SlideShare a Scribd company logo
Computer / Internet Security
West Haven Public Library
www.westhavenlibrary.org
Computer / Internet Security
• Use of internet services are unavoidable
  ▫ Job applications, school
    applications, taxes, credit, banking, DMV
    forms, personal communication (email), social
    networking
    (facebook), shopping, research, entertainment
• All parts of your life potentially have an online
  counterpart
Computer / Internet Security
• Everything you do online…
 ▫ Every account you make
 ▫ Every purchase
 ▫ Every job application

• Creates data about you
Computer / Internet Security
• Not always a bad thing… BUT
 ▫ Danger in losing control of your data (accounts)
 ▫ Danger in over sharing
 ▫ Danger in important data being destroyed
   (photos, records, documents)
Good News
It’s easy to stay safe and protect yourself
Computer / Internet Security
Goals
    • Secure your data
    • Keep what’s private
      PRIVATE
    • Prevent attack/ intrusion
    • Prepare for the worst,
      prevent loss
Computer / Internet Security
Goals                              Action
• Secure your data                 • Use better password practices

• Keep what’s private PRIVATE      • Be aware of what/how you
                                     share

• Prevent attack/ intrusion        • Be proactive- use protective
                                     software- be vigilant

• Prepare for the worst, prevent   • BACKUP, BACKUP, BACKUP
  loss
Data?
• Your data is anything on your computer or
  information stored in online accounts
 ▫   Documents, files, photos
 ▫   Online shopping sites
 ▫   Banking, credit card
 ▫   Social networking profiles
• Data that you own/control
• Private (banking info)
• Public (online profiles)
Why bother?
• Whether public (online profiles) or private
  (financial info) you need to stay in control

• Ensure that only authorized people can access
  your data, accounts, files

  Web-based accounts and services are increasingly
  important
Dangers
• Breaches can come from
 ▫ Leaked/ stolen data
   Leaked by a company or organization
   Stolen via virus on a computer you use
 ▫ Targeted attacks
 ▫ Automated attacks- cracks
Dangers
• Virus, Malware, Spyware, Adware, Trojans
 ▫ Software created to steal information, change
   settings, destroy files, take control of your system

 ▫ Most commonly contracted online unbeknownst
   to the user
    Email attachments, malicious websites, software
     downloads, toolbars
Secure Your Data
• Biggest step is use better password
  practices
 ▫ more difficult to guess
 ▫ Harder to crack (longer in length)
 ▫ Make it easier to deal with if username/passwords
   are leaked
Better Passwords
• Don't use passwords that are based on personal
  information that can be easily accessed or
  guessed.
 ▫ It may be easier than you think to guess your pet’s
   name, birthday, child’s name, favorite
   color, mother’s maiden name, etc.
 ▫ “password” “love” are extremely common and
   easily guessed
25 Worst Passwords of 2011
1. password       14. master
2. 123456         15. sunshine
3.12345678        16. ashley
4. qwerty         17. bailey
5. abc123         18. passw0rd
6. monkey         19. shadow
7. 1234567        20. 123123
8. letmein        21. 654321
9. trustno1       22. superman
10. dragon        23. qazwsx
11. baseball      24. michael
12. 111111        25. football
13. iloveyou

                 http://mashable.com/2011/11/17/worst-internet-
                 passwords/
Better Passwords
• Don't use words that can be found in any
  dictionary of any language.
 ▫ A single word, spelled correctly, is easy to check
   against a dictionary
 ▫ Single words are also short, easy to break using
   random guesses.
Stronger Passwords
• Use both lowercase and capital letters.
• Use a combination of letters, numbers, and
  special characters.

 ▫ Maine96knees@MtSnow

• Develop a mnemonic for remembering complex
  passwords.
Stronger Passwords
• Use passphrases when you can.
 ▫ Longer in length- harder to guess/ crack
 ▫ Easier to remember


 ▫ puppytograndmasforsummervacation
Stronger Passwords
• Use different passwords on different systems

 ▫ If you use the same password at one site that is
   broken into- then attackers can access your data at
   other sites using that same username/password.
Use different
passwords on
different systems
Keep what’s private PRIVATE
• Be aware of what you share
• When creating an account consider who you are
  giving your data to
• Any site asking for banking, social security, or
  login information for a different site should be
  closely examined.
Keep what’s private PRIVATE
• When creating accounts consider what you are
  entering and how it will be used
• You decide your comfort level with what you
  share
Email
• Email is more like a postcard than a letter

• Chances are no one other than the recipient will
  see it BUT it is possible for others see its content
  along the way (just like a postcard)

• Do not email: credit card #, logins/passwords
Web Addresses- URL
URL (Uniform Resource Locator)
           The address that connects you with a website.
Parts of the URL
http://www.google.com
       http://           = protocol [Hypertext Transfer Protocol]
       www.              = World Wide Web
       google            = domain name
       .com              = domain type
Domain Types
      .com       = commercial
      .org       = generally nonprofit organizations
      .edu       = higher education
      .gov       = U.S. government agency
Browsing the Web- Secure Sites
• Any site asking for sensitive info should be
  encrypted (Banks, Insurance, etc.)
• Encrypted site addresses begin with
  ▫ https://www.google.com- ENCRYPTED
  ▫ http://www.google.com- NOT encrypted
Browsing the Web- Secure Sites
Browsing the Web
• As you browse the web- websites collect info
  about you
• Your web browser keeps a history and collects
  cookies from websites

• Use your browser settings to:
 ▫ Clear your browser cache/history/cookies
 ▫ Limit 3rd party cookies
Computer / Internet Security WHPL
Keep what’s private PRIVATE
• If you have WiFi at home, set a password
 ▫ Keep your neighbors off your network (unless you
   want them there)

 ▫ Refer to the directions that came with your
   Router/Modem/Wifi
Prevent attack/ intrusion
• A Virus will get in through an open door or you
  unwillingly open the door yourself
Anti-Virus
• A program that scans your files and actively
  monitors to prevent infection
• Once installed, anti-virus monitors for virus
  activity, quarantines, and deletes

• Be sure to frequently run the virus scan
• Be sure that “definitions” are updated
Anti-Virus
• Free
 ▫ AVG
 ▫ Avast
 ▫ Microsoft Security Essentials
     www.windows.microsoft.com/mse
• Commercial
 ▫ McAffee
 ▫ Symantec Norton
 ▫ Bit Defender
Prevent attack/ intrusion
• Be vigilant
• Don’t download email attachments that you
  don’t trust
• If something from someone you trust looks
  suspicious check with them before opening
Prevent attack/ intrusion
• Scareware
 ▫ Virus/Malware that looks like an anti-virus
   program
 ▫ Popup while browsing the web

• Know what Anti-virus you have and how to use it
Fake Anti-Virus Warning
Prepare for the worst
• Backup your important files
  ▫ Keep duplicate copies
• Worst case scenario: you will still have what’s
  important to you
• Keep your backup current
Prepare for the worst
• Backup files locally
  ▫ Copy to cdr
  ▫ Flash drive
  ▫ external hard drive
• Paper copies
  ▫ tax returns
  ▫ Important photos
Prepare for the worst
• Cloud storage- files copied to a secure site over
  the internet
  ▫ Be sure that service is reputable, safe, stable
  ▫ Backup regularly
Resources
• http://www.us-cert.gov/cas/tips/
• http://www.ftc.gov/bcp/edu/microsites/onguard/




                  westhavenlibrary.org




                      David Cirella- dcirella@westhavenlibrary.org, 2012-03-01

More Related Content

PPTX
Computer / Internet Security
PPT
Online Self Defense
PPS
Microsoft (Projects)
PPTX
Internet security
PDF
001 ho basic computer
PDF
Protect digital content before upload to Facebook, Utube and Flickr
PPTX
Don't Forget Your (Virtual) Keys: Creating and Using Strong Passwords
PPTX
CYBER SECURITY
Computer / Internet Security
Online Self Defense
Microsoft (Projects)
Internet security
001 ho basic computer
Protect digital content before upload to Facebook, Utube and Flickr
Don't Forget Your (Virtual) Keys: Creating and Using Strong Passwords
CYBER SECURITY

What's hot (15)

PPTX
How to Create (use use) Strong & Unique Passwords
PPT
Internet Safety for Parents
PPT
Microsoft protect ppt_ms_final
PPTX
Digital parenting seminars
PDF
Cyber security awareness presentation nepal
PPTX
Password protection
PPTX
Online reputation
PPTX
Internet Safety for Parents
PPT
Building Trust in the Digital Age
PDF
NHC Tips - Secure your ID Theft - By Bijay Acharya
PPT
Computer Security and safety
PPSX
CYBERCRIME: AN OVERVIEW
PDF
Social Media Marketing 04 08 10
PPTX
Internet Safety Slideshare
How to Create (use use) Strong & Unique Passwords
Internet Safety for Parents
Microsoft protect ppt_ms_final
Digital parenting seminars
Cyber security awareness presentation nepal
Password protection
Online reputation
Internet Safety for Parents
Building Trust in the Digital Age
NHC Tips - Secure your ID Theft - By Bijay Acharya
Computer Security and safety
CYBERCRIME: AN OVERVIEW
Social Media Marketing 04 08 10
Internet Safety Slideshare
Ad

Similar to Computer / Internet Security WHPL (20)

PPTX
Awareness Security 123.pptx
PPTX
USG_Security_Awareness_Primer (1).pptx
PPTX
USG_Security_Awareness_Primer.pptx
PPTX
USG_Security_Awareness_Primer.pptx
PPT
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
PPT
UserSecurityAwarenessUniversityTemplate.ppt
PPT
End User Security Awareness - Information Security
PPTX
TheCyberThreatAndYou2_deck.pptx
PPTX
Security_Awareness_Primer.pptx
PDF
The Significance of Cybersecurity and securing your system
PPTX
Lesson 5 protecting yourself on the internet
PPTX
Cyber Security Awareness Program.pptx
PPT
UserSecurityAwareness.ppt awareness of security
PPT
Information security awareness
 
PPTX
Security Awareness 101
PPT
DNR-Security-Awareness-Training expert.ppt
PDF
Five habits that might be a cyber security risk
PDF
Ethical Hacking and Cyber Security
PDF
Sip 140208055023-phpapp02
Awareness Security 123.pptx
USG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptx
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
UserSecurityAwarenessUniversityTemplate.ppt
End User Security Awareness - Information Security
TheCyberThreatAndYou2_deck.pptx
Security_Awareness_Primer.pptx
The Significance of Cybersecurity and securing your system
Lesson 5 protecting yourself on the internet
Cyber Security Awareness Program.pptx
UserSecurityAwareness.ppt awareness of security
Information security awareness
 
Security Awareness 101
DNR-Security-Awareness-Training expert.ppt
Five habits that might be a cyber security risk
Ethical Hacking and Cyber Security
Sip 140208055023-phpapp02
Ad

More from West Haven Public Library (8)

PPTX
Introduction to Blogging WHPL
PPT
WHPL Computer Basics 2011
PPTX
WHPL Introduction to PowerPoint 2011
PPTX
WHPL Introduction to Excel
PPT
WHPL Online Job Search
PPT
WHPL Resume Creation
PPT
WHPL iCONN instruction
PPT
WHPL Internet and Searching Basics
Introduction to Blogging WHPL
WHPL Computer Basics 2011
WHPL Introduction to PowerPoint 2011
WHPL Introduction to Excel
WHPL Online Job Search
WHPL Resume Creation
WHPL iCONN instruction
WHPL Internet and Searching Basics

Recently uploaded (20)

PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Encapsulation theory and applications.pdf
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Approach and Philosophy of On baking technology
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Hindi spoken digit analysis for native and non-native speakers
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
project resource management chapter-09.pdf
A novel scalable deep ensemble learning framework for big data classification...
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
SOPHOS-XG Firewall Administrator PPT.pptx
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Heart disease approach using modified random forest and particle swarm optimi...
Encapsulation_ Review paper, used for researhc scholars
Encapsulation theory and applications.pdf
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Web App vs Mobile App What Should You Build First.pdf
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Approach and Philosophy of On baking technology
TLE Review Electricity (Electricity).pptx
Hindi spoken digit analysis for native and non-native speakers
Programs and apps: productivity, graphics, security and other tools
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Chapter 5: Probability Theory and Statistics
Unlocking AI with Model Context Protocol (MCP)
project resource management chapter-09.pdf

Computer / Internet Security WHPL

  • 1. Computer / Internet Security West Haven Public Library www.westhavenlibrary.org
  • 2. Computer / Internet Security • Use of internet services are unavoidable ▫ Job applications, school applications, taxes, credit, banking, DMV forms, personal communication (email), social networking (facebook), shopping, research, entertainment • All parts of your life potentially have an online counterpart
  • 3. Computer / Internet Security • Everything you do online… ▫ Every account you make ▫ Every purchase ▫ Every job application • Creates data about you
  • 4. Computer / Internet Security • Not always a bad thing… BUT ▫ Danger in losing control of your data (accounts) ▫ Danger in over sharing ▫ Danger in important data being destroyed (photos, records, documents)
  • 5. Good News It’s easy to stay safe and protect yourself
  • 6. Computer / Internet Security Goals • Secure your data • Keep what’s private PRIVATE • Prevent attack/ intrusion • Prepare for the worst, prevent loss
  • 7. Computer / Internet Security Goals Action • Secure your data • Use better password practices • Keep what’s private PRIVATE • Be aware of what/how you share • Prevent attack/ intrusion • Be proactive- use protective software- be vigilant • Prepare for the worst, prevent • BACKUP, BACKUP, BACKUP loss
  • 8. Data? • Your data is anything on your computer or information stored in online accounts ▫ Documents, files, photos ▫ Online shopping sites ▫ Banking, credit card ▫ Social networking profiles • Data that you own/control • Private (banking info) • Public (online profiles)
  • 9. Why bother? • Whether public (online profiles) or private (financial info) you need to stay in control • Ensure that only authorized people can access your data, accounts, files Web-based accounts and services are increasingly important
  • 10. Dangers • Breaches can come from ▫ Leaked/ stolen data  Leaked by a company or organization  Stolen via virus on a computer you use ▫ Targeted attacks ▫ Automated attacks- cracks
  • 11. Dangers • Virus, Malware, Spyware, Adware, Trojans ▫ Software created to steal information, change settings, destroy files, take control of your system ▫ Most commonly contracted online unbeknownst to the user  Email attachments, malicious websites, software downloads, toolbars
  • 12. Secure Your Data • Biggest step is use better password practices ▫ more difficult to guess ▫ Harder to crack (longer in length) ▫ Make it easier to deal with if username/passwords are leaked
  • 13. Better Passwords • Don't use passwords that are based on personal information that can be easily accessed or guessed. ▫ It may be easier than you think to guess your pet’s name, birthday, child’s name, favorite color, mother’s maiden name, etc. ▫ “password” “love” are extremely common and easily guessed
  • 14. 25 Worst Passwords of 2011 1. password 14. master 2. 123456 15. sunshine 3.12345678 16. ashley 4. qwerty 17. bailey 5. abc123 18. passw0rd 6. monkey 19. shadow 7. 1234567 20. 123123 8. letmein 21. 654321 9. trustno1 22. superman 10. dragon 23. qazwsx 11. baseball 24. michael 12. 111111 25. football 13. iloveyou http://mashable.com/2011/11/17/worst-internet- passwords/
  • 15. Better Passwords • Don't use words that can be found in any dictionary of any language. ▫ A single word, spelled correctly, is easy to check against a dictionary ▫ Single words are also short, easy to break using random guesses.
  • 16. Stronger Passwords • Use both lowercase and capital letters. • Use a combination of letters, numbers, and special characters. ▫ Maine96knees@MtSnow • Develop a mnemonic for remembering complex passwords.
  • 17. Stronger Passwords • Use passphrases when you can. ▫ Longer in length- harder to guess/ crack ▫ Easier to remember ▫ puppytograndmasforsummervacation
  • 18. Stronger Passwords • Use different passwords on different systems ▫ If you use the same password at one site that is broken into- then attackers can access your data at other sites using that same username/password.
  • 20. Keep what’s private PRIVATE • Be aware of what you share • When creating an account consider who you are giving your data to • Any site asking for banking, social security, or login information for a different site should be closely examined.
  • 21. Keep what’s private PRIVATE • When creating accounts consider what you are entering and how it will be used • You decide your comfort level with what you share
  • 22. Email • Email is more like a postcard than a letter • Chances are no one other than the recipient will see it BUT it is possible for others see its content along the way (just like a postcard) • Do not email: credit card #, logins/passwords
  • 24. URL (Uniform Resource Locator) The address that connects you with a website. Parts of the URL http://www.google.com http:// = protocol [Hypertext Transfer Protocol] www. = World Wide Web google = domain name .com = domain type Domain Types .com = commercial .org = generally nonprofit organizations .edu = higher education .gov = U.S. government agency
  • 25. Browsing the Web- Secure Sites • Any site asking for sensitive info should be encrypted (Banks, Insurance, etc.) • Encrypted site addresses begin with ▫ https://www.google.com- ENCRYPTED ▫ http://www.google.com- NOT encrypted
  • 26. Browsing the Web- Secure Sites
  • 27. Browsing the Web • As you browse the web- websites collect info about you • Your web browser keeps a history and collects cookies from websites • Use your browser settings to: ▫ Clear your browser cache/history/cookies ▫ Limit 3rd party cookies
  • 29. Keep what’s private PRIVATE • If you have WiFi at home, set a password ▫ Keep your neighbors off your network (unless you want them there) ▫ Refer to the directions that came with your Router/Modem/Wifi
  • 30. Prevent attack/ intrusion • A Virus will get in through an open door or you unwillingly open the door yourself
  • 31. Anti-Virus • A program that scans your files and actively monitors to prevent infection • Once installed, anti-virus monitors for virus activity, quarantines, and deletes • Be sure to frequently run the virus scan • Be sure that “definitions” are updated
  • 32. Anti-Virus • Free ▫ AVG ▫ Avast ▫ Microsoft Security Essentials  www.windows.microsoft.com/mse • Commercial ▫ McAffee ▫ Symantec Norton ▫ Bit Defender
  • 33. Prevent attack/ intrusion • Be vigilant • Don’t download email attachments that you don’t trust • If something from someone you trust looks suspicious check with them before opening
  • 34. Prevent attack/ intrusion • Scareware ▫ Virus/Malware that looks like an anti-virus program ▫ Popup while browsing the web • Know what Anti-virus you have and how to use it
  • 36. Prepare for the worst • Backup your important files ▫ Keep duplicate copies • Worst case scenario: you will still have what’s important to you • Keep your backup current
  • 37. Prepare for the worst • Backup files locally ▫ Copy to cdr ▫ Flash drive ▫ external hard drive • Paper copies ▫ tax returns ▫ Important photos
  • 38. Prepare for the worst • Cloud storage- files copied to a secure site over the internet ▫ Be sure that service is reputable, safe, stable ▫ Backup regularly