SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Downloaden Sie, um offline zu lesen
PRIVACY - HOW ANONYMOUS                                   ARE YOU?
                               Newsletter Date




                                                                       HOW TO KNOW
      INFORMATION        IS   COLLECTED FROM EVERYONE         YOUR PRIVACY IS BEING PROTECTED

When you visit a website, a certain amount of                   Privacy policy - Before submitting your
information is automatically sent to the site. This                 name, email address, or other personal
information may include the following:                              information on a website, look for the
                                                                    site's privacy policy. This policy should
  IP address - Each computer on the internet is
                                                                    state how the information will be used
      assigned a specific, unique IP (internet protocol)
                                                                    and whether or not the information will
      address. It’s like a street address for your
                                                                    be distributed to other organizations.
      computer.
                                                                    Look for indications that you are being
  domain name - You can identify the domain by                      added to mailing lists by default—failing
     looking at the end of URL; for example, .edu                   to deselect those options may lead to
     indicates an educational institution, .gov                     unwanted spam. Privacy policies
     indicates a US government agency, .org refers                  sometimes change (ie Facebook) so
     to organization, and .com is for commercial use.               you may want to review them often.

software details - It is possible for an organization to        Evidence that your information is being
    determine which browser, and operating system                   encrypted - To protect attackers from
    that you used to access its site.                               hijacking your information, any personal
                                                                    information submitted online should be
  page visits - Information about which pages you                   encrypted so that it can only be read by
     visited, how long you stayed on a given page,                  the appropriate recipient. Many sites
     and whether you came to the site from a search                 use SSL, or secure sockets layer, to
     engine is available to the organization operating              encrypt information. Indications that
     the website .                                                  your information will be encrypted

If a website uses cookies, the organization may be                  include a URL that begins with "https:"

able to collect even more information, such as your                 instead of "http:" If data is encrypted in

browsing patterns, which include other sites you've                 transit but stored insecurely, an

visited. If the site you're visiting is malicious, files on         attacker who is

your computer, as well as                                           able to break

passwords stored in the                                             into the                   Created by the
temporary memory, may                                               vendor's
                                                                                                  375AMW
be at risk.                                                         system could
                                                                                            Information Assurance
                                                                    access your
                                                                                                   Office
                                                                    personal
                                                                    information.
PRIVACY - HOW ANONYMOUS                                            ARE YOU?                      PAGE 2


                          Newsletter Date




                                                                        LIMIT THE AMOUNT OF
                                                                       INFORMATION COLLECTED
                PROTECT YOUR PRIVACY                                         ABOUT YOU
Do business with credible companies - Before supplying any          Be careful supplying personal
   information consider the answers to the following questions:      information - Unless you trust a site,
   do you trust the business? is it an established organization      don't give your address, password, or
   with a credible reputation? is there legitimate contact           credit card information. Look for
   information provided?                                             indications that the site uses SSL to
                                                                     encrypt your information Although
Do not use your primary email address in online
   submissions - Submitting your email address could result          some sites require you to supply your
   in spam. Consider opening an additional email account for         social security number (e.g., sites
   use online. Make sure to log in to the account on a regular       associated with financial transactions
   basis in case the vendor sends information about changes          such as loans or credit cards), be
   to policies.                                                      especially wary of providing this
                                                                     information online.
Avoid submitting credit card information online - Some
   companies offer a phone number you can use to provide
   your credit card information. This eliminates the possibility    Limit cookies - If an attacker can
   that attackers will be able to hijack it during the submission    access your computer, he or she may
   process.                                                          be able to find personal data stored in
                                                                     cookies. You may not realize the
Devote one credit card to online purchases - To minimize the         extent of the information stored on
   potential damage of an attacker gaining access to your            your computer until it is too late.
   credit card information, consider opening a credit card
   account for use only online.

Avoid using debit cards for online purchases - Debit cards          Browse safely - Be careful which
   normally do not offer the online protection that credit cards     websites you visit; if it seems
   offer.                                                            suspicious, leave the site. Also make
                                                                     sure to take precautions by
Take advantage of options to limit exposure of private               increasing your
   information - Avoid allowing a website to remember your           security settings,
   password. If your password is stored, your profile and any        keeping your
   account information you have provided on that site is readily     virus definitions
   available if an attacker gains access to your computer. Also,     up to date and
   evaluate your settings on websites used for social                scanning your
   networking. The nature of those sites is to share information,    computer for
   but you can restrict it.                                          spyware

Weitere ähnliche Inhalte

Was ist angesagt?

Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsNetLockSmith
 
online spying tools
online spying toolsonline spying tools
online spying toolsDeepa Jacob
 
Slideshow - Lil Rat
Slideshow - Lil RatSlideshow - Lil Rat
Slideshow - Lil Ratmegg16
 
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks Er. Rahul Jain
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internetmohmd-kutbi
 
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1Ayush Chopra
 
Phishing scams in banking ppt
Phishing scams in banking pptPhishing scams in banking ppt
Phishing scams in banking pptKrishma Sandesra
 
Phishing
PhishingPhishing
Phishingdefquon
 
Email Security: The Threat Landscape
Email Security: The Threat LandscapeEmail Security: The Threat Landscape
Email Security: The Threat LandscapeNuspire Networks
 
Strategies to handle Phishing attacks
Strategies to handle Phishing attacksStrategies to handle Phishing attacks
Strategies to handle Phishing attacksSreejith.D. Menon
 

Was ist angesagt? (16)

Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness Infographics
 
online spying tools
online spying toolsonline spying tools
online spying tools
 
Online spying tools
Online spying toolsOnline spying tools
Online spying tools
 
Slideshow - Lil Rat
Slideshow - Lil RatSlideshow - Lil Rat
Slideshow - Lil Rat
 
Phis
PhisPhis
Phis
 
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
 
Phishing
PhishingPhishing
Phishing
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
 
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
 
Phishing scams in banking ppt
Phishing scams in banking pptPhishing scams in banking ppt
Phishing scams in banking ppt
 
Phishing
PhishingPhishing
Phishing
 
Online secuirty
Online secuirtyOnline secuirty
Online secuirty
 
Email Security: The Threat Landscape
Email Security: The Threat LandscapeEmail Security: The Threat Landscape
Email Security: The Threat Landscape
 
Strategies to handle Phishing attacks
Strategies to handle Phishing attacksStrategies to handle Phishing attacks
Strategies to handle Phishing attacks
 
Phishing
PhishingPhishing
Phishing
 

Ähnlich wie NCSAM 2012 Privacy

Safe Use Of Social Networks Final Draft
Safe Use Of Social Networks   Final DraftSafe Use Of Social Networks   Final Draft
Safe Use Of Social Networks Final Draftravichar
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet- Mark - Fullbright
 
cyber security presentation 1234567.pptx
cyber security presentation 1234567.pptxcyber security presentation 1234567.pptx
cyber security presentation 1234567.pptxprashanth73488
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself OnlineGary Wagnon
 
IT Security booklet
IT Security bookletIT Security booklet
IT Security bookletiteclearners
 
Data protection
Data protectionData protection
Data protectionburto111
 
Cyber 101 for smb execs v1
Cyber 101 for smb execs v1Cyber 101 for smb execs v1
Cyber 101 for smb execs v1NetWatcher
 
How to protect your digital footprint
How to protect your digital footprintHow to protect your digital footprint
How to protect your digital footprintCybermaterial
 
information, people $ threats
information, people $ threatsinformation, people $ threats
information, people $ threats07Deeps
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end usersNetWatcher
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is DangerousGihan Dias
 
10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraud10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraudWebSitePulse
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxStephen Jesukanth Martin
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptBushra22
 
Train Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesTrain Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesHuman Resources & Payroll
 
Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptxRajviNikeetaRathore
 
End user security awareness
End user security awarenessEnd user security awareness
End user security awarenessKanishk Raj
 

Ähnlich wie NCSAM 2012 Privacy (20)

Safe Use Of Social Networks Final Draft
Safe Use Of Social Networks   Final DraftSafe Use Of Social Networks   Final Draft
Safe Use Of Social Networks Final Draft
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet
 
cyber security presentation 1234567.pptx
cyber security presentation 1234567.pptxcyber security presentation 1234567.pptx
cyber security presentation 1234567.pptx
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself Online
 
IT Security booklet
IT Security bookletIT Security booklet
IT Security booklet
 
Data protection
Data protectionData protection
Data protection
 
Cyber 101 for smb execs v1
Cyber 101 for smb execs v1Cyber 101 for smb execs v1
Cyber 101 for smb execs v1
 
How to protect your digital footprint
How to protect your digital footprintHow to protect your digital footprint
How to protect your digital footprint
 
information, people $ threats
information, people $ threatsinformation, people $ threats
information, people $ threats
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
Cyber security
Cyber securityCyber security
Cyber security
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
 
10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraud10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraud
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptx
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Train Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesTrain Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security Breaches
 
One of 2 protect your business
One of 2 protect your businessOne of 2 protect your business
One of 2 protect your business
 
Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptx
 
End user security awareness
End user security awarenessEnd user security awareness
End user security awareness
 

Mehr von Nerium International (12)

May picnic flyer
May picnic flyerMay picnic flyer
May picnic flyer
 
RR crossing closure 6-10 May
RR crossing closure 6-10 MayRR crossing closure 6-10 May
RR crossing closure 6-10 May
 
Calling All Artists
Calling All ArtistsCalling All Artists
Calling All Artists
 
March 2013 Spouse Newsletter
March 2013 Spouse NewsletterMarch 2013 Spouse Newsletter
March 2013 Spouse Newsletter
 
A&FRC Feb 2013 Calendar
A&FRC Feb 2013 CalendarA&FRC Feb 2013 Calendar
A&FRC Feb 2013 Calendar
 
AF101: Back to Basics Guide for AF Spouses
AF101: Back to Basics Guide for AF SpousesAF101: Back to Basics Guide for AF Spouses
AF101: Back to Basics Guide for AF Spouses
 
Safe Social Networking Handout
Safe Social Networking HandoutSafe Social Networking Handout
Safe Social Networking Handout
 
Elicitation Brochure from DHS
Elicitation Brochure from DHSElicitation Brochure from DHS
Elicitation Brochure from DHS
 
Arts & Crafts Center
Arts & Crafts CenterArts & Crafts Center
Arts & Crafts Center
 
A&FRC (Airmen & Family Readiness Ctr)
A&FRC (Airmen & Family Readiness Ctr)A&FRC (Airmen & Family Readiness Ctr)
A&FRC (Airmen & Family Readiness Ctr)
 
375th FSS
375th FSS375th FSS
375th FSS
 
Bowling Stars & Strikes
Bowling Stars & StrikesBowling Stars & Strikes
Bowling Stars & Strikes
 

NCSAM 2012 Privacy

  • 1. PRIVACY - HOW ANONYMOUS ARE YOU? Newsletter Date HOW TO KNOW INFORMATION IS COLLECTED FROM EVERYONE YOUR PRIVACY IS BEING PROTECTED When you visit a website, a certain amount of Privacy policy - Before submitting your information is automatically sent to the site. This name, email address, or other personal information may include the following: information on a website, look for the site's privacy policy. This policy should IP address - Each computer on the internet is state how the information will be used assigned a specific, unique IP (internet protocol) and whether or not the information will address. It’s like a street address for your be distributed to other organizations. computer. Look for indications that you are being domain name - You can identify the domain by added to mailing lists by default—failing looking at the end of URL; for example, .edu to deselect those options may lead to indicates an educational institution, .gov unwanted spam. Privacy policies indicates a US government agency, .org refers sometimes change (ie Facebook) so to organization, and .com is for commercial use. you may want to review them often. software details - It is possible for an organization to Evidence that your information is being determine which browser, and operating system encrypted - To protect attackers from that you used to access its site. hijacking your information, any personal information submitted online should be page visits - Information about which pages you encrypted so that it can only be read by visited, how long you stayed on a given page, the appropriate recipient. Many sites and whether you came to the site from a search use SSL, or secure sockets layer, to engine is available to the organization operating encrypt information. Indications that the website . your information will be encrypted If a website uses cookies, the organization may be include a URL that begins with "https:" able to collect even more information, such as your instead of "http:" If data is encrypted in browsing patterns, which include other sites you've transit but stored insecurely, an visited. If the site you're visiting is malicious, files on attacker who is your computer, as well as able to break passwords stored in the into the Created by the temporary memory, may vendor's 375AMW be at risk. system could Information Assurance access your Office personal information.
  • 2. PRIVACY - HOW ANONYMOUS ARE YOU? PAGE 2 Newsletter Date LIMIT THE AMOUNT OF INFORMATION COLLECTED PROTECT YOUR PRIVACY ABOUT YOU Do business with credible companies - Before supplying any Be careful supplying personal information consider the answers to the following questions: information - Unless you trust a site, do you trust the business? is it an established organization don't give your address, password, or with a credible reputation? is there legitimate contact credit card information. Look for information provided? indications that the site uses SSL to encrypt your information Although Do not use your primary email address in online submissions - Submitting your email address could result some sites require you to supply your in spam. Consider opening an additional email account for social security number (e.g., sites use online. Make sure to log in to the account on a regular associated with financial transactions basis in case the vendor sends information about changes such as loans or credit cards), be to policies. especially wary of providing this information online. Avoid submitting credit card information online - Some companies offer a phone number you can use to provide your credit card information. This eliminates the possibility Limit cookies - If an attacker can that attackers will be able to hijack it during the submission access your computer, he or she may process. be able to find personal data stored in cookies. You may not realize the Devote one credit card to online purchases - To minimize the extent of the information stored on potential damage of an attacker gaining access to your your computer until it is too late. credit card information, consider opening a credit card account for use only online. Avoid using debit cards for online purchases - Debit cards Browse safely - Be careful which normally do not offer the online protection that credit cards websites you visit; if it seems offer. suspicious, leave the site. Also make sure to take precautions by Take advantage of options to limit exposure of private increasing your information - Avoid allowing a website to remember your security settings, password. If your password is stored, your profile and any keeping your account information you have provided on that site is readily virus definitions available if an attacker gains access to your computer. Also, up to date and evaluate your settings on websites used for social scanning your networking. The nature of those sites is to share information, computer for but you can restrict it. spyware