SlideShare ist ein Scribd-Unternehmen logo
1 von 32
Online and Mobile Basic Security
NGETH Moses
ICT Project Coordinator
Community Legal Education Center
(CLEC)
“No place like 127.0.0.1”
• 2nd Step Verification and Set up
• Remote your smart phone
• Easy to set up “strong” passwords
not a long passwords
2nd Step Verification
(For Google user ONLY)
• Stronger security for your Google Account
• With 2-Step Verification, you’ll protect your
account with both your password and your
phone
Why you needs it
Why you needs it
How it works
How it works
How it protects you
How it protects you
How it protects you
How to set up 2nd step verification
Sup 2nd step verification
• Go to your Gmail account
Set up 2nd step verification
• Go to “Security Tap”
• Click on “Setup”
Set up 2nd step verification
• Click on “Start setup”
• Re-type your password
Set up 2nd step verification
• Type your phone number
• Note: you either choose Google to send “Text
message (SMS” or Call you “Voice Call”
Set up 2nd step verification
• Go to icon of you profile photo at the top right
side
Set up 2nd step verification
• Code was sent to your number.
• Fill in the 6 digits in a blank box
• Note: Mobile and Metfone doesn’t work well.
Set up 2nd step verification
• If you are setting up on somebody els’ computer,
please un-tick “Trust this computer”.
• Recommend to set up on your computer ONLY
• Click Next
Set up 2nd step verification
• Just to make sure you got the right phone number.
• Click Confirm to finish the setup
Set up 2nd step verification
• NOTE:
– After finish setup 2nd step verification, all your social media
that uses with this Gmail account will be sign out. It means
you can’t log in to those account with your current
password. It needs a one-time “App-specific passwords”.
(Explanation off slide presentation)
Remote your smart phone
1. First you need to make sure that you have turned it on, which you can do
by following this quick tutorial:
2. Go to the Google Setttings of your Android device.
3. Tap on Android Device Manager at the bottom of the list
4. Check the box for Remotely locate this device
5. Check box for remote lock and factory reset.
6. To the Settings of your phone.
7. Tap on Security and then Device administrator. Make sure the Android
Device Manager is ticked off there.
8. Now that you have done this, you can remotely lock and wipe your
device in case of theft or loss. To do this, go to the Device Manager
website.
9. The path to activate this feature might differ depending on your device,
but in general should be the same as it's a Google service and not one
from your phone's manufacturer.
Remote your smart phone
Remote your smart phone
Remote your smart phone
Remote your smart phone
Remote your smart phone (On Device)
Remote your smart phone (On Device)
Easy create “Strong Password” not
“Long Password”
“Strong Password” not “Long
Password”
It is important to use different types of characters when
choosing a password. This can be done in various ways:
• Varying capitalisation, such as: 'My naME is Not
MR. MarSter'
• Alternating numbers and letters, such as: 'a11 w0Rk
4nD N0 p14Y'
• Incorporating certain symbols, such as:
'c@t(heR1nthery3'
• Using multiple languages, such as: 'Let Them Eat 1e
gateaU au ch()colaT
“Strong Password” not “Long
Password”
• Passwords can also take advantage of more
traditional mnemonic devices, such as the use of
acronyms. This allows long phrases to be turned into
complex, seemingly-random words:
• 'To be or not to be? That is the question' becomes
'2Bon2B?TitQ’
• 'We hold these truths to be self-evident: that all men
are created equal' becomes 'WhtT2bs-e:taMac=’
• 'Are you happy today?' becomes 'rU:-)2d@y?'
“Strong Password” not “Long
Password”
• A little effort to make the password more complex
goes a very long way. Increasing the length of a
password even just by a few characters, or by adding
numbers or special characters, makes it much more
difficult to crack. For demonstrative purposes, the
table below shows how much longer it may take a
hacker to break a list of progressively more complex
passwords by trying different combinations of the
password one after another.
“Strong Password” not “Long
Password”

Weitere ähnliche Inhalte

Ähnlich wie Basic mobile and internet security

3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google AccountLookout
 
Webinar: Personal Online Privacy - Sucuri Security
Webinar: Personal Online Privacy - Sucuri SecurityWebinar: Personal Online Privacy - Sucuri Security
Webinar: Personal Online Privacy - Sucuri SecuritySucuri
 
HUAWEI P8 Lite Manual / User Guide
HUAWEI P8 Lite Manual / User GuideHUAWEI P8 Lite Manual / User Guide
HUAWEI P8 Lite Manual / User Guidemanualsheet
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKINGNAWAZ KHAN
 
Executive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdfExecutive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdfTechSoup
 
Ouch 201211 en
Ouch 201211 enOuch 201211 en
Ouch 201211 enHai Nguyen
 
How to secure your Gmail account using android phones?
How to secure your Gmail account using android phones?How to secure your Gmail account using android phones?
How to secure your Gmail account using android phones?limitlessusa
 
Mobisheild sales promotion presentation.
Mobisheild  sales promotion  presentation.Mobisheild  sales promotion  presentation.
Mobisheild sales promotion presentation.Arijit Ghosh
 
Digital security for Sri Lankan activists
Digital security for Sri Lankan activistsDigital security for Sri Lankan activists
Digital security for Sri Lankan activistsSanjana Hattotuwa
 
10 Reasons to Choose Connect Safe Antivirus
10 Reasons to Choose Connect Safe Antivirus10 Reasons to Choose Connect Safe Antivirus
10 Reasons to Choose Connect Safe Antivirusconnectsafe
 
Social Engineering and Identity Theft.pptx
Social Engineering and Identity Theft.pptxSocial Engineering and Identity Theft.pptx
Social Engineering and Identity Theft.pptxRoshni814224
 
Desgn&imp authentctn.ppt by Jaseela
Desgn&imp authentctn.ppt by JaseelaDesgn&imp authentctn.ppt by Jaseela
Desgn&imp authentctn.ppt by JaseelaStudent
 
Kaymera secure smartphone Quick start guide AndroidLM
Kaymera secure smartphone Quick start guide AndroidLMKaymera secure smartphone Quick start guide AndroidLM
Kaymera secure smartphone Quick start guide AndroidLMJeremy Glover
 
Set up a new enum with eskytel
Set up a new enum with eskytelSet up a new enum with eskytel
Set up a new enum with eskytelSTARSSIP LIMITED
 

Ähnlich wie Basic mobile and internet security (20)

Modicare Mighty Guard
Modicare Mighty GuardModicare Mighty Guard
Modicare Mighty Guard
 
3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account
 
Email security
Email securityEmail security
Email security
 
Webinar: Personal Online Privacy - Sucuri Security
Webinar: Personal Online Privacy - Sucuri SecurityWebinar: Personal Online Privacy - Sucuri Security
Webinar: Personal Online Privacy - Sucuri Security
 
HUAWEI P8 Lite Manual / User Guide
HUAWEI P8 Lite Manual / User GuideHUAWEI P8 Lite Manual / User Guide
HUAWEI P8 Lite Manual / User Guide
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
 
Executive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdfExecutive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdf
 
Speed dials
Speed dialsSpeed dials
Speed dials
 
Ouch 201211 en
Ouch 201211 enOuch 201211 en
Ouch 201211 en
 
Cyber security
Cyber securityCyber security
Cyber security
 
How to secure your Gmail account using android phones?
How to secure your Gmail account using android phones?How to secure your Gmail account using android phones?
How to secure your Gmail account using android phones?
 
Mobisheild sales promotion presentation.
Mobisheild  sales promotion  presentation.Mobisheild  sales promotion  presentation.
Mobisheild sales promotion presentation.
 
Digital security for Sri Lankan activists
Digital security for Sri Lankan activistsDigital security for Sri Lankan activists
Digital security for Sri Lankan activists
 
callmagic pro spyphone software.pdf
callmagic pro spyphone software.pdfcallmagic pro spyphone software.pdf
callmagic pro spyphone software.pdf
 
10 Reasons to Choose Connect Safe Antivirus
10 Reasons to Choose Connect Safe Antivirus10 Reasons to Choose Connect Safe Antivirus
10 Reasons to Choose Connect Safe Antivirus
 
Social Engineering and Identity Theft.pptx
Social Engineering and Identity Theft.pptxSocial Engineering and Identity Theft.pptx
Social Engineering and Identity Theft.pptx
 
Desgn&imp authentctn.ppt by Jaseela
Desgn&imp authentctn.ppt by JaseelaDesgn&imp authentctn.ppt by Jaseela
Desgn&imp authentctn.ppt by Jaseela
 
Kaymera secure smartphone Quick start guide AndroidLM
Kaymera secure smartphone Quick start guide AndroidLMKaymera secure smartphone Quick start guide AndroidLM
Kaymera secure smartphone Quick start guide AndroidLM
 
IT Security DOs and DON'Ts
IT Security DOs and DON'TsIT Security DOs and DON'Ts
IT Security DOs and DON'Ts
 
Set up a new enum with eskytel
Set up a new enum with eskytelSet up a new enum with eskytel
Set up a new enum with eskytel
 

Kürzlich hochgeladen

Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 

Kürzlich hochgeladen (20)

INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 

Basic mobile and internet security

  • 1. Online and Mobile Basic Security NGETH Moses ICT Project Coordinator Community Legal Education Center (CLEC)
  • 2. “No place like 127.0.0.1” • 2nd Step Verification and Set up • Remote your smart phone • Easy to set up “strong” passwords not a long passwords
  • 3. 2nd Step Verification (For Google user ONLY) • Stronger security for your Google Account • With 2-Step Verification, you’ll protect your account with both your password and your phone
  • 11. How to set up 2nd step verification
  • 12. Sup 2nd step verification • Go to your Gmail account
  • 13. Set up 2nd step verification • Go to “Security Tap” • Click on “Setup”
  • 14. Set up 2nd step verification • Click on “Start setup” • Re-type your password
  • 15. Set up 2nd step verification • Type your phone number • Note: you either choose Google to send “Text message (SMS” or Call you “Voice Call”
  • 16. Set up 2nd step verification • Go to icon of you profile photo at the top right side
  • 17. Set up 2nd step verification • Code was sent to your number. • Fill in the 6 digits in a blank box • Note: Mobile and Metfone doesn’t work well.
  • 18. Set up 2nd step verification • If you are setting up on somebody els’ computer, please un-tick “Trust this computer”. • Recommend to set up on your computer ONLY • Click Next
  • 19. Set up 2nd step verification • Just to make sure you got the right phone number. • Click Confirm to finish the setup
  • 20. Set up 2nd step verification • NOTE: – After finish setup 2nd step verification, all your social media that uses with this Gmail account will be sign out. It means you can’t log in to those account with your current password. It needs a one-time “App-specific passwords”. (Explanation off slide presentation)
  • 21. Remote your smart phone 1. First you need to make sure that you have turned it on, which you can do by following this quick tutorial: 2. Go to the Google Setttings of your Android device. 3. Tap on Android Device Manager at the bottom of the list 4. Check the box for Remotely locate this device 5. Check box for remote lock and factory reset. 6. To the Settings of your phone. 7. Tap on Security and then Device administrator. Make sure the Android Device Manager is ticked off there. 8. Now that you have done this, you can remotely lock and wipe your device in case of theft or loss. To do this, go to the Device Manager website. 9. The path to activate this feature might differ depending on your device, but in general should be the same as it's a Google service and not one from your phone's manufacturer.
  • 26. Remote your smart phone (On Device)
  • 27. Remote your smart phone (On Device)
  • 28. Easy create “Strong Password” not “Long Password”
  • 29. “Strong Password” not “Long Password” It is important to use different types of characters when choosing a password. This can be done in various ways: • Varying capitalisation, such as: 'My naME is Not MR. MarSter' • Alternating numbers and letters, such as: 'a11 w0Rk 4nD N0 p14Y' • Incorporating certain symbols, such as: 'c@t(heR1nthery3' • Using multiple languages, such as: 'Let Them Eat 1e gateaU au ch()colaT
  • 30. “Strong Password” not “Long Password” • Passwords can also take advantage of more traditional mnemonic devices, such as the use of acronyms. This allows long phrases to be turned into complex, seemingly-random words: • 'To be or not to be? That is the question' becomes '2Bon2B?TitQ’ • 'We hold these truths to be self-evident: that all men are created equal' becomes 'WhtT2bs-e:taMac=’ • 'Are you happy today?' becomes 'rU:-)2d@y?'
  • 31. “Strong Password” not “Long Password” • A little effort to make the password more complex goes a very long way. Increasing the length of a password even just by a few characters, or by adding numbers or special characters, makes it much more difficult to crack. For demonstrative purposes, the table below shows how much longer it may take a hacker to break a list of progressively more complex passwords by trying different combinations of the password one after another.
  • 32. “Strong Password” not “Long Password”