SlideShare a Scribd company logo
1 of 16
Online Privacy A Module of the CYC Course – Personal Security 8-9-10
The Realities of Digital Communications:  ,[object Object],[object Object],[object Object],[object Object]
Privacy Levels on Social Networking Sites ,[object Object],[object Object],[object Object]
Social Engineering ,[object Object],[object Object],[object Object]
Bogus Email Example
Understanding URLs ,[object Object],[object Object],[object Object],[object Object],[object Object]
Example
Passwords ,[object Object],[object Object],[object Object]
Passwords ,[object Object],[object Object],[object Object],[object Object],[object Object]
Shopping Online ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Credit Card Security ,[object Object],[object Object],[object Object]
Identity Theft ,[object Object]
Identity Theft Prevention Tips ,[object Object],[object Object],[object Object],[object Object],[object Object]
Identity Theft - Public Computer Safety Tips ,[object Object],[object Object],[object Object],[object Object],[object Object]
Sources ,[object Object],[object Object]
Creative Commons License ,[object Object]

More Related Content

What's hot

The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is DangerousGihan Dias
 
31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month OcotoberQuick Heal Technologies Ltd.
 
UW School of Medicine Social Engineering and Phishing Awareness
UW School of Medicine   Social Engineering and Phishing AwarenessUW School of Medicine   Social Engineering and Phishing Awareness
UW School of Medicine Social Engineering and Phishing AwarenessNicholas Davis
 
Cybersafety Version1
Cybersafety Version1Cybersafety Version1
Cybersafety Version1sabrinacotta
 
Internet safety
Internet safetyInternet safety
Internet safetywalsh008
 
The Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyThe Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyJonathan Bacon
 
Internet Safety Glossary of Terms
Internet Safety Glossary of TermsInternet Safety Glossary of Terms
Internet Safety Glossary of Termsmikel_l
 
Web security
Web securityWeb security
Web securityekostyuk
 
Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notesLinda Barron
 
CDSE Cybsecurity Awareness Posters
CDSE Cybsecurity Awareness PostersCDSE Cybsecurity Awareness Posters
CDSE Cybsecurity Awareness PostersNetLockSmith
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security riskK. A. M Lutfullah
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threatsmkinzie
 
Cyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalCyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalResham Acharya
 
Abhishek cyber bullying
Abhishek   cyber bullyingAbhishek   cyber bullying
Abhishek cyber bullyingparulata
 

What's hot (20)

The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
 
31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober
 
Social media-threats
Social media-threatsSocial media-threats
Social media-threats
 
UW School of Medicine Social Engineering and Phishing Awareness
UW School of Medicine   Social Engineering and Phishing AwarenessUW School of Medicine   Social Engineering and Phishing Awareness
UW School of Medicine Social Engineering and Phishing Awareness
 
Phis
PhisPhis
Phis
 
Dangers on the Internet
Dangers on the InternetDangers on the Internet
Dangers on the Internet
 
Cybersafety Version1
Cybersafety Version1Cybersafety Version1
Cybersafety Version1
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Emp tech las-week-2
Emp tech las-week-2Emp tech las-week-2
Emp tech las-week-2
 
The Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyThe Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and Privacy
 
Internet Safety Glossary of Terms
Internet Safety Glossary of TermsInternet Safety Glossary of Terms
Internet Safety Glossary of Terms
 
Social media-threats
Social media-threatsSocial media-threats
Social media-threats
 
Web security
Web securityWeb security
Web security
 
Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notes
 
CDSE Cybsecurity Awareness Posters
CDSE Cybsecurity Awareness PostersCDSE Cybsecurity Awareness Posters
CDSE Cybsecurity Awareness Posters
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
Cyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalCyber security tips in Banking in Nepal
Cyber security tips in Banking in Nepal
 
Abhishek cyber bullying
Abhishek   cyber bullyingAbhishek   cyber bullying
Abhishek cyber bullying
 

Viewers also liked

Basic terms & definitions
Basic terms & definitionsBasic terms & definitions
Basic terms & definitionsRozell Sneede
 
4 word press module 1d
4   word press module 1d4   word press module 1d
4 word press module 1dRozell Sneede
 
3 module basic hardware
3 module basic hardware3 module basic hardware
3 module basic hardwareRozell Sneede
 
7 module web based email
7 module web based email7 module web based email
7 module web based emailRozell Sneede
 
Lesson plan and most successful activity
Lesson plan and most successful activityLesson plan and most successful activity
Lesson plan and most successful activitymelyviquez
 

Viewers also liked (9)

Basic terms & definitions
Basic terms & definitionsBasic terms & definitions
Basic terms & definitions
 
4 word press module 1d
4   word press module 1d4   word press module 1d
4 word press module 1d
 
3 module basic hardware
3 module basic hardware3 module basic hardware
3 module basic hardware
 
9 word press 2c
9   word press 2c9   word press 2c
9 word press 2c
 
7 module web based email
7 module web based email7 module web based email
7 module web based email
 
Geitungar kynning
Geitungar kynningGeitungar kynning
Geitungar kynning
 
Folclore slide
Folclore slideFolclore slide
Folclore slide
 
Renaissance
RenaissanceRenaissance
Renaissance
 
Lesson plan and most successful activity
Lesson plan and most successful activityLesson plan and most successful activity
Lesson plan and most successful activity
 

Similar to 5 a module online privacy

Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptxAchu69
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxKevinRiley83
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet- Mark - Fullbright
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationJamie Proctor-Brassard
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internetmohmd-kutbi
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2NetLockSmith
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptxCharithraaAR
 
Internet Safety.pptx
Internet Safety.pptxInternet Safety.pptx
Internet Safety.pptxAljunMisa
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptxadblue2017
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptxTanvir Amin
 
Q3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfQ3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfBryanSmile
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxNoelBuctot1
 
CYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptxCYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptxTapan Khilar
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]sheenau
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media SecurityHem Pokhrel
 
media safety .pptx
media safety .pptxmedia safety .pptx
media safety .pptxGAmarioarei
 

Similar to 5 a module online privacy (20)

Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
Identity theft
Identity theftIdentity theft
Identity theft
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Internet Safety.pptx
Internet Safety.pptxInternet Safety.pptx
Internet Safety.pptx
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptx
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
 
Q3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfQ3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdf
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
 
CYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptxCYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptx
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
media safety .pptx
media safety .pptxmedia safety .pptx
media safety .pptx
 

More from Rozell Sneede

Security terms & definitions
Security terms & definitionsSecurity terms & definitions
Security terms & definitionsRozell Sneede
 
Excel & database terms & definitions
Excel & database terms & definitionsExcel & database terms & definitions
Excel & database terms & definitionsRozell Sneede
 
Digital literacy terms & definitions
Digital literacy terms & definitionsDigital literacy terms & definitions
Digital literacy terms & definitionsRozell Sneede
 
Removing virus tri fold - white
Removing virus tri fold - whiteRemoving virus tri fold - white
Removing virus tri fold - whiteRozell Sneede
 
Cyc flyer chn with ob logo
Cyc flyer   chn with ob logoCyc flyer   chn with ob logo
Cyc flyer chn with ob logoRozell Sneede
 
Cyc module learning express library
Cyc module learning express libraryCyc module learning express library
Cyc module learning express libraryRozell Sneede
 
Wordpress module 1 a
Wordpress module 1 aWordpress module 1 a
Wordpress module 1 aRozell Sneede
 
6 word press module 1f
6   word press module 1f6   word press module 1f
6 word press module 1fRozell Sneede
 
5 word press module 1e
5   word press module 1e5   word press module 1e
5 word press module 1eRozell Sneede
 
3 word press module 1c
3   word press module 1c3   word press module 1c
3 word press module 1cRozell Sneede
 
2 word press module 1b
2   word press module 1b2   word press module 1b
2 word press module 1bRozell Sneede
 
1 wordpress module 1 a
1   wordpress module 1 a1   wordpress module 1 a
1 wordpress module 1 aRozell Sneede
 
1 wordpress module 1 a
1   wordpress module 1 a1   wordpress module 1 a
1 wordpress module 1 aRozell Sneede
 
Module online investments
Module   online investmentsModule   online investments
Module online investmentsRozell Sneede
 

More from Rozell Sneede (20)

Terms & definitions
Terms & definitionsTerms & definitions
Terms & definitions
 
Security terms & definitions
Security terms & definitionsSecurity terms & definitions
Security terms & definitions
 
Excel & database terms & definitions
Excel & database terms & definitionsExcel & database terms & definitions
Excel & database terms & definitions
 
Digital literacy terms & definitions
Digital literacy terms & definitionsDigital literacy terms & definitions
Digital literacy terms & definitions
 
5 steps
5 steps5 steps
5 steps
 
Removing virus tri fold - white
Removing virus tri fold - whiteRemoving virus tri fold - white
Removing virus tri fold - white
 
Cyc flyer chn with ob logo
Cyc flyer   chn with ob logoCyc flyer   chn with ob logo
Cyc flyer chn with ob logo
 
Cyc module learning express library
Cyc module learning express libraryCyc module learning express library
Cyc module learning express library
 
Cyc module inf ohio
Cyc module inf ohioCyc module inf ohio
Cyc module inf ohio
 
Wordpress module 1 a
Wordpress module 1 aWordpress module 1 a
Wordpress module 1 a
 
8 word press 2b
8   word press 2b8   word press 2b
8 word press 2b
 
7 word press 2a
7   word press 2a7   word press 2a
7 word press 2a
 
6 word press module 1f
6   word press module 1f6   word press module 1f
6 word press module 1f
 
5 word press module 1e
5   word press module 1e5   word press module 1e
5 word press module 1e
 
3 word press module 1c
3   word press module 1c3   word press module 1c
3 word press module 1c
 
2 word press module 1b
2   word press module 1b2   word press module 1b
2 word press module 1b
 
1 wordpress module 1 a
1   wordpress module 1 a1   wordpress module 1 a
1 wordpress module 1 a
 
1 wordpress module 1 a
1   wordpress module 1 a1   wordpress module 1 a
1 wordpress module 1 a
 
On line banking cur
On line banking curOn line banking cur
On line banking cur
 
Module online investments
Module   online investmentsModule   online investments
Module online investments
 

Recently uploaded

New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 

Recently uploaded (20)

New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 

5 a module online privacy

Editor's Notes

  1. This module is intended to help class participants be more aware of how to protect themselves online while still enjoying and making full use of the Internet.
  2. Backups, archives, data/content pushing all result in the ambiguity of deleting digital content. Digital content is easily forwarded and reposted. Sometimes this is a good thing and sometimes it is not. Regardless of how we view this phenomena, it is a reality. Private information is no longer, by default, private. If you want information to be private, you must take steps to make it so. For example, avoiding mentioning your address or even your neighborhood on social networks is a conscious act. Know who has direct access to your posts in your social networks and recognize that others may have indirect access. Heard any stories about someone making a mistake online resulting in negative impact offline?
  3. Who uses Facebook? Who uses MySpace? Have you adjusted your privacy settings? Default privacy setting on most social networks – everything is public! Instructor – if majority of students have an account on a social network, have them log in and adjust the privacy settings during class. Review the privacy setting pages of Facebook and MySpace prior to class because they often change.
  4. Social Engineering Tactics - Someone claiming to be doing research or survey for your bank, a new employee at a company you use, or a repair person that NEEDS your help. They may seem to ask round about or harmless questions that they then use against you. Verify they really are who they say they are before answering questions.
  5. Why not trust this email? No such thing as free cash. Most likely they will ask for your bank account and password in order to supposedly deposit your check.
  6. You learned about URLs in How to Use a Browser. What is a URL? Uniform Resource Identifier. More commonly called a web address. Most popular top level domains? .com, .org, .net
  7. Phishing, and spyware attacks are occurring often on social networking sites, especially Facebook. Anyone received a message via email or a social network that was not sent by the person it appeared to have been sent by? Most likely Michelle has no idea this message went out in her name. What is the top level domain in this message? Do a search of .in domain. What do you find? It’s the country domain for India.
  8. Use a combination of letters (capital and lower case), numbers and symbols if allowed. Example are: EmilyP05 – Emily Pietilia was my great grandmother and she was born in 1905 – However, don’t do this with a spouse or child that relationship is too close and too obvious. Or use a mnemonic i.e. – mbsfe530 – my brother sells fire extinguishers and his birthday. Don’t use names or words in a dictionary, names, addresses, or birthdates. Or use a full sentence - ilovecats If you must write them down, don’t keep it in a file labeled passwords or on your calendar.
  9. If you are using public computers be alert to who is around you, if your password is too easy or too hard so you type it very slowly, it could be possible to watch what you type & learn your password. Why is your email account an important account? Because with access to your email account, someone could get access to your other accounts. Instructor – provide suggestions on how to create and keep track of passwords. Examples – use one string of letters and number but add a code to each one per application – such as having 135fox as a password and adding fb for Facebook to the beginning or end of 135fox, resulting in fb135fox. Your internet provider can access your account without your password – they would never contact you and ask for it. However, if you call them about a problem, they may ask for it so they can try and duplicate the problem you are having. If the incorrect password allows you to log into a site then you are on a spoofed site and not the company’s legitimate site. Most important – if you suspect someone is using your accounts, change the password and contact the company it is with immediately!
  10. Who has shopped online? What did you purchase? You initiate with a known and trusted company. Don’t use sites from unsolicited websites or pop up ads. www.hoogle.com vs. www.google.com
  11. MOST Credit cards have a maximum liability of $50.00 in the event of fraud, debit cards may have a higher or no limit check with your bank for information about the cards you have or read that little tiny print! One card lets you easily review online purchases and request a card with a lower limit Online transactions are said to be safer since there is no human interaction – you are not giving your card to a person.
  12. Anyone been a victim of identity theft?
  13. In addition to keeping your software up-to-date, keeping your anti-virus software up-to-date and doing weekly scans, and have a firewall you should: Laptops - Use a strong password, require a password log in and log off when you are finished using, that will at least make it difficult for a thief to access (not impossible) Wipe Utility or File Shredder - Files that have been deleted or moved to the trash or recycle bin can still be recovered using a recovery program. A wipe utility actually writes over old files on your hard drive so they can no longer be recovered. Privacy policies - should explain how they secure their site and what they do with the information they collect (do they share/sell it). If they sell information to others or there is no policy go somewhere else. Free Credit Reports – Reports can be requested annually online free but be very careful where you request it from. Use the FTC website. Do not go to a search engine!