SlideShare a Scribd company logo
Internet Safety
Staying Safe on the Wild, Wild
Internet
Your Host:
Vicky Yuki, Outreach & Education Coordinator
City of Seattle Community Technology Program
Created by:
David R. Matthews, CISSP, GSEC
Some Sobering Stats
 1 in 4 teens online had unwanted exposure
to sexually explicit pictures
 Approximately 1 in 5 received a sexual
solicitation or approach
 1 in 17 was threatened or harassed
 1 in 33 received an aggressive sexual
solicitation (from someone who asked to meet them
somewhere; called them on the telephone; sent them
regular mail, money or gifts)
**From a year 2000 report by the Center for Missing & Exploited Children
Identity Theft
“Risk of ID theft bonanza as thousands of
credit card slips found dumped in skip ”
BY Miles Brignall & Phillip Inman (Jan 9, 2006)

- The Guardian

 "Thousands of documents revealing the credit
card numbers, addresses, phone numbers and
signatures of guests were dumped in an open
skip ."
 “Each one lists the name, company, home
address and credit card number in full. ”
 “This information in the wrong hands could be
very dangerous. “
What‟s the problem?
“2005 worst year for breaches of computer
security”
By Jon Swartz (Dec. 29, 2005), USA TODAY

 “At least 130 reported breaches have
exposed more than 55 million Americans to
potential ID theft ...”
 “…cybercrime proceeds in 2004 were $105
billion, greater than those of illegal drug
sales.”
What‟s the problem (2)?
“Common sense can halt cyber criminals
- Reputable companies deemed far safer”
BY JUAN ORTEGA (Dec 21, 2005)

- FLORIDA TODAY

 "There are criminals from all over the world
trying to take advantage of this."
 “About one in four Internet users are hit with
e-mail scams every month”
Cyber Crime is Changing
 Hackers used to be in it for the reputation
they could gain. For pride of having beat the
system
 Now it‟s all about the money
 Organized crime is behind most of it
How is identity information
stolen







Burglary of your home, including mail
From your employer or school
From companies you do business with
Obtaining unauthorized credit reports
Stealing wallets, purses, laptops, etc.
Obtaining info from you by “social engineering” or
manipulating you to give up confidential info
 Technology Access - Internet
Risk Mitigation
 If you chat online, only allow connections to
people you know and have met off-line
 Don‟t reveal address, phone, school, sibs
names, especially SSN or Credit Card #s in
profiles
 Only purchase online from reputable and
well known companies
 Don‟t fall for „Phishing‟ schemes
Risk Mitigation (2)
 Don‟t click on links in emails or websites that
you aren‟t sure are legitimate
 Use text based email – not HTML
 Have good Antivirus, Anti-spyware, Antispam, and a software firewall – updated
automatically
 Have a hardware firewall between your
home network and the Internet
Risk Mitigation (3)
 Lock down any wireless access points with
good encryption, etc.
 Carefully examine ATMs before using them
– look around
 Don‟t let your Credit Cards get out of sight at
a restaurant or club
 Shred anything with Personally Identifiable
Information (PII)
 Use a locking mailbox
Quiz Questions (1)
 I receive several offers of pre-approved
credit every week. (5 points) Add 5 points if
you don‟t shred them.

 I carry my Social Security card in my wallet.
(10 points)
Quiz Questions (2)
 My driver‟s license has my Social Security
number on it. (10 points)
 I don‟t have a post office box or a locked,
secured mailbox. (5 points)
Quiz Questions (3)
 I use an unlocked, open box at work or at
home to mail my bills. (10 points)
 I carry my military ID in my wallet at all
times. (10 points)
Quiz Questions (4)
 I provide my Social Security number whenever
asked, without asking questions about how that
information will be safeguarded. (10 points) Add 5
points if you provide your number orally without
checking to see who might be listening.
 I‟m required to use my Social Security number at
work as an employee ID or at school as a student
ID number. (5 points)
Quiz Questions (5)
 My Social Security number is printed on
various documents frequently seen in the
workplace, such as on time cards. (10
points)
 I have my Social Security number and/or
driver‟s license number printed on my
personal checks. (10 points)
Quiz Questions (6)
 I carry my insurance card in my wallet, and
either my Social Security number or that of
my spouse is on that card. (10 points)

 I haven‟t ordered a copy of my credit report
for at least two years. (20 point)
Quiz Questions (7)
 I don‟t protect my discarded personal, credit, and
financial information from thieves by shredding
them prior to putting them in the trash. (10 points)
 Add your score. It it‟s 100 points or more, you are
at high risk for identity theft. If your score is 50 100, you‟re at average risk, but your risk is higher
if you have good credit. If your score is 0 – 50
points, you have a low risk of being an identity
theft victim.
How to Protect Yourself from
Identity Theft? You Can‟t
 Only Two Ways to Protect Yourself
– Have no personally identifying information
– Never, ever, ever, have it where someone else could
conceivably get access to it
Questions?
Vicky Yuki
Outreach & Education Coordinator
City of Seattle
206-233-7877
vicky.yuki@seattle.gov

More Related Content

PPT
Identity theft
Eqhball Ghazizadeh
 
PPTX
ID Theft and Computer Security 2008
Donald E. Hester
 
PPTX
Identity theft ppt
Cut 2 Shreds
 
PPTX
Data theft
Laura
 
PPTX
Identity Theft Presentation
charlesgarrett
 
PPTX
Id Theft & Phishing2
Jeffavery9
 
PPTX
Id Theft & Phishing2
Jeffavery99
 
PPTX
H -Tech frauds of identity theft, Identity cloning and address mirroring
GAURAV. H .TANDON
 
Identity theft
Eqhball Ghazizadeh
 
ID Theft and Computer Security 2008
Donald E. Hester
 
Identity theft ppt
Cut 2 Shreds
 
Data theft
Laura
 
Identity Theft Presentation
charlesgarrett
 
Id Theft & Phishing2
Jeffavery9
 
Id Theft & Phishing2
Jeffavery99
 
H -Tech frauds of identity theft, Identity cloning and address mirroring
GAURAV. H .TANDON
 

What's hot (11)

PDF
Child Identity Theft
- Mark - Fullbright
 
PPTX
Phishing
Basil Alothman
 
PDF
Digital footprints (preview)
Neeraj Mahajan
 
PPTX
Phishing
Ajit Yadav
 
PDF
IT Sample Paper
Write My Essay
 
PPTX
Identity theft
SARASWATHI S
 
PPT
UW School of Medicine Social Engineering and Phishing Awareness
Nicholas Davis
 
PPTX
Social Engineering
SpencerBurton8
 
PPT
The Phishing Ecosystem
amiable_indian
 
PPT
Security Presentation
jpeters_securitysnapshot
 
PPTX
Boushrat 9 a
Anumod E Nair
 
Child Identity Theft
- Mark - Fullbright
 
Phishing
Basil Alothman
 
Digital footprints (preview)
Neeraj Mahajan
 
Phishing
Ajit Yadav
 
IT Sample Paper
Write My Essay
 
Identity theft
SARASWATHI S
 
UW School of Medicine Social Engineering and Phishing Awareness
Nicholas Davis
 
Social Engineering
SpencerBurton8
 
The Phishing Ecosystem
amiable_indian
 
Security Presentation
jpeters_securitysnapshot
 
Boushrat 9 a
Anumod E Nair
 
Ad

Viewers also liked (20)

PPTX
Classical Roots 1-4
jman627
 
PPT
Internet
Naman Goel
 
PPTX
Ppt on internet
Rahul Gandhi
 
PPT
The Internet Presentation
guest9e3d59
 
PPTX
Top Internet & Technology Trends for 2014
QNET Ltd
 
PDF
Internet technology and web engineering
Professor Lili Saghafi
 
PPT
15 Ways to Make Your Organization More Likeable
Likeable Media
 
PPTX
Teacher as an Academic Leader
m nagaRAJU
 
PPT
Social Media Society May 2011 (actionitems)
Dave Kerpen
 
PDF
Social Media Week agency2. Be A Leader in Social Media
Joel Davis
 
PPTX
Keene State College Technology Design and Safety Center
rcobb67
 
PPT
Multimedia Presentation On Technology Integration
DebraFisher
 
PPTX
Cyber Saftey-_-
Gav
 
PDF
Seminar on Internet Technologies
Kiran Vadakkath
 
KEY
Internet Saftey
rogerkh
 
PPTX
E saftey by lily ngo
lilykimngo
 
PPT
Schooling By Design Ch 7 What Is The Job Of The Academic Leader
Sue Fox
 
PPS
Human Area Networking Technology
Vinayak Hegde
 
PPTX
Occupational Safety and Health
Kaniz shapla
 
PPT
Red tacton ppt
sorabh2312
 
Classical Roots 1-4
jman627
 
Internet
Naman Goel
 
Ppt on internet
Rahul Gandhi
 
The Internet Presentation
guest9e3d59
 
Top Internet & Technology Trends for 2014
QNET Ltd
 
Internet technology and web engineering
Professor Lili Saghafi
 
15 Ways to Make Your Organization More Likeable
Likeable Media
 
Teacher as an Academic Leader
m nagaRAJU
 
Social Media Society May 2011 (actionitems)
Dave Kerpen
 
Social Media Week agency2. Be A Leader in Social Media
Joel Davis
 
Keene State College Technology Design and Safety Center
rcobb67
 
Multimedia Presentation On Technology Integration
DebraFisher
 
Cyber Saftey-_-
Gav
 
Seminar on Internet Technologies
Kiran Vadakkath
 
Internet Saftey
rogerkh
 
E saftey by lily ngo
lilykimngo
 
Schooling By Design Ch 7 What Is The Job Of The Academic Leader
Sue Fox
 
Human Area Networking Technology
Vinayak Hegde
 
Occupational Safety and Health
Kaniz shapla
 
Red tacton ppt
sorabh2312
 
Ad

Similar to Community Technology Internet Safety Presentation (20)

PDF
Identity Theft-How to Reduce Your Risk-03-16
Barbara O'Neill
 
PDF
Common Consumer Frauds and How to Avoid Them-03-14
Barbara O'Neill
 
PPT
ID Theft
Willhack
 
PPT
Identity Theft Lake Placid 2012
Mark Kotzin
 
PDF
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
- Mark - Fullbright
 
PDF
Identity Theft Risk Assessment Quiz-01-15
Barbara O'Neill
 
PPT
Identity Theft Scams
ncpd
 
PPTX
Protecting Personal Privacy
DoubleXDS
 
PPTX
ISSA - Security Awareness 2016-1
Pedro Serrano
 
PPT
Identity Theft: How to Reduce Your Risk
milfamln
 
PPTX
PROTECTION PERSONAL PRIVACY
DoubleXDS
 
PDF
Identity theft
Nick Chandi
 
PDF
ID Theft Prevention
OremDPS
 
PPT
Id theft-phishing-research
Justin Saunders
 
PDF
Common Consumer Frauds & How to Avoid Them
milfamln
 
PPTX
Cyber Security Awareness October 2014
Donald E. Hester
 
PPTX
Identity Theft and How to Prevent Them in the Digital Age
Maven Logix
 
PPT
Identity Theft nigerian fraud cyberbullying
Matt Smith
 
PPTX
ASIS Phoenix February Presentation
John Hamilton, DAHC,EHC,CFDAI, CPP, PSPO
 
PDF
PREVENTING ID THEFT GUIDE FOR CONSUMERS
Greg Ewers
 
Identity Theft-How to Reduce Your Risk-03-16
Barbara O'Neill
 
Common Consumer Frauds and How to Avoid Them-03-14
Barbara O'Neill
 
ID Theft
Willhack
 
Identity Theft Lake Placid 2012
Mark Kotzin
 
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
- Mark - Fullbright
 
Identity Theft Risk Assessment Quiz-01-15
Barbara O'Neill
 
Identity Theft Scams
ncpd
 
Protecting Personal Privacy
DoubleXDS
 
ISSA - Security Awareness 2016-1
Pedro Serrano
 
Identity Theft: How to Reduce Your Risk
milfamln
 
PROTECTION PERSONAL PRIVACY
DoubleXDS
 
Identity theft
Nick Chandi
 
ID Theft Prevention
OremDPS
 
Id theft-phishing-research
Justin Saunders
 
Common Consumer Frauds & How to Avoid Them
milfamln
 
Cyber Security Awareness October 2014
Donald E. Hester
 
Identity Theft and How to Prevent Them in the Digital Age
Maven Logix
 
Identity Theft nigerian fraud cyberbullying
Matt Smith
 
ASIS Phoenix February Presentation
John Hamilton, DAHC,EHC,CFDAI, CPP, PSPO
 
PREVENTING ID THEFT GUIDE FOR CONSUMERS
Greg Ewers
 

Recently uploaded (20)

PDF
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Nguyen Thanh Tu Collection
 
PPTX
family health care settings home visit - unit 6 - chn 1 - gnm 1st year.pptx
Priyanshu Anand
 
PPTX
Measures_of_location_-_Averages_and__percentiles_by_DR SURYA K.pptx
Surya Ganesh
 
DOCX
pgdei-UNIT -V Neurological Disorders & developmental disabilities
JELLA VISHNU DURGA PRASAD
 
PPTX
How to Track Skills & Contracts Using Odoo 18 Employee
Celine George
 
PPTX
Applications of matrices In Real Life_20250724_091307_0000.pptx
gehlotkrish03
 
PPTX
Software Engineering BSC DS UNIT 1 .pptx
Dr. Pallawi Bulakh
 
PPTX
Basics and rules of probability with real-life uses
ravatkaran694
 
PDF
RA 12028_ARAL_Orientation_Day-2-Sessions_v2.pdf
Seven De Los Reyes
 
PDF
2.Reshaping-Indias-Political-Map.ppt/pdf/8th class social science Exploring S...
Sandeep Swamy
 
PPTX
How to Apply for a Job From Odoo 18 Website
Celine George
 
PDF
Review of Related Literature & Studies.pdf
Thelma Villaflores
 
PPTX
20250924 Navigating the Future: How to tell the difference between an emergen...
McGuinness Institute
 
PPTX
CDH. pptx
AneetaSharma15
 
PPTX
An introduction to Prepositions for beginners.pptx
drsiddhantnagine
 
PPTX
Kanban Cards _ Mass Action in Odoo 18.2 - Odoo Slides
Celine George
 
PPTX
Python-Application-in-Drug-Design by R D Jawarkar.pptx
Rahul Jawarkar
 
PDF
The Minister of Tourism, Culture and Creative Arts, Abla Dzifa Gomashie has e...
nservice241
 
PPTX
TEF & EA Bsc Nursing 5th sem.....BBBpptx
AneetaSharma15
 
PPTX
Dakar Framework Education For All- 2000(Act)
santoshmohalik1
 
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Nguyen Thanh Tu Collection
 
family health care settings home visit - unit 6 - chn 1 - gnm 1st year.pptx
Priyanshu Anand
 
Measures_of_location_-_Averages_and__percentiles_by_DR SURYA K.pptx
Surya Ganesh
 
pgdei-UNIT -V Neurological Disorders & developmental disabilities
JELLA VISHNU DURGA PRASAD
 
How to Track Skills & Contracts Using Odoo 18 Employee
Celine George
 
Applications of matrices In Real Life_20250724_091307_0000.pptx
gehlotkrish03
 
Software Engineering BSC DS UNIT 1 .pptx
Dr. Pallawi Bulakh
 
Basics and rules of probability with real-life uses
ravatkaran694
 
RA 12028_ARAL_Orientation_Day-2-Sessions_v2.pdf
Seven De Los Reyes
 
2.Reshaping-Indias-Political-Map.ppt/pdf/8th class social science Exploring S...
Sandeep Swamy
 
How to Apply for a Job From Odoo 18 Website
Celine George
 
Review of Related Literature & Studies.pdf
Thelma Villaflores
 
20250924 Navigating the Future: How to tell the difference between an emergen...
McGuinness Institute
 
CDH. pptx
AneetaSharma15
 
An introduction to Prepositions for beginners.pptx
drsiddhantnagine
 
Kanban Cards _ Mass Action in Odoo 18.2 - Odoo Slides
Celine George
 
Python-Application-in-Drug-Design by R D Jawarkar.pptx
Rahul Jawarkar
 
The Minister of Tourism, Culture and Creative Arts, Abla Dzifa Gomashie has e...
nservice241
 
TEF & EA Bsc Nursing 5th sem.....BBBpptx
AneetaSharma15
 
Dakar Framework Education For All- 2000(Act)
santoshmohalik1
 

Community Technology Internet Safety Presentation

  • 1. Internet Safety Staying Safe on the Wild, Wild Internet Your Host: Vicky Yuki, Outreach & Education Coordinator City of Seattle Community Technology Program Created by: David R. Matthews, CISSP, GSEC
  • 2. Some Sobering Stats  1 in 4 teens online had unwanted exposure to sexually explicit pictures  Approximately 1 in 5 received a sexual solicitation or approach  1 in 17 was threatened or harassed  1 in 33 received an aggressive sexual solicitation (from someone who asked to meet them somewhere; called them on the telephone; sent them regular mail, money or gifts) **From a year 2000 report by the Center for Missing & Exploited Children
  • 3. Identity Theft “Risk of ID theft bonanza as thousands of credit card slips found dumped in skip ” BY Miles Brignall & Phillip Inman (Jan 9, 2006) - The Guardian  "Thousands of documents revealing the credit card numbers, addresses, phone numbers and signatures of guests were dumped in an open skip ."  “Each one lists the name, company, home address and credit card number in full. ”  “This information in the wrong hands could be very dangerous. “
  • 4. What‟s the problem? “2005 worst year for breaches of computer security” By Jon Swartz (Dec. 29, 2005), USA TODAY  “At least 130 reported breaches have exposed more than 55 million Americans to potential ID theft ...”  “…cybercrime proceeds in 2004 were $105 billion, greater than those of illegal drug sales.”
  • 5. What‟s the problem (2)? “Common sense can halt cyber criminals - Reputable companies deemed far safer” BY JUAN ORTEGA (Dec 21, 2005) - FLORIDA TODAY  "There are criminals from all over the world trying to take advantage of this."  “About one in four Internet users are hit with e-mail scams every month”
  • 6. Cyber Crime is Changing  Hackers used to be in it for the reputation they could gain. For pride of having beat the system  Now it‟s all about the money  Organized crime is behind most of it
  • 7. How is identity information stolen       Burglary of your home, including mail From your employer or school From companies you do business with Obtaining unauthorized credit reports Stealing wallets, purses, laptops, etc. Obtaining info from you by “social engineering” or manipulating you to give up confidential info  Technology Access - Internet
  • 8. Risk Mitigation  If you chat online, only allow connections to people you know and have met off-line  Don‟t reveal address, phone, school, sibs names, especially SSN or Credit Card #s in profiles  Only purchase online from reputable and well known companies  Don‟t fall for „Phishing‟ schemes
  • 9. Risk Mitigation (2)  Don‟t click on links in emails or websites that you aren‟t sure are legitimate  Use text based email – not HTML  Have good Antivirus, Anti-spyware, Antispam, and a software firewall – updated automatically  Have a hardware firewall between your home network and the Internet
  • 10. Risk Mitigation (3)  Lock down any wireless access points with good encryption, etc.  Carefully examine ATMs before using them – look around  Don‟t let your Credit Cards get out of sight at a restaurant or club  Shred anything with Personally Identifiable Information (PII)  Use a locking mailbox
  • 11. Quiz Questions (1)  I receive several offers of pre-approved credit every week. (5 points) Add 5 points if you don‟t shred them.  I carry my Social Security card in my wallet. (10 points)
  • 12. Quiz Questions (2)  My driver‟s license has my Social Security number on it. (10 points)  I don‟t have a post office box or a locked, secured mailbox. (5 points)
  • 13. Quiz Questions (3)  I use an unlocked, open box at work or at home to mail my bills. (10 points)  I carry my military ID in my wallet at all times. (10 points)
  • 14. Quiz Questions (4)  I provide my Social Security number whenever asked, without asking questions about how that information will be safeguarded. (10 points) Add 5 points if you provide your number orally without checking to see who might be listening.  I‟m required to use my Social Security number at work as an employee ID or at school as a student ID number. (5 points)
  • 15. Quiz Questions (5)  My Social Security number is printed on various documents frequently seen in the workplace, such as on time cards. (10 points)  I have my Social Security number and/or driver‟s license number printed on my personal checks. (10 points)
  • 16. Quiz Questions (6)  I carry my insurance card in my wallet, and either my Social Security number or that of my spouse is on that card. (10 points)  I haven‟t ordered a copy of my credit report for at least two years. (20 point)
  • 17. Quiz Questions (7)  I don‟t protect my discarded personal, credit, and financial information from thieves by shredding them prior to putting them in the trash. (10 points)  Add your score. It it‟s 100 points or more, you are at high risk for identity theft. If your score is 50 100, you‟re at average risk, but your risk is higher if you have good credit. If your score is 0 – 50 points, you have a low risk of being an identity theft victim.
  • 18. How to Protect Yourself from Identity Theft? You Can‟t  Only Two Ways to Protect Yourself – Have no personally identifying information – Never, ever, ever, have it where someone else could conceivably get access to it
  • 19. Questions? Vicky Yuki Outreach & Education Coordinator City of Seattle 206-233-7877 [email protected]

Editor's Notes

  • #8: Social engineering, in the context of security, is understood to mean the art of manipulating people into performing actions or divulging confidential information.[1] While it is similar to a confidence trick or simple fraud, it is typically trickery or deception for the purpose of information gathering, fraud, or computer system access; in most cases the attacker never comes face-to-face with the victims.
  • #9: Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.
  • #10: Spyware is a type of malware (malicious software) installed on computers that collects information about users without their knowledge. Mail spam, also known as junk email or unsolicited bulk email (UBE)A computer virus is a computer program that can replicate itself[1] and spread from one computer to another.