Security and Privacy. 228 What might this number indicate? This is the number of mobile phones stolen in the UK every hour.

Slides:



Advertisements
Similar presentations
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Advertisements

Mobile Devices and Support Kathy Boock Diane Jachimowicz.
What am I describing ? Questions: Cannot say any word or phrase on the card Answers: Must be word or phrase on the card.
Introducing The McLaughlin Company Mobile Claim Application We have developed a mobile application to help our insureds gather and submit information to.
_Protecting Our Kids New Technology: New Pitfalls Purpose: To help families ask the right questions, and make an informed decision for their children regarding.
Top 10 Checklist to Protect Your Personal Privacy Online Teens 1.
How does GPS work?. Organisations might wish to know what their employees are doing and where they are during their working day. There are many reasons.
Beyond WiFi: Securing Your Mobile Devices Thomas Kuhn Information Technology Assistance Center (iTAC) Kansas State University.
Google Account Basics: Getting Started with free Google applications.
GPS Joseph Morton. What is GPS ?  Global Positioning System or GPS. Is a space satellite navigation system that provides location and time info in all.
 The Global Positioning System (GPS) is a navigational system involving satellites and computers that can determine the latitude and longitude of a receiver.
Welcome to Week 5 at the Summer Computer Club GPS and Geocaching.
Mobile Phone Theft. Serving our communities and protecting them from harm Introduction Mobile Phone Theft There were an estimated 742,000 victims of mobile.
EP M6 E-Commerce.  Today we will have a look at the benefits for businesses that use E-Commerce against traditional methods.  There are benefits both.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
The secret to creative success is knowing how to hide your sources! — Albert Einstein.
ESCCO Data Security Training David Dixon September 2014.
Co-hosted by Presents Where’s Your Data
PRIVACY BOOTCAMP YpJU.
Getting organized was never so easy. Every person in the world will have some or the other Valuable Information which should be protected from anybody,
Wireless Security: Protect yourself when you’re mobile.
Deepak Bangalore. About the app idea: Every day we receive call to our mobile phones we don’t know the exact location of the person from where he is calling.
By Shubham GOEL ECE-III year xyz. Introduction Automatic Vehicle Locator (AVL) is a computer – based vehicle tracking system The actual real –time position.
Global Positioning System (GPS) WHAT: Describe GPS and how it is used HOW: Group discussion and an activity to find a secret location WHY: GPS technology.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
Home Networking. The Smith Family This is the house the Smiths live in. Can you spot their digital devices?
Home and Personal Communication Systems Lesson 7 – Personal Connections.
Revision Q1: Explain the term HACKING?
LI: I can show what I already know about handling data Steps to Success… Give ideas of important words to contribute towards a mind map Be able to name.
How to Select and Use Privacy Settings EL Civics Assessment Task 3.
Activity 1 Mobile phone Safety. Why Use a Phone? What is good about having a mobile phone? Quick communication.
PRIVACY BOOTCAMP Jack Vale - Social Media Experiement.
File:///var/folders/9p/bbpc5f kd6ybdzwss43hcfzsc0000 gn/T/noun_dna_77921.png Welcome enroll learn more the icon should relate as directly as possible to.
G p s.  The Global Positioning System (GPS) is a space-based satellite navigation system that provides location and time information in all weather conditions,
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
Policies and Security for Internet Access
BCS Level 1 Award In e-safety Lesson 4.. e-Safety - Lesson 4 2 Today you will learn to ….. Identify the risks of social networking; Use social networking.
that keeping money and personal information safe is very important That losing money or having personal information stolen can be distressing.
SLC – You tell me Web design – Using software design a website.
Setting Up Your New iPad. Turn on Your iPad and then… Select English Select United States Select DVUSD Mobile as your wifi network Select enable location.
Self storage Locate your convenient self storage company to preserve and safeguard valuables for a rental fee. The size of the storage space varies as.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Location-Sensing and Location Systems 1. A positioning system provides the means to determine location and leaves it to the user device to calculate its.
 Being free from public attention that means not being watched or disturbed by other people.
By: Sambit Pulak XI-IB. Surveillance is the use of IT to monitor the actions of people. For example, monitoring may be used to track, record and assess.
Learn, enjoy, stay safe online. New technology Old problem.
Protecting PHI & PII 12/30/2017 6:45 AM
Technology: Mobile, Wifi, and Facial Recognition
PC Gameplan Application.
The Cost of Free Lesson 4-4.
Technology: Mobile, Wifi, and Facial Recognition
TB2 Lesson 8 Online Banking
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
© EIT, Author Gay Robertson, 2017
Changing of Apple ID Payment Information Settings  Open Settings and go to iTunes & App Store  Tap on Apple ID – this brings up a menu  Tap on View.
Reporting personal data breaches to the ICO
Which Mobile?.
Ian Ramsey C of E School GCSE ICT On the move Finding the way.
Business Phones.
Ian Ramsey C of E School GCSE ICT On the move How can we connect?
Customer Data.
Sales Engagement Process for Sales People
Digital Champion training for young people
How to Download And Install McAfee Mobile Security on iOS?
What’s wrong with this? Arrow 1 – anyone can see whats on your page – including pictures! Arrow 2 – anyone can add you – from anywhere in the world! Arrow.
Using Google Cloud Search
TALKING POINTS Introduce yourself
Contact Details Brand Name : How to Recover Gmail Password Location : California Pin code : Website :
Online Safety; Privacy and Sharing
Online Safety; Privacy and Sharing
Presentation transcript:

Security and Privacy

228 What might this number indicate? This is the number of mobile phones stolen in the UK every hour

I’ve found a mobile! What it can tell you about its owner? Contacts, appointments, passwords, security codes, credit card details, photos, s, attachments, task lists, confidential information such as customer details or product details. Which of these is sensitive information that might be of value to someone else.

In this lesson students are learning about: personal information stored on a mobile phone ways in which mobile phones pose a threat to privacy measures that should be taken to protect data stored on mobile phones

At the end of this lesson students will be able to: explain what a mobile phone can tell you about its owner understand privacy issues posed by mobile phones explain how phones can be used to monitor an individual’s movements and identify benefits and drawbacks explain security measures/precautions that mobile phone users should take

How can I protect my data? 20mins Task: in groups you need to investigate ways of protecting data stored on a mobile phone and to draw up a checklist of security measures/precautions users should take. Create some media that gives security advice. Including: password protection, data encryption, keypad locks, time-outs.

Keeping track “Find friends” or Google Lattitude allow you to keep track of friends and family on your mobile phone. How it works – demo! What are your views about this service? How many of you already use it? How many would use it if you could? Who has reservations and why?

GPS Many mobile phones are now GPS-enabled. How GPS technology works. The Global Positioning System (GPS) is a space-based satellite navigation system that provides location and time information in all weather conditions, anywhere on or near the Earth where there is an unobstructed line of sight to four or more GPS satellites.

GPS in action

Task: Answer the following questions… Work in pairs to find examples of mobile phone apps that use GPS. What are the benefits and drawbacks of GPS apps on phones? To what extent do they encroach on personal privacy?