SlideShare a Scribd company logo
1 of 21
Internet Security:
Staying Safe, Having Fun, And Cruising The ‘Net




Daniel Owens
IT Security Professional
Agenda

 Introduction
 Staying Safe
 Having Fun
 Cruising The ‘Net
 Conclusion And Appendices
A Note About Good And Evil

   Nothing in this world is purely good or purely evil –
    to include the Internet and those who use it.
                                         -Daniel Owens
With That Said… A Note About Me

 Currently
   Working as a NASA contractor in IT Security
 Formerly
   Worked for/with the…
     Department of Defense (DoD) to include the NSA
     FBI                          MySpace
     Justice Department           IBM
     Microsoft                    Xerox
     Oracle                       Booz Allen Hamilton
     Cisco                        SystemSecurities
   And many more…
Agenda

 Introduction
 Staying Safe
 Having Fun
 Cruising The ‘Net
 Conclusion And Appendices
Protecting Your Computer

 Apply updates and patches
   This includes for the Operating System, your web
   browser, any plug-ins and add-ons for the web
   browser, any games, and any other software
 Use Anti-Malware Software
   This includes antivirus, antispyware, and anti-
   adware software
     Examples Include (all free for home use):
     AVG and Avast!
     Spybot Search & Destroy
     Adaware
Protecting Your Privacy

 Don’t fill out online surveys or enter contests
 without permission
   Many of these are simply there to get information
   about you and some can be harmful
 Never give out sensitive information about
 yourself, your family, or others
   This includes addresses, school names, your full
   name, phone numbers, and your
   schedule/vacation data in advance
 Don’t open or respond to SPAM
   And don’t give your email address to just anyone
Doubt Everything

 If you can’t verify someone’s identity, you
 can’t trust them with your information
 Anyone can post just about anything on the
 Internet… pretending to be just about anyone
   Just like any other medium
Doubt Everything (cont.)
Agenda

 Introduction
 Staying Safe
 Having Fun
 Cruising The ‘Net
 Conclusion And Appendices
Cyberbullying

 Often either a source of or voice for rumors
   Common places are MySpace and Facebook
 Often successful only AFTER the victim starts
 to respond to the bully(ing)
   While it may be difficult, ignoring posts and simply
   blocking instant messages from people you don’t
   know is the best way to stop cyberbullying
 Can also include compromising a victim’s
 account and using it
   Again, MySpace and Facebook are common
   vectors, but so are Instant Messengers
Cyberpredators

 Few cyberpredators give out their real age,
 name, and other information
   And anyone can find a picture online
 Unsolicited instant messages, posts, and
 emails from strangers should never be
 responded to
   40% of females have been solicited on the
   Internet at least once before graduating high
   school
   Males are vulnerable too
 Should be treated the same as bullying
If All Else Fails

  Change your account name and password
    Most bullies and predators won’t be able to track
    you if you change your information… unless you
    give it to them
  Don’t go there…
    Just don’t visit the site
  The Internet isn’t anonymous
    Well-trained professionals (and criminals) can
    track down almost anyone on the Internet
    If you’re a victim, talk to your parents and/or a
    trusted adult
Agenda

 Introduction
 Staying Safe
 Having Fun
 Cruising The ‘Net
 Conclusion And Appendices
Be Suspicious Of The Unknown

 Warez and Torrents
   Many of the software and videos on these sites
   are bugged in one way or another
 Free Games and Software
   Many of the freeware and shareware software
   gathers personal information
     Often the company owning the software then sells the
     data
 Unknown Websites
   Some sites are designed to install malware onto
   visitor computers
Be Suspicious Of The Unknown
(cont.)
Online Gaming

 Protect your privacy
   Give out as little information as possible
     And don’t have your screenname be your real name
 Find a ‘room’ where you feel both safe and
 comfortable and stay there
     If things start to go downhill, leave and don’t come
     back
 Avoid games with monthly fees
   These often require you to give credit card
   information and other data that an attacker can
   steal from the server
Agenda

 Introduction
 Staying Safe
 Having Fun
 Cruising The ‘Net
 Conclusion And Appendices
For More Information

 Media Awareness Network (MNet)
   http://www.media-
   awareness.ca/english/index.cfm
 Cyberbullying Research Center
   http://www.cyberbullying.us/
 NetAlert
   http://www.netalert.gov.au/
 OnGuard Online
   http://www.onguardonline.gov/
For More Information (cont.)

 Safe Internet Alliance
   http://www.safeinternet.org/
 GRC IT Security Office
   http://itsecurity.grc.nasa.gov
 STOP Cyberbullying
   http://www.stopcyberbullying.org/
Acknowledgements

 I stole the background from Microsoft
 I stole a lot from my experiences and
 previous writings

More Related Content

What's hot

Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesMark Jhon Oxillo
 
Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computingMukul Kumar
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of NetiquetteRochelle Nato
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and securityjovellconde1
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and SafetyConor O'Neill
 
Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethicsNikki Shree
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteAngelito Quiambao
 
Lkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & SanjayLkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & SanjayQuek Lilian
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraDevsena Mishra
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awarenessMichel Bitter
 
Internet Security
Internet SecurityInternet Security
Internet Securityalookulo
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Jay Nagar
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetytonyh1
 

What's hot (20)

Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
 
Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computing
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and Safety
 
Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethics
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber security
Cyber securityCyber security
Cyber security
 
Lkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & SanjayLkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & Sanjay
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena Mishra
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Computer SOS
Computer SOSComputer SOS
Computer SOS
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Social Media Safety Tips
Social Media Safety TipsSocial Media Safety Tips
Social Media Safety Tips
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 

Viewers also liked

Application and Website Security -- Developer Edition: Introducing Security I...
Application and Website Security -- Developer Edition:Introducing Security I...Application and Website Security -- Developer Edition:Introducing Security I...
Application and Website Security -- Developer Edition: Introducing Security I...Daniel Owens
 
Application and Website Security -- Designer Edition: Using Formal Specificat...
Application and Website Security -- Designer Edition:Using Formal Specificat...Application and Website Security -- Designer Edition:Using Formal Specificat...
Application and Website Security -- Designer Edition: Using Formal Specificat...Daniel Owens
 
Application and Website Security -- Fundamental Edition
Application and Website Security -- Fundamental EditionApplication and Website Security -- Fundamental Edition
Application and Website Security -- Fundamental EditionDaniel Owens
 
The Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsThe Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsBarry Feldman
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome EconomyHelge Tennø
 

Viewers also liked (6)

Application and Website Security -- Developer Edition: Introducing Security I...
Application and Website Security -- Developer Edition:Introducing Security I...Application and Website Security -- Developer Edition:Introducing Security I...
Application and Website Security -- Developer Edition: Introducing Security I...
 
Application and Website Security -- Designer Edition: Using Formal Specificat...
Application and Website Security -- Designer Edition:Using Formal Specificat...Application and Website Security -- Designer Edition:Using Formal Specificat...
Application and Website Security -- Designer Edition: Using Formal Specificat...
 
Application and Website Security -- Fundamental Edition
Application and Website Security -- Fundamental EditionApplication and Website Security -- Fundamental Edition
Application and Website Security -- Fundamental Edition
 
penetest VS. APT
penetest VS. APTpenetest VS. APT
penetest VS. APT
 
The Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsThe Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post Formats
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome Economy
 

Similar to Staying Safe, Having Fun, And Cruising The ‘Net

Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
 
CYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWCYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWBilly Warero
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityAshley Zimmerman
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityJFashant
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber SecurityDominic Rajesh
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]sheenau
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxDinesh582831
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquetteEmmanuelaSernicul
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Jesus Rances
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesBlake Carver
 
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter Cyber Security
 
Promote Education Internet Security
Promote Education Internet SecurityPromote Education Internet Security
Promote Education Internet SecurityZoaib Mirza
 
Web security
Web securityWeb security
Web securityekostyuk
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is DangerousGihan Dias
 
Lesson 2.2 Online Safety And Security.pptx
Lesson 2.2 Online Safety And Security.pptxLesson 2.2 Online Safety And Security.pptx
Lesson 2.2 Online Safety And Security.pptxGrayzon Gonzales, LPT
 
Internet safety for middles school
Internet safety for middles schoolInternet safety for middles school
Internet safety for middles schoolesksaints
 

Similar to Staying Safe, Having Fun, And Cruising The ‘Net (20)

Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
CYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWCYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEW
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and Libraries
 
Protect
ProtectProtect
Protect
 
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdf
 
Promote Education Internet Security
Promote Education Internet SecurityPromote Education Internet Security
Promote Education Internet Security
 
Web security
Web securityWeb security
Web security
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
 
IT Security
IT SecurityIT Security
IT Security
 
School presentation
School presentationSchool presentation
School presentation
 
Lesson 2.2 Online Safety And Security.pptx
Lesson 2.2 Online Safety And Security.pptxLesson 2.2 Online Safety And Security.pptx
Lesson 2.2 Online Safety And Security.pptx
 
Internet safety for middles school
Internet safety for middles schoolInternet safety for middles school
Internet safety for middles school
 

Recently uploaded

TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024Stephen Perrenod
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfalexjohnson7307
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfFIDO Alliance
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideStefan Dietze
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...FIDO Alliance
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...FIDO Alliance
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTopCSSGallery
 

Recently uploaded (20)

TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 

Staying Safe, Having Fun, And Cruising The ‘Net

  • 1. Internet Security: Staying Safe, Having Fun, And Cruising The ‘Net Daniel Owens IT Security Professional
  • 2. Agenda Introduction Staying Safe Having Fun Cruising The ‘Net Conclusion And Appendices
  • 3. A Note About Good And Evil Nothing in this world is purely good or purely evil – to include the Internet and those who use it. -Daniel Owens
  • 4. With That Said… A Note About Me Currently Working as a NASA contractor in IT Security Formerly Worked for/with the… Department of Defense (DoD) to include the NSA FBI MySpace Justice Department IBM Microsoft Xerox Oracle Booz Allen Hamilton Cisco SystemSecurities And many more…
  • 5. Agenda Introduction Staying Safe Having Fun Cruising The ‘Net Conclusion And Appendices
  • 6. Protecting Your Computer Apply updates and patches This includes for the Operating System, your web browser, any plug-ins and add-ons for the web browser, any games, and any other software Use Anti-Malware Software This includes antivirus, antispyware, and anti- adware software Examples Include (all free for home use): AVG and Avast! Spybot Search & Destroy Adaware
  • 7. Protecting Your Privacy Don’t fill out online surveys or enter contests without permission Many of these are simply there to get information about you and some can be harmful Never give out sensitive information about yourself, your family, or others This includes addresses, school names, your full name, phone numbers, and your schedule/vacation data in advance Don’t open or respond to SPAM And don’t give your email address to just anyone
  • 8. Doubt Everything If you can’t verify someone’s identity, you can’t trust them with your information Anyone can post just about anything on the Internet… pretending to be just about anyone Just like any other medium
  • 10. Agenda Introduction Staying Safe Having Fun Cruising The ‘Net Conclusion And Appendices
  • 11. Cyberbullying Often either a source of or voice for rumors Common places are MySpace and Facebook Often successful only AFTER the victim starts to respond to the bully(ing) While it may be difficult, ignoring posts and simply blocking instant messages from people you don’t know is the best way to stop cyberbullying Can also include compromising a victim’s account and using it Again, MySpace and Facebook are common vectors, but so are Instant Messengers
  • 12. Cyberpredators Few cyberpredators give out their real age, name, and other information And anyone can find a picture online Unsolicited instant messages, posts, and emails from strangers should never be responded to 40% of females have been solicited on the Internet at least once before graduating high school Males are vulnerable too Should be treated the same as bullying
  • 13. If All Else Fails Change your account name and password Most bullies and predators won’t be able to track you if you change your information… unless you give it to them Don’t go there… Just don’t visit the site The Internet isn’t anonymous Well-trained professionals (and criminals) can track down almost anyone on the Internet If you’re a victim, talk to your parents and/or a trusted adult
  • 14. Agenda Introduction Staying Safe Having Fun Cruising The ‘Net Conclusion And Appendices
  • 15. Be Suspicious Of The Unknown Warez and Torrents Many of the software and videos on these sites are bugged in one way or another Free Games and Software Many of the freeware and shareware software gathers personal information Often the company owning the software then sells the data Unknown Websites Some sites are designed to install malware onto visitor computers
  • 16. Be Suspicious Of The Unknown (cont.)
  • 17. Online Gaming Protect your privacy Give out as little information as possible And don’t have your screenname be your real name Find a ‘room’ where you feel both safe and comfortable and stay there If things start to go downhill, leave and don’t come back Avoid games with monthly fees These often require you to give credit card information and other data that an attacker can steal from the server
  • 18. Agenda Introduction Staying Safe Having Fun Cruising The ‘Net Conclusion And Appendices
  • 19. For More Information Media Awareness Network (MNet) http://www.media- awareness.ca/english/index.cfm Cyberbullying Research Center http://www.cyberbullying.us/ NetAlert http://www.netalert.gov.au/ OnGuard Online http://www.onguardonline.gov/
  • 20. For More Information (cont.) Safe Internet Alliance http://www.safeinternet.org/ GRC IT Security Office http://itsecurity.grc.nasa.gov STOP Cyberbullying http://www.stopcyberbullying.org/
  • 21. Acknowledgements I stole the background from Microsoft I stole a lot from my experiences and previous writings