SlideShare a Scribd company logo
Computer / Internet Security
West Haven Public Library
www.westhavenlibrary.org
Computer / Internet Security
• Use of internet services are unavoidable
▫ Job applications, school applications, taxes, credit,
banking, DMV forms, personal communication
(email), social networking (facebook), shopping,
research, entertainment
• All parts of your life potentially have an online
counterpart
Computer / Internet Security
• Everything you do online…
▫ Every account you make
▫ Every purchase
▫ Every job application
• Creates data about you
Computer / Internet Security
• Not always a bad thing… BUT
▫ Danger in losing control of your data (accounts)
▫ Danger in over sharing
▫ Danger in important data being destroyed
(photos, records, documents)
Good News
It’s easy to stay safe and protect yourself
Computer / Internet Security
Goals
• Secure your data
• Keep what’s private
PRIVATE
• Prevent attack/ intrusion
• Prepare for the worst,
prevent loss
Computer / Internet Security
Goals Action
• Secure your data
• Keep what’s private PRIVATE
• Prevent attack/ intrusion
• Prepare for the worst, prevent
loss
• Use better password practices
• Be aware of what/how you
share
• Be proactive- use protective
software- be vigilant
• BACKUP, BACKUP, BACKUP
Data?
• Your data is anything on your computer or
information stored in online accounts
▫ Documents, files, photos
▫ Online shopping sites
▫ Banking, credit card
▫ Social networking profiles
• Data that you own/control
• Private (banking info)
• Public (online profiles)
Why bother?
• Whether public (online profiles) or private
(financial info) you need to stay in control
• Ensure that only authorized people can access
your data, accounts, files
Web-based accounts and services are increasingly
important
Dangers
•Breaches can come from
▫ Leaked/ stolen data
 Leaked by a company or organization
 Stolen via virus on a computer you use
▫ Targeted attacks
▫ Automated attacks- cracks
Dangers
• Virus, Malware, Spyware, Adware, Trojans
▫ Software created to steal information, change
settings, destroy files, take control of your system
▫ Most commonly contracted online unbeknownst
to the user
 Email attachments, malicious websites, software
downloads, toolbars
Secure Your Data
• Biggest step is use better password
practices
▫ more difficult to guess
▫ Harder to crack (longer in length)
▫ Make it easier to deal with if username/passwords
are leaked
Better Passwords
• Don't use passwords that are based on personal
information that can be easily accessed or
guessed.
▫ It may be easier than you think to guess your pet’s
name, birthday, child’s name, favorite
color, mother’s maiden name, etc.
▫ “password” “love” are extremely common and
easily guessed
25 Worst Passwords of 2011
1. password
2. 123456
3.12345678
4. qwerty
5. abc123
6. monkey
7. 1234567
8. letmein
9. trustno1
10. dragon
11. baseball
12. 111111
13. iloveyou
14. master
15. sunshine
16. ashley
17. bailey
18. passw0rd
19. shadow
20. 123123
21. 654321
22. superman
23. qazwsx
24. michael
25. football
http://mashable.com/2011/11/17/worst-internet-
passwords/
Better Passwords
• Don't use words that can be found in any
dictionary of any language.
▫ A single word, spelled correctly, is easy to check
against a dictionary
▫ Single words are also short, easy to break using
random guesses.
Stronger Passwords
• Use both lowercase and capital letters.
• Use a combination of letters, numbers, and
special characters.
▫ Maine96knees@MtSnow
• Develop a mnemonic for remembering complex
passwords.
Stronger Passwords
• Use passphrases when you can.
▫ Longer in length- harder to guess/ crack
▫ Easier to remember
▫ puppytograndmasforsummervacation
Stronger Passwords
• Use different passwords on different systems
▫ If you use the same password at one site that is
broken into- then attackers can access your data at
other sites using that same username/password.
Use different
passwords on
different systems
Keep what’s private PRIVATE
• Be aware of what you share
• When creating an account consider who you are
giving your data to
• Any site asking for banking, social security, or
login information for a different site should be
closely examined.
Keep what’s private PRIVATE
• When creating accounts consider what you are
entering and how it will be used
• You decide your comfort level with what you
share
Email
• Email is more like a postcard than a letter
• Chances are no one other than the recipient will
see it BUT it is possible for others see its content
along the way (just like a postcard)
• Do not email: credit card #, logins/passwords
Web Addresses- URL
URL (Uniform Resource Locator)
The address that connects you with a website.
Parts of the URL
http://www.google.com
http:// = protocol [Hypertext Transfer Protocol]
www. = World Wide Web
google = domain name
.com = domain type
Domain Types
.com = commercial
.org = generally nonprofit organizations
.edu = higher education
.gov = U.S. government agency
Browsing the Web- Secure Sites
• Any site asking for sensitive info should be
encrypted (Banks, Insurance, etc.)
• Encrypted site addresses begin with
▫ https://www.google.com- ENCRYPTED
▫ http://www.google.com- NOT encrypted
Browsing the Web- Secure Sites
Browsing the Web
• As you browse the web- websites collect info
about you
• Your web browser keeps a history and collects
cookies from websites
• Use your browser settings to:
▫ Clear your browser cache/history/cookies
▫ Limit 3rd party cookies
Computer / Internet Security
Keep what’s private PRIVATE
• If you have WiFi at home, set a password
▫ Keep your neighbors off your network (unless you
want them there)
▫ Refer to the directions that came with your
Router/Modem/Wifi
Prevent attack/ intrusion
• A Virus will get in through an open door or you
unwillingly open the door yourself
Anti-Virus
• A program that scans your files and actively
monitors to prevent infection
• Once installed, anti-virus monitors for virus
activity, quarantines, and deletes
• Be sure to frequently run the virus scan
• Be sure that “definitions” are updated
Anti-Virus
• Free
▫ AVG
▫ Avast
▫ Microsoft Security Essentials
 www.windows.microsoft.com/mse
• Commercial
▫ McAffee
▫ Symantec Norton
▫ Bit Defender
Prevent attack/ intrusion
• Be vigilant
• Don’t download email attachments that you
don’t trust
• If something from someone you trust looks
suspicious check with them before opening
Prevent attack/ intrusion
• Scareware
▫ Virus/Malware that looks like an anti-virus
program
▫ Popup while browsing the web
• Know what Anti-virus you have and how to use it
Fake Anti-Virus Warning
Prepare for the worst
• Backup your important files
▫ Keep duplicate copies
• Worst case scenario: you will still have what’s
important to you
• Keep your backup current
Prepare for the worst
• Backup files locally
▫ Copy to cdr
▫ Flash drive
▫ external hard drive
• Paper copies
▫ tax returns
▫ Important photos
Prepare for the worst
• Cloud storage- files copied to a secure site over
the internet
▫ Be sure that service is reputable, safe, stable
▫ Backup regularly
Resources
• http://www.us-cert.gov/cas/tips/
• http://www.ftc.gov/bcp/edu/microsites/onguard/
westhavenlibrary.org
David Cirella, decirella@gmail.com - 2012-03-01

More Related Content

PPTX
Computer / Internet Security WHPL
PPT
Online Self Defense
PPTX
Internet security
PDF
Securing your cyberspace_Watson
PPS
Microsoft (Projects)
PPTX
CYBER SECURITY
PDF
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
PPTX
Cyber Security Tips for students_Deepak
Computer / Internet Security WHPL
Online Self Defense
Internet security
Securing your cyberspace_Watson
Microsoft (Projects)
CYBER SECURITY
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Cyber Security Tips for students_Deepak

What's hot (20)

PPTX
An Introduction To IT Security And Privacy In Libraries & Anywhere
PPTX
An Introduction To IT Security And Privacy In Libraries
PPTX
Keeping you and your library safe and secure
PPTX
An Introduction To IT Security And Privacy for Librarians and Libraries
PPTX
An Introduction To IT Security And Privacy - Servers And More
PDF
Protect digital content before upload to Facebook, Utube and Flickr
PDF
Cyber security awareness presentation nepal
PPT
Computer Security and safety
PPTX
Password protection
PPT
Internet safety presentation sv
PPTX
Online reputation
PPT
Ten Important Rules
PPTX
Online safety, security, ethics & etiquette
PDF
001 ho basic computer
PDF
NHC Tips - Secure your ID Theft - By Bijay Acharya
PDF
CyberSecThreats_R_U_atRisk_Watson
PPTX
Safe Internet Banking Cyber Security
PPSX
CYBERCRIME: AN OVERVIEW
PPTX
Confidentiality in a Digital World
An Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries
Keeping you and your library safe and secure
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy - Servers And More
Protect digital content before upload to Facebook, Utube and Flickr
Cyber security awareness presentation nepal
Computer Security and safety
Password protection
Internet safety presentation sv
Online reputation
Ten Important Rules
Online safety, security, ethics & etiquette
001 ho basic computer
NHC Tips - Secure your ID Theft - By Bijay Acharya
CyberSecThreats_R_U_atRisk_Watson
Safe Internet Banking Cyber Security
CYBERCRIME: AN OVERVIEW
Confidentiality in a Digital World
Ad

Viewers also liked (6)

PPT
Questions to consider
PPT
Account-Based Literacy A New Focus in Library Computer Instruction
PPT
M-ETH: Man in the Middle Ethernet - LaCon'09
PPTX
Wave 5 Srbija
PPTX
Insights u kreiranje online medija kampanje
PPT
Jeopardy watsons
Questions to consider
Account-Based Literacy A New Focus in Library Computer Instruction
M-ETH: Man in the Middle Ethernet - LaCon'09
Wave 5 Srbija
Insights u kreiranje online medija kampanje
Jeopardy watsons
Ad

Similar to Computer / Internet Security (20)

PPTX
TheCyberThreatAndYou2_deck.pptx
PPTX
Lesson 5 protecting yourself on the internet
PPTX
Internet Security
PPTX
Cyber security-1.pptx
PPTX
Rules of Netiquette Empowerment Technologies Lesson
PPTX
Security Best Practices for Regular Users
PPTX
Security best practices for regular users
PPTX
Cyber security
PPT
Building Trust in the Digital Age
PPT
Rayane hazimeh building trust in the digital age teenagers and students
PPT
Rayane hazimeh building trust in the digital age teenagers and students
PPT
Cyber Security Awareness Training by Win-Pro
PDF
Information Security Awareness Training
PDF
Users awarness programme for Online Privacy
PPTX
Lesson 2 - Rules of Netiquette (Information and Communication Technology)
PPTX
securitya wareness dont miss it .pptx
PDF
Steps and Tips to Protect Yourself and your Private Information while Online....
PPTX
Personal Threat Models
PPT
It security in healthcare
PPTX
Securityawareness
TheCyberThreatAndYou2_deck.pptx
Lesson 5 protecting yourself on the internet
Internet Security
Cyber security-1.pptx
Rules of Netiquette Empowerment Technologies Lesson
Security Best Practices for Regular Users
Security best practices for regular users
Cyber security
Building Trust in the Digital Age
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Cyber Security Awareness Training by Win-Pro
Information Security Awareness Training
Users awarness programme for Online Privacy
Lesson 2 - Rules of Netiquette (Information and Communication Technology)
securitya wareness dont miss it .pptx
Steps and Tips to Protect Yourself and your Private Information while Online....
Personal Threat Models
It security in healthcare
Securityawareness

Recently uploaded (20)

PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PPTX
History, Philosophy and sociology of education (1).pptx
PDF
Empowerment Technology for Senior High School Guide
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PPTX
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
PDF
Indian roads congress 037 - 2012 Flexible pavement
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
Hazard Identification & Risk Assessment .pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PDF
A systematic review of self-coping strategies used by university students to ...
PPTX
Introduction to Building Materials
PPTX
Cell Types and Its function , kingdom of life
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PPTX
Lesson notes of climatology university.
PDF
What if we spent less time fighting change, and more time building what’s rig...
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
History, Philosophy and sociology of education (1).pptx
Empowerment Technology for Senior High School Guide
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
Indian roads congress 037 - 2012 Flexible pavement
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Hazard Identification & Risk Assessment .pdf
Final Presentation General Medicine 03-08-2024.pptx
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
202450812 BayCHI UCSC-SV 20250812 v17.pptx
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
A systematic review of self-coping strategies used by university students to ...
Introduction to Building Materials
Cell Types and Its function , kingdom of life
LDMMIA Reiki Yoga Finals Review Spring Summer
Lesson notes of climatology university.
What if we spent less time fighting change, and more time building what’s rig...

Computer / Internet Security

  • 1. Computer / Internet Security West Haven Public Library www.westhavenlibrary.org
  • 2. Computer / Internet Security • Use of internet services are unavoidable ▫ Job applications, school applications, taxes, credit, banking, DMV forms, personal communication (email), social networking (facebook), shopping, research, entertainment • All parts of your life potentially have an online counterpart
  • 3. Computer / Internet Security • Everything you do online… ▫ Every account you make ▫ Every purchase ▫ Every job application • Creates data about you
  • 4. Computer / Internet Security • Not always a bad thing… BUT ▫ Danger in losing control of your data (accounts) ▫ Danger in over sharing ▫ Danger in important data being destroyed (photos, records, documents)
  • 5. Good News It’s easy to stay safe and protect yourself
  • 6. Computer / Internet Security Goals • Secure your data • Keep what’s private PRIVATE • Prevent attack/ intrusion • Prepare for the worst, prevent loss
  • 7. Computer / Internet Security Goals Action • Secure your data • Keep what’s private PRIVATE • Prevent attack/ intrusion • Prepare for the worst, prevent loss • Use better password practices • Be aware of what/how you share • Be proactive- use protective software- be vigilant • BACKUP, BACKUP, BACKUP
  • 8. Data? • Your data is anything on your computer or information stored in online accounts ▫ Documents, files, photos ▫ Online shopping sites ▫ Banking, credit card ▫ Social networking profiles • Data that you own/control • Private (banking info) • Public (online profiles)
  • 9. Why bother? • Whether public (online profiles) or private (financial info) you need to stay in control • Ensure that only authorized people can access your data, accounts, files Web-based accounts and services are increasingly important
  • 10. Dangers •Breaches can come from ▫ Leaked/ stolen data  Leaked by a company or organization  Stolen via virus on a computer you use ▫ Targeted attacks ▫ Automated attacks- cracks
  • 11. Dangers • Virus, Malware, Spyware, Adware, Trojans ▫ Software created to steal information, change settings, destroy files, take control of your system ▫ Most commonly contracted online unbeknownst to the user  Email attachments, malicious websites, software downloads, toolbars
  • 12. Secure Your Data • Biggest step is use better password practices ▫ more difficult to guess ▫ Harder to crack (longer in length) ▫ Make it easier to deal with if username/passwords are leaked
  • 13. Better Passwords • Don't use passwords that are based on personal information that can be easily accessed or guessed. ▫ It may be easier than you think to guess your pet’s name, birthday, child’s name, favorite color, mother’s maiden name, etc. ▫ “password” “love” are extremely common and easily guessed
  • 14. 25 Worst Passwords of 2011 1. password 2. 123456 3.12345678 4. qwerty 5. abc123 6. monkey 7. 1234567 8. letmein 9. trustno1 10. dragon 11. baseball 12. 111111 13. iloveyou 14. master 15. sunshine 16. ashley 17. bailey 18. passw0rd 19. shadow 20. 123123 21. 654321 22. superman 23. qazwsx 24. michael 25. football http://mashable.com/2011/11/17/worst-internet- passwords/
  • 15. Better Passwords • Don't use words that can be found in any dictionary of any language. ▫ A single word, spelled correctly, is easy to check against a dictionary ▫ Single words are also short, easy to break using random guesses.
  • 16. Stronger Passwords • Use both lowercase and capital letters. • Use a combination of letters, numbers, and special characters. ▫ Maine96knees@MtSnow • Develop a mnemonic for remembering complex passwords.
  • 17. Stronger Passwords • Use passphrases when you can. ▫ Longer in length- harder to guess/ crack ▫ Easier to remember ▫ puppytograndmasforsummervacation
  • 18. Stronger Passwords • Use different passwords on different systems ▫ If you use the same password at one site that is broken into- then attackers can access your data at other sites using that same username/password.
  • 20. Keep what’s private PRIVATE • Be aware of what you share • When creating an account consider who you are giving your data to • Any site asking for banking, social security, or login information for a different site should be closely examined.
  • 21. Keep what’s private PRIVATE • When creating accounts consider what you are entering and how it will be used • You decide your comfort level with what you share
  • 22. Email • Email is more like a postcard than a letter • Chances are no one other than the recipient will see it BUT it is possible for others see its content along the way (just like a postcard) • Do not email: credit card #, logins/passwords
  • 24. URL (Uniform Resource Locator) The address that connects you with a website. Parts of the URL http://www.google.com http:// = protocol [Hypertext Transfer Protocol] www. = World Wide Web google = domain name .com = domain type Domain Types .com = commercial .org = generally nonprofit organizations .edu = higher education .gov = U.S. government agency
  • 25. Browsing the Web- Secure Sites • Any site asking for sensitive info should be encrypted (Banks, Insurance, etc.) • Encrypted site addresses begin with ▫ https://www.google.com- ENCRYPTED ▫ http://www.google.com- NOT encrypted
  • 26. Browsing the Web- Secure Sites
  • 27. Browsing the Web • As you browse the web- websites collect info about you • Your web browser keeps a history and collects cookies from websites • Use your browser settings to: ▫ Clear your browser cache/history/cookies ▫ Limit 3rd party cookies
  • 29. Keep what’s private PRIVATE • If you have WiFi at home, set a password ▫ Keep your neighbors off your network (unless you want them there) ▫ Refer to the directions that came with your Router/Modem/Wifi
  • 30. Prevent attack/ intrusion • A Virus will get in through an open door or you unwillingly open the door yourself
  • 31. Anti-Virus • A program that scans your files and actively monitors to prevent infection • Once installed, anti-virus monitors for virus activity, quarantines, and deletes • Be sure to frequently run the virus scan • Be sure that “definitions” are updated
  • 32. Anti-Virus • Free ▫ AVG ▫ Avast ▫ Microsoft Security Essentials  www.windows.microsoft.com/mse • Commercial ▫ McAffee ▫ Symantec Norton ▫ Bit Defender
  • 33. Prevent attack/ intrusion • Be vigilant • Don’t download email attachments that you don’t trust • If something from someone you trust looks suspicious check with them before opening
  • 34. Prevent attack/ intrusion • Scareware ▫ Virus/Malware that looks like an anti-virus program ▫ Popup while browsing the web • Know what Anti-virus you have and how to use it
  • 36. Prepare for the worst • Backup your important files ▫ Keep duplicate copies • Worst case scenario: you will still have what’s important to you • Keep your backup current
  • 37. Prepare for the worst • Backup files locally ▫ Copy to cdr ▫ Flash drive ▫ external hard drive • Paper copies ▫ tax returns ▫ Important photos
  • 38. Prepare for the worst • Cloud storage- files copied to a secure site over the internet ▫ Be sure that service is reputable, safe, stable ▫ Backup regularly