SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Internet Security:
Staying Safe, Having Fun, And Cruising The ‘Net




Daniel Owens
IT Security Professional
Agenda

 Introduction
 Staying Safe
 Having Fun
 Cruising The ‘Net
 Conclusion And Appendices
A Note About Good And Evil

   Nothing in this world is purely good or purely evil –
    to include the Internet and those who use it.
                                         -Daniel Owens
With That Said… A Note About Me

 Currently
   Working as a NASA contractor in IT Security
 Formerly
   Worked for/with the…
     Department of Defense (DoD) to include the NSA
     FBI                          MySpace
     Justice Department           IBM
     Microsoft                    Xerox
     Oracle                       Booz Allen Hamilton
     Cisco                        SystemSecurities
   And many more…
Agenda

 Introduction
 Staying Safe
 Having Fun
 Cruising The ‘Net
 Conclusion And Appendices
Protecting Your Computer

 Apply updates and patches
   This includes for the Operating System, your web
   browser, any plug-ins and add-ons for the web
   browser, any games, and any other software
 Use Anti-Malware Software
   This includes antivirus, antispyware, and anti-
   adware software
     Examples Include (all free for home use):
     AVG and Avast!
     Spybot Search & Destroy
     Adaware
Protecting Your Privacy

 Don’t fill out online surveys or enter contests
 without permission
   Many of these are simply there to get information
   about you and some can be harmful
 Never give out sensitive information about
 yourself, your family, or others
   This includes addresses, school names, your full
   name, phone numbers, and your
   schedule/vacation data in advance
 Don’t open or respond to SPAM
   And don’t give your email address to just anyone
Doubt Everything

 If you can’t verify someone’s identity, you
 can’t trust them with your information
 Anyone can post just about anything on the
 Internet… pretending to be just about anyone
   Just like any other medium
Doubt Everything (cont.)
Agenda

 Introduction
 Staying Safe
 Having Fun
 Cruising The ‘Net
 Conclusion And Appendices
Cyberbullying

 Often either a source of or voice for rumors
   Common places are MySpace and Facebook
 Often successful only AFTER the victim starts
 to respond to the bully(ing)
   While it may be difficult, ignoring posts and simply
   blocking instant messages from people you don’t
   know is the best way to stop cyberbullying
 Can also include compromising a victim’s
 account and using it
   Again, MySpace and Facebook are common
   vectors, but so are Instant Messengers
Cyberpredators

 Few cyberpredators give out their real age,
 name, and other information
   And anyone can find a picture online
 Unsolicited instant messages, posts, and
 emails from strangers should never be
 responded to
   40% of females have been solicited on the
   Internet at least once before graduating high
   school
   Males are vulnerable too
 Should be treated the same as bullying
If All Else Fails

  Change your account name and password
    Most bullies and predators won’t be able to track
    you if you change your information… unless you
    give it to them
  Don’t go there…
    Just don’t visit the site
  The Internet isn’t anonymous
    Well-trained professionals (and criminals) can
    track down almost anyone on the Internet
    If you’re a victim, talk to your parents and/or a
    trusted adult
Agenda

 Introduction
 Staying Safe
 Having Fun
 Cruising The ‘Net
 Conclusion And Appendices
Be Suspicious Of The Unknown

 Warez and Torrents
   Many of the software and videos on these sites
   are bugged in one way or another
 Free Games and Software
   Many of the freeware and shareware software
   gathers personal information
     Often the company owning the software then sells the
     data
 Unknown Websites
   Some sites are designed to install malware onto
   visitor computers
Be Suspicious Of The Unknown
(cont.)
Online Gaming

 Protect your privacy
   Give out as little information as possible
     And don’t have your screenname be your real name
 Find a ‘room’ where you feel both safe and
 comfortable and stay there
     If things start to go downhill, leave and don’t come
     back
 Avoid games with monthly fees
   These often require you to give credit card
   information and other data that an attacker can
   steal from the server
Agenda

 Introduction
 Staying Safe
 Having Fun
 Cruising The ‘Net
 Conclusion And Appendices
For More Information

 Media Awareness Network (MNet)
   http://www.media-
   awareness.ca/english/index.cfm
 Cyberbullying Research Center
   http://www.cyberbullying.us/
 NetAlert
   http://www.netalert.gov.au/
 OnGuard Online
   http://www.onguardonline.gov/
For More Information (cont.)

 Safe Internet Alliance
   http://www.safeinternet.org/
 GRC IT Security Office
   http://itsecurity.grc.nasa.gov
 STOP Cyberbullying
   http://www.stopcyberbullying.org/
Acknowledgements

 I stole the background from Microsoft
 I stole a lot from my experiences and
 previous writings

Weitere ähnliche Inhalte

Was ist angesagt?

Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesMark Jhon Oxillo
 
Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computingMukul Kumar
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of NetiquetteRochelle Nato
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and securityjovellconde1
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and SafetyConor O'Neill
 
Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethicsNikki Shree
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteAngelito Quiambao
 
Lkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & SanjayLkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & SanjayQuek Lilian
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraDevsena Mishra
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awarenessMichel Bitter
 
Internet Security
Internet SecurityInternet Security
Internet Securityalookulo
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Jay Nagar
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetytonyh1
 

Was ist angesagt? (20)

Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
 
Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computing
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and Safety
 
Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethics
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber security
Cyber securityCyber security
Cyber security
 
Lkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & SanjayLkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & Sanjay
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena Mishra
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Computer SOS
Computer SOSComputer SOS
Computer SOS
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Social Media Safety Tips
Social Media Safety TipsSocial Media Safety Tips
Social Media Safety Tips
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 

Andere mochten auch

Application and Website Security -- Developer Edition: Introducing Security I...
Application and Website Security -- Developer Edition:Introducing Security I...Application and Website Security -- Developer Edition:Introducing Security I...
Application and Website Security -- Developer Edition: Introducing Security I...Daniel Owens
 
Application and Website Security -- Designer Edition: Using Formal Specificat...
Application and Website Security -- Designer Edition:Using Formal Specificat...Application and Website Security -- Designer Edition:Using Formal Specificat...
Application and Website Security -- Designer Edition: Using Formal Specificat...Daniel Owens
 
Application and Website Security -- Fundamental Edition
Application and Website Security -- Fundamental EditionApplication and Website Security -- Fundamental Edition
Application and Website Security -- Fundamental EditionDaniel Owens
 
The Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsThe Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsBarry Feldman
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome EconomyHelge Tennø
 

Andere mochten auch (6)

Application and Website Security -- Developer Edition: Introducing Security I...
Application and Website Security -- Developer Edition:Introducing Security I...Application and Website Security -- Developer Edition:Introducing Security I...
Application and Website Security -- Developer Edition: Introducing Security I...
 
Application and Website Security -- Designer Edition: Using Formal Specificat...
Application and Website Security -- Designer Edition:Using Formal Specificat...Application and Website Security -- Designer Edition:Using Formal Specificat...
Application and Website Security -- Designer Edition: Using Formal Specificat...
 
Application and Website Security -- Fundamental Edition
Application and Website Security -- Fundamental EditionApplication and Website Security -- Fundamental Edition
Application and Website Security -- Fundamental Edition
 
penetest VS. APT
penetest VS. APTpenetest VS. APT
penetest VS. APT
 
The Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsThe Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post Formats
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome Economy
 

Ähnlich wie Staying Safe, Having Fun, And Cruising The ‘Net

Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
 
CYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWCYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWBilly Warero
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityAshley Zimmerman
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityJFashant
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber SecurityDominic Rajesh
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]sheenau
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxDinesh582831
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquetteEmmanuelaSernicul
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Jesus Rances
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesBlake Carver
 
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter Cyber Security
 
Promote Education Internet Security
Promote Education Internet SecurityPromote Education Internet Security
Promote Education Internet SecurityZoaib Mirza
 
Web security
Web securityWeb security
Web securityekostyuk
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is DangerousGihan Dias
 
Lesson 2.2 Online Safety And Security.pptx
Lesson 2.2 Online Safety And Security.pptxLesson 2.2 Online Safety And Security.pptx
Lesson 2.2 Online Safety And Security.pptxGrayzon Gonzales, LPT
 
Internet safety for middles school
Internet safety for middles schoolInternet safety for middles school
Internet safety for middles schoolesksaints
 

Ähnlich wie Staying Safe, Having Fun, And Cruising The ‘Net (20)

Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
CYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWCYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEW
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and Libraries
 
Protect
ProtectProtect
Protect
 
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdf
 
Promote Education Internet Security
Promote Education Internet SecurityPromote Education Internet Security
Promote Education Internet Security
 
Web security
Web securityWeb security
Web security
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
 
IT Security
IT SecurityIT Security
IT Security
 
School presentation
School presentationSchool presentation
School presentation
 
Lesson 2.2 Online Safety And Security.pptx
Lesson 2.2 Online Safety And Security.pptxLesson 2.2 Online Safety And Security.pptx
Lesson 2.2 Online Safety And Security.pptx
 
Internet safety for middles school
Internet safety for middles schoolInternet safety for middles school
Internet safety for middles school
 

Kürzlich hochgeladen

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Kürzlich hochgeladen (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Staying Safe, Having Fun, And Cruising The ‘Net

  • 1. Internet Security: Staying Safe, Having Fun, And Cruising The ‘Net Daniel Owens IT Security Professional
  • 2. Agenda Introduction Staying Safe Having Fun Cruising The ‘Net Conclusion And Appendices
  • 3. A Note About Good And Evil Nothing in this world is purely good or purely evil – to include the Internet and those who use it. -Daniel Owens
  • 4. With That Said… A Note About Me Currently Working as a NASA contractor in IT Security Formerly Worked for/with the… Department of Defense (DoD) to include the NSA FBI MySpace Justice Department IBM Microsoft Xerox Oracle Booz Allen Hamilton Cisco SystemSecurities And many more…
  • 5. Agenda Introduction Staying Safe Having Fun Cruising The ‘Net Conclusion And Appendices
  • 6. Protecting Your Computer Apply updates and patches This includes for the Operating System, your web browser, any plug-ins and add-ons for the web browser, any games, and any other software Use Anti-Malware Software This includes antivirus, antispyware, and anti- adware software Examples Include (all free for home use): AVG and Avast! Spybot Search & Destroy Adaware
  • 7. Protecting Your Privacy Don’t fill out online surveys or enter contests without permission Many of these are simply there to get information about you and some can be harmful Never give out sensitive information about yourself, your family, or others This includes addresses, school names, your full name, phone numbers, and your schedule/vacation data in advance Don’t open or respond to SPAM And don’t give your email address to just anyone
  • 8. Doubt Everything If you can’t verify someone’s identity, you can’t trust them with your information Anyone can post just about anything on the Internet… pretending to be just about anyone Just like any other medium
  • 10. Agenda Introduction Staying Safe Having Fun Cruising The ‘Net Conclusion And Appendices
  • 11. Cyberbullying Often either a source of or voice for rumors Common places are MySpace and Facebook Often successful only AFTER the victim starts to respond to the bully(ing) While it may be difficult, ignoring posts and simply blocking instant messages from people you don’t know is the best way to stop cyberbullying Can also include compromising a victim’s account and using it Again, MySpace and Facebook are common vectors, but so are Instant Messengers
  • 12. Cyberpredators Few cyberpredators give out their real age, name, and other information And anyone can find a picture online Unsolicited instant messages, posts, and emails from strangers should never be responded to 40% of females have been solicited on the Internet at least once before graduating high school Males are vulnerable too Should be treated the same as bullying
  • 13. If All Else Fails Change your account name and password Most bullies and predators won’t be able to track you if you change your information… unless you give it to them Don’t go there… Just don’t visit the site The Internet isn’t anonymous Well-trained professionals (and criminals) can track down almost anyone on the Internet If you’re a victim, talk to your parents and/or a trusted adult
  • 14. Agenda Introduction Staying Safe Having Fun Cruising The ‘Net Conclusion And Appendices
  • 15. Be Suspicious Of The Unknown Warez and Torrents Many of the software and videos on these sites are bugged in one way or another Free Games and Software Many of the freeware and shareware software gathers personal information Often the company owning the software then sells the data Unknown Websites Some sites are designed to install malware onto visitor computers
  • 16. Be Suspicious Of The Unknown (cont.)
  • 17. Online Gaming Protect your privacy Give out as little information as possible And don’t have your screenname be your real name Find a ‘room’ where you feel both safe and comfortable and stay there If things start to go downhill, leave and don’t come back Avoid games with monthly fees These often require you to give credit card information and other data that an attacker can steal from the server
  • 18. Agenda Introduction Staying Safe Having Fun Cruising The ‘Net Conclusion And Appendices
  • 19. For More Information Media Awareness Network (MNet) http://www.media- awareness.ca/english/index.cfm Cyberbullying Research Center http://www.cyberbullying.us/ NetAlert http://www.netalert.gov.au/ OnGuard Online http://www.onguardonline.gov/
  • 20. For More Information (cont.) Safe Internet Alliance http://www.safeinternet.org/ GRC IT Security Office http://itsecurity.grc.nasa.gov STOP Cyberbullying http://www.stopcyberbullying.org/
  • 21. Acknowledgements I stole the background from Microsoft I stole a lot from my experiences and previous writings