your library of you - socialsafe.net
How to stay safe
online
(eSecurity)
your library of you - socialsafe.net
Aim
• Just a starter today covering main points of eSecurity
– Privacy, Passwords, and Computer Security
• There are many layers of actions you can take
– Just like securing your home
• A simple door lock
• A 5 lever door lock
• Window locks
• Alarm system
• CCTV
• The internet offers huge advantages for everyone –
and simple precautions will keep you safe
your library of you - socialsafe.net
Digital
World
Self
Harm
Permanence
Ease of Search
Ethical Grey Unethical Illegal
Harm
Spectrum
Gossip
Public Interest
Privacy Invasion
List
Selling
Unsolicited
Calls
Mug
Targeting
Phone
Tapping
Libel
ID
Theft
Fraud
Assault
Physical
World
Privacy – know your settings
your library of you - socialsafe.net
Social networks & Online privacy
• Are you a person of interest?
– Maybe not to national media
– But always the answer is yes
• Current & future employers
• Friends and acquaintances
• Partners and ex partners
• Understand what is public, private or semi-private
– Twitter is public, but has private Direct messages
– Facebook defaults to public, but can by private
– Be careful what you reveal publically online
• Hard to pull back your personal reputation
• Understand & use Privacy settings
– Default to Friends only where possible
– Network defaults are rarely very private
– You can often (but not always) delete posts/photos
your library of you - socialsafe.net
Passwords
• Passwords are you main line of defence
– Hackers DO try and guess
– Your (ex)partner, “friends”, others may try too
• Fraping – “When a friend or family member
pretends to be you and uses your Facebook
account (for example) to post funny (or
supposedly funny) updates”
• Use safe passwords
– Relatively easy to get details about you
• So don’t use birthdates, names, schools, anything
personal
• Safe passwords can be hard to remember
– Tools to help such as 1Password
• Security questions to recover passwords
– Lie, but do so in a way you can remember
Strong password
Long (8+ characters)
Upper & lower case
Include numbers (0..9)
Include special chars
(@£$%^&*:;….)
Different from site to site
your library of you - socialsafe.net
• Think before you click
– But we all get caught at some
point
– Have computer security
program
• & enable firewall
– (Stops people entering by the
back door)
– Keep your computer system
and phone system up to date
with latest software - by default
keep updates on
Computer security - viruses,
spyware, malware
your library of you - socialsafe.net
Exercises
• What password(s) do you Use?
• Check your Facebook privacy settings
• Has you computer got Virus Protection/Frewall
– Is it up to date?

More Related Content

PDF
Precautions to ensure safety
PPTX
Com 6 u1 L1 Maintaining internet safety
PPTX
EEAS - Cultivate your data protection
PPTX
2.5 Netiquette
PPTX
Digital safety and security for students
PPTX
Netiquette2
PPTX
Nettique
PPTX
The (almost) paperless office thomas vellacott v2
Precautions to ensure safety
Com 6 u1 L1 Maintaining internet safety
EEAS - Cultivate your data protection
2.5 Netiquette
Digital safety and security for students
Netiquette2
Nettique
The (almost) paperless office thomas vellacott v2

Similar to E security (20)

PPT
Cyber Security
PPTX
Lesson 2_Rules_of_Netiquette.pptx
PPTX
Internet Issues (How to Deal on Internet Security)
PPT
Security for database administrator to enhance security
PPT
Threats
PPTX
Don't Get Hacked
 
PPTX
Lesson 2 - Rules of Netiquette (Information and Communication Technology)
PPT
Web2.0 Class Guidelines
PPTX
Password protection
PPTX
Tech" is a shortened form of the word "technology
PPTX
An Introduction To IT Security And Privacy In Libraries & Anywhere
PPTX
Judy Taylour's Digital Privacy Day 2014 Presentation
PPTX
Rules of Netiquette Empowerment Technologies Lesson
PPTX
Tablets, Apps and Cybersecurity
PPTX
Using Skype, Facebook, and email to communicate with family and friends
PPT
Web2.0 Class Safety Guidelines
PPT
Online Self Defense
PPTX
Lesson-2-Online-Safety-Security-Ethics-And-Etiquette.pptx
PPT
password.ppt
Cyber Security
Lesson 2_Rules_of_Netiquette.pptx
Internet Issues (How to Deal on Internet Security)
Security for database administrator to enhance security
Threats
Don't Get Hacked
 
Lesson 2 - Rules of Netiquette (Information and Communication Technology)
Web2.0 Class Guidelines
Password protection
Tech" is a shortened form of the word "technology
An Introduction To IT Security And Privacy In Libraries & Anywhere
Judy Taylour's Digital Privacy Day 2014 Presentation
Rules of Netiquette Empowerment Technologies Lesson
Tablets, Apps and Cybersecurity
Using Skype, Facebook, and email to communicate with family and friends
Web2.0 Class Safety Guidelines
Online Self Defense
Lesson-2-Online-Safety-Security-Ethics-And-Etiquette.pptx
password.ppt
Ad

More from Sue Black (14)

PPTX
Mumsnet techmums social media share
PPTX
Techmums social media
PPT
From Bletchley Park to modern computing: the value of Twitter
PPT
goto sue black computer weekly
PPT
Newcastle july2012sueblack
PPT
Turing2012
PPT
Did twitter save bletchley park?
PPT
Turingslegacy
PPT
Sueblack overtheair2011
PPT
Google Feb 2011 - My life as a geek
PPT
Bpark guardian feb2011
PPT
Areusocialorantisocial old
PPT
Opentech2010 Slideshare
PPT
Web2se Black et al
Mumsnet techmums social media share
Techmums social media
From Bletchley Park to modern computing: the value of Twitter
goto sue black computer weekly
Newcastle july2012sueblack
Turing2012
Did twitter save bletchley park?
Turingslegacy
Sueblack overtheair2011
Google Feb 2011 - My life as a geek
Bpark guardian feb2011
Areusocialorantisocial old
Opentech2010 Slideshare
Web2se Black et al
Ad

Recently uploaded (20)

PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PPTX
2018-HIPAA-Renewal-Training for executives
PPTX
Microsoft Excel 365/2024 Beginner's training
DOCX
search engine optimization ppt fir known well about this
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
PDF
STKI Israel Market Study 2025 version august
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PDF
A review of recent deep learning applications in wood surface defect identifi...
PPT
What is a Computer? Input Devices /output devices
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
Flame analysis and combustion estimation using large language and vision assi...
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
Taming the Chaos: How to Turn Unstructured Data into Decisions
OpenACC and Open Hackathons Monthly Highlights July 2025
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
2018-HIPAA-Renewal-Training for executives
Microsoft Excel 365/2024 Beginner's training
search engine optimization ppt fir known well about this
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
STKI Israel Market Study 2025 version august
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
A review of recent deep learning applications in wood surface defect identifi...
What is a Computer? Input Devices /output devices
Chapter 5: Probability Theory and Statistics
Developing a website for English-speaking practice to English as a foreign la...
Flame analysis and combustion estimation using large language and vision assi...
sbt 2.0: go big (Scala Days 2025 edition)
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...

E security

  • 1. your library of you - socialsafe.net How to stay safe online (eSecurity)
  • 2. your library of you - socialsafe.net Aim • Just a starter today covering main points of eSecurity – Privacy, Passwords, and Computer Security • There are many layers of actions you can take – Just like securing your home • A simple door lock • A 5 lever door lock • Window locks • Alarm system • CCTV • The internet offers huge advantages for everyone – and simple precautions will keep you safe
  • 3. your library of you - socialsafe.net Digital World Self Harm Permanence Ease of Search Ethical Grey Unethical Illegal Harm Spectrum Gossip Public Interest Privacy Invasion List Selling Unsolicited Calls Mug Targeting Phone Tapping Libel ID Theft Fraud Assault Physical World Privacy – know your settings
  • 4. your library of you - socialsafe.net Social networks & Online privacy • Are you a person of interest? – Maybe not to national media – But always the answer is yes • Current & future employers • Friends and acquaintances • Partners and ex partners • Understand what is public, private or semi-private – Twitter is public, but has private Direct messages – Facebook defaults to public, but can by private – Be careful what you reveal publically online • Hard to pull back your personal reputation • Understand & use Privacy settings – Default to Friends only where possible – Network defaults are rarely very private – You can often (but not always) delete posts/photos
  • 5. your library of you - socialsafe.net Passwords • Passwords are you main line of defence – Hackers DO try and guess – Your (ex)partner, “friends”, others may try too • Fraping – “When a friend or family member pretends to be you and uses your Facebook account (for example) to post funny (or supposedly funny) updates” • Use safe passwords – Relatively easy to get details about you • So don’t use birthdates, names, schools, anything personal • Safe passwords can be hard to remember – Tools to help such as 1Password • Security questions to recover passwords – Lie, but do so in a way you can remember Strong password Long (8+ characters) Upper & lower case Include numbers (0..9) Include special chars (@£$%^&*:;….) Different from site to site
  • 6. your library of you - socialsafe.net • Think before you click – But we all get caught at some point – Have computer security program • & enable firewall – (Stops people entering by the back door) – Keep your computer system and phone system up to date with latest software - by default keep updates on Computer security - viruses, spyware, malware
  • 7. your library of you - socialsafe.net Exercises • What password(s) do you Use? • Check your Facebook privacy settings • Has you computer got Virus Protection/Frewall – Is it up to date?