Do not spam forums, chat rooms, or social media sites with useless or repeated ... Image: http://www.worldpulse.com/site
Internet Security Kimberly Kachadoorian MBA
Netiquette, commonly accepted rules Do not spam
Do not spam forums, chat rooms, or social media sites with useless or repeated information
Do not pretend
Do not pretend to be someone else
Do not post or distribute
Do not post or distribute illegal material
Do not use
Do not use abusive or threatening language
Do not try
Do not try to obtain personal info about someone
Did u see Jane’s skirt today?? What color was that??! puke green???
Cyberbulling Bully refers to any unwanted, aggressive behavior • Insulting texts or emails • Rumors sent via email or social networking sites • Fake profiles • Embarrassing photos or videos – with some they may be illegal
Bullying affects 29.2% of students every year and the number is growing Why it’s harmful: • Anonymous • Can be done 24/7
Image: http://www.worldpulse.com/sites/default/files/styles/post_cover_image/public/post/22246/65258/post_cover_image/6875666d4ff9736630e57ff55f2b52cd/cyberbullying-finalcolor.png?itok=zT5k7_e_
Cyberbullying: If it happens to you
• Do not respond to any messages, posts or emails • Block offenders • Document and report the behavior • Flag the content so others are not hurt by it • Tell an adult – if not your parents then someone you trust
• To schools: • Inform your school of any cyberbullying as you would with other types of bullying • Provide screenshots or records of bullying
Report Cyberbullying
• To your parents and law enforcement, especially if it involves any of the following: • Threats of violence • Explicit messages or photos • Taking a photo or video of someone in a place where he or she would expect privacy • Stalking and hate crimes
Protect your Identity Personal Identifiable Information (PII) Examples: • Student ID Number • Date of Birth • Email Address • Mailing Address – even if it is a PO Box • Credit Card Information – PIN numbers or code on back of card • Social Security Number • City/State/School • Your Full Name – especially if unique This info helps hackers steal your identity to steal you funds, impersonate you, so they can be trusted. Never share this information on-line.
Basic Security • • • • • • •
Never share your password Do not repeat passwords across sites Do NOT share (personally identifiable information) PII Do not download any suspicious or unknown software Always log out when you are done Don’t click on links in emails - phishing Never post anything you do not want public You might think you’re being safe and limiting your posts to only friends, but anything you post can be easily copied and pasted and sent to anyone else!
If you are unsure about anything you do online, ask your parent, teacher or guardian if it is OK Image: https://cdn.theconversation.com/files/141344/wide_article/width1356x668/image-20161012-8415-1bqpx5b.jpg
Risky Business • • • •
On-line Shopping Connecting on your Social Media Any site requiring you to give out your Personal Identifiable information (PII) Posting fake news sites
While these sites are enjoyable and useful. Just make sure you are being extra careful when visiting them • Do not use public Wi-Fi to access these risk sites – especially without a password • Check the address for spoofing
http://bank0famerica.com – note the “0” instead of and “o”
• Use a secure website, especially when submitting PII Look for an "s" after “http” in the web address example: https://www.yahoo.com/ Look for a ‘padlock’ in the browser address bar
Browser Safely • Use automatic Updates • Use and regularly update built-in safety features • Pop-up blockers • Anti-spyware • Anti-virus • Anti-phishing • Do not use “Save Password” or “Remember Me” functions • Internet Explorer is more frequently targeted and has more security flaws than any other browser
Social Media Tips
• Be picky- only friend folks you know in real-life • Never post your location • Never post that you are going on vacation – show the vacation pictures when you get back • Be careful with apps-many free games have geo-tracking or give away your PII • Assume everything you post on-line is permanent-employers and colleges will check social media • Don’t over share-just because a site asks for info doesn’t mean they need it • Customize and update your Security Settingsdefault settings are WEAK! PUBLIC is weak
Why do we care? Not everyone that is online with you is who you think they are They take a lot of time sometimes to groom you into a meet or will kidnap
You think you are talking to
In reality
Could lose a job…or a potential career • McDonald's employee fired after posting gross photos of ice cream machine on his twitter account – could also be sued at this point – global news – whistle blower might not cover his legal issues
Don’t be a troll/hater
Red Flags!!!!!!!!!!!!!!!!!!!! • You don’t know them – or they pretend you know them… • They want to see a picture or video of you • They keep asking for more and more information about you or your family (social engineering) • They threaten your family, friends or you • They are nice but get more and more aggressive • They want to know when your parents aren’t hanging around • They claim to be 21 or older • Claim to be in the military or a minister or have come into a lot of money they want to share • Start asking for money a little at a time – or send you gifts or money small stuff to start • Too many compliments about you
The more you know… • Smishing • Instagram • Snapchat • Virtual worlds • YouTube • Social Challenges • Dating sites • Catfishing • Ponzi schemes
Why do we care? Not everyone that is online with you is who you think they are – safety is the concern
Some of the bad people that hang out on social media: • Pedophiles • Scammers • Thieves • Human Traffickers • Imposters • Bullies
They see you as vulnerable, an easy target
LOOKING TO THE FUTURE WANT TO MAKE A DIFFERENCE? • Student
• Join an anti-bullying peer group • Stop any abusive behavior you see
• Careers
• Social media marketing guru • Cybercrime fighter
• Police, FBI, CIA, attorney, own a business that helps law enforcement
• Ethical Hacker • Human trafficking
• Police, border patrol, international police
• Network security • Federal Government
• NSA, FBI, CIA, Central Security Service
LOOKING TO THE FUTURE WANT TO MAKE A DIFFERENCE? Degree/Certificate programs you can take Washtenaw Community College • Criminal Justice and Law Enforcement • Certificate •
• •
Police Academy Certificate
Associate in Arts
• •
Criminal Justice Associate in Arts Paralegal Studies/Pre-Law Associate in Arts
Associate in Applied Science
•
Criminal Justice - Law Enforcement Associate in Applied Science
• Associate in Applied Science
• Cybersecurity Associate in Applied Science
LOOKING TO THE FUTURE WANT TO MAKE A DIFFERENCE? Degree programs you can take Eastern Michigan University • Information Assurance • Digital Investigations – CSI for computers • Information Assurance Management • Network Security
Companies in Washtenaw County
National Cyber Security Competition for Middle and High School Students Oct-April
Free team registration for 80 Michigan teams, contact Tamara Shoemaker at
[email protected] or 734-325-6823
Big ThankYou to:
Tamara Shoemaker - Director at University of Detroit Mercy Center for Cyber Security & Intelligence Studies AND Jennifer Mansfield – Redford Police Department – Human Trafficking Specialist