Internet Security: Staying Safe, Having Fun, And Cruising The ‘Net Daniel Owens IT Security Professional
Jun 27, 2015
Internet Security:Staying Safe, Having Fun, And Cruising The ‘Net
Daniel OwensIT Security Professional
Agenda
IntroductionStaying SafeHaving FunCruising The ‘NetConclusion And Appendices
A Note About Good And Evil
Nothing in this world is purely good or purely evil – to include the Internet and those who use it.
-Daniel Owens
With That Said… A Note About Me
CurrentlyWorking as a NASA contractor in IT Security
FormerlyWorked for/with the…
Department of Defense (DoD) to include the NSAFBIJustice DepartmentMicrosoftOracleCisco
And many more…
MySpaceIBMXeroxBooz Allen HamiltonSystemSecurities
Agenda
IntroductionStaying SafeHaving FunCruising The ‘NetConclusion And Appendices
Protecting Your Computer
Apply updates and patchesThis includes for the Operating System, your web browser, any plug-ins and add-ons for the web browser, any games, and any other software
Use Anti-Malware SoftwareThis includes antivirus, antispyware, and anti-adware software
Examples Include (all free for home use):AVG and Avast!Spybot Search & DestroyAdaware
Protecting Your Privacy
Don’t fill out online surveys or enter contests without permission
Many of these are simply there to get information about you and some can be harmful
Never give out sensitive information about yourself, your family, or others
This includes addresses, school names, your full name, phone numbers, and your schedule/vacation data in advance
Don’t open or respond to SPAMAnd don’t give your email address to just anyone
Doubt Everything
If you can’t verify someone’s identity, you can’t trust them with your informationAnyone can post just about anything on the Internet… pretending to be just about anyone
Just like any other medium
Doubt Everything (cont.)
Agenda
IntroductionStaying SafeHaving FunCruising The ‘NetConclusion And Appendices
Cyberbullying
Often either a source of or voice for rumors
Common places are MySpace and Facebook
Often successful only AFTER the victim starts to respond to the bully(ing)
While it may be difficult, ignoring posts and simply blocking instant messages from people you don’t know is the best way to stop cyberbullying
Can also include compromising a victim’s account and using it
Again, MySpace and Facebook are common vectors, but so are Instant Messengers
Cyberpredators
Few cyberpredators give out their real age, name, and other information
And anyone can find a picture online
Unsolicited instant messages, posts, and emails from strangers should never be responded to
40% of females have been solicited on the Internet at least once before graduating high schoolMales are vulnerable too
Should be treated the same as bullying
If All Else Fails
Change your account name and password
Most bullies and predators won’t be able to track you if you change your information… unless you give it to them
Don’t go there…Just don’t visit the site
The Internet isn’t anonymousWell-trained professionals (and criminals) can track down almost anyone on the InternetIf you’re a victim, talk to your parents and/or a trusted adult
Agenda
IntroductionStaying SafeHaving FunCruising The ‘NetConclusion And Appendices
Be Suspicious Of The Unknown
Warez and TorrentsMany of the software and videos on these sites are bugged in one way or another
Free Games and SoftwareMany of the freeware and shareware software gathers personal information
Often the company owning the software then sells the data
Unknown WebsitesSome sites are designed to install malware onto visitor computers
Be Suspicious Of The Unknown (cont.)
Online Gaming
Protect your privacyGive out as little information as possible
And don’t have your screenname be your real name
Find a ‘room’ where you feel both safe and comfortable and stay there
If things start to go downhill, leave and don’t come back
Avoid games with monthly feesThese often require you to give credit card information and other data that an attacker can steal from the server
Agenda
IntroductionStaying SafeHaving FunCruising The ‘NetConclusion And Appendices
For More Information
Media Awareness Network (MNet)http://www.media-awareness.ca/english/index.cfm
Cyberbullying Research Centerhttp://www.cyberbullying.us/
NetAlerthttp://www.netalert.gov.au/
OnGuard Onlinehttp://www.onguardonline.gov/
For More Information (cont.)
Safe Internet Alliancehttp://www.safeinternet.org/
GRC IT Security Officehttp://itsecurity.grc.nasa.gov
STOP Cyberbullyinghttp://www.stopcyberbullying.org/
Acknowledgements
I stole the background from MicrosoftI stole a lot from my experiences and previous writings