1. Online and Mobile Basic Security
NGETH Moses
ICT Project Coordinator
Community Legal Education Center
(CLEC)
2. “No place like 127.0.0.1”
• 2nd Step Verification and Set up
• Remote your smart phone
• Easy to set up “strong” passwords
not a long passwords
3. 2nd Step Verification
(For Google user ONLY)
• Stronger security for your Google Account
• With 2-Step Verification, you’ll protect your
account with both your password and your
phone
12. Sup 2nd step verification
• Go to your Gmail account
13. Set up 2nd step verification
• Go to “Security Tap”
• Click on “Setup”
14. Set up 2nd step verification
• Click on “Start setup”
• Re-type your password
15. Set up 2nd step verification
• Type your phone number
• Note: you either choose Google to send “Text
message (SMS” or Call you “Voice Call”
16. Set up 2nd step verification
• Go to icon of you profile photo at the top right
side
17. Set up 2nd step verification
• Code was sent to your number.
• Fill in the 6 digits in a blank box
• Note: Mobile and Metfone doesn’t work well.
18. Set up 2nd step verification
• If you are setting up on somebody els’ computer,
please un-tick “Trust this computer”.
• Recommend to set up on your computer ONLY
• Click Next
19. Set up 2nd step verification
• Just to make sure you got the right phone number.
• Click Confirm to finish the setup
20. Set up 2nd step verification
• NOTE:
– After finish setup 2nd step verification, all your social media
that uses with this Gmail account will be sign out. It means
you can’t log in to those account with your current
password. It needs a one-time “App-specific passwords”.
(Explanation off slide presentation)
21. Remote your smart phone
1. First you need to make sure that you have turned it on, which you can do
by following this quick tutorial:
2. Go to the Google Setttings of your Android device.
3. Tap on Android Device Manager at the bottom of the list
4. Check the box for Remotely locate this device
5. Check box for remote lock and factory reset.
6. To the Settings of your phone.
7. Tap on Security and then Device administrator. Make sure the Android
Device Manager is ticked off there.
8. Now that you have done this, you can remotely lock and wipe your
device in case of theft or loss. To do this, go to the Device Manager
website.
9. The path to activate this feature might differ depending on your device,
but in general should be the same as it's a Google service and not one
from your phone's manufacturer.
29. “Strong Password” not “Long
Password”
It is important to use different types of characters when
choosing a password. This can be done in various ways:
• Varying capitalisation, such as: 'My naME is Not
MR. MarSter'
• Alternating numbers and letters, such as: 'a11 w0Rk
4nD N0 p14Y'
• Incorporating certain symbols, such as:
'c@t(heR1nthery3'
• Using multiple languages, such as: 'Let Them Eat 1e
gateaU au ch()colaT
30. “Strong Password” not “Long
Password”
• Passwords can also take advantage of more
traditional mnemonic devices, such as the use of
acronyms. This allows long phrases to be turned into
complex, seemingly-random words:
• 'To be or not to be? That is the question' becomes
'2Bon2B?TitQ’
• 'We hold these truths to be self-evident: that all men
are created equal' becomes 'WhtT2bs-e:taMac=’
• 'Are you happy today?' becomes 'rU:-)2d@y?'
31. “Strong Password” not “Long
Password”
• A little effort to make the password more complex
goes a very long way. Increasing the length of a
password even just by a few characters, or by adding
numbers or special characters, makes it much more
difficult to crack. For demonstrative purposes, the
table below shows how much longer it may take a
hacker to break a list of progressively more complex
passwords by trying different combinations of the
password one after another.