SlideShare une entreprise Scribd logo
1  sur  32
Online and Mobile Basic Security
NGETH Moses
ICT Project Coordinator
Community Legal Education Center
(CLEC)
“No place like 127.0.0.1”
• 2nd Step Verification and Set up
• Remote your smart phone
• Easy to set up “strong” passwords
not a long passwords
2nd Step Verification
(For Google user ONLY)
• Stronger security for your Google Account
• With 2-Step Verification, you’ll protect your
account with both your password and your
phone
Why you needs it
Why you needs it
How it works
How it works
How it protects you
How it protects you
How it protects you
How to set up 2nd step verification
Sup 2nd step verification
• Go to your Gmail account
Set up 2nd step verification
• Go to “Security Tap”
• Click on “Setup”
Set up 2nd step verification
• Click on “Start setup”
• Re-type your password
Set up 2nd step verification
• Type your phone number
• Note: you either choose Google to send “Text
message (SMS” or Call you “Voice Call”
Set up 2nd step verification
• Go to icon of you profile photo at the top right
side
Set up 2nd step verification
• Code was sent to your number.
• Fill in the 6 digits in a blank box
• Note: Mobile and Metfone doesn’t work well.
Set up 2nd step verification
• If you are setting up on somebody els’ computer,
please un-tick “Trust this computer”.
• Recommend to set up on your computer ONLY
• Click Next
Set up 2nd step verification
• Just to make sure you got the right phone number.
• Click Confirm to finish the setup
Set up 2nd step verification
• NOTE:
– After finish setup 2nd step verification, all your social media
that uses with this Gmail account will be sign out. It means
you can’t log in to those account with your current
password. It needs a one-time “App-specific passwords”.
(Explanation off slide presentation)
Remote your smart phone
1. First you need to make sure that you have turned it on, which you can do
by following this quick tutorial:
2. Go to the Google Setttings of your Android device.
3. Tap on Android Device Manager at the bottom of the list
4. Check the box for Remotely locate this device
5. Check box for remote lock and factory reset.
6. To the Settings of your phone.
7. Tap on Security and then Device administrator. Make sure the Android
Device Manager is ticked off there.
8. Now that you have done this, you can remotely lock and wipe your
device in case of theft or loss. To do this, go to the Device Manager
website.
9. The path to activate this feature might differ depending on your device,
but in general should be the same as it's a Google service and not one
from your phone's manufacturer.
Remote your smart phone
Remote your smart phone
Remote your smart phone
Remote your smart phone
Remote your smart phone (On Device)
Remote your smart phone (On Device)
Easy create “Strong Password” not
“Long Password”
“Strong Password” not “Long
Password”
It is important to use different types of characters when
choosing a password. This can be done in various ways:
• Varying capitalisation, such as: 'My naME is Not
MR. MarSter'
• Alternating numbers and letters, such as: 'a11 w0Rk
4nD N0 p14Y'
• Incorporating certain symbols, such as:
'c@t(heR1nthery3'
• Using multiple languages, such as: 'Let Them Eat 1e
gateaU au ch()colaT
“Strong Password” not “Long
Password”
• Passwords can also take advantage of more
traditional mnemonic devices, such as the use of
acronyms. This allows long phrases to be turned into
complex, seemingly-random words:
• 'To be or not to be? That is the question' becomes
'2Bon2B?TitQ’
• 'We hold these truths to be self-evident: that all men
are created equal' becomes 'WhtT2bs-e:taMac=’
• 'Are you happy today?' becomes 'rU:-)2d@y?'
“Strong Password” not “Long
Password”
• A little effort to make the password more complex
goes a very long way. Increasing the length of a
password even just by a few characters, or by adding
numbers or special characters, makes it much more
difficult to crack. For demonstrative purposes, the
table below shows how much longer it may take a
hacker to break a list of progressively more complex
passwords by trying different combinations of the
password one after another.
“Strong Password” not “Long
Password”

Contenu connexe

Similaire à Basic mobile and internet security

Ouch 201211 en
Ouch 201211 enOuch 201211 en
Ouch 201211 en
Hai Nguyen
 
Kaymera secure smartphone Quick start guide AndroidLM
Kaymera secure smartphone Quick start guide AndroidLMKaymera secure smartphone Quick start guide AndroidLM
Kaymera secure smartphone Quick start guide AndroidLM
Jeremy Glover
 

Similaire à Basic mobile and internet security (20)

Modicare Mighty Guard
Modicare Mighty GuardModicare Mighty Guard
Modicare Mighty Guard
 
3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account
 
Email security
Email securityEmail security
Email security
 
Webinar: Personal Online Privacy - Sucuri Security
Webinar: Personal Online Privacy - Sucuri SecurityWebinar: Personal Online Privacy - Sucuri Security
Webinar: Personal Online Privacy - Sucuri Security
 
HUAWEI P8 Lite Manual / User Guide
HUAWEI P8 Lite Manual / User GuideHUAWEI P8 Lite Manual / User Guide
HUAWEI P8 Lite Manual / User Guide
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
 
Executive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdfExecutive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdf
 
Speed dials
Speed dialsSpeed dials
Speed dials
 
Ouch 201211 en
Ouch 201211 enOuch 201211 en
Ouch 201211 en
 
Cyber security
Cyber securityCyber security
Cyber security
 
How to secure your Gmail account using android phones?
How to secure your Gmail account using android phones?How to secure your Gmail account using android phones?
How to secure your Gmail account using android phones?
 
Mobisheild sales promotion presentation.
Mobisheild  sales promotion  presentation.Mobisheild  sales promotion  presentation.
Mobisheild sales promotion presentation.
 
Digital security for Sri Lankan activists
Digital security for Sri Lankan activistsDigital security for Sri Lankan activists
Digital security for Sri Lankan activists
 
callmagic pro spyphone software.pdf
callmagic pro spyphone software.pdfcallmagic pro spyphone software.pdf
callmagic pro spyphone software.pdf
 
10 Reasons to Choose Connect Safe Antivirus
10 Reasons to Choose Connect Safe Antivirus10 Reasons to Choose Connect Safe Antivirus
10 Reasons to Choose Connect Safe Antivirus
 
Social Engineering and Identity Theft.pptx
Social Engineering and Identity Theft.pptxSocial Engineering and Identity Theft.pptx
Social Engineering and Identity Theft.pptx
 
Desgn&imp authentctn.ppt by Jaseela
Desgn&imp authentctn.ppt by JaseelaDesgn&imp authentctn.ppt by Jaseela
Desgn&imp authentctn.ppt by Jaseela
 
Kaymera secure smartphone Quick start guide AndroidLM
Kaymera secure smartphone Quick start guide AndroidLMKaymera secure smartphone Quick start guide AndroidLM
Kaymera secure smartphone Quick start guide AndroidLM
 
IT Security DOs and DON'Ts
IT Security DOs and DON'TsIT Security DOs and DON'Ts
IT Security DOs and DON'Ts
 
Set up a new enum with eskytel
Set up a new enum with eskytelSet up a new enum with eskytel
Set up a new enum with eskytel
 

Dernier

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Dernier (20)

FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 

Basic mobile and internet security

  • 1. Online and Mobile Basic Security NGETH Moses ICT Project Coordinator Community Legal Education Center (CLEC)
  • 2. “No place like 127.0.0.1” • 2nd Step Verification and Set up • Remote your smart phone • Easy to set up “strong” passwords not a long passwords
  • 3. 2nd Step Verification (For Google user ONLY) • Stronger security for your Google Account • With 2-Step Verification, you’ll protect your account with both your password and your phone
  • 11. How to set up 2nd step verification
  • 12. Sup 2nd step verification • Go to your Gmail account
  • 13. Set up 2nd step verification • Go to “Security Tap” • Click on “Setup”
  • 14. Set up 2nd step verification • Click on “Start setup” • Re-type your password
  • 15. Set up 2nd step verification • Type your phone number • Note: you either choose Google to send “Text message (SMS” or Call you “Voice Call”
  • 16. Set up 2nd step verification • Go to icon of you profile photo at the top right side
  • 17. Set up 2nd step verification • Code was sent to your number. • Fill in the 6 digits in a blank box • Note: Mobile and Metfone doesn’t work well.
  • 18. Set up 2nd step verification • If you are setting up on somebody els’ computer, please un-tick “Trust this computer”. • Recommend to set up on your computer ONLY • Click Next
  • 19. Set up 2nd step verification • Just to make sure you got the right phone number. • Click Confirm to finish the setup
  • 20. Set up 2nd step verification • NOTE: – After finish setup 2nd step verification, all your social media that uses with this Gmail account will be sign out. It means you can’t log in to those account with your current password. It needs a one-time “App-specific passwords”. (Explanation off slide presentation)
  • 21. Remote your smart phone 1. First you need to make sure that you have turned it on, which you can do by following this quick tutorial: 2. Go to the Google Setttings of your Android device. 3. Tap on Android Device Manager at the bottom of the list 4. Check the box for Remotely locate this device 5. Check box for remote lock and factory reset. 6. To the Settings of your phone. 7. Tap on Security and then Device administrator. Make sure the Android Device Manager is ticked off there. 8. Now that you have done this, you can remotely lock and wipe your device in case of theft or loss. To do this, go to the Device Manager website. 9. The path to activate this feature might differ depending on your device, but in general should be the same as it's a Google service and not one from your phone's manufacturer.
  • 26. Remote your smart phone (On Device)
  • 27. Remote your smart phone (On Device)
  • 28. Easy create “Strong Password” not “Long Password”
  • 29. “Strong Password” not “Long Password” It is important to use different types of characters when choosing a password. This can be done in various ways: • Varying capitalisation, such as: 'My naME is Not MR. MarSter' • Alternating numbers and letters, such as: 'a11 w0Rk 4nD N0 p14Y' • Incorporating certain symbols, such as: 'c@t(heR1nthery3' • Using multiple languages, such as: 'Let Them Eat 1e gateaU au ch()colaT
  • 30. “Strong Password” not “Long Password” • Passwords can also take advantage of more traditional mnemonic devices, such as the use of acronyms. This allows long phrases to be turned into complex, seemingly-random words: • 'To be or not to be? That is the question' becomes '2Bon2B?TitQ’ • 'We hold these truths to be self-evident: that all men are created equal' becomes 'WhtT2bs-e:taMac=’ • 'Are you happy today?' becomes 'rU:-)2d@y?'
  • 31. “Strong Password” not “Long Password” • A little effort to make the password more complex goes a very long way. Increasing the length of a password even just by a few characters, or by adding numbers or special characters, makes it much more difficult to crack. For demonstrative purposes, the table below shows how much longer it may take a hacker to break a list of progressively more complex passwords by trying different combinations of the password one after another.
  • 32. “Strong Password” not “Long Password”