Online Security & Privacy: Updated

42
Online Online Securit Securit y y Source: http://www.flickr.com/photos/theeerin/7606588048/ Amanda L. Goodman, User Experience Librarian Darien Library, January 2014

description

Seen these slides before? Skip to slide 33 to see the new content. I presented these slides to an Online Security Workshop for Parents. Property of Darien Library

Transcript of Online Security & Privacy: Updated

Page 1: Online Security & Privacy: Updated

Online Online SecuritySecurity

Source: http://www.flickr.com/photos/theeerin/7606588048/

Amanda L. Goodman, User Experience Librarian Darien Library, January 2014

Page 2: Online Security & Privacy: Updated

Source: http://www.flickr.com/photos/looking_and_learning/8400360699

Story Time!

Page 3: Online Security & Privacy: Updated

Source: http://www.darientimes.com/22805/darien-residents-identity-stolen-to-buy-online-goods

The Bad News

Page 4: Online Security & Privacy: Updated

Source: http://www.flickr.com/photos/seandreilinger/5739375222

The Good News

Know the signs of a Know the signs of a scam, use strong scam, use strong passwords, and passwords, and protect your protect your computer from computer from hackers.hackers.

Protecting yourself is easy!Protecting yourself is easy!

Page 5: Online Security & Privacy: Updated

Your Online User AccountBe fake!

Ease to do:Moderately easy

Source: http://www.flickr.com/photos/whiteboard_dave/8462689688/

Create a fake persona for Create a fake persona for yourself and use its yourself and use its information when creating information when creating accounts online.accounts online.

Page 6: Online Security & Privacy: Updated

Your Online User AccountBe fake!

Do not use your real personal dataI.e. not your mom’s maiden name

Create a story for yourselfLove a book character to death? Use their story information for your account

Remember your fake details

Source: http://www.flickr.com/photos/librarygoblin/6888540425

Protect yourself:Protect yourself:

Page 7: Online Security & Privacy: Updated

Scam MessagesDo not click!

Difficulty to spot:Very easy

Shows up on:All social networksInstant messagingText messages

Scammers and spammers Scammers and spammers want to take your identity want to take your identity and money.and money.

Page 8: Online Security & Privacy: Updated

Scam MessagesDo not click!

No photo

No text but just a URLBeware of messages like:~ “You won’t believe what they said about you!”~ “Check out this video of you.”

Nonsense username

Giveaways of a scam:Giveaways of a scam:

Page 9: Online Security & Privacy: Updated

Scam EmailsDo not click!

Difficulty to spot:Depends

Shows up on:All email providers

Source: http://www.flickr.com/photos/nbr/3705010877

Email scammers prey on Email scammers prey on gullibility, greed, empathy, gullibility, greed, empathy, and loneliness.and loneliness.

Page 10: Online Security & Privacy: Updated

Scam EmailsDo not click!

Unreasonably high salary

Looking for no experience or says you can work from home.

Giveaways of a scam:Giveaways of a scam:

Page 11: Online Security & Privacy: Updated

Scam EmailsDo not click!

Wants to transfer you moneyFrom a foreign princeA dead family memberSomeone trying to leave a dangerous situation

Language is unusualEnglish grammar is very weak

Urges urgency

Source: http://www.flickr.com/photos/librarygoblin/6888540425

Giveaways of a scam:Giveaways of a scam:

Page 12: Online Security & Privacy: Updated

PhishingDo not click!

Difficulty to spot:Moderately difficult

Shows up on:All social networksEmails

Source: http://www.flickr.com/photos/djwaldow/4679640891

Phisers want to hack Phisers want to hack your account and steal your account and steal your information.your information.

Page 13: Online Security & Privacy: Updated

PhishingDo not click!

Claims there’s an issue withyour account

Wants you to click on a link tolog in or reactivate account

Warnings of doom if you do not immediately comply

Giveaways of a scam:Giveaways of a scam:

Page 14: Online Security & Privacy: Updated

PhishingDo not click!

How to check if real:How to check if real:Hover over the URLSee if it really goes to the exact URL the email claims to be from

Check the email address of the senderBeware of close URLs like gmale instead of gmail

Know who will not send you suchan emailAKA your bank, the IRS, the FBI, etc.If in doubt, go the website directly and log in

Page 15: Online Security & Privacy: Updated

Romance Scam EmailsDo not click!

Source: http://dailym.ai/17zMPKm

Wants you to transfer moneyFor goods, services, plane tickets

Sweet talks you“Love of my life”“No one has made me feel like this before”

Avoids meeting you

Giveaways of a scam:Giveaways of a scam:

Page 16: Online Security & Privacy: Updated

ScamsProtect yourself!

Source: http://dailym.ai/17zMPKm

Wikipediaen.wikipedia.org/wiki/Nigerian_scam

5 Common Email Scams1.usa.gov/1fzsdCS

Latest Email Hoaxeswww.hoax-slayer.com

Urban Legendssnopes.com

To learn more:To learn more:

Page 17: Online Security & Privacy: Updated

Email AttachmentsDo not open unless you are expecting an attachment!

Difficulty to spot:Easy

Shows up on:All email providers

Source: http://www.flickr.com/photos/ari-herzog/3346927141

Email hackers send Email hackers send damaging attachments via damaging attachments via email to take over your email to take over your computer.computer.

Page 18: Online Security & Privacy: Updated

Email Attachments

Attachment file ends in .exe or .rar

Attachment(s) from a stranger

Do not open unless you are expecting an attachment!

Attachment(s) from a friend but no text in the email body

Giveaways of a scam:Giveaways of a scam:

Page 19: Online Security & Privacy: Updated

PasswordsKeep ‘em fresh!

Easy level:Very easy

Shows up:Everywhere you go online

********************Changing your passwords Changing your passwords frequently is the best frequently is the best security measure.security measure.

Page 20: Online Security & Privacy: Updated

PasswordsKeep ‘em fresh!

Source: https://xkcd.com/936

Page 21: Online Security & Privacy: Updated

Passwords

Do not leave your password cheat sheet lying around

********************Protect yourself:Protect yourself:

Use different passwords for important sitesE.g. bank, email, shopping sites

Keep ‘em fresh!

Keep your password to yourselfUse a password managerE.g. LastPass, Dashlane, KeePass

Page 22: Online Security & Privacy: Updated

Two Factor AuthenticationAdd an extra level of protection!

Easy level:Easy after setting up

Shows up:Gmail Facebook PayPalTwitter Dropbox And more

Use a second layer of Use a second layer of authentication when authentication when accessing your online accessing your online accounts.accounts.

Page 23: Online Security & Privacy: Updated

Two Factor AuthenticationAdd an extra level of protection!

Remember how to access your accountsOr you will not be able to log into the siteYou may need your mobile phone if your site uses an app to generate the access code

Enable two factor authenticationYou will need a code, a password, or answer a question to log into a site where you have enabled two factor authentication

More informationhttp://bit.ly/17zkjEy

Protect yourself:Protect yourself:

Page 24: Online Security & Privacy: Updated

WiFi & Public Computer SafetyBe aware!

Ease to do:Moderately easy

When on public WiFi When on public WiFi networks or computers, be networks or computers, be careful to not give away careful to not give away your personal information.your personal information.

Page 25: Online Security & Privacy: Updated

WiFi & Public Computer Safety

If on public WiFi, know that someone could be “sniffing” and stealing your dataStudent recommended using Hotspot Shield

Stay off sensitive information sitesE.g. bank, email, shopping sites

Be aware!

Always sign off all sites you log into on a public computer

Protect yourself:Protect yourself:

Page 26: Online Security & Privacy: Updated

HTTPSUse secure connections!

Easy level:Very easy

Shows up:Many popular, major websites already offer HTTPS security so your data is encrypted.

Encrypt your data as you Encrypt your data as you browse the web.browse the web.

Page 27: Online Security & Privacy: Updated

HTTPSUse secure connections!

Check for HTTPS in the URLIf a site which is handling sensitive data like financial information or Social Security Numbers does not use HTTPS, do not input your information

Download a browser extension that tries to use HTTPS everywhere it is available on the web https://www.eff.org/https-everywhereAvailable for Firefox and Chrome browsers

Protect yourself:Protect yourself:

Page 28: Online Security & Privacy: Updated

Web BrowserUse a secure browser!

Easy level:Very easy

Keeping your browser up Keeping your browser up to date is essential for safe to date is essential for safe online usage.online usage.

Page 29: Online Security & Privacy: Updated

Web BrowserUse a secure browser!

Choose a better browserMy recommended browsers are Google Chrome and Firefox (my bias)

Add protective features to the browserAdBlock PlusHTTPS EverywhereDisconnect extensionKeep My Opt-OutsDo Not Track

Disable third party cookieshttp://bit.ly/14mVK2Q

Protect yourself:Protect yourself:

Page 30: Online Security & Privacy: Updated

Read Your Credit ReportIt’s free!

Easy level:Moderately easy

Source: http://www.experian.com/assistance/free-annual-credit-report.html

123-45-6789123-45-6789Federal law guarantees Federal law guarantees your access to an online your access to an online copy of your credit report.copy of your credit report.

Page 31: Online Security & Privacy: Updated

Read Your Credit ReportIt’s free!

Get your free credit reportshttps://www.annualcreditreport.com

123-45-6789123-45-6789Reports are from three major reporting agenciesExperian Equifax TransUnionGet a single report from a single agency every 4 monthsThis way you can watch your credit report throughout the year

Protect yourself:Protect yourself:

Page 32: Online Security & Privacy: Updated

Viruses

avast! Free Antivirusavast.com/index

AVG Freefree.avg.com

PaidPaidNortonus.norton.com/antivirus

Bitdefender Antivirus Plusbitdeferender.com

Get yourself some anti-virus software.

FreeFree

Page 33: Online Security & Privacy: Updated

Online Online PrivacyPrivacy

Source: http://www.flickr.com/photos/avissena/6131373743/in/photostream/

Page 34: Online Security & Privacy: Updated

COPPAThe Children’s Online Privacy Protection Act

Source: http://www.ftc.gov/news-events/media-resources/protecting-consumer-privacy/kids-privacy-coppa & http://www.coppa.org/comply.htm

The purpose of the law:The purpose of the law:Children under 13 cannot give out personal information without the consent of their parents

Be aware: Be aware: Children who have online accounts like email and social media can lose their accounts if its discovered that they’re younger than 13.

How parental permission How parental permission is gathered:is gathered:~ Signature via postal mail or email~ A credit card for a transaction~ A 1-800 number for parents to call

Page 35: Online Security & Privacy: Updated

CIPAChildren’s Internet Protection Act

Source: http://www.fcc.gov/guides/childrens-internet-protection-act

The purpose of the law:The purpose of the law:“to address concerns about children’s access to obscene or harmful content over the Internet” especially in schools and libraries

What schools & libraries must do:What schools & libraries must do:~ Implement filtering software~ Create an Internet safety policy in regards to minors

Benefits to schools Benefits to schools & libraries:& libraries:~ Reduced rates for Internet access

Page 36: Online Security & Privacy: Updated

Protecting Children in the 21st Century ActWorks alongside CIPA

Source: http://www.fcc.gov/guides/childrens-internet-protection-act & Michael Oide of OITP

The purpose of the law:The purpose of the law:To educate minors on appropriate online behavior

Education outline:Education outline:~ Posting responsibly~ Cyberbullying~ Creating a positive online profile~ Consider the consequences of your actions

Page 37: Online Security & Privacy: Updated

Cyberbullying24/7/365 access to the victim

Online bullying is worse than Online bullying is worse than traditional bullying. traditional bullying.

Violent & sexual crimes Violent & sexual crimes against the victim are shared against the victim are shared via social media. via social media.

Page 38: Online Security & Privacy: Updated

Child Pornography LawsMinors get charged too.

Source: http://www.law.cornell.edu/uscode/text/18/1466A & http://en.wikipedia.org/wiki/PROTECT_Act_of_2003

The PROTECT Act of 2003 & 18 U.S. Code § 1466AThe PROTECT Act of 2003 & 18 U.S. Code § 1466Acriminalizes “knowingly or distributing ‘an obscene visual depiction of a minor engaging in sexually explicit conduct; or a visual depiction of an actual minor engaging in sexually explicit conduct.’”

Page 39: Online Security & Privacy: Updated

Teens & Online PrivacyThey can hide it better.

Source: http://www.theguardian.com/technology/2013/oct/21/teenagers-careless-about-online-privacy

Wrong assumption: Wrong assumption: Teens don’t care about privacy

Truth: Truth: 60% of teens have private Facebook profiles & 26% post fake information about themselves

Page 40: Online Security & Privacy: Updated

Erasable HistoryLet it go. Let it go.

Source: http://www.theguardian.com/technology/2013/oct/21/teenagers-careless-about-online-privacy

Delete, delete, delete.Delete, delete, delete.Teens are learning to leave no trace of their online presence for others to find.

Self-destructing services:Self-destructing services:Secretink.coSnapchatWickr

Page 41: Online Security & Privacy: Updated

Other Tips

Follow the news to learn which sites were hackedChange your password immediately on that site

Do not give your password or PIN to your childThey could run up charges by making purchasing on your iPad or iPhone

Pay attention!

Be mindful of others’ privacyFamily and friends may not want their name, photo, or other information posted online

No such thing as a free lunchVisiting pornography or free download sites (i.e. movies, music, etc.) may expose your computer to viruses

Protect yourself:Protect yourself:

Page 42: Online Security & Privacy: Updated

You are responsible for your online You are responsible for your online security. security. By being aware of what’s happening online and how your data can be compromised, you are now ready to protect yourself!