SlideShare une entreprise Scribd logo
1  sur  32
Online Privacy A Module of the CYC Course – Personal Security 8-9-10
The Realities of Digital Communications:  ,[object Object]
The Realities of Digital Communications:  ,[object Object],[object Object],[object Object],[object Object]
The Realities of Digital Communications:  ,[object Object]
The Realities of Digital Communications:  ,[object Object],[object Object],[object Object],[object Object],[object Object]
The Realities of Digital Communications:  ,[object Object]
The Realities of Digital Communications:  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Realities of Digital Communications:  ,[object Object],[object Object]
The Realities of Digital Communications:  ,[object Object]
Privacy Levels on Social Networking Sites ,[object Object],[object Object]
Privacy Levels on Social Networking Sites ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Privacy Levels on Social Networking Sites ,[object Object]
Privacy Levels on Social Networking Sites ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Social Engineering ,[object Object],[object Object],[object Object],[object Object]
Example
Bogus Email Example
Privacy Levels on Social Networking Sites ,[object Object],[object Object],[object Object]
Understanding URLs ,[object Object],[object Object],[object Object],[object Object]
Understanding URLs ,[object Object],[object Object]
Passwords ,[object Object],[object Object],[object Object]
Passwords ,[object Object],[object Object],[object Object],[object Object],[object Object]
Shopping Online ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Credit Card Security ,[object Object],[object Object],[object Object]
Identity Theft ,[object Object],[object Object]
Identity Theft Prevention Tips ,[object Object],[object Object],[object Object],[object Object]
Identity Theft Prevention Tips ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Identity Theft Prevention Tips ,[object Object]
Identity Theft - Public Computer Safety Tips ,[object Object],[object Object],[object Object],[object Object],[object Object]
Identity Theft - Public Computer Safety Tips ,[object Object],[object Object],[object Object],[object Object]
Safety Checklist ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sources ,[object Object],[object Object]
Creative Commons License ,[object Object]

Contenu connexe

Tendances

Digital privacy
Digital privacyDigital privacy
Digital privacyAnna Adel
 
Digital ASSETS: A PATH TO FIDUCIARY ACCESS - FALL 2014
Digital ASSETS:A PATH TO FIDUCIARY ACCESS- FALL 2014Digital ASSETS:A PATH TO FIDUCIARY ACCESS- FALL 2014
Digital ASSETS: A PATH TO FIDUCIARY ACCESS - FALL 2014gallowayandcollens
 
Internet safety
Internet safetyInternet safety
Internet safetywalsh008
 
Becybersmart
BecybersmartBecybersmart
BecybersmartVelma
 
Privacy Online
Privacy OnlinePrivacy Online
Privacy OnlineJohn Curry
 
Internet issues
Internet issuesInternet issues
Internet issuesCJ900
 
Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentationMatthew Momney
 
Protecting your privacy online june 2012 tech tuesday
Protecting your privacy online june 2012 tech tuesdayProtecting your privacy online june 2012 tech tuesday
Protecting your privacy online june 2012 tech tuesdayMolly Immendorf
 
Digital Footprint
Digital FootprintDigital Footprint
Digital Footprintdarpankambo
 
Internet safety presentation 2019
Internet safety presentation 2019Internet safety presentation 2019
Internet safety presentation 2019KanelandSvihlik
 
Paul Madden Frokostseminar Slides
Paul Madden Frokostseminar SlidesPaul Madden Frokostseminar Slides
Paul Madden Frokostseminar SlidesLinkRisk
 
Facebook for Parents
Facebook for ParentsFacebook for Parents
Facebook for Parentsamelialouise
 
Digital Assets: A Path To Fiduciary Access
Digital Assets: A Path To Fiduciary AccessDigital Assets: A Path To Fiduciary Access
Digital Assets: A Path To Fiduciary AccessHoward Collens
 
How to Avoid Getting Malware on Your Computer
How to Avoid Getting Malware on Your ComputerHow to Avoid Getting Malware on Your Computer
How to Avoid Getting Malware on Your ComputerJillian Stone
 
Digital DNA (Toronto Public Library) May 26 2016
Digital DNA (Toronto Public Library) May 26 2016Digital DNA (Toronto Public Library) May 26 2016
Digital DNA (Toronto Public Library) May 26 2016Towa Beer
 

Tendances (19)

Heads up!
Heads up!Heads up!
Heads up!
 
Social Networking
Social NetworkingSocial Networking
Social Networking
 
Digital privacy
Digital privacyDigital privacy
Digital privacy
 
Digital ASSETS: A PATH TO FIDUCIARY ACCESS - FALL 2014
Digital ASSETS:A PATH TO FIDUCIARY ACCESS- FALL 2014Digital ASSETS:A PATH TO FIDUCIARY ACCESS- FALL 2014
Digital ASSETS: A PATH TO FIDUCIARY ACCESS - FALL 2014
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Becybersmart
BecybersmartBecybersmart
Becybersmart
 
Privacy Online
Privacy OnlinePrivacy Online
Privacy Online
 
Internet issues
Internet issuesInternet issues
Internet issues
 
Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentation
 
Protecting your privacy online june 2012 tech tuesday
Protecting your privacy online june 2012 tech tuesdayProtecting your privacy online june 2012 tech tuesday
Protecting your privacy online june 2012 tech tuesday
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Digital Footprint
Digital FootprintDigital Footprint
Digital Footprint
 
Internet safety presentation 2019
Internet safety presentation 2019Internet safety presentation 2019
Internet safety presentation 2019
 
Paul Madden Frokostseminar Slides
Paul Madden Frokostseminar SlidesPaul Madden Frokostseminar Slides
Paul Madden Frokostseminar Slides
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Facebook for Parents
Facebook for ParentsFacebook for Parents
Facebook for Parents
 
Digital Assets: A Path To Fiduciary Access
Digital Assets: A Path To Fiduciary AccessDigital Assets: A Path To Fiduciary Access
Digital Assets: A Path To Fiduciary Access
 
How to Avoid Getting Malware on Your Computer
How to Avoid Getting Malware on Your ComputerHow to Avoid Getting Malware on Your Computer
How to Avoid Getting Malware on Your Computer
 
Digital DNA (Toronto Public Library) May 26 2016
Digital DNA (Toronto Public Library) May 26 2016Digital DNA (Toronto Public Library) May 26 2016
Digital DNA (Toronto Public Library) May 26 2016
 

En vedette

5 word press module 1e
5   word press module 1e5   word press module 1e
5 word press module 1eRozell Sneede
 
Computer saftey adware, spyware & viruses
Computer saftey adware, spyware & virusesComputer saftey adware, spyware & viruses
Computer saftey adware, spyware & virusesRozell Sneede
 
Digital literacy terms & definitions
Digital literacy terms & definitionsDigital literacy terms & definitions
Digital literacy terms & definitionsRozell Sneede
 
Module google docs and calendar
Module google docs and calendarModule google docs and calendar
Module google docs and calendarRozell Sneede
 
Cyc module learning express library
Cyc module learning express libraryCyc module learning express library
Cyc module learning express libraryRozell Sneede
 
1 wordpress module 1 a
1   wordpress module 1 a1   wordpress module 1 a
1 wordpress module 1 aRozell Sneede
 
4 module windows operating system
4 module windows operating system4 module windows operating system
4 module windows operating systemRozell Sneede
 

En vedette (8)

5 word press module 1e
5   word press module 1e5   word press module 1e
5 word press module 1e
 
Cyc module inf ohio
Cyc module inf ohioCyc module inf ohio
Cyc module inf ohio
 
Computer saftey adware, spyware & viruses
Computer saftey adware, spyware & virusesComputer saftey adware, spyware & viruses
Computer saftey adware, spyware & viruses
 
Digital literacy terms & definitions
Digital literacy terms & definitionsDigital literacy terms & definitions
Digital literacy terms & definitions
 
Module google docs and calendar
Module google docs and calendarModule google docs and calendar
Module google docs and calendar
 
Cyc module learning express library
Cyc module learning express libraryCyc module learning express library
Cyc module learning express library
 
1 wordpress module 1 a
1   wordpress module 1 a1   wordpress module 1 a
1 wordpress module 1 a
 
4 module windows operating system
4 module windows operating system4 module windows operating system
4 module windows operating system
 

Similaire à 10 online privacy module samedit1

A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet- Mark - Fullbright
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxKevinRiley83
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptxCharithraaAR
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is DangerousGihan Dias
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital AgeMarian Merritt
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
CYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptxCYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptxTapan Khilar
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself OnlineGary Wagnon
 
Cybersecurity additional activities
Cybersecurity additional activitiesCybersecurity additional activities
Cybersecurity additional activitiesYumonomics
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptxAchu69
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraDevsena Mishra
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptxadblue2017
 

Similaire à 10 online privacy module samedit1 (20)

A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Maintaining Online Privacy
Maintaining Online PrivacyMaintaining Online Privacy
Maintaining Online Privacy
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Online privacy
Online privacyOnline privacy
Online privacy
 
CYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptxCYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptx
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself Online
 
Online privacy
Online privacy Online privacy
Online privacy
 
Cybersecurity additional activities
Cybersecurity additional activitiesCybersecurity additional activities
Cybersecurity additional activities
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena Mishra
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptx
 

Plus de Rozell Sneede

Security terms & definitions
Security terms & definitionsSecurity terms & definitions
Security terms & definitionsRozell Sneede
 
Excel & database terms & definitions
Excel & database terms & definitionsExcel & database terms & definitions
Excel & database terms & definitionsRozell Sneede
 
Basic terms & definitions
Basic terms & definitionsBasic terms & definitions
Basic terms & definitionsRozell Sneede
 
Removing virus tri fold - white
Removing virus tri fold - whiteRemoving virus tri fold - white
Removing virus tri fold - whiteRozell Sneede
 
Cyc flyer chn with ob logo
Cyc flyer   chn with ob logoCyc flyer   chn with ob logo
Cyc flyer chn with ob logoRozell Sneede
 
Wordpress module 1 a
Wordpress module 1 aWordpress module 1 a
Wordpress module 1 aRozell Sneede
 
6 word press module 1f
6   word press module 1f6   word press module 1f
6 word press module 1fRozell Sneede
 
4 word press module 1d
4   word press module 1d4   word press module 1d
4 word press module 1dRozell Sneede
 
3 word press module 1c
3   word press module 1c3   word press module 1c
3 word press module 1cRozell Sneede
 
2 word press module 1b
2   word press module 1b2   word press module 1b
2 word press module 1bRozell Sneede
 
1 wordpress module 1 a
1   wordpress module 1 a1   wordpress module 1 a
1 wordpress module 1 aRozell Sneede
 
Module online investments
Module   online investmentsModule   online investments
Module online investmentsRozell Sneede
 
Cyc elective online banking
Cyc elective online bankingCyc elective online banking
Cyc elective online bankingRozell Sneede
 

Plus de Rozell Sneede (20)

Terms & definitions
Terms & definitionsTerms & definitions
Terms & definitions
 
Security terms & definitions
Security terms & definitionsSecurity terms & definitions
Security terms & definitions
 
Excel & database terms & definitions
Excel & database terms & definitionsExcel & database terms & definitions
Excel & database terms & definitions
 
Basic terms & definitions
Basic terms & definitionsBasic terms & definitions
Basic terms & definitions
 
5 steps
5 steps5 steps
5 steps
 
Removing virus tri fold - white
Removing virus tri fold - whiteRemoving virus tri fold - white
Removing virus tri fold - white
 
Cyc flyer chn with ob logo
Cyc flyer   chn with ob logoCyc flyer   chn with ob logo
Cyc flyer chn with ob logo
 
Wordpress module 1 a
Wordpress module 1 aWordpress module 1 a
Wordpress module 1 a
 
9 word press 2c
9   word press 2c9   word press 2c
9 word press 2c
 
8 word press 2b
8   word press 2b8   word press 2b
8 word press 2b
 
7 word press 2a
7   word press 2a7   word press 2a
7 word press 2a
 
6 word press module 1f
6   word press module 1f6   word press module 1f
6 word press module 1f
 
4 word press module 1d
4   word press module 1d4   word press module 1d
4 word press module 1d
 
3 word press module 1c
3   word press module 1c3   word press module 1c
3 word press module 1c
 
2 word press module 1b
2   word press module 1b2   word press module 1b
2 word press module 1b
 
1 wordpress module 1 a
1   wordpress module 1 a1   wordpress module 1 a
1 wordpress module 1 a
 
On line banking cur
On line banking curOn line banking cur
On line banking cur
 
Module online investments
Module   online investmentsModule   online investments
Module online investments
 
Cyc elective online banking
Cyc elective online bankingCyc elective online banking
Cyc elective online banking
 
Web design 101
Web design 101Web design 101
Web design 101
 

Dernier

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Dernier (20)

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

10 online privacy module samedit1

Notes de l'éditeur

  1. This module is intended to help class participants be more aware of how to protect themselves online while still enjoying and making full use of the Internet.
  2. Backups, archives, data/content pushing all result in the ambiguity of deleting digital content. Digital content is easily forwarded and reposted. Sometimes this is a good thing and sometimes it is not. Regardless of how we view this phenomena, it is a reality. Private information is no longer, by default, private. If you want information to be private, you must take steps to make it so. For example, avoiding mentioning your address or even your neighborhood on social networks is a conscious act. Know who has direct access to your posts in your social networks and recognize that others may have indirect access. Heard any stories about someone making a mistake online resulting in negative impact offline?
  3. Backups, archives, data/content pushing all result in the ambiguity of deleting digital content. Digital content is easily forwarded and reposted. Sometimes this is a good thing and sometimes it is not. Regardless of how we view this phenomena, it is a reality. Private information is no longer, by default, private. If you want information to be private, you must take steps to make it so. For example, avoiding mentioning your address or even your neighborhood on social networks is a conscious act. Know who has direct access to your posts in your social networks and recognize that others may have indirect access. Heard any stories about someone making a mistake online resulting in negative impact offline?
  4. Backups, archives, data/content pushing all result in the ambiguity of deleting digital content. Digital content is easily forwarded and reposted. Sometimes this is a good thing and sometimes it is not. Regardless of how we view this phenomena, it is a reality. Private information is no longer, by default, private. If you want information to be private, you must take steps to make it so. For example, avoiding mentioning your address or even your neighborhood on social networks is a conscious act. Know who has direct access to your posts in your social networks and recognize that others may have indirect access. Heard any stories about someone making a mistake online resulting in negative impact offline?
  5. Backups, archives, data/content pushing all result in the ambiguity of deleting digital content. Digital content is easily forwarded and reposted. Sometimes this is a good thing and sometimes it is not. Regardless of how we view this phenomena, it is a reality. Private information is no longer, by default, private. If you want information to be private, you must take steps to make it so. For example, avoiding mentioning your address or even your neighborhood on social networks is a conscious act. Know who has direct access to your posts in your social networks and recognize that others may have indirect access. Heard any stories about someone making a mistake online resulting in negative impact offline?
  6. Backups, archives, data/content pushing all result in the ambiguity of deleting digital content. Digital content is easily forwarded and reposted. Sometimes this is a good thing and sometimes it is not. Regardless of how we view this phenomena, it is a reality. Private information is no longer, by default, private. If you want information to be private, you must take steps to make it so. For example, avoiding mentioning your address or even your neighborhood on social networks is a conscious act. Know who has direct access to your posts in your social networks and recognize that others may have indirect access. Heard any stories about someone making a mistake online resulting in negative impact offline?
  7. Backups, archives, data/content pushing all result in the ambiguity of deleting digital content. Digital content is easily forwarded and reposted. Sometimes this is a good thing and sometimes it is not. Regardless of how we view this phenomena, it is a reality. Private information is no longer, by default, private. If you want information to be private, you must take steps to make it so. For example, avoiding mentioning your address or even your neighborhood on social networks is a conscious act. Know who has direct access to your posts in your social networks and recognize that others may have indirect access. Heard any stories about someone making a mistake online resulting in negative impact offline?
  8. Backups, archives, data/content pushing all result in the ambiguity of deleting digital content. Digital content is easily forwarded and reposted. Sometimes this is a good thing and sometimes it is not. Regardless of how we view this phenomena, it is a reality. Private information is no longer, by default, private. If you want information to be private, you must take steps to make it so. For example, avoiding mentioning your address or even your neighborhood on social networks is a conscious act. Know who has direct access to your posts in your social networks and recognize that others may have indirect access. Heard any stories about someone making a mistake online resulting in negative impact offline?
  9. Backups, archives, data/content pushing all result in the ambiguity of deleting digital content. Digital content is easily forwarded and reposted. Sometimes this is a good thing and sometimes it is not. Regardless of how we view this phenomena, it is a reality. Private information is no longer, by default, private. If you want information to be private, you must take steps to make it so. For example, avoiding mentioning your address or even your neighborhood on social networks is a conscious act. Know who has direct access to your posts in your social networks and recognize that others may have indirect access. Heard any stories about someone making a mistake online resulting in negative impact offline?
  10. Who uses Facebook? Who uses MySpace? Have you adjusted your privacy settings? Default privacy setting on most social networks – everything is public! Instructor – if majority of students have an account on a social network, have them log in and adjust the privacy settings during class. Review the privacy setting pages of Facebook and MySpace prior to class because they often change.
  11. Who uses Facebook? Who uses MySpace? Have you adjusted your privacy settings? Default privacy setting on most social networks – everything is public! Instructor – if majority of students have an account on a social network, have them log in and adjust the privacy settings during class. Review the privacy setting pages of Facebook and MySpace prior to class because they often change.
  12. Who uses Facebook? Who uses MySpace? Have you adjusted your privacy settings? Default privacy setting on most social networks – everything is public! Instructor – if majority of students have an account on a social network, have them log in and adjust the privacy settings during class. Review the privacy setting pages of Facebook and MySpace prior to class because they often change.
  13. Who uses Facebook? Who uses MySpace? Have you adjusted your privacy settings? Default privacy setting on most social networks – everything is public! Instructor – if majority of students have an account on a social network, have them log in and adjust the privacy settings during class. Review the privacy setting pages of Facebook and MySpace prior to class because they often change.
  14. Social Engineering Tactics - Someone claiming to be doing research or survey for your bank, a new employee at a company you use, or a repair person that NEEDS your help. They may seem to ask round about or harmless questions that they then use against you. Verify they really are who they say they are before answering questions.
  15. Phishing, and spyware attacks are occurring often on social networking sites, especially Facebook. Anyone received a message via email or a social network that was not sent by the person it appeared to have been sent by? Most likely Michelle has no idea this message went out in her name. What is the top level domain in this message? Do a search of .in domain. What do you find? It’s the country domain for India.
  16. Why not trust this email? No such thing as free cash. Most likely they will ask for your bank account and password in order to supposedly deposit your check.
  17. Who uses Facebook? Who uses MySpace? Have you adjusted your privacy settings? Default privacy setting on most social networks – everything is public! Instructor – if majority of students have an account on a social network, have them log in and adjust the privacy settings during class. Review the privacy setting pages of Facebook and MySpace prior to class because they often change.
  18. You learned about URLs in How to Use a Browser. What is a URL? Uniform Resource Identifier. More commonly called a web address. Most popular top level domains? .com, .org, .net
  19. You learned about URLs in How to Use a Browser. What is a URL? Uniform Resource Identifier. More commonly called a web address. Most popular top level domains? .com, .org, .net
  20. Use a combination of letters (capital and lower case), numbers and symbols if allowed. Example are: EmilyP05 – Emily Pietilia was my great grandmother and she was born in 1905 – However, don’t do this with a spouse or child that relationship is too close and too obvious. Or use a mnemonic i.e. – mbsfe530 – my brother sells fire extinguishers and his birthday. Don’t use names or words in a dictionary, names, addresses, or birthdates. Or use a full sentence - ilovecats If you must write them down, don’t keep it in a file labeled passwords or on your calendar.
  21. If you are using public computers be alert to who is around you, if your password is too easy or too hard so you type it very slowly, it could be possible to watch what you type & learn your password. Why is your email account an important account? Because with access to your email account, someone could get access to your other accounts. Instructor – provide suggestions on how to create and keep track of passwords. Examples – use one string of letters and number but add a code to each one per application – such as having 135fox as a password and adding fb for Facebook to the beginning or end of 135fox, resulting in fb135fox. Your internet provider can access your account without your password – they would never contact you and ask for it. However, if you call them about a problem, they may ask for it so they can try and duplicate the problem you are having. If the incorrect password allows you to log into a site then you are on a spoofed site and not the company’s legitimate site. Most important – if you suspect someone is using your accounts, change the password and contact the company it is with immediately!
  22. Who has shopped online? What did you purchase? You initiate with a known and trusted company. Don’t use sites from unsolicited websites or pop up ads. www.hoogle.com vs. www.google.com
  23. MOST Credit cards have a maximum liability of $50.00 in the event of fraud, debit cards may have a higher or no limit check with your bank for information about the cards you have or read that little tiny print! One card lets you easily review online purchases and request a card with a lower limit Online transactions are said to be safer since there is no human interaction – you are not giving your card to a person.
  24. Anyone been a victim of identity theft?
  25. In addition to keeping your software up-to-date, keeping your anti-virus software up-to-date and doing weekly scans, and have a firewall you should: Laptops - Use a strong password, require a password log in and log off when you are finished using, that will at least make it difficult for a thief to access (not impossible) Wipe Utility or File Shredder - Files that have been deleted or moved to the trash or recycle bin can still be recovered using a recovery program. A wipe utility actually writes over old files on your hard drive so they can no longer be recovered. Privacy policies - should explain how they secure their site and what they do with the information they collect (do they share/sell it). If they sell information to others or there is no policy go somewhere else. Free Credit Reports – Reports can be requested annually online free but be very careful where you request it from. Use the Federal Trade Commission website. Do not go to a search engine!
  26. In addition to keeping your software up-to-date, keeping your anti-virus software up-to-date and doing weekly scans, and have a firewall you should: Laptops - Use a strong password, require a password log in and log off when you are finished using, that will at least make it difficult for a thief to access (not impossible) Wipe Utility or File Shredder - Files that have been deleted or moved to the trash or recycle bin can still be recovered using a recovery program. A wipe utility actually writes over old files on your hard drive so they can no longer be recovered. Privacy policies - should explain how they secure their site and what they do with the information they collect (do they share/sell it). If they sell information to others or there is no policy go somewhere else. Free Credit Reports – Reports can be requested annually online free but be very careful where you request it from. Use the Federal Trade Commission website. Do not go to a search engine! the ONLY authorized source for the free annual credit report that's yours by law. The Fair Credit Reporting Act guarantees you access to your credit report for free from each of the three nationwide credit reporting companies — Experian, Equifax, and TransUnion — every 12 months. The Federal Trade Commission has received complaints from consumers who thought they were ordering their free annual credit report, and yet couldn't get it without paying fees or buying other services. TV ads, email offers, or online search results may tout "free" credit reports, but there is only one authorized source for a truly free credit report.
  27. In addition to keeping your software up-to-date, keeping your anti-virus software up-to-date and doing weekly scans, and have a firewall you should: Laptops - Use a strong password, require a password log in and log off when you are finished using, that will at least make it difficult for a thief to access (not impossible) Wipe Utility or File Shredder - Files that have been deleted or moved to the trash or recycle bin can still be recovered using a recovery program. A wipe utility actually writes over old files on your hard drive so they can no longer be recovered. Privacy policies - should explain how they secure their site and what they do with the information they collect (do they share/sell it). If they sell information to others or there is no policy go somewhere else. Free Credit Reports – Reports can be requested annually online free but be very careful where you request it from. Use the Federal Trade Commission website. Do not go to a search engine! the ONLY authorized source for the free annual credit report that's yours by law. The Fair Credit Reporting Act guarantees you access to your credit report for free from each of the three nationwide credit reporting companies — Experian, Equifax, and TransUnion — every 12 months. The Federal Trade Commission has received complaints from consumers who thought they were ordering their free annual credit report, and yet couldn't get it without paying fees or buying other services. TV ads, email offers, or online search results may tout "free" credit reports, but there is only one authorized source for a truly free credit report.