SlideShare a Scribd company logo
Social media for upskilling unemployed and low
skilled adult workers for digital society
2018-1-PT01-KA204-047429
IO2 Mobile and online interactive platform for building the digital
competence of low-skilled / low-qualified unemployed persons
Module 5: SAFETY
Author: MARIE CURIE ASSOCIATION – MCA, PLOVDIV, BULGARIA
LINK-UPS
The European Commission support for the production of this publication does not
constitute an endorsement of the contents which reflects the views only of the
authors, and the Commission cannot be held responsible for any use which may be
made of the information contained therein.
Aims of the module (in line with the
competence framework):
 To protect the devices, personal data and privacy of adults,
who equally need to understand the risks and threats of
digital environments.
 To train adults to know more about safety and security
measures and to consider reliability and privacy.
 To enable adults to understand how to use and share
personally identifying information while being able to protect
oneself and others from damages.
 To enable adults to understand that digital services use a
“Privacy policy” and be aware of how personal data is being
used.
Previous knowledge required
 Basic literacy
 Basic knowledge of common English terms used while
exploring digital devices and the internet
 Basic digital competences required on how to use
independently a PC, tablet, smartphone, USB device,
and internet connection (incl. WiFi)
 Completion of LINK-UPS modules 1-4
Learning outcomes
 Knowledge
 Knows that there are several risks associated with the use of technologies.
 Knows about how to avoidrisks.
 Understands the risks associated with using online services.
 Knows how to protect personal data and privacy
 Knows how to use properly USB flash drive
 Skills
 Is able to take steps to mitigate the risk of fraud by using safe credentials.
 Is able to protect different devices from threats of the digital world
(malware, phishing, viruses, etc.).
 Is able to protect personal data and privacy
 Competences
 Has a positive but realistic attitude towards the benefits and risks associated
with online technologies.
 Is competent to protect personal data and privacy
Delivery
 Training duration – 2 hours
 Learning duration – 4 hours
 Equipment/resource required – computer, tablet,
smartphone, access to internet, email
 Assessment test – pre- and post-assessment
Short summary of the module
This module is providing information and guidance on how to
protect personal devices, data and privacy and to understand risks
and threats in digital environments.
It provides information about safety and security measures with
regards to computer usage, USB flash drives, and smartphones.
As an adult learner, you will raise your awareness and
understanding with regards to how to use and share personally
identifying information while being able to protect yourself and
others from damages.
You will understand that digital services use a “Privacy policy” to
inform how personal data is being used.
We will help you in preventing your personal data being used
wrongfully by non-authorised people.
Glossary
•The attempt to access personal information by sending e-mails purporting to come from a genuine
company operating on the Internet,but in fact, it is a fake website operated by fraudsters
Data dredging/phishing
•A network security system that monitors and controls incoming and outgoing network traffic based on
predetermined security rules
Firewall
•Tools, machinery, and other durable equipment
Hardware
•Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer
system
Malware
•The programs and other operating information used by a computer, tablet, smartphone,etc.
Software
•Irrelevantor unsolicited messages sent over theInternet,usually of a commercial nature
Spam
•A flash driveis a deviceused for data storage that includes a flash memory and an integrated Universal
Serial Bus (USB) interface
USB flash drive
Chapter I. Safety and
associated risks
 A digital citizen is “someone who is able to think critically
about the ethical opportunities and challenges of the
‘digital world’ and make safe, respectful, and responsible
choices.” (Common Sense Media, 2010)
Attributes of a good digital citizen:
Respects others (doesn’t respond to or post negativecomments)
Doesn’t steal (if you wouldn’t steal from a store, why steal music,
movies, videos)
Accepts personal responsibility (smartphones and Internet)
Who is a digital citizen?
Closest Friends Friends Acquaintances Strangers
 There is a perceived sense of anonymity online.
 As a result, some individuals pretend to be someone they are not.
 Users can misrepresent their ages, gender, personalities, location,
and other information about themselves.
Determine with whom you are communicating…
Who are you when online?
Risks for all Internet users
The three Cs:
 Inappropriate or unwanted Contact
 Inappropriate or inaccurate Content
 Deceptive or fraudulent Commerce
 You as an adult needs to be aware of
what information you are posting and how
you are representing yourself online.
 Limit the amount of personal information
 Address
 Phone number
 Birthday
 Videos
 Images
 Statements
 Treat your personal information as you
would treat your money—protect it
and don't leaveit lying around for
others to take.
 Mind appropriate self-representation
Online posted content
Safe posting tips: What to
post
What to block?
• Use nickname only
• Use cartoons, drawings, or
avatars
• Make the profile private
• Home telephone number
• Cell phone number
• Street address
• Home town/city of
residence
• Date of birth
• Credit card numbers
Risky Behavior = Unwanted Outcomes
Try to avoid the following:
 Talking to people in various places online
 Adding strangers to a buddy list
 Talking to strangers about sex
 Acting in a rude or nasty manner online (trolling or
cyberbullying)
 Harassing or posting embarrassing information
about others online
 Sharing your personal information with strangers
 Using file sharing programs for pornographic
images
How to protect against “phishing”?
 Phishing e-mails usually claim that it is necessary to “update” or
“verify” your account information and urge recipients to click on a
link in the e-mail which may …
 take you subsequently to a bogus website which looks legit,but isn’t;
 make you unconsciously install malicious software.
Any information entered on the website or in the installed
software is then retained by criminals for fraudulent purposes.
 The e-mails are sent with the expectation of reaching an active e-
mail address belonging to a customer with an account at the
institution being targeted.
 The key to remaining safe is to be suspicious of all unsolicited or
unexpected e-mails you receive, even if they appear to be from a
trusted source.
What is Cyberbullying?
 When a person is tormented, harassed, humiliated,
embarrassed or otherwise targeted by any other person
using the Internet or other digital communication
technology.
What is a Virus?
A virus is software that spreads from program to
program, or from disk to disk, and uses each infected
program or disk to make copies of itself = computer
sabotage.
It can also spread to other computers via email
attachments, USB flash drives, etc.
Protect Yourself:
• If you are using an unsecured operating system, you can install various virus
protection software like Windows Security (free), 360° Total Security (free),
McAfee, Avast or Norton AntiVirus.
• To help avoid viruses, it’s very important that your computer runs the latest
updates and has antivirus tools installed.
• Try to stay informed about recent threats about viruses and be careful
when surfing the Internet, downloading files and opening attachments.
What is an Antivirus Software?
 It is a computer program intended to identify and
eliminate computer/smartphones viruses.
 It has a user-friendly interface that scans all existing files
on your device.
 It examines (scans) files to look for known viruses
matching.
 Real-time “dynamic” scanning is recommended to
prevent the device from getting infected in the first
place.
 The software will immediately put the affected files into
“quarantine”.
Chapter II. How to stay
safe using the internet &
app’s
What apps do you use?
Even though being online can be really fun
and useful, we need to be aware of the
dangers.
It is important to know how to be online safely.
Risks
• Do not give people your mobile
phone, tablet or smartphone
because they may read your
personal data.
• Use a code or a password to
protect personal data on your
mobile device.
• Do not give your phone number to
anyone you do not know.
• Be careful what WiFi connection
you use as unsecure ones allow
hackers to steal data.
Staying safe
Protecting Your Data
• Activate (free) firewall
software
• Install (free) antivirus
software
• Install (free) antispyware
• Activate a spam filter on
your email software
• Perform timely updates
of your Operating System
(Windows, Android, etc.)
Protecting Your Data
 Create strong passwords for all software you
access, offline and online, on your PC or
mobile
 Secure your wireless network with a strong
password (avoid 123456 !!!)
 Stick with trusted sources when purchasing
goods or software
 Beware of older computers’ security
limitations
Keep passwords safe
 Always memorise your passwords and other security information and promptly
destroy the notice containingthis information.
 Take the appropriate steps to keep your password and other security
information secret at all times; never reveal it to family, friends, or anyone else.
 If callingthe bank, be aware of which information you will be asked for: you will
never be asked for your password.
 Ensure that you log out properly after doingyour online banking.
 Never save your password on your computer unless it is protected (e.g.
password manager).
 Never leave your computer unattended when logged into Internet banking.
 We recommend changingyour password regularly. If you change your
password, choose one which cannot be guessed easily.
 Do not use your online bankingpassword for any other websites.
Keep your computer secure
 Be cautious of any unsolicited e-
mails (especially those from
unknown senders) and never click
on links in such e-mails to visit
unknown websites.
 Do not open, download or
execute e-mail attachments from
unknown, suspicious, or
untrustworthy sources.
 Install anti-virus software, keep it
up-to-date and run regular
security scans. Install the latest
security updates, also known as
patches.
Be careful with “Online Marketing”
 Be wary of contests and
“special” offers received
via email or online (pop
ups, banners, etc.)
 Read the privacy policy
of those sites
 Use an alternate email
address if you do want
to engage
 Guard your information
 Manage your cookies
Chapter III. Safety
measures for mobile
devices and USB flash
drives
Use of mobile devices
 Basically everyone has a mobile
device
 These devices are used for
many activities
Mobile banking
Videos
Pictures
Messaging
GPS
…
Mobile threats and attacks
Mobile devices make attractive targets:
People store much personal info on them:
email, calendars, contacts, pictures, etc.
They are easily lost/stolen
Built-in billing system: in-app purchases (credit
card)
Many new devices have near field
communications (NFC), used for contactless
payments, etc.
Your device becomes your credit card
Location privacy issues
Protect your mobile device
 Protect your telephone with a (non-trivial) password
and set your screen to lock automatically when it is
not being used.
 Don’t use:
Lazy users’ passwords: 123456, password,
letmein, your name, etc.
Predictable patterns: Zorro sign (Z)…
 Do not allow the phone from which you are banking
online to be used by third persons without
supervision.
 Download applications only from official application
stores (e.g. Apple Store, Google Play Store).
 Install anti-virussoftware and keep it up to date.
Learn more at:
For Android devices: https://support.google.com/android/answer/6215472?hl=en
For iOS devices: https://support.apple.com/guide/iphone/important-safety-information-iph301fc905/ios
Authentication: Smart Cards / Security
Tokens
 More expensive, harder to
implement
 Vulnerability: prone to loss or theft
 Very strong when combined with
another form of authentication, e.g.
a password
 Does not work well in all applications
Authentication: Comparison
Passwords Smart Cards Biometrics Pattern Lock
Security Weak Strong Strong Weak
Ease of Use Easy Medium Hard Easy
Implementation Easy Hard Hard Easy
Works for phones Yes No Possible Yes
• Deeper problem: mobile devices are
designed with a single-user assumption…
How to safely use a USB flash drive?
This is called the “USB port”
Your computer can have 1 or more. Located on the front
or back of your computer.
USB ports are used to connect many different items to the
computer (printer, scanner, USB flash drive, etc.)
When you insert the USB flash drive into the USB Port, your
computer should automatically recognize it and let you
know.
Before using any file on your USB flash drive, do perform
a virus scanning
• From My Computer
• Right click on the name
of the USB drive (i.e.
SecureGuard)
• Click on Scan for viruses
For further information please
contact us:
info@mariecurie.bg

More Related Content

PPTX
Securityawareness
PDF
Computer security
PPTX
Security issues ethics in education chapter 8
PPTX
Computer security privacy and ethics
PPTX
Online Safety and Security
PPT
New Hire Information Security Awareness
PPTX
Online Security and How to Make Money Online
PDF
Chapter 4 Computer Science :: Computer Ethics and Security
Securityawareness
Computer security
Security issues ethics in education chapter 8
Computer security privacy and ethics
Online Safety and Security
New Hire Information Security Awareness
Online Security and How to Make Money Online
Chapter 4 Computer Science :: Computer Ethics and Security

What's hot (20)

PPTX
Security best practices for regular users
PPT
Cyber Security Awareness Training by Win-Pro
PPTX
PPSX
Security Awareness Training
PPTX
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
PPT
11 Computer Privacy
PPTX
Information Security Awareness: at Work, at Home, and For Your Kids
PDF
WFH Cybersecurity Basics Employees and Employers
PPTX
Awareness Training on Information Security
PPT
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
PDF
Employee Security Awareness Program
PPTX
Computer Security and Ethics
PPT
COMPUTER ETHICS AND SECURITY
PPTX
Cyber ethics cbse class xi
PPTX
Discovering Computers: Chapter 11
PPT
Microsoft protect ppt_ms_final
PPTX
Cyber Safety Class 9
PPTX
Privacy , Security and Ethics Presentation
POT
Chapter11
PPTX
Ethics,security and privacy control
Security best practices for regular users
Cyber Security Awareness Training by Win-Pro
Security Awareness Training
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
11 Computer Privacy
Information Security Awareness: at Work, at Home, and For Your Kids
WFH Cybersecurity Basics Employees and Employers
Awareness Training on Information Security
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
Employee Security Awareness Program
Computer Security and Ethics
COMPUTER ETHICS AND SECURITY
Cyber ethics cbse class xi
Discovering Computers: Chapter 11
Microsoft protect ppt_ms_final
Cyber Safety Class 9
Privacy , Security and Ethics Presentation
Chapter11
Ethics,security and privacy control
Ad

Similar to Module 5: Safety (20)

PPTX
Cyber Safety.pptx cause its the best lol
PPT
Rayane hazimeh building trust in the digital age teenagers and students
PPT
Digital safety[1]
PPTX
INTERNET SAFER DAY-2021.pptx
PPTX
Lecture in Empowerment Technologies week 2.pptx
PDF
Emp tech las-week-2
PPTX
Cyber Safety and Digital Empowerment.pptx
PPTX
Empowerment TECHONOLOGY 12- FIRST SEMESTER
PDF
Empowerment Technologies - Module 2
PPTX
empowerment technologies Powerpoint presentation
PPTX
Internet safety update
PPTX
Cyber safety.pptx
PDF
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
PPT
Rayane hazimeh building trust in the digital age teenagers and students
PPT
Rayane hazimeh building trust in the digital age teenagers and students
PPT
Building Trust in the Digital Age
PPTX
Internet safety
PDF
Security awareness-checklist 2019
PPTX
Pengetahun Dasar Tenatng Cyber Security Untuk Anak.pptx
PPTX
Lesson 2_Rules_of_Netiquette.pptx
Cyber Safety.pptx cause its the best lol
Rayane hazimeh building trust in the digital age teenagers and students
Digital safety[1]
INTERNET SAFER DAY-2021.pptx
Lecture in Empowerment Technologies week 2.pptx
Emp tech las-week-2
Cyber Safety and Digital Empowerment.pptx
Empowerment TECHONOLOGY 12- FIRST SEMESTER
Empowerment Technologies - Module 2
empowerment technologies Powerpoint presentation
Internet safety update
Cyber safety.pptx
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Building Trust in the Digital Age
Internet safety
Security awareness-checklist 2019
Pengetahun Dasar Tenatng Cyber Security Untuk Anak.pptx
Lesson 2_Rules_of_Netiquette.pptx
Ad

More from Karel Van Isacker (20)

PDF
DIGITOUR IO4: Manual for trainers GR
PDF
DIGITOUR IO4: Manual for trainees GR
PDF
DIGITOUR IO4: Manual for trainees ES
PDF
DIGITOUR IO4: Manual for trainers ES
PDF
DIGITOUR IO4: Manual for trainees ES
PPTX
DIGITOUR IO4: Manual for trainers NL
PPTX
DIGITOUR IO4: Manual for trainees NL
PDF
EcologyKM company presentation 2022 new
PPTX
EcologyKM company presentation 2022
PDF
DIGITOUR IO4: Manual for trainees EN
PDF
DIGITOUR IO4: Manual for trainers EN
PDF
DIPCE How to use platform and mobile apps EL
PDF
DIPCE IO3: How to use platform and mobile apps ES
PDF
HIPPOTHERAPY and sensory processing BG
PDF
HIPPOTHERAPY and sensory processing TR
PDF
HIPPOTHERAPY and sensory processing EN
PDF
HIPPOTHERAPY MODULE 14 BG
PDF
HIPPOTHERAPY MODULE 13 BG
PDF
HIPPOTHERAPY MODULE 12 BG
PDF
HIPPOTHERAPY MODULE 11 BG
DIGITOUR IO4: Manual for trainers GR
DIGITOUR IO4: Manual for trainees GR
DIGITOUR IO4: Manual for trainees ES
DIGITOUR IO4: Manual for trainers ES
DIGITOUR IO4: Manual for trainees ES
DIGITOUR IO4: Manual for trainers NL
DIGITOUR IO4: Manual for trainees NL
EcologyKM company presentation 2022 new
EcologyKM company presentation 2022
DIGITOUR IO4: Manual for trainees EN
DIGITOUR IO4: Manual for trainers EN
DIPCE How to use platform and mobile apps EL
DIPCE IO3: How to use platform and mobile apps ES
HIPPOTHERAPY and sensory processing BG
HIPPOTHERAPY and sensory processing TR
HIPPOTHERAPY and sensory processing EN
HIPPOTHERAPY MODULE 14 BG
HIPPOTHERAPY MODULE 13 BG
HIPPOTHERAPY MODULE 12 BG
HIPPOTHERAPY MODULE 11 BG

Recently uploaded (20)

PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
Basic Mud Logging Guide for educational purpose
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
master seminar digital applications in india
PPTX
Pharma ospi slides which help in ospi learning
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
GDM (1) (1).pptx small presentation for students
PDF
Complications of Minimal Access Surgery at WLH
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
Computing-Curriculum for Schools in Ghana
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Sports Quiz easy sports quiz sports quiz
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
Renaissance Architecture: A Journey from Faith to Humanism
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Basic Mud Logging Guide for educational purpose
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
master seminar digital applications in india
Pharma ospi slides which help in ospi learning
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
GDM (1) (1).pptx small presentation for students
Complications of Minimal Access Surgery at WLH
O5-L3 Freight Transport Ops (International) V1.pdf
TR - Agricultural Crops Production NC III.pdf
Computing-Curriculum for Schools in Ghana
human mycosis Human fungal infections are called human mycosis..pptx
Module 4: Burden of Disease Tutorial Slides S2 2025
Sports Quiz easy sports quiz sports quiz
Final Presentation General Medicine 03-08-2024.pptx
O7-L3 Supply Chain Operations - ICLT Program
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Supply Chain Operations Speaking Notes -ICLT Program

Module 5: Safety

  • 1. Social media for upskilling unemployed and low skilled adult workers for digital society 2018-1-PT01-KA204-047429 IO2 Mobile and online interactive platform for building the digital competence of low-skilled / low-qualified unemployed persons Module 5: SAFETY Author: MARIE CURIE ASSOCIATION – MCA, PLOVDIV, BULGARIA LINK-UPS The European Commission support for the production of this publication does not constitute an endorsement of the contents which reflects the views only of the authors, and the Commission cannot be held responsible for any use which may be made of the information contained therein.
  • 2. Aims of the module (in line with the competence framework):  To protect the devices, personal data and privacy of adults, who equally need to understand the risks and threats of digital environments.  To train adults to know more about safety and security measures and to consider reliability and privacy.  To enable adults to understand how to use and share personally identifying information while being able to protect oneself and others from damages.  To enable adults to understand that digital services use a “Privacy policy” and be aware of how personal data is being used.
  • 3. Previous knowledge required  Basic literacy  Basic knowledge of common English terms used while exploring digital devices and the internet  Basic digital competences required on how to use independently a PC, tablet, smartphone, USB device, and internet connection (incl. WiFi)  Completion of LINK-UPS modules 1-4
  • 4. Learning outcomes  Knowledge  Knows that there are several risks associated with the use of technologies.  Knows about how to avoidrisks.  Understands the risks associated with using online services.  Knows how to protect personal data and privacy  Knows how to use properly USB flash drive  Skills  Is able to take steps to mitigate the risk of fraud by using safe credentials.  Is able to protect different devices from threats of the digital world (malware, phishing, viruses, etc.).  Is able to protect personal data and privacy  Competences  Has a positive but realistic attitude towards the benefits and risks associated with online technologies.  Is competent to protect personal data and privacy
  • 5. Delivery  Training duration – 2 hours  Learning duration – 4 hours  Equipment/resource required – computer, tablet, smartphone, access to internet, email  Assessment test – pre- and post-assessment
  • 6. Short summary of the module This module is providing information and guidance on how to protect personal devices, data and privacy and to understand risks and threats in digital environments. It provides information about safety and security measures with regards to computer usage, USB flash drives, and smartphones. As an adult learner, you will raise your awareness and understanding with regards to how to use and share personally identifying information while being able to protect yourself and others from damages. You will understand that digital services use a “Privacy policy” to inform how personal data is being used. We will help you in preventing your personal data being used wrongfully by non-authorised people.
  • 7. Glossary •The attempt to access personal information by sending e-mails purporting to come from a genuine company operating on the Internet,but in fact, it is a fake website operated by fraudsters Data dredging/phishing •A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules Firewall •Tools, machinery, and other durable equipment Hardware •Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system Malware •The programs and other operating information used by a computer, tablet, smartphone,etc. Software •Irrelevantor unsolicited messages sent over theInternet,usually of a commercial nature Spam •A flash driveis a deviceused for data storage that includes a flash memory and an integrated Universal Serial Bus (USB) interface USB flash drive
  • 8. Chapter I. Safety and associated risks
  • 9.  A digital citizen is “someone who is able to think critically about the ethical opportunities and challenges of the ‘digital world’ and make safe, respectful, and responsible choices.” (Common Sense Media, 2010) Attributes of a good digital citizen: Respects others (doesn’t respond to or post negativecomments) Doesn’t steal (if you wouldn’t steal from a store, why steal music, movies, videos) Accepts personal responsibility (smartphones and Internet) Who is a digital citizen?
  • 10. Closest Friends Friends Acquaintances Strangers  There is a perceived sense of anonymity online.  As a result, some individuals pretend to be someone they are not.  Users can misrepresent their ages, gender, personalities, location, and other information about themselves. Determine with whom you are communicating… Who are you when online?
  • 11. Risks for all Internet users The three Cs:  Inappropriate or unwanted Contact  Inappropriate or inaccurate Content  Deceptive or fraudulent Commerce
  • 12.  You as an adult needs to be aware of what information you are posting and how you are representing yourself online.  Limit the amount of personal information  Address  Phone number  Birthday  Videos  Images  Statements  Treat your personal information as you would treat your money—protect it and don't leaveit lying around for others to take.  Mind appropriate self-representation Online posted content
  • 13. Safe posting tips: What to post What to block? • Use nickname only • Use cartoons, drawings, or avatars • Make the profile private • Home telephone number • Cell phone number • Street address • Home town/city of residence • Date of birth • Credit card numbers
  • 14. Risky Behavior = Unwanted Outcomes Try to avoid the following:  Talking to people in various places online  Adding strangers to a buddy list  Talking to strangers about sex  Acting in a rude or nasty manner online (trolling or cyberbullying)  Harassing or posting embarrassing information about others online  Sharing your personal information with strangers  Using file sharing programs for pornographic images
  • 15. How to protect against “phishing”?  Phishing e-mails usually claim that it is necessary to “update” or “verify” your account information and urge recipients to click on a link in the e-mail which may …  take you subsequently to a bogus website which looks legit,but isn’t;  make you unconsciously install malicious software. Any information entered on the website or in the installed software is then retained by criminals for fraudulent purposes.  The e-mails are sent with the expectation of reaching an active e- mail address belonging to a customer with an account at the institution being targeted.  The key to remaining safe is to be suspicious of all unsolicited or unexpected e-mails you receive, even if they appear to be from a trusted source.
  • 16. What is Cyberbullying?  When a person is tormented, harassed, humiliated, embarrassed or otherwise targeted by any other person using the Internet or other digital communication technology.
  • 17. What is a Virus? A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself = computer sabotage. It can also spread to other computers via email attachments, USB flash drives, etc. Protect Yourself: • If you are using an unsecured operating system, you can install various virus protection software like Windows Security (free), 360° Total Security (free), McAfee, Avast or Norton AntiVirus. • To help avoid viruses, it’s very important that your computer runs the latest updates and has antivirus tools installed. • Try to stay informed about recent threats about viruses and be careful when surfing the Internet, downloading files and opening attachments.
  • 18. What is an Antivirus Software?  It is a computer program intended to identify and eliminate computer/smartphones viruses.  It has a user-friendly interface that scans all existing files on your device.  It examines (scans) files to look for known viruses matching.  Real-time “dynamic” scanning is recommended to prevent the device from getting infected in the first place.  The software will immediately put the affected files into “quarantine”.
  • 19. Chapter II. How to stay safe using the internet & app’s
  • 20. What apps do you use?
  • 21. Even though being online can be really fun and useful, we need to be aware of the dangers. It is important to know how to be online safely. Risks
  • 22. • Do not give people your mobile phone, tablet or smartphone because they may read your personal data. • Use a code or a password to protect personal data on your mobile device. • Do not give your phone number to anyone you do not know. • Be careful what WiFi connection you use as unsecure ones allow hackers to steal data. Staying safe
  • 23. Protecting Your Data • Activate (free) firewall software • Install (free) antivirus software • Install (free) antispyware • Activate a spam filter on your email software • Perform timely updates of your Operating System (Windows, Android, etc.)
  • 24. Protecting Your Data  Create strong passwords for all software you access, offline and online, on your PC or mobile  Secure your wireless network with a strong password (avoid 123456 !!!)  Stick with trusted sources when purchasing goods or software  Beware of older computers’ security limitations
  • 25. Keep passwords safe  Always memorise your passwords and other security information and promptly destroy the notice containingthis information.  Take the appropriate steps to keep your password and other security information secret at all times; never reveal it to family, friends, or anyone else.  If callingthe bank, be aware of which information you will be asked for: you will never be asked for your password.  Ensure that you log out properly after doingyour online banking.  Never save your password on your computer unless it is protected (e.g. password manager).  Never leave your computer unattended when logged into Internet banking.  We recommend changingyour password regularly. If you change your password, choose one which cannot be guessed easily.  Do not use your online bankingpassword for any other websites.
  • 26. Keep your computer secure  Be cautious of any unsolicited e- mails (especially those from unknown senders) and never click on links in such e-mails to visit unknown websites.  Do not open, download or execute e-mail attachments from unknown, suspicious, or untrustworthy sources.  Install anti-virus software, keep it up-to-date and run regular security scans. Install the latest security updates, also known as patches.
  • 27. Be careful with “Online Marketing”  Be wary of contests and “special” offers received via email or online (pop ups, banners, etc.)  Read the privacy policy of those sites  Use an alternate email address if you do want to engage  Guard your information  Manage your cookies
  • 28. Chapter III. Safety measures for mobile devices and USB flash drives
  • 29. Use of mobile devices  Basically everyone has a mobile device  These devices are used for many activities Mobile banking Videos Pictures Messaging GPS …
  • 30. Mobile threats and attacks Mobile devices make attractive targets: People store much personal info on them: email, calendars, contacts, pictures, etc. They are easily lost/stolen Built-in billing system: in-app purchases (credit card) Many new devices have near field communications (NFC), used for contactless payments, etc. Your device becomes your credit card Location privacy issues
  • 31. Protect your mobile device  Protect your telephone with a (non-trivial) password and set your screen to lock automatically when it is not being used.  Don’t use: Lazy users’ passwords: 123456, password, letmein, your name, etc. Predictable patterns: Zorro sign (Z)…  Do not allow the phone from which you are banking online to be used by third persons without supervision.  Download applications only from official application stores (e.g. Apple Store, Google Play Store).  Install anti-virussoftware and keep it up to date. Learn more at: For Android devices: https://support.google.com/android/answer/6215472?hl=en For iOS devices: https://support.apple.com/guide/iphone/important-safety-information-iph301fc905/ios
  • 32. Authentication: Smart Cards / Security Tokens  More expensive, harder to implement  Vulnerability: prone to loss or theft  Very strong when combined with another form of authentication, e.g. a password  Does not work well in all applications
  • 33. Authentication: Comparison Passwords Smart Cards Biometrics Pattern Lock Security Weak Strong Strong Weak Ease of Use Easy Medium Hard Easy Implementation Easy Hard Hard Easy Works for phones Yes No Possible Yes • Deeper problem: mobile devices are designed with a single-user assumption…
  • 34. How to safely use a USB flash drive? This is called the “USB port” Your computer can have 1 or more. Located on the front or back of your computer. USB ports are used to connect many different items to the computer (printer, scanner, USB flash drive, etc.) When you insert the USB flash drive into the USB Port, your computer should automatically recognize it and let you know.
  • 35. Before using any file on your USB flash drive, do perform a virus scanning • From My Computer • Right click on the name of the USB drive (i.e. SecureGuard) • Click on Scan for viruses
  • 36. For further information please contact us: info@mariecurie.bg