SlideShare a Scribd company logo
1 of 7
your library of you - socialsafe.net
How to stay safe
online
(eSecurity)
your library of you - socialsafe.net
Aim
• Just a starter today covering main points of eSecurity
– Privacy, Passwords, and Computer Security
• There are many layers of actions you can take
– Just like securing your home
• A simple door lock
• A 5 lever door lock
• Window locks
• Alarm system
• CCTV
• The internet offers huge advantages for everyone –
and simple precautions will keep you safe
your library of you - socialsafe.net
Digital
World
Self
Harm
Permanence
Ease of Search
Ethical Grey Unethical Illegal
Harm
Spectrum
Gossip
Public Interest
Privacy Invasion
List
Selling
Unsolicited
Calls
Mug
Targeting
Phone
Tapping
Libel
ID
Theft
Fraud
Assault
Physical
World
Privacy – know your settings
your library of you - socialsafe.net
Social networks & Online privacy
• Are you a person of interest?
– Maybe not to national media
– But always the answer is yes
• Current & future employers
• Friends and acquaintances
• Partners and ex partners
• Understand what is public, private or semi-private
– Twitter is public, but has private Direct messages
– Facebook defaults to public, but can by private
– Be careful what you reveal publically online
• Hard to pull back your personal reputation
• Understand & use Privacy settings
– Default to Friends only where possible
– Network defaults are rarely very private
– You can often (but not always) delete posts/photos
your library of you - socialsafe.net
Passwords
• Passwords are you main line of defence
– Hackers DO try and guess
– Your (ex)partner, “friends”, others may try too
• Fraping – “When a friend or family member
pretends to be you and uses your Facebook
account (for example) to post funny (or
supposedly funny) updates”
• Use safe passwords
– Relatively easy to get details about you
• So don’t use birthdates, names, schools, anything
personal
• Safe passwords can be hard to remember
– Tools to help such as 1Password
• Security questions to recover passwords
– Lie, but do so in a way you can remember
Strong password
Long (8+ characters)
Upper & lower case
Include numbers (0..9)
Include special chars
(@£$%^&*:;….)
Different from site to site
your library of you - socialsafe.net
• Think before you click
– But we all get caught at some
point
– Have computer security
program
• & enable firewall
– (Stops people entering by the
back door)
– Keep your computer system
and phone system up to date
with latest software - by default
keep updates on
Computer security - viruses,
spyware, malware
your library of you - socialsafe.net
Exercises
• What password(s) do you Use?
• Check your Facebook privacy settings
• Has you computer got Virus Protection/Frewall
– Is it up to date?

More Related Content

Similar to E security

Lesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxLesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxJoy Dugayo
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Hannah Jane del Castillo
 
Don't Get Hacked
Don't Get HackedDon't Get Hacked
Don't Get HackedYTH
 
Password protection
Password protectionPassword protection
Password protectionpost_it
 
An Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereAn Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereBlake Carver
 
Using Skype, Facebook, and email to communicate with family and friends
Using Skype, Facebook, and email to communicate with family and friendsUsing Skype, Facebook, and email to communicate with family and friends
Using Skype, Facebook, and email to communicate with family and friendsSocial Status
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self DefenseBarry Caplin
 
password.ppt
password.pptpassword.ppt
password.pptKaxa5
 
Computer / Internet Security
Computer / Internet SecurityComputer / Internet Security
Computer / Internet SecurityDavid Cirella
 
An Introduction To IT Security And Privacy In Libraries
 An Introduction To IT Security And Privacy In Libraries An Introduction To IT Security And Privacy In Libraries
An Introduction To IT Security And Privacy In LibrariesBlake Carver
 
Online reputation
Online reputationOnline reputation
Online reputationesl2m
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awarenessKaran Veer Singh
 

Similar to E security (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Lesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxLesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptx
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Threats
ThreatsThreats
Threats
 
Don't Get Hacked
Don't Get HackedDon't Get Hacked
Don't Get Hacked
 
Web2.0 Class Guidelines
Web2.0 Class Guidelines Web2.0 Class Guidelines
Web2.0 Class Guidelines
 
Password protection
Password protectionPassword protection
Password protection
 
An Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereAn Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & Anywhere
 
Judy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 PresentationJudy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 Presentation
 
Tablets, Apps and Cybersecurity
Tablets, Apps and CybersecurityTablets, Apps and Cybersecurity
Tablets, Apps and Cybersecurity
 
Using Skype, Facebook, and email to communicate with family and friends
Using Skype, Facebook, and email to communicate with family and friendsUsing Skype, Facebook, and email to communicate with family and friends
Using Skype, Facebook, and email to communicate with family and friends
 
Web2.0 Class Safety Guidelines
Web2.0 Class Safety GuidelinesWeb2.0 Class Safety Guidelines
Web2.0 Class Safety Guidelines
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
 
password.ppt
password.pptpassword.ppt
password.ppt
 
Computer / Internet Security
Computer / Internet SecurityComputer / Internet Security
Computer / Internet Security
 
An Introduction To IT Security And Privacy In Libraries
 An Introduction To IT Security And Privacy In Libraries An Introduction To IT Security And Privacy In Libraries
An Introduction To IT Security And Privacy In Libraries
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Carver IT Security for Librarians
Carver IT Security for LibrariansCarver IT Security for Librarians
Carver IT Security for Librarians
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 

More from Sue Black

Mumsnet techmums social media share
Mumsnet techmums social media shareMumsnet techmums social media share
Mumsnet techmums social media shareSue Black
 
Techmums social media
Techmums social mediaTechmums social media
Techmums social mediaSue Black
 
From Bletchley Park to modern computing: the value of Twitter
From Bletchley Park to modern computing: the value of TwitterFrom Bletchley Park to modern computing: the value of Twitter
From Bletchley Park to modern computing: the value of TwitterSue Black
 
goto sue black computer weekly
goto sue black computer weeklygoto sue black computer weekly
goto sue black computer weeklySue Black
 
Newcastle july2012sueblack
Newcastle july2012sueblackNewcastle july2012sueblack
Newcastle july2012sueblackSue Black
 
Did twitter save bletchley park?
Did twitter save bletchley park? Did twitter save bletchley park?
Did twitter save bletchley park? Sue Black
 
Turingslegacy
TuringslegacyTuringslegacy
TuringslegacySue Black
 
Sueblack overtheair2011
Sueblack overtheair2011Sueblack overtheair2011
Sueblack overtheair2011Sue Black
 
Google Feb 2011 - My life as a geek
Google Feb 2011 - My life as a geekGoogle Feb 2011 - My life as a geek
Google Feb 2011 - My life as a geekSue Black
 
Bpark guardian feb2011
Bpark guardian feb2011Bpark guardian feb2011
Bpark guardian feb2011Sue Black
 
Areusocialorantisocial old
Areusocialorantisocial oldAreusocialorantisocial old
Areusocialorantisocial oldSue Black
 
Opentech2010 Slideshare
Opentech2010 SlideshareOpentech2010 Slideshare
Opentech2010 SlideshareSue Black
 
Web2se Black et al
Web2se Black et alWeb2se Black et al
Web2se Black et alSue Black
 

More from Sue Black (14)

Mumsnet techmums social media share
Mumsnet techmums social media shareMumsnet techmums social media share
Mumsnet techmums social media share
 
Techmums social media
Techmums social mediaTechmums social media
Techmums social media
 
From Bletchley Park to modern computing: the value of Twitter
From Bletchley Park to modern computing: the value of TwitterFrom Bletchley Park to modern computing: the value of Twitter
From Bletchley Park to modern computing: the value of Twitter
 
goto sue black computer weekly
goto sue black computer weeklygoto sue black computer weekly
goto sue black computer weekly
 
Newcastle july2012sueblack
Newcastle july2012sueblackNewcastle july2012sueblack
Newcastle july2012sueblack
 
Turing2012
Turing2012Turing2012
Turing2012
 
Did twitter save bletchley park?
Did twitter save bletchley park? Did twitter save bletchley park?
Did twitter save bletchley park?
 
Turingslegacy
TuringslegacyTuringslegacy
Turingslegacy
 
Sueblack overtheair2011
Sueblack overtheair2011Sueblack overtheair2011
Sueblack overtheair2011
 
Google Feb 2011 - My life as a geek
Google Feb 2011 - My life as a geekGoogle Feb 2011 - My life as a geek
Google Feb 2011 - My life as a geek
 
Bpark guardian feb2011
Bpark guardian feb2011Bpark guardian feb2011
Bpark guardian feb2011
 
Areusocialorantisocial old
Areusocialorantisocial oldAreusocialorantisocial old
Areusocialorantisocial old
 
Opentech2010 Slideshare
Opentech2010 SlideshareOpentech2010 Slideshare
Opentech2010 Slideshare
 
Web2se Black et al
Web2se Black et alWeb2se Black et al
Web2se Black et al
 

Recently uploaded

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 

Recently uploaded (20)

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 

E security

  • 1. your library of you - socialsafe.net How to stay safe online (eSecurity)
  • 2. your library of you - socialsafe.net Aim • Just a starter today covering main points of eSecurity – Privacy, Passwords, and Computer Security • There are many layers of actions you can take – Just like securing your home • A simple door lock • A 5 lever door lock • Window locks • Alarm system • CCTV • The internet offers huge advantages for everyone – and simple precautions will keep you safe
  • 3. your library of you - socialsafe.net Digital World Self Harm Permanence Ease of Search Ethical Grey Unethical Illegal Harm Spectrum Gossip Public Interest Privacy Invasion List Selling Unsolicited Calls Mug Targeting Phone Tapping Libel ID Theft Fraud Assault Physical World Privacy – know your settings
  • 4. your library of you - socialsafe.net Social networks & Online privacy • Are you a person of interest? – Maybe not to national media – But always the answer is yes • Current & future employers • Friends and acquaintances • Partners and ex partners • Understand what is public, private or semi-private – Twitter is public, but has private Direct messages – Facebook defaults to public, but can by private – Be careful what you reveal publically online • Hard to pull back your personal reputation • Understand & use Privacy settings – Default to Friends only where possible – Network defaults are rarely very private – You can often (but not always) delete posts/photos
  • 5. your library of you - socialsafe.net Passwords • Passwords are you main line of defence – Hackers DO try and guess – Your (ex)partner, “friends”, others may try too • Fraping – “When a friend or family member pretends to be you and uses your Facebook account (for example) to post funny (or supposedly funny) updates” • Use safe passwords – Relatively easy to get details about you • So don’t use birthdates, names, schools, anything personal • Safe passwords can be hard to remember – Tools to help such as 1Password • Security questions to recover passwords – Lie, but do so in a way you can remember Strong password Long (8+ characters) Upper & lower case Include numbers (0..9) Include special chars (@£$%^&*:;….) Different from site to site
  • 6. your library of you - socialsafe.net • Think before you click – But we all get caught at some point – Have computer security program • & enable firewall – (Stops people entering by the back door) – Keep your computer system and phone system up to date with latest software - by default keep updates on Computer security - viruses, spyware, malware
  • 7. your library of you - socialsafe.net Exercises • What password(s) do you Use? • Check your Facebook privacy settings • Has you computer got Virus Protection/Frewall – Is it up to date?