SlideShare une entreprise Scribd logo
1  sur  19
The Importance of Protecting Yourself
Online and How to Do It!
By Marvin Williams
 There are many things you can do online from
entertaining yourself all the way up to
completing business transactions.
 While the internet allows many people to do
a lot from one location. We must understand
the importance of protecting our information
online to keep life running as smoothly as
possible.
 Privacy is mainly defined as a human value
consisting of 4 rights: solitude, anonymity,
intimacy and reserve (Stamatellos 2007 pg.26)
 SSN
 Bank account Numbers
 Credit Card Numbers
 Personal Health Information
These are all examples of personal data worth
protecting!
 The biggest issue involved with
not protecting your personal
data is Identity Theft.
 This is where unauthorized individuals use
another person’s name to receive credit
cards, driver’s licenses and various other items
in their victim’s name (Buetens 2002 )
 They can also sell this information on the
stolen identity black market to the highest
bidder!
“I have personally felt the sting of identity theft. It was a
few years ago. I believe I had done a sales transaction on
an unsecure website. A few days later, I logged into my
bank account to find various charges from various online
stores. I was devastated, and I had to go through a long
stressful process to stop it. I couldn’t use my bank account
for weeks. This was especially rough since all my money
was in one location. Identity theft can be heart wrenching,
and we should do everything we can to prevent it from
happening to ourselves.”
 There can be some serious implications to
not protecting your persona data online but
there is no reason to live in fear
 Use the Following steps to protect yourself
online and in the virtual universe:
 Make sure your passwords are at least eight
characters in length (Kissell 2009)
 You can actually get the best protection from a
password that is at least 11 characters in length
 Mix & Match -People often like to use names,
places, dates and other familiar things
associated with them. This can be too easy to
guess, but you can make your password
stronger by combining 2 into one. For instance,
you can could use your dog’s name and the
date you graduated together for a super strong
password (Kissell 2009)
 There are many social websites
(Facebook,Twitter,Pinterest) that allow you to
create public profiles and add personal
information like your date of birth.
 Be fully aware of what you display to the world.
Identity thieves can take little bits of personal
information displayed here to eventually
access greater personal information later.
 I often receive many emails telling me that I
have a package or I need to check my bank
account .Then will ask me to click a link in the
email.
 Never do this! It is often best to go directly to
the website by typing in the web address, if
you are familiar with the website such as your
bank and log in there.
 Make sure you are in a secure section of the
website
 The “http://” should change to a “https://”
 The extra “s” stands for secure
 In addition, a lock or key should be represented
on the lower corner of the webpage (Buetens
2002)
These simple tips will help
protect your personal data
and privacy online.
The internet can be wonderful place
for information, growth, and
socialization. You just need to take the
proper steps to protect yourself along
the way.
Happy Surfing!
 Was the content relevant and easily
understood?
 Was the presentation appropriate to your level?
 Would you be able or willing to apply the
preventative approach suggested in the
presentation?
 What improvements would you suggest be
made to the presentation?
Stamatellos, G. (2007) Computer Ethics: A Global Perspective. United
States: Jones and Bartlett Publishers
Kissell, J. (2009). Top Password Tips. Macworld, 26(9), 64-68.
Buetens, B. (2002). Identity Theft: How It
Can Destroy Your Life and How to Guard Against It. Biography, 6(9),
58.

Contenu connexe

Tendances

Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for studentsKandarp Shah
 
what is data security full ppt
what is data security full pptwhat is data security full ppt
what is data security full pptShahbaz Khan
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy IntroductionG Prachi
 
Cyber threats
Cyber threatsCyber threats
Cyber threatskelsports
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptxkishore golla
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data SecurityWilmerHale
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacyrealpeterz
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0DallasHaselhorst
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingDepartment of Defense
 
World Wide Web and Internet
World Wide Web and InternetWorld Wide Web and Internet
World Wide Web and InternetJanecatalla
 
Introduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityIntroduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityJisc Scotland
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information PrivacyPerry Slack
 

Tendances (20)

Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
Professional Ethics of IT
Professional Ethics of ITProfessional Ethics of IT
Professional Ethics of IT
 
Privacy in simple
Privacy in simplePrivacy in simple
Privacy in simple
 
what is data security full ppt
what is data security full pptwhat is data security full ppt
what is data security full ppt
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
 
Data Privacy & Security
Data Privacy & SecurityData Privacy & Security
Data Privacy & Security
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
Cyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptxCyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptx
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
 
World Wide Web and Internet
World Wide Web and InternetWorld Wide Web and Internet
World Wide Web and Internet
 
Introduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityIntroduction to Data Protection and Information Security
Introduction to Data Protection and Information Security
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 

En vedette

Data protection ppt
Data protection pptData protection ppt
Data protection pptgrahamwell
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - EnglishData Security
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationHajarul Cikyen
 
Transparents Formation SMS, Séminaire de Médiation Scientifique janvier 2012
Transparents Formation SMS, Séminaire de Médiation Scientifique janvier 2012Transparents Formation SMS, Séminaire de Médiation Scientifique janvier 2012
Transparents Formation SMS, Séminaire de Médiation Scientifique janvier 2012Fabien Gandon
 
Data protection and security on the web, ESWC2014 Panel
Data protection and security on the web, ESWC2014 PanelData protection and security on the web, ESWC2014 Panel
Data protection and security on the web, ESWC2014 PanelFabien Gandon
 
Data security and Integrity
Data security and IntegrityData security and Integrity
Data security and IntegrityZaid Shabbir
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Showrobinlgray
 
Cyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav GaurCyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav GaurVaibhav's Group
 
Introduction to service innovation
Introduction to service innovationIntroduction to service innovation
Introduction to service innovationmobilestudy
 
Service Innovation - an overview
Service Innovation - an overviewService Innovation - an overview
Service Innovation - an overviewIan Miles
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft PresentationRandall Chesnutt
 

En vedette (13)

Data protection ppt
Data protection pptData protection ppt
Data protection ppt
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - English
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
Transparents Formation SMS, Séminaire de Médiation Scientifique janvier 2012
Transparents Formation SMS, Séminaire de Médiation Scientifique janvier 2012Transparents Formation SMS, Séminaire de Médiation Scientifique janvier 2012
Transparents Formation SMS, Séminaire de Médiation Scientifique janvier 2012
 
Data protection and security on the web, ESWC2014 Panel
Data protection and security on the web, ESWC2014 PanelData protection and security on the web, ESWC2014 Panel
Data protection and security on the web, ESWC2014 Panel
 
Data security and Integrity
Data security and IntegrityData security and Integrity
Data security and Integrity
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Show
 
Software Security
Software SecuritySoftware Security
Software Security
 
Cyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav GaurCyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav Gaur
 
Introduction to service innovation
Introduction to service innovationIntroduction to service innovation
Introduction to service innovation
 
Service Innovation - an overview
Service Innovation - an overviewService Innovation - an overview
Service Innovation - an overview
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
System security
System securitySystem security
System security
 

Similaire à Data Privacy and Protection Presentation

Internet Safety.pptx
Internet Safety.pptxInternet Safety.pptx
Internet Safety.pptxAljunMisa
 
Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...
Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...
Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...John Bambenek
 
10.a guide-to-facebook-security
10.a guide-to-facebook-security10.a guide-to-facebook-security
10.a guide-to-facebook-securityrobert mota
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationJamie Proctor-Brassard
 
Internet safety 2010
Internet safety 2010Internet safety 2010
Internet safety 2010Nancy Gross
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook securityErnest Staats
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Homejaysonstreet
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptxAchu69
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology- Mark - Fullbright
 
IST Presentation
IST PresentationIST Presentation
IST Presentationguest1d1ed5
 
Student book key unit3
Student book key unit3Student book key unit3
Student book key unit3jesusmlaz
 
5 a module online privacy
5 a module online privacy5 a module online privacy
5 a module online privacyRozell Sneede
 
10 tips to prevent phishing attacks
10 tips to prevent phishing attacks10 tips to prevent phishing attacks
10 tips to prevent phishing attacksNamik Heydarov
 
Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notesLinda Barron
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is DangerousGihan Dias
 
Cybersecurity for the non-technical
Cybersecurity for the non-technicalCybersecurity for the non-technical
Cybersecurity for the non-technicalStephen Cobb
 
online safety, security and netiquette.pdf
online safety, security and netiquette.pdfonline safety, security and netiquette.pdf
online safety, security and netiquette.pdfjessa451416
 

Similaire à Data Privacy and Protection Presentation (20)

Internet Safety.pptx
Internet Safety.pptxInternet Safety.pptx
Internet Safety.pptx
 
Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...
Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...
Introduction to Computer Crime - John Bambenek talk to Champaign Seniors Poli...
 
10.a guide-to-facebook-security
10.a guide-to-facebook-security10.a guide-to-facebook-security
10.a guide-to-facebook-security
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
Internet safety 2010
Internet safety 2010Internet safety 2010
Internet safety 2010
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook security
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook security
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Home
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Wk4 project
Wk4 projectWk4 project
Wk4 project
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
 
IST Presentation
IST PresentationIST Presentation
IST Presentation
 
Student book key unit3
Student book key unit3Student book key unit3
Student book key unit3
 
5 a module online privacy
5 a module online privacy5 a module online privacy
5 a module online privacy
 
10 tips to prevent phishing attacks
10 tips to prevent phishing attacks10 tips to prevent phishing attacks
10 tips to prevent phishing attacks
 
Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notes
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
 
Cybersecurity for the non-technical
Cybersecurity for the non-technicalCybersecurity for the non-technical
Cybersecurity for the non-technical
 
online safety, security and netiquette.pdf
online safety, security and netiquette.pdfonline safety, security and netiquette.pdf
online safety, security and netiquette.pdf
 

Data Privacy and Protection Presentation

  • 1. The Importance of Protecting Yourself Online and How to Do It! By Marvin Williams
  • 2.  There are many things you can do online from entertaining yourself all the way up to completing business transactions.
  • 3.  While the internet allows many people to do a lot from one location. We must understand the importance of protecting our information online to keep life running as smoothly as possible.
  • 4.  Privacy is mainly defined as a human value consisting of 4 rights: solitude, anonymity, intimacy and reserve (Stamatellos 2007 pg.26)
  • 5.  SSN  Bank account Numbers  Credit Card Numbers  Personal Health Information These are all examples of personal data worth protecting!
  • 6.  The biggest issue involved with not protecting your personal data is Identity Theft.
  • 7.  This is where unauthorized individuals use another person’s name to receive credit cards, driver’s licenses and various other items in their victim’s name (Buetens 2002 )  They can also sell this information on the stolen identity black market to the highest bidder!
  • 8. “I have personally felt the sting of identity theft. It was a few years ago. I believe I had done a sales transaction on an unsecure website. A few days later, I logged into my bank account to find various charges from various online stores. I was devastated, and I had to go through a long stressful process to stop it. I couldn’t use my bank account for weeks. This was especially rough since all my money was in one location. Identity theft can be heart wrenching, and we should do everything we can to prevent it from happening to ourselves.”
  • 9.
  • 10.  There can be some serious implications to not protecting your persona data online but there is no reason to live in fear  Use the Following steps to protect yourself online and in the virtual universe:
  • 11.  Make sure your passwords are at least eight characters in length (Kissell 2009)  You can actually get the best protection from a password that is at least 11 characters in length
  • 12.  Mix & Match -People often like to use names, places, dates and other familiar things associated with them. This can be too easy to guess, but you can make your password stronger by combining 2 into one. For instance, you can could use your dog’s name and the date you graduated together for a super strong password (Kissell 2009)
  • 13.  There are many social websites (Facebook,Twitter,Pinterest) that allow you to create public profiles and add personal information like your date of birth.  Be fully aware of what you display to the world. Identity thieves can take little bits of personal information displayed here to eventually access greater personal information later.
  • 14.  I often receive many emails telling me that I have a package or I need to check my bank account .Then will ask me to click a link in the email.  Never do this! It is often best to go directly to the website by typing in the web address, if you are familiar with the website such as your bank and log in there.
  • 15.  Make sure you are in a secure section of the website  The “http://” should change to a “https://”  The extra “s” stands for secure  In addition, a lock or key should be represented on the lower corner of the webpage (Buetens 2002)
  • 16. These simple tips will help protect your personal data and privacy online.
  • 17. The internet can be wonderful place for information, growth, and socialization. You just need to take the proper steps to protect yourself along the way. Happy Surfing!
  • 18.  Was the content relevant and easily understood?  Was the presentation appropriate to your level?  Would you be able or willing to apply the preventative approach suggested in the presentation?  What improvements would you suggest be made to the presentation?
  • 19. Stamatellos, G. (2007) Computer Ethics: A Global Perspective. United States: Jones and Bartlett Publishers Kissell, J. (2009). Top Password Tips. Macworld, 26(9), 64-68. Buetens, B. (2002). Identity Theft: How It Can Destroy Your Life and How to Guard Against It. Biography, 6(9), 58.