1 / 21

Staying Safe, Having Fun, And Cruising The ‘Net

Staying Safe, Having Fun, And Cruising The ‘Net. Daniel Owens IT Security Professional. Agenda. Introduction Staying Safe Having Fun Cruising The ‘Net Conclusion And Appendices. A Note About Good And Evil.

sook
Download Presentation

Staying Safe, Having Fun, And Cruising The ‘Net

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Staying Safe, Having Fun, And Cruising The ‘Net Daniel Owens IT Security Professional

  2. Agenda • Introduction • Staying Safe • Having Fun • Cruising The ‘Net • Conclusion And Appendices

  3. A Note About Good And Evil Nothing in this world is purely good or purely evil – to include the Internet and those who use it. -Daniel Owens

  4. With That Said… A Note About Me • Currently • Working as a NASA contractor in IT Security • Formerly • Worked for/with the… • Department of Defense (DoD) to include the NSA • FBI • Justice Department • Microsoft • Oracle • Cisco • And many more… • MySpace • IBM • Xerox • Booz Allen Hamilton • SystemSecurities

  5. Agenda • Introduction • Staying Safe • Having Fun • Cruising The ‘Net • Conclusion And Appendices

  6. Protecting Your Computer • Apply updates and patches • This includes for the Operating System, your web browser, any plug-ins and add-ons for the web browser, any games, and any other software • Use Anti-Malware Software • This includes antivirus, antispyware, and anti-adware software • Examples Include (all free for home use): • AVG and Avast! • Spybot Search & Destroy • Adaware

  7. Protecting Your Privacy • Don’t fill out online surveys or enter contests without permission • Many of these are simply there to get information about you and some can be harmful • Never give out sensitive information about yourself, your family, or others • This includes addresses, school names, your full name, phone numbers, and your schedule/vacation data in advance • Don’t open or respond to SPAM • And don’t give your email address to just anyone

  8. Doubt Everything • If you can’t verify someone’s identity, you can’t trust them with your information • Anyone can post just about anything on the Internet… pretending to be just about anyone • Just like any other medium

  9. Doubt Everything (cont.)

  10. Agenda • Introduction • Staying Safe • Having Fun • Cruising The ‘Net • Conclusion And Appendices

  11. Cyberbullying • Often either a source of or voice for rumors • Common places are MySpace and Facebook • Often successful only AFTER the victim starts to respond to the bully(ing) • While it may be difficult, ignoring posts and simply blocking instant messages from people you don’t know is the best way to stop cyberbullying • Can also include compromising a victim’s account and using it • Again, MySpace and Facebook are common vectors, but so are Instant Messengers

  12. Cyberpredators • Few cyberpredators give out their real age, name, and other information • And anyone can find a picture online • Unsolicited instant messages, posts, and emails from strangers should never be responded to • 40% of females have been solicited on the Internet at least once before graduating high school • Males are vulnerable too • Should be treated the same as bullying

  13. If All Else Fails • Change your account name and password • Most bullies and predators won’t be able to track you if you change your information… unless you give it to them • Don’t go there… • Just don’t visit the site • The Internet isn’t anonymous • Well-trained professionals (and criminals) can track down almost anyone on the Internet • If you’re a victim, talk to your parents and/or a trusted adult

  14. Agenda • Introduction • Staying Safe • Having Fun • Cruising The ‘Net • Conclusion And Appendices

  15. Be Suspicious Of The Unknown • Warez and Torrents • Many of the software and videos on these sites are bugged in one way or another • Free Games and Software • Many of the freeware and shareware software gathers personal information • Often the company owning the software then sells the data • Unknown Websites • Some sites are designed to install malware onto visitor computers

  16. Be Suspicious Of The Unknown (cont.)

  17. Online Gaming • Protect your privacy • Give out as little information as possible • And don’t have your screenname be your real name • Find a ‘room’ where you feel both safe and comfortable and stay there • If things start to go downhill, leave and don’t come back • Avoid games with monthly fees • These often require you to give credit card information and other data that an attacker can steal from the server

  18. Agenda • Introduction • Staying Safe • Having Fun • Cruising The ‘Net • Conclusion And Appendices

  19. For More Information • Media Awareness Network (MNet) • http://www.media-awareness.ca/english/index.cfm • Cyberbullying Research Center • http://www.cyberbullying.us/ • NetAlert • http://www.netalert.gov.au/ • OnGuard Online • http://www.onguardonline.gov/

  20. For More Information (cont.) • Safe Internet Alliance • http://www.safeinternet.org/ • GRC IT Security Office • http://itsecurity.grc.nasa.gov • STOP Cyberbullying • http://www.stopcyberbullying.org/

  21. Acknowledgements • I stole the background and some clipart from Microsoft • I stole a lot from my experiences and previous writings

More Related