1 / 23

Keeping Your Online Presence Safe and Professional November 8, 2013

Keeping Your Online Presence Safe and Professional November 8, 2013. What to expect today. Cryptography and Online Shopping Password Security Professional Online Presence. Enigma (2001) Movie Trailer. Cryptography and Shopping Are they related?.

percyr
Download Presentation

Keeping Your Online Presence Safe and Professional November 8, 2013

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Keeping Your Online Presence Safe and ProfessionalNovember 8, 2013

  2. What to expect today • Cryptography and Online Shopping • Password Security • Professional Online Presence

  3. Enigma (2001) Movie Trailer

  4. Cryptography and Shopping Are they related? Bombe Machine used to decipher Enigma Code in WWII

  5. E-commerce and Digital Signatures • In 2009, $234.7 billion in retail merchandise was sold. • 48.1% of this was e-commerce sales • Online shopping continues to grow. $327 billion is expected to be spent in 2016. • Retailers protect your information using digital certificates. • Source: U.S. Census Bureau, “E-Stats, 2009 E-Commerce Multi-Sector Report,” May 2011, <http://www.census.gov/econ/estats/>

  6. What are digital certificates? • Business buys certificate • Company verifies ID • Issues certificate

  7. What does it mean? Type of encryption Cipher and cryptographic hash function

  8. Let’s revisit the Enigma Code Public Key – Code book issued by German Secret Service that had settings for each day. The stacker board was changed according to the code book. Is there a private key? No. The operator used the same book. How would you make this asymmetric encryption?

  9. Certificate Issuance Symantec procedures to identify and authenticate Subscriber information from Section 3.2: • Use at least one 3rd party identity proofing service. • Telephone or postal mail confirmation that applicant has applied for certificate. • If certificate includes name of individual, verify that they are an authorized representative of the applying organization.

  10. Are you safe shopping online? • Several breaches have occurred. Fake digital certificates have been issued. • Bit9 – Endpoint and server security • Adobe • Fictitious company in Brazil able to pass malware through a verified digital certificate. • What to do? • Google to find info on company before you purchase • Be leery of attachments in emails

  11. P@ssW0RD S3CuR!Ty Without password protection, nothing is safe!

  12. Unique Passwords Use a unique password for each of your important accounts -Email -Online banking -Social Network -School -Work

  13. Password Best Practices Creating Your Password • Use a long password made up of: • Numbers • Letters • Symbols What to Avoid • Avoid using: • Only letters/numbers. • Names of spouses, children or pets. • Phone numbers, SS#, or birthdates • Same word as your log-in • Words that can be found in the dictionary.

  14. Keeping Your Password Safe • Keep your passwords in a secret place that isn’t easily visible • Don’t leave notes with passwords in plain sight • It is important to change your password • Every 30 to 90 days

  15. Creating a Strong Password

  16. LastPass – Password Manager

  17. LastPass, con’t • Autofill or autologin to sites • Group by type of website **What are some disadvantages to using a password manager?

  18. Professional Online Presence What does your online presence say about you?

  19. Be Professional Clean up your social networking sites such as Facebook and Twitter

  20. Employees Fired Over Posts

  21. Facebook • Customize your privacy settings • Keep photos appropriate • Be careful what you post • Be aware of what you share or “Like”

  22. Library of Congress Is Archiving All of America’s Tweets

  23. Twitter Professional Networking • Write a short description that is professional and indicates your career field. • Link to your professional website such as LinkedIn or an ePortfolio (optional). • Upload a professionally appropriate photo • Choose a professional Twitter handle

More Related