home Computer Maintenance A Module of the CYC Course - HomeConnect
Online Job Search A CYC Electives Module
Downloading & Installing Software A Module of the CYC Course - HomeConnect
1 Basic Hardware – The Anatomy of a Computer A Module of the CYC Course – Computer Basics
A CYC Electives Module Online Banking and Online Bill Pay.
1 Mouse Basics A Module of the CYC Course – Computer Basics
Purchasing a Computer A Module of the CYC Course - HomeConnect
Data Storage A Module of the CYC Course – Computer Basics
Understanding netTrekker, for Parents A CYC Electives Module
Beyond YouTube A CYC Electives Module Beyond YouTube There are more places to watch video online other than YouTube. There are sites that allow.
Introduction to Broadband and CYC Introductory Module for Connect Your Community
1 Keyboard Basics A Module of the CYC Course – Computer Basics
Choosing a Broadband Service Provider A Module of the CYC HomeConnect Course
1 Advanced with GMail A CYC Electives Module
Google Docs & Google Calendar A CYC Electives Module
Online Identity A Module of the CYC Course – Personal Security
Microsoft Office A Module of the CYC Course – Overview of Common Office Suites
Search Techniques A Module of the CYC Course - Online Search and Information Literacy
Viruses & Spyware A Module of the CYC Course – Computer Security
1 How To Use a Browser A Module of the CYC Course – Computer Basics
Facebook, An Introduction Including Safe Use A CYC Electives Module
Cyber Safety Assessment Review
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Top 10 Checklist to Protect Your Personal Privacy Online Teens 1.
Internet Safety James Fuller Internet Rules To Remember When asked by friends or strangers, online or offline, never share Account IDs and Passwords.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
How It Applies In A Virtual World. Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Katrina Lopes. Every time you log onto a website, you leave a mark saying “I was here”
Computer Basics. Computers & Peripherals Safety on the Web Security Software Firewall Antivirus Software Norton Antivirus McAffee Antivirus Security.
Company LOGO Internet Safety A Community Approach.
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
What is E-commerce Safety Precautions Password Strengths
Stay Safe & Secure Online. Outline Passwords Everyday Security Security Physical Security Protecting Personal Information.
IT security By Tilly Gerlack.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
 Facebook  Twitter  MySpace  Windows LiveSpace.
What is Identity Theft? How is it accomplished? How might it impact the victim? What can I do to protect myself? What is phishing? By Ellen Justice.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
 Why is this important to you?  How do digital footprints connect with digital citizenship?  Does everyone have a digital footprint?
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Personal Online Safety Information Security Systems Community Outreach Program McKinley Middle School April 23, 2013.
Internet Safety Mr. Richard Orr Technology Teacher Murphy Jr. High School.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Protecting Your Identity © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Protecting Yourself Against Identity Theft A Financial Literacy Presentation by.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Computer Security Keeping you and your computer safe in the digital world.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
PUBLIC COMPUTER SAFETY
Identity Theft It’s a crime!
Internet Identity, Safety, & Security
Personal spaces.
Class 2 - Transitional Internet Basics
A Module of the CYC Course Online Search and Information Literacy
Protecting Your Credit Identity
What is Phishing? Pronounced “Fishing”
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Online Privacy A Module of the CYC Course – Personal Security

The Realities of Digital Communications: Deleting a digital post is not as permanent as setting fire to a handwritten note. Digital content is easily forwarded and reposted. Private information is no longer, by default, private. If you want information to be private, you must take steps to make it so. Your online reputation has offline implications.

Privacy Levels on Social Networking Sites What is the default privacy setting on most social networks? You control who sees what content. BUT, even though you are restricting access, remember content can be forwarded.

Social Engineering Manipulating people into providing personal information. Often uses human interaction/emotions to obtain information. Phishing - Tries to attack you personally. Looks to be from a trusted company asking you to for your personal information. Occurs via , websites and social networks.

Bogus Example

Understanding URLs Top level domains Domain names Text before the domain name / after the top level domain Common tactic – URLs that look legitimate but are not. Example – citybank.com.jumbleofletters.com/jumbleofle tters

Example

Passwords Choose a password that cant be easily guessed. Dont write your password down in any easily findable place. Dont send your password to anyone through .

Passwords Dont allow public computers to remember your password. Dont tell anyone your passwords. Dont use the same password for all your accounts, especially the important accounts such as , banks, credit cards. Create a system for remembering your passwords. Check the strength of your password - m/

Shopping Online Make sure YOU initiated the contact. Dont follow an link. Type web addresses carefully. Dont give out SSN, DOB, or your Mothers Maiden name. Do not accept free trial offers. Dont rely on a site looking professional.

Credit Card Security When possible, choose a credit card NOT a debit card. Best choice - choose one card for online use only or a prepaid credit card. Paypal.com - Most companies online accept payments from PayPal. Paypal acts as an intermediary for payment. If you dont have a credit card you can set it up to take payment out of a checking/savings account.

Identity Theft Someone uses your personal information without your knowledge to commit fraud or theft.

Identity Theft Prevention Tips Do not store personal financial information on laptop computers. Before disposing of a computer delete all personal information. Review websites privacy policies. Request free credit report A company or organization that initiated contact with you will not request your password via or phone.

Identity Theft - Public Computer Safety Tips Beware of Shoulder Surfers Do NOT allow public computers to remember your log in and password. ALWAYS Sign Out or Log Off. Clear browser history. Close the browser window.

Sources This curriculum was adapted from a workshop created by N. Riesgraf for the Hibbing Public Library (MN). Funding provided by IRRRA Do I.T. Community Technology Awareness Program. Additional content created by Connect Your Community, a project of OneCommunity, funded by the federal Broadband Technology Opportunities Program.OneCommunityBroadband Technology Opportunities Program

Creative Commons License This work is licensed under the Creative Commons Attribution 3.0 Unported License. To view a copy of this license, visit This work is licensed under the Creative Commons Attribution 3.0 Unported License. To view a copy of this license, visit