SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Internet Security:
Staying Safe, Having Fun, And Cruising The ‘Net




Daniel Owens
IT Security Professional
Agenda

 Introduction
 Staying Safe
 Having Fun
 Cruising The ‘Net
 Conclusion And Appendices
A Note About Good And Evil

   Nothing in this world is purely good or purely evil –
    to include the Internet and those who use it.
                                         -Daniel Owens
With That Said… A Note About Me

 Currently
   Working as a NASA contractor in IT Security
 Formerly
   Worked for/with the…
     Department of Defense (DoD) to include the NSA
     FBI                          MySpace
     Justice Department           IBM
     Microsoft                    Xerox
     Oracle                       Booz Allen Hamilton
     Cisco                        SystemSecurities
   And many more…
Agenda

 Introduction
 Staying Safe
 Having Fun
 Cruising The ‘Net
 Conclusion And Appendices
Protecting Your Computer

 Apply updates and patches
   This includes for the Operating System, your web
   browser, any plug-ins and add-ons for the web
   browser, any games, and any other software
 Use Anti-Malware Software
   This includes antivirus, antispyware, and anti-
   adware software
     Examples Include (all free for home use):
     AVG and Avast!
     Spybot Search & Destroy
     Adaware
Protecting Your Privacy

 Don’t fill out online surveys or enter contests
 without permission
   Many of these are simply there to get information
   about you and some can be harmful
 Never give out sensitive information about
 yourself, your family, or others
   This includes addresses, school names, your full
   name, phone numbers, and your
   schedule/vacation data in advance
 Don’t open or respond to SPAM
   And don’t give your email address to just anyone
Doubt Everything

 If you can’t verify someone’s identity, you
 can’t trust them with your information
 Anyone can post just about anything on the
 Internet… pretending to be just about anyone
   Just like any other medium
Doubt Everything (cont.)
Agenda

 Introduction
 Staying Safe
 Having Fun
 Cruising The ‘Net
 Conclusion And Appendices
Cyberbullying

 Often either a source of or voice for rumors
   Common places are MySpace and Facebook
 Often successful only AFTER the victim starts
 to respond to the bully(ing)
   While it may be difficult, ignoring posts and simply
   blocking instant messages from people you don’t
   know is the best way to stop cyberbullying
 Can also include compromising a victim’s
 account and using it
   Again, MySpace and Facebook are common
   vectors, but so are Instant Messengers
Cyberpredators

 Few cyberpredators give out their real age,
 name, and other information
   And anyone can find a picture online
 Unsolicited instant messages, posts, and
 emails from strangers should never be
 responded to
   40% of females have been solicited on the
   Internet at least once before graduating high
   school
   Males are vulnerable too
 Should be treated the same as bullying
If All Else Fails

  Change your account name and password
    Most bullies and predators won’t be able to track
    you if you change your information… unless you
    give it to them
  Don’t go there…
    Just don’t visit the site
  The Internet isn’t anonymous
    Well-trained professionals (and criminals) can
    track down almost anyone on the Internet
    If you’re a victim, talk to your parents and/or a
    trusted adult
Agenda

 Introduction
 Staying Safe
 Having Fun
 Cruising The ‘Net
 Conclusion And Appendices
Be Suspicious Of The Unknown

 Warez and Torrents
   Many of the software and videos on these sites
   are bugged in one way or another
 Free Games and Software
   Many of the freeware and shareware software
   gathers personal information
     Often the company owning the software then sells the
     data
 Unknown Websites
   Some sites are designed to install malware onto
   visitor computers
Be Suspicious Of The Unknown
(cont.)
Online Gaming

 Protect your privacy
   Give out as little information as possible
     And don’t have your screenname be your real name
 Find a ‘room’ where you feel both safe and
 comfortable and stay there
     If things start to go downhill, leave and don’t come
     back
 Avoid games with monthly fees
   These often require you to give credit card
   information and other data that an attacker can
   steal from the server
Agenda

 Introduction
 Staying Safe
 Having Fun
 Cruising The ‘Net
 Conclusion And Appendices
For More Information

 Media Awareness Network (MNet)
   http://www.media-
   awareness.ca/english/index.cfm
 Cyberbullying Research Center
   http://www.cyberbullying.us/
 NetAlert
   http://www.netalert.gov.au/
 OnGuard Online
   http://www.onguardonline.gov/
For More Information (cont.)

 Safe Internet Alliance
   http://www.safeinternet.org/
 GRC IT Security Office
   http://itsecurity.grc.nasa.gov
 STOP Cyberbullying
   http://www.stopcyberbullying.org/
Acknowledgements

 I stole the background from Microsoft
 I stole a lot from my experiences and
 previous writings

Weitere ähnliche Inhalte

Was ist angesagt?

Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesMark Jhon Oxillo
 
Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computingMukul Kumar
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of NetiquetteRochelle Nato
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and securityjovellconde1
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and SafetyConor O'Neill
 
Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethicsNikki Shree
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteAngelito Quiambao
 
Lkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & SanjayLkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & SanjayQuek Lilian
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraDevsena Mishra
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awarenessMichel Bitter
 
Internet Security
Internet SecurityInternet Security
Internet Securityalookulo
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Jay Nagar
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetytonyh1
 

Was ist angesagt? (20)

Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
 
Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computing
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and Safety
 
Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethics
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber security
Cyber securityCyber security
Cyber security
 
Lkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & SanjayLkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & Sanjay
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena Mishra
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Computer SOS
Computer SOSComputer SOS
Computer SOS
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Social Media Safety Tips
Social Media Safety TipsSocial Media Safety Tips
Social Media Safety Tips
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 

Andere mochten auch

Application and Website Security -- Developer Edition: Introducing Security I...
Application and Website Security -- Developer Edition:Introducing Security I...Application and Website Security -- Developer Edition:Introducing Security I...
Application and Website Security -- Developer Edition: Introducing Security I...Daniel Owens
 
Application and Website Security -- Designer Edition: Using Formal Specificat...
Application and Website Security -- Designer Edition:Using Formal Specificat...Application and Website Security -- Designer Edition:Using Formal Specificat...
Application and Website Security -- Designer Edition: Using Formal Specificat...Daniel Owens
 
Application and Website Security -- Fundamental Edition
Application and Website Security -- Fundamental EditionApplication and Website Security -- Fundamental Edition
Application and Website Security -- Fundamental EditionDaniel Owens
 
The Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsThe Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsBarry Feldman
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome EconomyHelge Tennø
 

Andere mochten auch (6)

Application and Website Security -- Developer Edition: Introducing Security I...
Application and Website Security -- Developer Edition:Introducing Security I...Application and Website Security -- Developer Edition:Introducing Security I...
Application and Website Security -- Developer Edition: Introducing Security I...
 
Application and Website Security -- Designer Edition: Using Formal Specificat...
Application and Website Security -- Designer Edition:Using Formal Specificat...Application and Website Security -- Designer Edition:Using Formal Specificat...
Application and Website Security -- Designer Edition: Using Formal Specificat...
 
Application and Website Security -- Fundamental Edition
Application and Website Security -- Fundamental EditionApplication and Website Security -- Fundamental Edition
Application and Website Security -- Fundamental Edition
 
penetest VS. APT
penetest VS. APTpenetest VS. APT
penetest VS. APT
 
The Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsThe Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post Formats
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome Economy
 

Ähnlich wie Staying Safe, Having Fun, And Cruising The ‘Net

Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
 
CYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWCYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWBilly Warero
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityAshley Zimmerman
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityJFashant
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber SecurityDominic Rajesh
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]sheenau
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxDinesh582831
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquetteEmmanuelaSernicul
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Jesus Rances
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesBlake Carver
 
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter Cyber Security
 
Promote Education Internet Security
Promote Education Internet SecurityPromote Education Internet Security
Promote Education Internet SecurityZoaib Mirza
 
Web security
Web securityWeb security
Web securityekostyuk
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is DangerousGihan Dias
 
Lesson 2.2 Online Safety And Security.pptx
Lesson 2.2 Online Safety And Security.pptxLesson 2.2 Online Safety And Security.pptx
Lesson 2.2 Online Safety And Security.pptxGrayzon Gonzales, LPT
 
Internet safety for middles school
Internet safety for middles schoolInternet safety for middles school
Internet safety for middles schoolesksaints
 

Ähnlich wie Staying Safe, Having Fun, And Cruising The ‘Net (20)

Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
CYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWCYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEW
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and Libraries
 
Protect
ProtectProtect
Protect
 
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdf
 
Promote Education Internet Security
Promote Education Internet SecurityPromote Education Internet Security
Promote Education Internet Security
 
Web security
Web securityWeb security
Web security
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
 
IT Security
IT SecurityIT Security
IT Security
 
School presentation
School presentationSchool presentation
School presentation
 
Lesson 2.2 Online Safety And Security.pptx
Lesson 2.2 Online Safety And Security.pptxLesson 2.2 Online Safety And Security.pptx
Lesson 2.2 Online Safety And Security.pptx
 
Internet safety for middles school
Internet safety for middles schoolInternet safety for middles school
Internet safety for middles school
 

Kürzlich hochgeladen

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 

Kürzlich hochgeladen (20)

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 

Staying Safe, Having Fun, And Cruising The ‘Net

  • 1. Internet Security: Staying Safe, Having Fun, And Cruising The ‘Net Daniel Owens IT Security Professional
  • 2. Agenda Introduction Staying Safe Having Fun Cruising The ‘Net Conclusion And Appendices
  • 3. A Note About Good And Evil Nothing in this world is purely good or purely evil – to include the Internet and those who use it. -Daniel Owens
  • 4. With That Said… A Note About Me Currently Working as a NASA contractor in IT Security Formerly Worked for/with the… Department of Defense (DoD) to include the NSA FBI MySpace Justice Department IBM Microsoft Xerox Oracle Booz Allen Hamilton Cisco SystemSecurities And many more…
  • 5. Agenda Introduction Staying Safe Having Fun Cruising The ‘Net Conclusion And Appendices
  • 6. Protecting Your Computer Apply updates and patches This includes for the Operating System, your web browser, any plug-ins and add-ons for the web browser, any games, and any other software Use Anti-Malware Software This includes antivirus, antispyware, and anti- adware software Examples Include (all free for home use): AVG and Avast! Spybot Search & Destroy Adaware
  • 7. Protecting Your Privacy Don’t fill out online surveys or enter contests without permission Many of these are simply there to get information about you and some can be harmful Never give out sensitive information about yourself, your family, or others This includes addresses, school names, your full name, phone numbers, and your schedule/vacation data in advance Don’t open or respond to SPAM And don’t give your email address to just anyone
  • 8. Doubt Everything If you can’t verify someone’s identity, you can’t trust them with your information Anyone can post just about anything on the Internet… pretending to be just about anyone Just like any other medium
  • 10. Agenda Introduction Staying Safe Having Fun Cruising The ‘Net Conclusion And Appendices
  • 11. Cyberbullying Often either a source of or voice for rumors Common places are MySpace and Facebook Often successful only AFTER the victim starts to respond to the bully(ing) While it may be difficult, ignoring posts and simply blocking instant messages from people you don’t know is the best way to stop cyberbullying Can also include compromising a victim’s account and using it Again, MySpace and Facebook are common vectors, but so are Instant Messengers
  • 12. Cyberpredators Few cyberpredators give out their real age, name, and other information And anyone can find a picture online Unsolicited instant messages, posts, and emails from strangers should never be responded to 40% of females have been solicited on the Internet at least once before graduating high school Males are vulnerable too Should be treated the same as bullying
  • 13. If All Else Fails Change your account name and password Most bullies and predators won’t be able to track you if you change your information… unless you give it to them Don’t go there… Just don’t visit the site The Internet isn’t anonymous Well-trained professionals (and criminals) can track down almost anyone on the Internet If you’re a victim, talk to your parents and/or a trusted adult
  • 14. Agenda Introduction Staying Safe Having Fun Cruising The ‘Net Conclusion And Appendices
  • 15. Be Suspicious Of The Unknown Warez and Torrents Many of the software and videos on these sites are bugged in one way or another Free Games and Software Many of the freeware and shareware software gathers personal information Often the company owning the software then sells the data Unknown Websites Some sites are designed to install malware onto visitor computers
  • 16. Be Suspicious Of The Unknown (cont.)
  • 17. Online Gaming Protect your privacy Give out as little information as possible And don’t have your screenname be your real name Find a ‘room’ where you feel both safe and comfortable and stay there If things start to go downhill, leave and don’t come back Avoid games with monthly fees These often require you to give credit card information and other data that an attacker can steal from the server
  • 18. Agenda Introduction Staying Safe Having Fun Cruising The ‘Net Conclusion And Appendices
  • 19. For More Information Media Awareness Network (MNet) http://www.media- awareness.ca/english/index.cfm Cyberbullying Research Center http://www.cyberbullying.us/ NetAlert http://www.netalert.gov.au/ OnGuard Online http://www.onguardonline.gov/
  • 20. For More Information (cont.) Safe Internet Alliance http://www.safeinternet.org/ GRC IT Security Office http://itsecurity.grc.nasa.gov STOP Cyberbullying http://www.stopcyberbullying.org/
  • 21. Acknowledgements I stole the background from Microsoft I stole a lot from my experiences and previous writings