Online Safety and Awareness
Jan 16, 2016
Online Safety and Awareness
Introductions
• We are students at UNM
• We are taking an Information Security course this semester.
• It is our mission to teach others how to be safe online!
Introductions
We feel it is important to teach this to YOU:
Eighth grade students are just beginning to enter the online world, and are especially vulnerable. We want to give you the TOOLS to keep yourself and your classmates SAFE!!
Tell us what you already know...
About being safe online
What you’ve heard before…
• STRANGER DANGER–Don’t give out personal information
to strangers online!–Be sure that you know who you are
speaking to online, and that they are not an imposter or stranger.
Online Safety
• What happens when the attack is from a friend?–Cyber bullying is becoming more
common, as students increasingly use email, text messaging, Facebook, Snapchat, Instagram and other social networking sites, and interact online.
Jennifer Lawrence
Victim of cyber bullying?
How many of you…
…think that I could be a hacker?
Technology Demonstration
Technology Demonstration
Technology Demonstration
Technology Demonstration
Technology Demonstration
Technology Demonstration
Technology Demonstration
Technology Demonstration
Technology Demonstration
Technology Demonstration
Technology Demonstration
Technology Demonstration
Technology Demonstration
• This is just one of the ways that Jennifer Lawrence’s pictures could have been stolen…. All without her knowing, or giving consent.
Cyber Bullying
What being cyberbullied feels like…
Cyber Bullying
If you are being bullied, it is important to remember:
Cyber Bullying– Over half of adolescents and teens have been bullied
online, and about the same number have engaged in cyber bullying.
– More than 1 in 3 young people have experienced
cyber threats online.
– Over 25 percent of adolescents and teens have been
bullied repeatedly through their cell phones or the Internet.
– Well over half of young people do not tell their parents when cyber bullying occurs.
Cyberbullying is happening at your school.
Be aware!
Why does cyber bullying happen?
• Anonymity–Cyber bullies can feel protected
because they don’t feel accountable for their actions behind the computer.
Why does cyber bullying happen?
• Remember that what you post is PERMANENT and can be spread very quickly without your consent.
Why does cyber bullying happen?
• Think about the other side of the click:–Trust your gut feeling, if you don’t feel
right about it, don’t pass it along.
Cyber bullying and the law
• Certain types of cyberbullying may violate school codes or breach anti-discrimination and sexual harassment laws.
• In many states “sexting” or forwarding a “sext” (sexual messages) is punishable as distributing or possessing child pornography, and requires even minors to be registered as sex offenders.
Let your hopes, not your hurts, shape your future
How should I respond to cyber bullying?
Build your confidence by repeating things you love about yourself.
Unplug from online! Get outside, get some sunshine, and exercise. This can help to reduce stress and anxiety!
Sign the pledge!
How should I respond to cyber bullying?
Anonymous Hotlines:• The Trevor Lifeline
866-4-U-TREVOR (488-7386)Twenty-four hours a day, seven days a weekhttp://www.thetrevorproject.org
• The New Mexico Crisis and Access Line istoll free and is staffed 24 hours a day, 7 days a week
1 (855) NMCRISIS (662-7474)
Social Engineering
• Another form of online harassment.
Survey Results
Yes No Not sure0
2
4
6
8
10
12
14
16
4
15
1
Have you ever been tricked into clicking a link that you thought was from someone you
knew?
Who is behind Social Engineering?
• Someone who wants specific information from the victim, and will get it by any means necessary
• Cyber-criminal– “An individual
who commits cybercrimes, where he/she makes use of the computer either as a tool or as a target or as both”
Information Gathering
• Any AND everything on the internet– Posts– Photos– “Likes”
• Connections - friend of a friend
Develop a Relationship
• Messages:– Email Hoaxes
• Urgent request• Compelling story• “You won the
lottery!!!”– Software Installation:
• System updates• Links to
websites/webpages
Exploitation of Relationship
• Social Media Scams:– “Someone has a
secret crush on you, click here to find out”
• Phishing e-mails:– “This is John from
tech support. Your computer has been infected with a virus.”
Execution to Achieve the Objective
• Malicious code– Trojan Horses– Viruses– Worms
• More leads & information
Example of Social Engineering
Prevention
• Never disclose passwords
• Question people you don’t know
• Regularly update security features
• Watch what you post online
Prevent your CELLPHONE from being hacked
• Strengthen Passwords– Pass-phrase– Change often– DO NOT use same
password• Other Security
Factors– Public WiFi
My Story
– Weekend in Albuquerque– FB message with link– Friend notified me– FB account was hacked