Internet Safety

5 downloads 230 Views 2MB Size Report
Do not spam forums, chat rooms, or social media sites with useless or repeated ... Image: http://www.worldpulse.com/site
Internet Security Kimberly Kachadoorian MBA

Netiquette, commonly accepted rules Do not spam

Do not spam forums, chat rooms, or social media sites with useless or repeated information

Do not pretend

Do not pretend to be someone else

Do not post or distribute

Do not post or distribute illegal material

Do not use

Do not use abusive or threatening language

Do not try

Do not try to obtain personal info about someone

Did u see Jane’s skirt today?? What color was that??! puke green???

Cyberbulling Bully refers to any unwanted, aggressive behavior • Insulting texts or emails • Rumors sent via email or social networking sites • Fake profiles • Embarrassing photos or videos – with some they may be illegal

Bullying affects 29.2% of students every year and the number is growing Why it’s harmful: • Anonymous • Can be done 24/7

Image: http://www.worldpulse.com/sites/default/files/styles/post_cover_image/public/post/22246/65258/post_cover_image/6875666d4ff9736630e57ff55f2b52cd/cyberbullying-finalcolor.png?itok=zT5k7_e_

Cyberbullying: If it happens to you

• Do not respond to any messages, posts or emails • Block offenders • Document and report the behavior • Flag the content so others are not hurt by it • Tell an adult – if not your parents then someone you trust

• To schools: • Inform your school of any cyberbullying as you would with other types of bullying • Provide screenshots or records of bullying

Report Cyberbullying

• To your parents and law enforcement, especially if it involves any of the following: • Threats of violence • Explicit messages or photos • Taking a photo or video of someone in a place where he or she would expect privacy • Stalking and hate crimes

Protect your Identity Personal Identifiable Information (PII) Examples: • Student ID Number • Date of Birth • Email Address • Mailing Address – even if it is a PO Box • Credit Card Information – PIN numbers or code on back of card • Social Security Number • City/State/School • Your Full Name – especially if unique This info helps hackers steal your identity to steal you funds, impersonate you, so they can be trusted. Never share this information on-line.

Basic Security • • • • • • •

Never share your password Do not repeat passwords across sites Do NOT share (personally identifiable information) PII Do not download any suspicious or unknown software Always log out when you are done Don’t click on links in emails - phishing Never post anything you do not want public You might think you’re being safe and limiting your posts to only friends, but anything you post can be easily copied and pasted and sent to anyone else!

If you are unsure about anything you do online, ask your parent, teacher or guardian if it is OK Image: https://cdn.theconversation.com/files/141344/wide_article/width1356x668/image-20161012-8415-1bqpx5b.jpg

Risky Business • • • •

On-line Shopping Connecting on your Social Media Any site requiring you to give out your Personal Identifiable information (PII) Posting fake news sites

While these sites are enjoyable and useful. Just make sure you are being extra careful when visiting them • Do not use public Wi-Fi to access these risk sites – especially without a password • Check the address for spoofing

http://bank0famerica.com – note the “0” instead of and “o”

• Use a secure website, especially when submitting PII Look for an "s" after “http” in the web address example: https://www.yahoo.com/ Look for a ‘padlock’ in the browser address bar

Browser Safely • Use automatic Updates • Use and regularly update built-in safety features • Pop-up blockers • Anti-spyware • Anti-virus • Anti-phishing • Do not use “Save Password” or “Remember Me” functions • Internet Explorer is more frequently targeted and has more security flaws than any other browser

Social Media Tips

• Be picky- only friend folks you know in real-life • Never post your location • Never post that you are going on vacation – show the vacation pictures when you get back • Be careful with apps-many free games have geo-tracking or give away your PII • Assume everything you post on-line is permanent-employers and colleges will check social media • Don’t over share-just because a site asks for info doesn’t mean they need it • Customize and update your Security Settingsdefault settings are WEAK! PUBLIC is weak

Why do we care? Not everyone that is online with you is who you think they are They take a lot of time sometimes to groom you into a meet or will kidnap

You think you are talking to

In reality

Could lose a job…or a potential career • McDonald's employee fired after posting gross photos of ice cream machine on his twitter account – could also be sued at this point – global news – whistle blower might not cover his legal issues

Don’t be a troll/hater

Red Flags!!!!!!!!!!!!!!!!!!!! • You don’t know them – or they pretend you know them… • They want to see a picture or video of you • They keep asking for more and more information about you or your family (social engineering) • They threaten your family, friends or you • They are nice but get more and more aggressive • They want to know when your parents aren’t hanging around • They claim to be 21 or older • Claim to be in the military or a minister or have come into a lot of money they want to share • Start asking for money a little at a time – or send you gifts or money small stuff to start • Too many compliments about you

The more you know… • Smishing • Instagram • Snapchat • Virtual worlds • YouTube • Social Challenges • Dating sites • Catfishing • Ponzi schemes

Why do we care? Not everyone that is online with you is who you think they are – safety is the concern

Some of the bad people that hang out on social media: • Pedophiles • Scammers • Thieves • Human Traffickers • Imposters • Bullies

They see you as vulnerable, an easy target

LOOKING TO THE FUTURE WANT TO MAKE A DIFFERENCE? • Student

• Join an anti-bullying peer group • Stop any abusive behavior you see

• Careers

• Social media marketing guru • Cybercrime fighter

• Police, FBI, CIA, attorney, own a business that helps law enforcement

• Ethical Hacker • Human trafficking

• Police, border patrol, international police

• Network security • Federal Government

• NSA, FBI, CIA, Central Security Service

LOOKING TO THE FUTURE WANT TO MAKE A DIFFERENCE? Degree/Certificate programs you can take Washtenaw Community College • Criminal Justice and Law Enforcement • Certificate •

• •

Police Academy Certificate

Associate in Arts

• •

Criminal Justice Associate in Arts Paralegal Studies/Pre-Law Associate in Arts

Associate in Applied Science



Criminal Justice - Law Enforcement Associate in Applied Science

• Associate in Applied Science

• Cybersecurity Associate in Applied Science

LOOKING TO THE FUTURE WANT TO MAKE A DIFFERENCE? Degree programs you can take Eastern Michigan University • Information Assurance • Digital Investigations – CSI for computers • Information Assurance Management • Network Security

Companies in Washtenaw County

National Cyber Security Competition for Middle and High School Students Oct-April

Free team registration for 80 Michigan teams, contact Tamara Shoemaker at [email protected] or 734-325-6823

Big ThankYou to:

Tamara Shoemaker - Director at University of Detroit Mercy Center for Cyber Security & Intelligence Studies AND Jennifer Mansfield – Redford Police Department – Human Trafficking Specialist