SlideShare une entreprise Scribd logo
1  sur  53
Building Trust in the Digital Age
Rayane Hazimeh
Security Consultant
• Lebanese
• Computer and Communication Engineering
and MBA degrees
• Security Consultant at Symantec
• Certifications: CCNA, CCNP, CCDP, CCSK,
VTSP, VSP, and other stuff
• Activist in several initiatives to promote
Technology
• Hobbies: dancing, outdoor activities
• My Motto: Live, Laugh and Love
My ASL (a Little bit about me)
Internet did not exist 20 years ago!
First Website Ever Made: CERN
When the Internet began (early 90’s)
• Information was centralized or had little user created content
• Browsers like Mosaic made internet “visual”
• Big companies made websites, sometimes too graphic heavy, lots of design
• Most of world was on dial-up, slow connections
Internet Matured in early 2000’s
• Broadband became widely available
• Websites sprang up for everyone
• Today, internet moving to mobile devices and app based
Today’s Digital Native (born in 1990’s or later)
• You have never stood to change a TV channel
• Internet has always existed
• You don’t go “online”; you are always connected
• Your definition of privacy is different from your parents
• You expect devices to just turn on, connect and work
• You are more collaborative, get help from networks, not just a web search or
in a book
What Your Parents Worry About
• Online Strangers
• Cyber bullying
• Internet Addictions
• Reputation problems
• Inappropriate or violent content
What You Worry About (Maybe)
• Online “drama”
• Will my friends embarrass me?
• Will my secret stuff get out?
• Who are my real friends?
• Will I be judged by my:
•Facebook
•Twitter
•YouTube stuff
What we all should worry about
Create a Positive Digital Footprint
Protect Our Privacy
Protect Our Money
Protect Ourselves from Bullies
Protect Ourselves from Predators
Protect Ourselves from Ourselves
What we all should worry about
Create a Positive Digital Footprint
Protect Our Privacy
Protect Our Money
Protect Ourselves from Bullies
Protect Ourselves from Predators
Protect Ourselves from Ourselves
Our digital footprint
is the evidence of our
online activities.
You want to
leave positive
digital footprints
In the future, your "digital footprint" will carry far more weight
than anything you might include on a resume.
Chris Betcher
What we all should worry about
Create a Positive Digital Footprint
Protect Our Privacy
Protect Ourselves from Identity Theft
Protect Ourselves from Bullies
Protect Ourselves from Predators
Protect Ourselves from Yourself
A HELPFUL VENN DIAGRAM
THE INTERNET YOUR PRIVACY
Who’s peeking?
• Friendsfamily
• Friends of friendsfamily
• Parents
• Employers and co-workers
– Dec 2009 study commissioned by Microsoft
said 79% of recruiters & hiring mgrs
researched applicants online
– CareerBuilder.com study – 45% of employers
use social networks to screen job candidates
Everyone is!
• Customers
• Universities
• Marketing companiesvendors
• Criminalshackers
• Government agencies (IRS, SRS!)
Do not inadvertently reveal personal information online
Protect Our Privacy
1
Be conscious of Web Security3
Be conscious of security on shared computers4
Be wary of unsecured WIFI5
Do not reply to Spammers, EVER2
Do not inadvertently reveal personal information online
Protect Our Privacy
1
Be conscious of Web Security3
Be conscious of security on shared computers4
Be wary of unsecured WIFI5
Do not reply to Spammers, EVER2
One message before Social Media…
One message after Social Media…
The message is
distributed
across
Social Media
channels…
Safe Social Networking – 5 tips
Tip #1: Remember that
even people you know can
be identity thieves Tip #5: Limit the amount of
personal information available
on your social networking
profile. (don’t publicize your
unlisted phone number!)
Tip #2: Learn how to
change your privacy
settings
Tip #3: Only accept friend
requests from people you
know
Tip #4: Limit the amount
of "time and place" data
that you expose through
social networking
Do not inadvertently reveal personal information online
Protect Our Privacy
1
Be conscious of Web Security3
Be conscious of security on shared computers4
Be wary of unsecured WIFI5
Do not reply to Spammers, EVER2
What is Spam?
• Unwanted emails
• Up to 80% of world’s email is spam
• Some is dangerous:
− links to websites with malware
− attachments that have
− viruses in them
− Phishing emails:
offers that are dangerous
or fake
The “Golden Rules” for email safety
Rule #1: If you don’t
immediately recognize the
sender, don’t open it, just
delete it
Rule #2: Never send
personal information
via email > call them
Rule #3: Never click on
a link from an email
unless is from a friend
and it sounds like is
from them
Email Scams
Chain Letters
• They instruct to “forward to 10 other people” or “everyone you
know”
• Sometimes sounds well-meaning: “raise awareness to a good
cause”, “bring luck”, etc.
• Often their purpose is to spread a dangerous virus!
 Delete them, Don’t click on any link, If sent by a friend, ask them not to forward them to you
because of the risks involved
‘Get Rich Quick’ Themes
• Promise earning money for selling items for them
• Become a ‘professional shopper’
• Process an inheritance or other payment for people other of the country
 Don’t click on links; delete
Financial Institution Asking for Personal Information
• Your bank, insurance, broker etc. asking to verify your password, social security number, etc.
• Usually with an excuse: ‘need to verify …”, ‘need to update every year …”, “we have detected
potential fraud …”, etc.
• They will look EXACTLY as the institution you do business with
Don’t reply; don’t click on links; Call them; Legitimate companies will NEVER ask for personal
information via email; they will call you or send you a letter
11
22
33
Self-defense against Internet and email scams
• Instead of clicking a suspicious link from an email,
type the web address yourself when you want to
visit the site.
– This is especially important for bank, credit card, and IRS websites.
Do not inadvertently reveal personal information online
Protect Our Privacy
1
Be conscious of Web Security3
Be conscious of security on shared computers4
Be wary of unsecured WIFI5
Do not reply to Spammers, EVER2
Passwords
DO’s
• Unique, complex, try a code that can be customized
• Not a dictionary word or name
• Not a phrase
• Nothing a good friend might guess (like an address, pet’s name,
birthday, nickname)
• Use a different password for each site
• Most important passwords are for email and social network
DON’Ts
• DON’T store your password list on your computer in a file called
“passwords.”
• DON’T keep your passwords with your account information.
• DON’T tell your password to other people Not with a sibling, BFF, or from
one website to another. You can tell your parent.
• DON’T let other people watch you enter your passwords.
• DON’T stay logged in on a public computer
http://
https://
Encryption
Virus, Spyware, Adware and Malware
is a program capable of
continually replicating
with little or no user
intervention.
is malicious computer
program that does exactly
what its name implies-i.e.,
spies on you.
is any software that, once installed
on your computer, tracks your
internet browsing habits and sends
you popups containing
advertisements related to the sites
and topics you've visited.
is short for malicious software. Malware is
a broad term that encompasses computer
viruses, worms, Trojan horses, spyware,
adware, and others.
A Virus
A
Spyware
A
Malware
An
Adware
Dangerous downloads
Clicking on ads, links
Visiting infected websites
Buying into “security” alerts
& scare tactics by
unknown companies
Peer-to-peer file sharing
networks
Through “holes” left by web
browser vulnerabilities
Virus, Spyware, Adware and Malware
How do Computers get infected?
• Computer runs slowly or trouble starting
• Programs might not start, esp. security software
• Flickering hard drive light
• Strange programs listed in task manager
• OFTEN YOU CAN’T EVEN TELL!!!
• Best bet: run security software at all times, regularly scan the
computer and let your parents know if something weird
happens when you are online. i.e Symantec Endpoint Protection
or Norton Internet Security
Virus, Spyware, Adware and Malware
How to spot them?
Do not inadvertently reveal personal information online
Protect Our Privacy
1
Be conscious of Web Security3
Be conscious of security on shared computers4
Be wary of unsecured WIFI5
Do not reply to Spammers, EVER2
Log out or sign out every time you leave the computer.
Be aware of
“shoulder
surfers” who
might try to
peek at your
passwords
Create
“strong”
passwords
that are hard
for others to
guess
Do not share
account
information
or passwords
with others Log out or
sign out
every time
you leave
the
computer
SecuritySecurity ONON SharedShared ComputersComputers
Do not inadvertently reveal personal information online
Protect Your Privacy
1
Be conscious of Web Security3
Be conscious of security on shared computers4
Be wary of unsecured WIFI5
Do not reply to Spammers, EVER2
What we all should worry about
Create a Positive Digital Footprint
Protect Our Privacy
Protect Our Money
Protect Ourselves from Bullies
Protect Ourselves from Predators
Protect Ourselves from Ourselves
Online Shopping
• Most retailers have a website and allow you to browse for items and make purchases.
– It is always best to only shop from Retailers you are familiar with.
– Check the reputation e.g. http://norton.safeweb.com
• Choose a secure password
• Print out all receipts or save them on your computer
• Make sure it is the real store website
– Don’t click on links in e-mails
– The website should start with https://www
 It is always best to pay with a Credit Card. Do not ever send cash, check or money
order.
– Check your Credit Card statement frequently
– You do not have to complete surveys after you make a purchase.
Online Banking
• Banks provide online services
– To check account balances, pay bills, make transfers
– Check the reputation at http://norton.safeweb.com
• Always carefully type the bank website
• Never send account details via e-mail
• Ignore e-mails requesting you to reset your password
– If in doubt, phone your bank to confirm
Norton Safeweb – indicates if a website is safe
What we all should worry about
Create a Positive Digital Footprint
Protect Our Privacy
Protect Our Money
Protect Ourselves from Bullies
Protect Ourselves from Predators
Protect Ourselves from Ourselves
• IM/Text harassment
• Stealing passwords
• Blogs
• Web sites
• Sending pictures
through email & cell
phones
• Internet polling
• Interactive gaming
• Malicious code
• Sending porn or junk email
• Impersonation
• Cyberbullying by proxy
What is Cyberbullying?
Tips for Dealing with Cyberbullying
Most kids don’t cyberbully!
•Work together as a community
•If you see cyberbullying, don’t be a silent bystander. Do something!
•Talk to your classmates if they are being teased online, be a friend!
•Involve your parents, teachers and other adults.
•If there’s too much “drama”, turn it off. Get off the computer, mobile
phone and find something else to do.
Talk about it
before
it happens
Don’t reply,
Keep copies
Ask your friends
and parents for help
Bystanders Can
Help!
What we all should worry about
Create a Positive Digital Footprint
Protect Our Privacy
Protect Our Money
Protect Ourselves from Bullies
Protect Ourselves from Predators
Protect Ourselves from Ourselves
Emotionally
vulnerable
Seeking
attention
Seeking
affection
Seeking
validation
Who is the Online Predator?
What we all should worry about
Create a Positive Digital Footprint
Protect Our Privacy
Protect Our Money
Protect Ourselves from Bullies
Protect Ourselves from Predators
Protect Ourselves from Ourselves
Embrace technology
Remain alert
Keep a low profile
Trust your instincts
Control your information
BE
Interested in Technology?
Technovation Challenge:
http://iridescentlearning.org/programs/technovation-challenge/
Techgirl
http://exchanges.state.gov/non-us/program/techgirls
Copyright © 2013 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in
the U.S. and other countries. Other names may be trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied,
are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
Want a copy of this presentation?
Join Norton Zone www.nortonzone.com and drop me an
email!Rayane_hazimeh@symantec.com

Contenu connexe

Tendances

Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety SlideshareLawrence Fine
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipstephensc
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipstephensc
 
Online Security & Privacy: Updated
Online Security & Privacy: UpdatedOnline Security & Privacy: Updated
Online Security & Privacy: UpdatedAmanda L. Goodman
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipstephensc
 
The Hacker's Guide to NOT Getting Hacked
The Hacker's Guide to NOT Getting HackedThe Hacker's Guide to NOT Getting Hacked
The Hacker's Guide to NOT Getting HackedJakub Kałużny
 
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyCyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyMariam Sb
 
Microsoft (Projects)
Microsoft (Projects)Microsoft (Projects)
Microsoft (Projects)Vinayak Hegde
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threatsmkinzie
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentationCandice Wimbles
 
[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young Students[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young StudentsShubham Gupta
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersStephen Thomas, CISSP
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint bgmartinez1971
 

Tendances (19)

Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Online Security & Privacy: Updated
Online Security & Privacy: UpdatedOnline Security & Privacy: Updated
Online Security & Privacy: Updated
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
The Hacker's Guide to NOT Getting Hacked
The Hacker's Guide to NOT Getting HackedThe Hacker's Guide to NOT Getting Hacked
The Hacker's Guide to NOT Getting Hacked
 
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyCyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
 
Microsoft (Projects)
Microsoft (Projects)Microsoft (Projects)
Microsoft (Projects)
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
Riverview
RiverviewRiverview
Riverview
 
E safety-slide-presentation
E safety-slide-presentationE safety-slide-presentation
E safety-slide-presentation
 
[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young Students[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young Students
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
CYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESHCYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESH
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
Securityguide
SecurityguideSecurityguide
Securityguide
 
Digital wellness and your family internet upload
Digital wellness and your family   internet uploadDigital wellness and your family   internet upload
Digital wellness and your family internet upload
 
Heads up!
Heads up!Heads up!
Heads up!
 

En vedette

Life With Pets
Life With PetsLife With Pets
Life With PetsRen
 
Thomas hofbauer the role of the expert witness in arbitration
Thomas hofbauer   the role of the expert witness in arbitrationThomas hofbauer   the role of the expert witness in arbitration
Thomas hofbauer the role of the expert witness in arbitrationThomas Hofbauer
 
Medications and Lactation: Principles for Safe Practice for the Clinician – E...
Medications and Lactation: Principles for Safe Practice for the Clinician – E...Medications and Lactation: Principles for Safe Practice for the Clinician – E...
Medications and Lactation: Principles for Safe Practice for the Clinician – E...ErikaAGoyer
 
Evangelizing Agile in Large Organizations
Evangelizing Agile in Large OrganizationsEvangelizing Agile in Large Organizations
Evangelizing Agile in Large OrganizationsFakhruddin Bandukwala
 
Yuvee press release 2005.2 yuvee announces doodling software functionality
Yuvee press release 2005.2 yuvee announces doodling software functionalityYuvee press release 2005.2 yuvee announces doodling software functionality
Yuvee press release 2005.2 yuvee announces doodling software functionalitywww.webhub.mobi by Yuvee, Inc.
 
Narrative And Wordplay Celebration
Narrative And Wordplay CelebrationNarrative And Wordplay Celebration
Narrative And Wordplay Celebrationghbrown
 
Inside the Halifax Case: An Interview with the Government’s Expert Witness
Inside the Halifax Case: An Interview with the Government’s Expert WitnessInside the Halifax Case: An Interview with the Government’s Expert Witness
Inside the Halifax Case: An Interview with the Government’s Expert WitnessCBIZ, Inc.
 
Building and Evangelizing Holistic Experience Design - DMI Seattle 2011
Building and Evangelizing Holistic Experience Design - DMI Seattle 2011Building and Evangelizing Holistic Experience Design - DMI Seattle 2011
Building and Evangelizing Holistic Experience Design - DMI Seattle 2011Samantha Starmer
 
Sugarcon 2013: Left Brain Meet Right Brain: Customer Experience, Business Ben...
Sugarcon 2013: Left Brain Meet Right Brain: Customer Experience, Business Ben...Sugarcon 2013: Left Brain Meet Right Brain: Customer Experience, Business Ben...
Sugarcon 2013: Left Brain Meet Right Brain: Customer Experience, Business Ben...SugarCRM
 
Constructive feedback to create suceess
Constructive feedback to create suceessConstructive feedback to create suceess
Constructive feedback to create suceessThomas Müller
 
Beer & Banter- New Media
Beer & Banter- New MediaBeer & Banter- New Media
Beer & Banter- New Medialoughjef
 
09. What's Involved in Evangelizing Notes
09. What's Involved in Evangelizing Notes09. What's Involved in Evangelizing Notes
09. What's Involved in Evangelizing NotesWilliam Anderson
 
Culture Slides Breaking The Chains Of Culture Building Trust In Individua...
Culture Slides   Breaking The Chains Of Culture   Building Trust In Individua...Culture Slides   Breaking The Chains Of Culture   Building Trust In Individua...
Culture Slides Breaking The Chains Of Culture Building Trust In Individua...guesta4eeb5
 
Expert Witness Testimony 2
Expert Witness Testimony 2Expert Witness Testimony 2
Expert Witness Testimony 2warren142
 
Reframing Languages
Reframing LanguagesReframing Languages
Reframing Languagesmarkreid1895
 

En vedette (16)

Life With Pets
Life With PetsLife With Pets
Life With Pets
 
Thomas hofbauer the role of the expert witness in arbitration
Thomas hofbauer   the role of the expert witness in arbitrationThomas hofbauer   the role of the expert witness in arbitration
Thomas hofbauer the role of the expert witness in arbitration
 
Medications and Lactation: Principles for Safe Practice for the Clinician – E...
Medications and Lactation: Principles for Safe Practice for the Clinician – E...Medications and Lactation: Principles for Safe Practice for the Clinician – E...
Medications and Lactation: Principles for Safe Practice for the Clinician – E...
 
Evangelizing Agile in Large Organizations
Evangelizing Agile in Large OrganizationsEvangelizing Agile in Large Organizations
Evangelizing Agile in Large Organizations
 
Yuvee press release 2005.2 yuvee announces doodling software functionality
Yuvee press release 2005.2 yuvee announces doodling software functionalityYuvee press release 2005.2 yuvee announces doodling software functionality
Yuvee press release 2005.2 yuvee announces doodling software functionality
 
Narrative And Wordplay Celebration
Narrative And Wordplay CelebrationNarrative And Wordplay Celebration
Narrative And Wordplay Celebration
 
Inside the Halifax Case: An Interview with the Government’s Expert Witness
Inside the Halifax Case: An Interview with the Government’s Expert WitnessInside the Halifax Case: An Interview with the Government’s Expert Witness
Inside the Halifax Case: An Interview with the Government’s Expert Witness
 
Building and Evangelizing Holistic Experience Design - DMI Seattle 2011
Building and Evangelizing Holistic Experience Design - DMI Seattle 2011Building and Evangelizing Holistic Experience Design - DMI Seattle 2011
Building and Evangelizing Holistic Experience Design - DMI Seattle 2011
 
Sugarcon 2013: Left Brain Meet Right Brain: Customer Experience, Business Ben...
Sugarcon 2013: Left Brain Meet Right Brain: Customer Experience, Business Ben...Sugarcon 2013: Left Brain Meet Right Brain: Customer Experience, Business Ben...
Sugarcon 2013: Left Brain Meet Right Brain: Customer Experience, Business Ben...
 
Semantic Technologies for Big Sciences including Astrophysics
Semantic Technologies for Big Sciences including AstrophysicsSemantic Technologies for Big Sciences including Astrophysics
Semantic Technologies for Big Sciences including Astrophysics
 
Constructive feedback to create suceess
Constructive feedback to create suceessConstructive feedback to create suceess
Constructive feedback to create suceess
 
Beer & Banter- New Media
Beer & Banter- New MediaBeer & Banter- New Media
Beer & Banter- New Media
 
09. What's Involved in Evangelizing Notes
09. What's Involved in Evangelizing Notes09. What's Involved in Evangelizing Notes
09. What's Involved in Evangelizing Notes
 
Culture Slides Breaking The Chains Of Culture Building Trust In Individua...
Culture Slides   Breaking The Chains Of Culture   Building Trust In Individua...Culture Slides   Breaking The Chains Of Culture   Building Trust In Individua...
Culture Slides Breaking The Chains Of Culture Building Trust In Individua...
 
Expert Witness Testimony 2
Expert Witness Testimony 2Expert Witness Testimony 2
Expert Witness Testimony 2
 
Reframing Languages
Reframing LanguagesReframing Languages
Reframing Languages
 

Similaire à Rayane hazimeh building trust in the digital age teenagers and students

Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxKevinRiley83
 
Internet Security
Internet SecurityInternet Security
Internet Securitymjelson
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptxCharithraaAR
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safetyjaenjenny
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationSheryldeVilla2
 
Cybersecurity for the non-technical
Cybersecurity for the non-technicalCybersecurity for the non-technical
Cybersecurity for the non-technicalStephen Cobb
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxHarishParthasarathy4
 
INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxBHUt6
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraudRadiant Minds
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptxBobby Dait
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Abzetdin Adamov
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureLourdes Paloma Gimenez
 
Online reputation
Online reputationOnline reputation
Online reputationesl2m
 
Mobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech MogulMobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech MogulAndrew Schwabe
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online Nader Alkeinay
 
Internet Safety & Privacy
Internet Safety & PrivacyInternet Safety & Privacy
Internet Safety & PrivacyAlexine Marier
 

Similaire à Rayane hazimeh building trust in the digital age teenagers and students (20)

Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Masterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy BasicsMasterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy Basics
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safety
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
 
Cybersecurity for the non-technical
Cybersecurity for the non-technicalCybersecurity for the non-technical
Cybersecurity for the non-technical
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
 
INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptx
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptx
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity posture
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Mobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech MogulMobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech Mogul
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online
 
Lesson 5 protecting yourself on the internet
Lesson 5 protecting yourself on the internetLesson 5 protecting yourself on the internet
Lesson 5 protecting yourself on the internet
 
Internet Safety & Privacy
Internet Safety & PrivacyInternet Safety & Privacy
Internet Safety & Privacy
 

Dernier

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Dernier (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Rayane hazimeh building trust in the digital age teenagers and students

  • 1. Building Trust in the Digital Age Rayane Hazimeh Security Consultant
  • 2. • Lebanese • Computer and Communication Engineering and MBA degrees • Security Consultant at Symantec • Certifications: CCNA, CCNP, CCDP, CCSK, VTSP, VSP, and other stuff • Activist in several initiatives to promote Technology • Hobbies: dancing, outdoor activities • My Motto: Live, Laugh and Love My ASL (a Little bit about me)
  • 3. Internet did not exist 20 years ago!
  • 4. First Website Ever Made: CERN
  • 5. When the Internet began (early 90’s) • Information was centralized or had little user created content • Browsers like Mosaic made internet “visual” • Big companies made websites, sometimes too graphic heavy, lots of design • Most of world was on dial-up, slow connections Internet Matured in early 2000’s • Broadband became widely available • Websites sprang up for everyone • Today, internet moving to mobile devices and app based
  • 6. Today’s Digital Native (born in 1990’s or later) • You have never stood to change a TV channel • Internet has always existed • You don’t go “online”; you are always connected • Your definition of privacy is different from your parents • You expect devices to just turn on, connect and work • You are more collaborative, get help from networks, not just a web search or in a book
  • 7. What Your Parents Worry About • Online Strangers • Cyber bullying • Internet Addictions • Reputation problems • Inappropriate or violent content What You Worry About (Maybe) • Online “drama” • Will my friends embarrass me? • Will my secret stuff get out? • Who are my real friends? • Will I be judged by my: •Facebook •Twitter •YouTube stuff
  • 8. What we all should worry about Create a Positive Digital Footprint Protect Our Privacy Protect Our Money Protect Ourselves from Bullies Protect Ourselves from Predators Protect Ourselves from Ourselves
  • 9. What we all should worry about Create a Positive Digital Footprint Protect Our Privacy Protect Our Money Protect Ourselves from Bullies Protect Ourselves from Predators Protect Ourselves from Ourselves
  • 10. Our digital footprint is the evidence of our online activities.
  • 11.
  • 12. You want to leave positive digital footprints In the future, your "digital footprint" will carry far more weight than anything you might include on a resume. Chris Betcher
  • 13. What we all should worry about Create a Positive Digital Footprint Protect Our Privacy Protect Ourselves from Identity Theft Protect Ourselves from Bullies Protect Ourselves from Predators Protect Ourselves from Yourself
  • 14. A HELPFUL VENN DIAGRAM THE INTERNET YOUR PRIVACY
  • 15. Who’s peeking? • Friendsfamily • Friends of friendsfamily • Parents • Employers and co-workers – Dec 2009 study commissioned by Microsoft said 79% of recruiters & hiring mgrs researched applicants online – CareerBuilder.com study – 45% of employers use social networks to screen job candidates Everyone is! • Customers • Universities • Marketing companiesvendors • Criminalshackers • Government agencies (IRS, SRS!)
  • 16. Do not inadvertently reveal personal information online Protect Our Privacy 1 Be conscious of Web Security3 Be conscious of security on shared computers4 Be wary of unsecured WIFI5 Do not reply to Spammers, EVER2
  • 17. Do not inadvertently reveal personal information online Protect Our Privacy 1 Be conscious of Web Security3 Be conscious of security on shared computers4 Be wary of unsecured WIFI5 Do not reply to Spammers, EVER2
  • 18. One message before Social Media…
  • 19.
  • 20.
  • 21. One message after Social Media…
  • 23.
  • 24.
  • 25. Safe Social Networking – 5 tips Tip #1: Remember that even people you know can be identity thieves Tip #5: Limit the amount of personal information available on your social networking profile. (don’t publicize your unlisted phone number!) Tip #2: Learn how to change your privacy settings Tip #3: Only accept friend requests from people you know Tip #4: Limit the amount of "time and place" data that you expose through social networking
  • 26. Do not inadvertently reveal personal information online Protect Our Privacy 1 Be conscious of Web Security3 Be conscious of security on shared computers4 Be wary of unsecured WIFI5 Do not reply to Spammers, EVER2
  • 27. What is Spam? • Unwanted emails • Up to 80% of world’s email is spam • Some is dangerous: − links to websites with malware − attachments that have − viruses in them − Phishing emails: offers that are dangerous or fake
  • 28. The “Golden Rules” for email safety Rule #1: If you don’t immediately recognize the sender, don’t open it, just delete it Rule #2: Never send personal information via email > call them Rule #3: Never click on a link from an email unless is from a friend and it sounds like is from them
  • 29. Email Scams Chain Letters • They instruct to “forward to 10 other people” or “everyone you know” • Sometimes sounds well-meaning: “raise awareness to a good cause”, “bring luck”, etc. • Often their purpose is to spread a dangerous virus!  Delete them, Don’t click on any link, If sent by a friend, ask them not to forward them to you because of the risks involved ‘Get Rich Quick’ Themes • Promise earning money for selling items for them • Become a ‘professional shopper’ • Process an inheritance or other payment for people other of the country  Don’t click on links; delete Financial Institution Asking for Personal Information • Your bank, insurance, broker etc. asking to verify your password, social security number, etc. • Usually with an excuse: ‘need to verify …”, ‘need to update every year …”, “we have detected potential fraud …”, etc. • They will look EXACTLY as the institution you do business with Don’t reply; don’t click on links; Call them; Legitimate companies will NEVER ask for personal information via email; they will call you or send you a letter 11 22 33
  • 30. Self-defense against Internet and email scams • Instead of clicking a suspicious link from an email, type the web address yourself when you want to visit the site. – This is especially important for bank, credit card, and IRS websites.
  • 31. Do not inadvertently reveal personal information online Protect Our Privacy 1 Be conscious of Web Security3 Be conscious of security on shared computers4 Be wary of unsecured WIFI5 Do not reply to Spammers, EVER2
  • 32. Passwords DO’s • Unique, complex, try a code that can be customized • Not a dictionary word or name • Not a phrase • Nothing a good friend might guess (like an address, pet’s name, birthday, nickname) • Use a different password for each site • Most important passwords are for email and social network DON’Ts • DON’T store your password list on your computer in a file called “passwords.” • DON’T keep your passwords with your account information. • DON’T tell your password to other people Not with a sibling, BFF, or from one website to another. You can tell your parent. • DON’T let other people watch you enter your passwords. • DON’T stay logged in on a public computer
  • 34. Virus, Spyware, Adware and Malware is a program capable of continually replicating with little or no user intervention. is malicious computer program that does exactly what its name implies-i.e., spies on you. is any software that, once installed on your computer, tracks your internet browsing habits and sends you popups containing advertisements related to the sites and topics you've visited. is short for malicious software. Malware is a broad term that encompasses computer viruses, worms, Trojan horses, spyware, adware, and others. A Virus A Spyware A Malware An Adware
  • 35. Dangerous downloads Clicking on ads, links Visiting infected websites Buying into “security” alerts & scare tactics by unknown companies Peer-to-peer file sharing networks Through “holes” left by web browser vulnerabilities Virus, Spyware, Adware and Malware How do Computers get infected?
  • 36. • Computer runs slowly or trouble starting • Programs might not start, esp. security software • Flickering hard drive light • Strange programs listed in task manager • OFTEN YOU CAN’T EVEN TELL!!! • Best bet: run security software at all times, regularly scan the computer and let your parents know if something weird happens when you are online. i.e Symantec Endpoint Protection or Norton Internet Security Virus, Spyware, Adware and Malware How to spot them?
  • 37. Do not inadvertently reveal personal information online Protect Our Privacy 1 Be conscious of Web Security3 Be conscious of security on shared computers4 Be wary of unsecured WIFI5 Do not reply to Spammers, EVER2
  • 38. Log out or sign out every time you leave the computer. Be aware of “shoulder surfers” who might try to peek at your passwords Create “strong” passwords that are hard for others to guess Do not share account information or passwords with others Log out or sign out every time you leave the computer SecuritySecurity ONON SharedShared ComputersComputers
  • 39. Do not inadvertently reveal personal information online Protect Your Privacy 1 Be conscious of Web Security3 Be conscious of security on shared computers4 Be wary of unsecured WIFI5 Do not reply to Spammers, EVER2
  • 40.
  • 41. What we all should worry about Create a Positive Digital Footprint Protect Our Privacy Protect Our Money Protect Ourselves from Bullies Protect Ourselves from Predators Protect Ourselves from Ourselves
  • 42. Online Shopping • Most retailers have a website and allow you to browse for items and make purchases. – It is always best to only shop from Retailers you are familiar with. – Check the reputation e.g. http://norton.safeweb.com • Choose a secure password • Print out all receipts or save them on your computer • Make sure it is the real store website – Don’t click on links in e-mails – The website should start with https://www  It is always best to pay with a Credit Card. Do not ever send cash, check or money order. – Check your Credit Card statement frequently – You do not have to complete surveys after you make a purchase.
  • 43. Online Banking • Banks provide online services – To check account balances, pay bills, make transfers – Check the reputation at http://norton.safeweb.com • Always carefully type the bank website • Never send account details via e-mail • Ignore e-mails requesting you to reset your password – If in doubt, phone your bank to confirm
  • 44. Norton Safeweb – indicates if a website is safe
  • 45. What we all should worry about Create a Positive Digital Footprint Protect Our Privacy Protect Our Money Protect Ourselves from Bullies Protect Ourselves from Predators Protect Ourselves from Ourselves
  • 46. • IM/Text harassment • Stealing passwords • Blogs • Web sites • Sending pictures through email & cell phones • Internet polling • Interactive gaming • Malicious code • Sending porn or junk email • Impersonation • Cyberbullying by proxy What is Cyberbullying?
  • 47. Tips for Dealing with Cyberbullying Most kids don’t cyberbully! •Work together as a community •If you see cyberbullying, don’t be a silent bystander. Do something! •Talk to your classmates if they are being teased online, be a friend! •Involve your parents, teachers and other adults. •If there’s too much “drama”, turn it off. Get off the computer, mobile phone and find something else to do. Talk about it before it happens Don’t reply, Keep copies Ask your friends and parents for help Bystanders Can Help!
  • 48. What we all should worry about Create a Positive Digital Footprint Protect Our Privacy Protect Our Money Protect Ourselves from Bullies Protect Ourselves from Predators Protect Ourselves from Ourselves
  • 50. What we all should worry about Create a Positive Digital Footprint Protect Our Privacy Protect Our Money Protect Ourselves from Bullies Protect Ourselves from Predators Protect Ourselves from Ourselves
  • 51. Embrace technology Remain alert Keep a low profile Trust your instincts Control your information BE
  • 52. Interested in Technology? Technovation Challenge: http://iridescentlearning.org/programs/technovation-challenge/ Techgirl http://exchanges.state.gov/non-us/program/techgirls
  • 53. Copyright © 2013 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Want a copy of this presentation? Join Norton Zone www.nortonzone.com and drop me an email!Rayane_hazimeh@symantec.com

Notes de l'éditeur

  1. Surprise, surprise, surprise!
  2. Conseil Européen pour la Recherche Nucléaire", or European Council for Nuclear Research Tim Berners-Lee, a British scientist at CERN, invented the World Wide Web (WWW) in 1989. The web was originally conceived and developed to meet the demand for automatic information-sharing between scientists in universities and institutes around the world. The first Web page ever created centered on information regarding the WWW project. Visitors could learn more about hypertext, technical details for creating their own webpage, and even an explanation on how to search the web for information. Early in 1993, the National Center for Supercomputing Applications (NCSA) at the University of Illinois released a first version of their Mosaic browser. This software ran in the X Window System environment, popular in the research community, and offered friendly window-based interaction.
  3. Government information University research Usenet group, special interests Not visual, text based
  4. So far, we’ve talked about why we need passwords and we’ve learned that the best passwords are at least 6 characters long, have a combination of capital letters, lower case letters, numbers, and symbols. We just talked about ways that we can remember our passwords and keep them safe. Now, we’ll learn about keeping safe on social networking sites like Facebook and MySpace.
  5. As you continue to use the Internet and emails, you need to learn to tell safe emails from dangerous emails sent by scammers, spammers, and crooks. You may do serious damage to your computer by simply opening the email's links and attachments. Therefore, it is very important to learn to spot the spammers' gimmicks.
  6. From Gawker hack; 13 most common passwords used (of millions of accounts): 123456 Password 12345678 Lifehack Qwerty abc123 111111 Monkey Consumer 12345 0 Letmein Trustno1 Most common Iphone passwords: 0000, 1234, 2580 (straight shot down keypad) Most important two passwords are your email and social network? Because with email I can hit “forgotmy password” at almost any account and get the code to reset yours. With your social network I can spread a scam to all your friends and make money or spread malware. Or just embarrass you by using your account and posting silly or embarassing stuff. Sharing – lots of girls will test their friendships by saying you’re not “BFF” until you share a FB password. Or boyfriend/girlfriends will post for each other or share an account, then whenthey break up it’s a disaster.
  7. This is where kids get into trouble. We think they are safe because we installed security software but we let our kids use the Admin account (where they can install and uninstall things on the family computer) or they don’t know not to ignore security software warnings. Also if you give a kid an iPod but not a way to get music legally, you’ve created a pirate. That brings us to peer to peer software. Some of it is legal but most isn’t and downloading free music is usually stealing. Kids who don’t know what they are doing are inviting the criminals directly into your computer. There’s nothing the software can do to stop them since by definition when you install peer to peer, you are opening a port on your computer where traffic is allowed. Crooks know this and regularly scan the networks of connected music sharing computers, looking for financial records. The Today show recently did a story on a family whose tax refund was stolen by a crook who found their tax return’s digital image (from their online filing), registered a change of address for them at the IRS and received (and cashed) the family’s refund check.
  8. Parents must be aware of cyberbullying and teach their kids to recognize and report it. Talk to your child about how you could work together if it happened. If it does, make sure you don’t respond to the bully. Keep a copy of any on screen message, no matter how embarassing. And if you are a bystander (meaning you were sent a link to a mean website, copied on an email, etc) make sure you reach out to the victim/target to express friendship, sympathy, offer a diversion together (like ‘let’s get together after school and work on math’) If the bullying is serious enough, get police involved. If it’s impacting the school environment, (child is afraid to go to school, feels like everyone is laughing at them, etc) then report to the school, the teacher or principal, counselor or resource officer. But parents need to drive process, leave a paper trail, review the school policy, ask for an action plan in writing. Stay on top of things and demand a respones. (from Allison Trachthill) theAmerican School Counselor Association has updated its ethical standards. Now, confronting cyberbullying is an ethical obligation for school counselors. Section A.10.e of the Ethical Standards for School Counselors states that school counselors should, "Consider the extent to which cyberbullying is interfering with students’ educational process and base guidance curriculum and intervention programming for this pervasive and potentially dangerous problem on research-based and best practices."