SlideShare ist ein Scribd-Unternehmen logo
1 von 13
PAGE 1

Internet Safety and Security
Presented January 13, 2014

Company Proprietary and Confidential
Company Proprietary and Confidential
Introductions

PAGE 2

Me:
• Austin Stroud – Instructional Designer at
the Monroe County Public Library
• Heavy Internet user since the mid-1990s

You:
• Do you use the Internet regularly?
• If so, what do you use the Internet for?
• What questions about Internet safety and
security do you hope to have answered
today?

Company Proprietary and Confidential
Company Proprietary and Confidential
Needs Assessment

PAGE 3

Let’s all take a short, multiple-choice
assessment to test your current
knowledge about Internet safety and
security: http://tinyurl.com/kkuxas8
No pressure, this is just for fun so no
worries if you don’t know a lot of the
answers. That’s what this program is
for!

This assessment is adapted from
www.getsafeonline.org.

Company Proprietary and Confidential
Company Proprietary and Confidential
Passwords

PAGE 4

Tips For Creating Strong Passwords (from www.gcflearnfree.org):
•
•
•
•
•
•
•

Never use personal information such as your name, birthday, or spouse's name. Personal
information is often publicly available, which makes it much easier for someone to guess your
password.
Use a longer password. Your password should be at least six characters long, and for extra
security it should ideally be at least twelve characters (if the site allows it).
If you need to write down your passwords, keep them in a secure place. It's even better if you
"encrypt" your passwords or just write down hints for them that others won't be able to understand.
Don't use the same password for each account. If someone does discover your password for one
account, all of your other accounts will be vulnerable.
Try to include numbers, symbols and both uppercase and lowercase letters (if the site allows it).
Avoid using words that can be found in the dictionary. For example, "swimming1" would be a very
weak password.
Random passwords are the strongest. Use a password generator
(www.strongpasswordgenerator.com instead of trying to think of your own. Random
passwords are harder to remember, so create a mnemonic device. For example, "H=jNp2#" can be
remembered as "HARRY = jessica NOKIA paris 2 #." This may still seem random, but with a bit of
practice it becomes relatively easy to memorize.

The infographic (http://tinyurl.com/k9cqnj7) I handed out (also from www.gcflearnfree.org) gives
more password advice.

Company Proprietary and Confidential
Company Proprietary and Confidential
Online Security – Phishing Scams

PAGE 5

We are going to watch this short video about
phishing scams from the AARP:
http://www.youtube.com/watch?v=H5QMjLRI24E
Let’s also take a look at this interactive email to see
how deceptive phishing scams can be:
http://www.gcflearnfree.org/internetsafety/4.3

Company Proprietary and Confidential
Company Proprietary and Confidential
Securing Financial Transactions

PAGE 6

Let’s learn more about ensuring a website is
secure before you complete any financial
transactions on the Internet:
http://www.gcflearnfree.org/internetsafety/6.2
We also can take a look at this interactive tool to
see what you should be looking for in a website
before inputting any of your sensitive, private
information:
http://www.gcflearnfree.org/internetsafety/6.5

Company Proprietary and Confidential
Company Proprietary and Confidential
Protecting Your Computer

PAGE 7

Now, we’ll take a look at how to protect your
computer from Internet threats by ensuring your
computer is protected by anti-virus software and
receives regular updates:
http://www.gcflearnfree.org/internetsafety/3

Company Proprietary and Confidential
Company Proprietary and Confidential
Safe Social Networking

PAGE 8

Stay safe on websites like Facebook, Twitter, LinkedIn, YouTube, and
more: http://www.gcflearnfree.org/internetsafety/7
The Privacy Rights Clearinghouse provides a full list of resources for
learning about your privacy rights in the online environment:
https://www.privacyrights.org/Online-Privacy-and-Technology

Company Proprietary and Confidential
Company Proprietary and Confidential
How Secure is Your Information?

PAGE 9

Let’s all go to www.google.com on the Internet and
search for your own name. Example: My name is
Austin Stroud so I will type in Austin Stroud into the
search box and click search. Search for your own
name instead of mine.
•

What kinds of things did you find (if you feel
comfortable sharing)?

•

Were you surprised by what you were able to
find about yourself openly on the Internet?

Company Proprietary and Confidential
Company Proprietary and Confidential
Children
•

PAGE 10

Some resources to protect your children on the Internet:
–
–
–
–

www.gcflearnfree.org/internetsafetyforkids (Internet safety for kids online course)
www.commonsensemedia.org/advice-for-parents/internet-safety-and-privacy (Several
videos targeted at parents and children for Internet safety and security)
www.att.com/Common/images/safety/game.html (A game you can play with your
children to help them learn about Internet safety and security)
www.mcpl.info/childrens/internet-safety-tips-kids (Internet safety tips for kids from
the library)

Company Proprietary and Confidential
Company Proprietary and Confidential
Additional Resources

PAGE 11

•

http://www.gcflearnfree.org/internetsafety (A full course on Internet
safety and security – we viewed portions of it today)

•

http://tinyurl.com/7hgkkrm (Microsoft’s family safety website with
tips, articles, and tutorials)

•

http://www.library.kent.edu/files/webevalform.pdf (A form to help you
evaluate websites on the Internet to ensure they are credible/safe)

Company Proprietary and Confidential
Company Proprietary and Confidential
Questions?

PAGE 12

Company Proprietary and Confidential
Company Proprietary and Confidential
Contact Information

PAGE 13

Austin Stroud
Instructional Designer
812-349-3050 ext. 1666
astroud@mcpl.info

The library also offers free, 1-hour, 1-on-1
sessions to help with basic technology
questions. If interested in scheduling one
of these sessions with a reference staff
member, call 812-349-3228 or fill out a
form on the library website:
http://tinyurl.com/kxzdfxz

Company Proprietary and Confidential
Company Proprietary and Confidential

Weitere ähnliche Inhalte

Andere mochten auch

Uof t symposium competencies
Uof t symposium   competenciesUof t symposium   competencies
Uof t symposium competenciesStephen Abram
 
STEAM in Youth Programming
STEAM in Youth ProgrammingSTEAM in Youth Programming
STEAM in Youth ProgrammingMargaret Portier
 
Meaningful Measures: Why size (and volume) doesn't matter
Meaningful Measures: Why size (and volume) doesn't matterMeaningful Measures: Why size (and volume) doesn't matter
Meaningful Measures: Why size (and volume) doesn't matterRebecca Jones
 
Build an Event Calendar in Drupal
Build an Event Calendar in DrupalBuild an Event Calendar in Drupal
Build an Event Calendar in DrupalAcquia
 
Social, Digital & Mobile Around The World (January 2014)
Social, Digital & Mobile Around The World (January 2014)Social, Digital & Mobile Around The World (January 2014)
Social, Digital & Mobile Around The World (January 2014)We Are Social Singapore
 
Beyond the Gig Economy
Beyond the Gig EconomyBeyond the Gig Economy
Beyond the Gig EconomyJon Lieber
 
Recovery: Job Growth and Education Requirements Through 2020
Recovery: Job Growth and Education Requirements Through 2020Recovery: Job Growth and Education Requirements Through 2020
Recovery: Job Growth and Education Requirements Through 2020CEW Georgetown
 
3 hard facts shaping higher education thinking and behavior
3 hard facts shaping higher education thinking and behavior3 hard facts shaping higher education thinking and behavior
3 hard facts shaping higher education thinking and behaviorGrant Thornton LLP
 
African Americans: College Majors and Earnings
African Americans: College Majors and Earnings African Americans: College Majors and Earnings
African Americans: College Majors and Earnings CEW Georgetown
 
The Online College Labor Market
The Online College Labor MarketThe Online College Labor Market
The Online College Labor MarketCEW Georgetown
 
Game Based Learning for Language Learners
Game Based Learning for Language LearnersGame Based Learning for Language Learners
Game Based Learning for Language LearnersShelly Sanchez Terrell
 
What's Trending in Talent and Learning for 2016?
What's Trending in Talent and Learning for 2016?What's Trending in Talent and Learning for 2016?
What's Trending in Talent and Learning for 2016?Skillsoft
 
SXSW 2016 takeaways
SXSW 2016 takeawaysSXSW 2016 takeaways
SXSW 2016 takeawaysHavas
 
SXSW 2016: The Need To Knows
SXSW 2016: The Need To KnowsSXSW 2016: The Need To Knows
SXSW 2016: The Need To KnowsOgilvy Consulting
 
The French Revolution of 1789
The French Revolution of 1789The French Revolution of 1789
The French Revolution of 1789Tom Richey
 
Digitized Student Development, Social Media, and Identity
Digitized Student Development, Social Media, and IdentityDigitized Student Development, Social Media, and Identity
Digitized Student Development, Social Media, and IdentityPaul Brown
 
8 Tips for Scaling Mobile Users in China by Edith Yeung
8 Tips for Scaling Mobile Users in China by Edith Yeung8 Tips for Scaling Mobile Users in China by Edith Yeung
8 Tips for Scaling Mobile Users in China by Edith YeungEdith Yeung
 
GAME ON! Integrating Games and Simulations in the Classroom
GAME ON! Integrating Games and Simulations in the Classroom GAME ON! Integrating Games and Simulations in the Classroom
GAME ON! Integrating Games and Simulations in the Classroom Brian Housand
 

Andere mochten auch (20)

Uof t symposium competencies
Uof t symposium   competenciesUof t symposium   competencies
Uof t symposium competencies
 
STEAM in Youth Programming
STEAM in Youth ProgrammingSTEAM in Youth Programming
STEAM in Youth Programming
 
Meaningful Measures: Why size (and volume) doesn't matter
Meaningful Measures: Why size (and volume) doesn't matterMeaningful Measures: Why size (and volume) doesn't matter
Meaningful Measures: Why size (and volume) doesn't matter
 
Build an Event Calendar in Drupal
Build an Event Calendar in DrupalBuild an Event Calendar in Drupal
Build an Event Calendar in Drupal
 
Programming ideas
Programming ideasProgramming ideas
Programming ideas
 
Harvard March 2014 transformation future library
Harvard March 2014 transformation   future libraryHarvard March 2014 transformation   future library
Harvard March 2014 transformation future library
 
Social, Digital & Mobile Around The World (January 2014)
Social, Digital & Mobile Around The World (January 2014)Social, Digital & Mobile Around The World (January 2014)
Social, Digital & Mobile Around The World (January 2014)
 
Beyond the Gig Economy
Beyond the Gig EconomyBeyond the Gig Economy
Beyond the Gig Economy
 
Recovery: Job Growth and Education Requirements Through 2020
Recovery: Job Growth and Education Requirements Through 2020Recovery: Job Growth and Education Requirements Through 2020
Recovery: Job Growth and Education Requirements Through 2020
 
3 hard facts shaping higher education thinking and behavior
3 hard facts shaping higher education thinking and behavior3 hard facts shaping higher education thinking and behavior
3 hard facts shaping higher education thinking and behavior
 
African Americans: College Majors and Earnings
African Americans: College Majors and Earnings African Americans: College Majors and Earnings
African Americans: College Majors and Earnings
 
The Online College Labor Market
The Online College Labor MarketThe Online College Labor Market
The Online College Labor Market
 
Game Based Learning for Language Learners
Game Based Learning for Language LearnersGame Based Learning for Language Learners
Game Based Learning for Language Learners
 
What's Trending in Talent and Learning for 2016?
What's Trending in Talent and Learning for 2016?What's Trending in Talent and Learning for 2016?
What's Trending in Talent and Learning for 2016?
 
SXSW 2016 takeaways
SXSW 2016 takeawaysSXSW 2016 takeaways
SXSW 2016 takeaways
 
SXSW 2016: The Need To Knows
SXSW 2016: The Need To KnowsSXSW 2016: The Need To Knows
SXSW 2016: The Need To Knows
 
The French Revolution of 1789
The French Revolution of 1789The French Revolution of 1789
The French Revolution of 1789
 
Digitized Student Development, Social Media, and Identity
Digitized Student Development, Social Media, and IdentityDigitized Student Development, Social Media, and Identity
Digitized Student Development, Social Media, and Identity
 
8 Tips for Scaling Mobile Users in China by Edith Yeung
8 Tips for Scaling Mobile Users in China by Edith Yeung8 Tips for Scaling Mobile Users in China by Edith Yeung
8 Tips for Scaling Mobile Users in China by Edith Yeung
 
GAME ON! Integrating Games and Simulations in the Classroom
GAME ON! Integrating Games and Simulations in the Classroom GAME ON! Integrating Games and Simulations in the Classroom
GAME ON! Integrating Games and Simulations in the Classroom
 

Ähnlich wie Internet Safety & Security

Friend is Not A Verb
Friend is Not A VerbFriend is Not A Verb
Friend is Not A VerbAndy Smith
 
Week 4 digital overload and privacy
Week 4 digital overload and privacyWeek 4 digital overload and privacy
Week 4 digital overload and privacyRay Brannon
 
What's Next for Technology? Mansfield Senior Center 2014
What's Next for Technology? Mansfield Senior Center 2014What's Next for Technology? Mansfield Senior Center 2014
What's Next for Technology? Mansfield Senior Center 2014Steve Sokoloski
 
Internet Safety.pptx
Internet Safety.pptxInternet Safety.pptx
Internet Safety.pptxAljunMisa
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersStephen Thomas, CISSP
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersStephen Thomas, CISSP
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquetteEmmanuelaSernicul
 
Lesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxLesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxJoy Dugayo
 
The Veterans' Guide to Protecting Your Privacy and Staying Safe Online
The Veterans' Guide to Protecting Your Privacy and Staying Safe OnlineThe Veterans' Guide to Protecting Your Privacy and Staying Safe Online
The Veterans' Guide to Protecting Your Privacy and Staying Safe OnlineJinger Jarrett
 
Educational Technology 1
Educational Technology 1Educational Technology 1
Educational Technology 1Angelica Vargas
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
 
Ctss Safe Internet For Kids
Ctss Safe Internet For KidsCtss Safe Internet For Kids
Ctss Safe Internet For Kidskwazy
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awarenessKaran Veer Singh
 
hamad.pwrpoint.pdf
hamad.pwrpoint.pdfhamad.pwrpoint.pdf
hamad.pwrpoint.pdfhmooodes115
 
Internet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for ParentsInternet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for Parentssafetyseminar
 
Is Your Face In The Book?
Is Your Face In The Book?Is Your Face In The Book?
Is Your Face In The Book?Andy Smith
 
Securing, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-HSecuring, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-Hjmoore55
 

Ähnlich wie Internet Safety & Security (20)

Friend is Not A Verb
Friend is Not A VerbFriend is Not A Verb
Friend is Not A Verb
 
Week 4 digital overload and privacy
Week 4 digital overload and privacyWeek 4 digital overload and privacy
Week 4 digital overload and privacy
 
Content is ux
Content is uxContent is ux
Content is ux
 
What's Next for Technology? Mansfield Senior Center 2014
What's Next for Technology? Mansfield Senior Center 2014What's Next for Technology? Mansfield Senior Center 2014
What's Next for Technology? Mansfield Senior Center 2014
 
Internet Safety.pptx
Internet Safety.pptxInternet Safety.pptx
Internet Safety.pptx
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
Lesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxLesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptx
 
The Veterans' Guide to Protecting Your Privacy and Staying Safe Online
The Veterans' Guide to Protecting Your Privacy and Staying Safe OnlineThe Veterans' Guide to Protecting Your Privacy and Staying Safe Online
The Veterans' Guide to Protecting Your Privacy and Staying Safe Online
 
Educational Technology 1
Educational Technology 1Educational Technology 1
Educational Technology 1
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Ctss Safe Internet For Kids
Ctss Safe Internet For KidsCtss Safe Internet For Kids
Ctss Safe Internet For Kids
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
Users guide
Users guideUsers guide
Users guide
 
hamad.pwrpoint.pdf
hamad.pwrpoint.pdfhamad.pwrpoint.pdf
hamad.pwrpoint.pdf
 
Internet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for ParentsInternet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for Parents
 
Is Your Face In The Book?
Is Your Face In The Book?Is Your Face In The Book?
Is Your Face In The Book?
 
Securing, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-HSecuring, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-H
 

Mehr von Austin Stroud

Rotary Classification Talk
Rotary Classification TalkRotary Classification Talk
Rotary Classification TalkAustin Stroud
 
Assistive Technologies @ Your Library
Assistive Technologies @ Your Library Assistive Technologies @ Your Library
Assistive Technologies @ Your Library Austin Stroud
 
Battle FUD* at Your Library
Battle FUD* at Your LibraryBattle FUD* at Your Library
Battle FUD* at Your LibraryAustin Stroud
 
Marketing through Social Media
Marketing through Social MediaMarketing through Social Media
Marketing through Social MediaAustin Stroud
 
Organizing and Editing Your Photos
Organizing and Editing Your PhotosOrganizing and Editing Your Photos
Organizing and Editing Your PhotosAustin Stroud
 
Spring 2013 IOLUG Conference Presentation: Instructional Design in Libraries ...
Spring 2013 IOLUG Conference Presentation: Instructional Design in Libraries ...Spring 2013 IOLUG Conference Presentation: Instructional Design in Libraries ...
Spring 2013 IOLUG Conference Presentation: Instructional Design in Libraries ...Austin Stroud
 
Public Library Services: My Path & Experiences
Public Library Services:  My Path & ExperiencesPublic Library Services:  My Path & Experiences
Public Library Services: My Path & ExperiencesAustin Stroud
 
The Life of an Instructional Librarian
The Life of an Instructional LibrarianThe Life of an Instructional Librarian
The Life of an Instructional LibrarianAustin Stroud
 
Presenting with PowerPoint
Presenting with PowerPointPresenting with PowerPoint
Presenting with PowerPointAustin Stroud
 

Mehr von Austin Stroud (16)

Rotary Classification Talk
Rotary Classification TalkRotary Classification Talk
Rotary Classification Talk
 
Assistive Technologies @ Your Library
Assistive Technologies @ Your Library Assistive Technologies @ Your Library
Assistive Technologies @ Your Library
 
Battle FUD* at Your Library
Battle FUD* at Your LibraryBattle FUD* at Your Library
Battle FUD* at Your Library
 
Marketing through Social Media
Marketing through Social MediaMarketing through Social Media
Marketing through Social Media
 
Organizing and Editing Your Photos
Organizing and Editing Your PhotosOrganizing and Editing Your Photos
Organizing and Editing Your Photos
 
Spring 2013 IOLUG Conference Presentation: Instructional Design in Libraries ...
Spring 2013 IOLUG Conference Presentation: Instructional Design in Libraries ...Spring 2013 IOLUG Conference Presentation: Instructional Design in Libraries ...
Spring 2013 IOLUG Conference Presentation: Instructional Design in Libraries ...
 
Public Library Services: My Path & Experiences
Public Library Services:  My Path & ExperiencesPublic Library Services:  My Path & Experiences
Public Library Services: My Path & Experiences
 
The Life of an Instructional Librarian
The Life of an Instructional LibrarianThe Life of an Instructional Librarian
The Life of an Instructional Librarian
 
Presenting with PowerPoint
Presenting with PowerPointPresenting with PowerPoint
Presenting with PowerPoint
 
Facebook101
Facebook101Facebook101
Facebook101
 
Typing 3
Typing 3Typing 3
Typing 3
 
Typing 2
Typing 2Typing 2
Typing 2
 
Typing 1
Typing 1Typing 1
Typing 1
 
Basic computing
Basic computingBasic computing
Basic computing
 
Email101
Email101Email101
Email101
 
Facebook virality
Facebook viralityFacebook virality
Facebook virality
 

Kürzlich hochgeladen

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 

Kürzlich hochgeladen (20)

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 

Internet Safety & Security

  • 1. PAGE 1 Internet Safety and Security Presented January 13, 2014 Company Proprietary and Confidential Company Proprietary and Confidential
  • 2. Introductions PAGE 2 Me: • Austin Stroud – Instructional Designer at the Monroe County Public Library • Heavy Internet user since the mid-1990s You: • Do you use the Internet regularly? • If so, what do you use the Internet for? • What questions about Internet safety and security do you hope to have answered today? Company Proprietary and Confidential Company Proprietary and Confidential
  • 3. Needs Assessment PAGE 3 Let’s all take a short, multiple-choice assessment to test your current knowledge about Internet safety and security: http://tinyurl.com/kkuxas8 No pressure, this is just for fun so no worries if you don’t know a lot of the answers. That’s what this program is for! This assessment is adapted from www.getsafeonline.org. Company Proprietary and Confidential Company Proprietary and Confidential
  • 4. Passwords PAGE 4 Tips For Creating Strong Passwords (from www.gcflearnfree.org): • • • • • • • Never use personal information such as your name, birthday, or spouse's name. Personal information is often publicly available, which makes it much easier for someone to guess your password. Use a longer password. Your password should be at least six characters long, and for extra security it should ideally be at least twelve characters (if the site allows it). If you need to write down your passwords, keep them in a secure place. It's even better if you "encrypt" your passwords or just write down hints for them that others won't be able to understand. Don't use the same password for each account. If someone does discover your password for one account, all of your other accounts will be vulnerable. Try to include numbers, symbols and both uppercase and lowercase letters (if the site allows it). Avoid using words that can be found in the dictionary. For example, "swimming1" would be a very weak password. Random passwords are the strongest. Use a password generator (www.strongpasswordgenerator.com instead of trying to think of your own. Random passwords are harder to remember, so create a mnemonic device. For example, "H=jNp2#" can be remembered as "HARRY = jessica NOKIA paris 2 #." This may still seem random, but with a bit of practice it becomes relatively easy to memorize. The infographic (http://tinyurl.com/k9cqnj7) I handed out (also from www.gcflearnfree.org) gives more password advice. Company Proprietary and Confidential Company Proprietary and Confidential
  • 5. Online Security – Phishing Scams PAGE 5 We are going to watch this short video about phishing scams from the AARP: http://www.youtube.com/watch?v=H5QMjLRI24E Let’s also take a look at this interactive email to see how deceptive phishing scams can be: http://www.gcflearnfree.org/internetsafety/4.3 Company Proprietary and Confidential Company Proprietary and Confidential
  • 6. Securing Financial Transactions PAGE 6 Let’s learn more about ensuring a website is secure before you complete any financial transactions on the Internet: http://www.gcflearnfree.org/internetsafety/6.2 We also can take a look at this interactive tool to see what you should be looking for in a website before inputting any of your sensitive, private information: http://www.gcflearnfree.org/internetsafety/6.5 Company Proprietary and Confidential Company Proprietary and Confidential
  • 7. Protecting Your Computer PAGE 7 Now, we’ll take a look at how to protect your computer from Internet threats by ensuring your computer is protected by anti-virus software and receives regular updates: http://www.gcflearnfree.org/internetsafety/3 Company Proprietary and Confidential Company Proprietary and Confidential
  • 8. Safe Social Networking PAGE 8 Stay safe on websites like Facebook, Twitter, LinkedIn, YouTube, and more: http://www.gcflearnfree.org/internetsafety/7 The Privacy Rights Clearinghouse provides a full list of resources for learning about your privacy rights in the online environment: https://www.privacyrights.org/Online-Privacy-and-Technology Company Proprietary and Confidential Company Proprietary and Confidential
  • 9. How Secure is Your Information? PAGE 9 Let’s all go to www.google.com on the Internet and search for your own name. Example: My name is Austin Stroud so I will type in Austin Stroud into the search box and click search. Search for your own name instead of mine. • What kinds of things did you find (if you feel comfortable sharing)? • Were you surprised by what you were able to find about yourself openly on the Internet? Company Proprietary and Confidential Company Proprietary and Confidential
  • 10. Children • PAGE 10 Some resources to protect your children on the Internet: – – – – www.gcflearnfree.org/internetsafetyforkids (Internet safety for kids online course) www.commonsensemedia.org/advice-for-parents/internet-safety-and-privacy (Several videos targeted at parents and children for Internet safety and security) www.att.com/Common/images/safety/game.html (A game you can play with your children to help them learn about Internet safety and security) www.mcpl.info/childrens/internet-safety-tips-kids (Internet safety tips for kids from the library) Company Proprietary and Confidential Company Proprietary and Confidential
  • 11. Additional Resources PAGE 11 • http://www.gcflearnfree.org/internetsafety (A full course on Internet safety and security – we viewed portions of it today) • http://tinyurl.com/7hgkkrm (Microsoft’s family safety website with tips, articles, and tutorials) • http://www.library.kent.edu/files/webevalform.pdf (A form to help you evaluate websites on the Internet to ensure they are credible/safe) Company Proprietary and Confidential Company Proprietary and Confidential
  • 12. Questions? PAGE 12 Company Proprietary and Confidential Company Proprietary and Confidential
  • 13. Contact Information PAGE 13 Austin Stroud Instructional Designer 812-349-3050 ext. 1666 astroud@mcpl.info The library also offers free, 1-hour, 1-on-1 sessions to help with basic technology questions. If interested in scheduling one of these sessions with a reference staff member, call 812-349-3228 or fill out a form on the library website: http://tinyurl.com/kxzdfxz Company Proprietary and Confidential Company Proprietary and Confidential