building trust in the digital age
DESCRIPTION
This wonderful presentation, appropriate for teens and young adults, was created by Symantec's Rayane Hazimeh for the Dubai Techfest, 2013. We thank her for generously sharing her content with the SlideShare community.TRANSCRIPT
![Page 1: Building Trust in the Digital Age](https://reader035.vdocuments.us/reader035/viewer/2022081518/549e9632ac7959504c8b4626/html5/thumbnails/1.jpg)
Building Trust in the Digital AgeRayane Hazimeh
Security Consultant
![Page 2: Building Trust in the Digital Age](https://reader035.vdocuments.us/reader035/viewer/2022081518/549e9632ac7959504c8b4626/html5/thumbnails/2.jpg)
• Lebanese• Computer and Communication Engineering and MBA degrees• Security Consultant at Symantec • Certifications: CCNA, CCNP, CCDP, CCSK, VTSP, VSP, and other stuff• Activist in several initiatives to promote Technology• Hobbies: dancing, outdoor activities• My Motto: Live, Laugh and Love
My ASL (a Little bit about me)
![Page 3: Building Trust in the Digital Age](https://reader035.vdocuments.us/reader035/viewer/2022081518/549e9632ac7959504c8b4626/html5/thumbnails/3.jpg)
Internet did not exist 20 years ago!
![Page 4: Building Trust in the Digital Age](https://reader035.vdocuments.us/reader035/viewer/2022081518/549e9632ac7959504c8b4626/html5/thumbnails/4.jpg)
First Website Ever Made: CERN
![Page 5: Building Trust in the Digital Age](https://reader035.vdocuments.us/reader035/viewer/2022081518/549e9632ac7959504c8b4626/html5/thumbnails/5.jpg)
When the Internet began (early 90’s)
• Information was centralized or had little user created content
• Browsers like Mosaic made internet “visual”
• Big companies made websites, sometimes too graphic heavy, lots of design
• Most of world was on dial-up, slow connections
Internet Matured in early 2000’s• Broadband became widely available
• Websites sprang up for everyone
• Today, internet moving to mobile devices and app based
![Page 6: Building Trust in the Digital Age](https://reader035.vdocuments.us/reader035/viewer/2022081518/549e9632ac7959504c8b4626/html5/thumbnails/6.jpg)
Today’s Digital Native (born in 1990’s or later)
• You have never stood to change a TV channel
• Internet has always existed
• You don’t go “online”; you are always connected
• Your definition of privacy is different from your parents
• You expect devices to just turn on, connect and work
• You are more collaborative, get help from networks, not just a web search or in a book
![Page 7: Building Trust in the Digital Age](https://reader035.vdocuments.us/reader035/viewer/2022081518/549e9632ac7959504c8b4626/html5/thumbnails/7.jpg)
What Your Parents Worry About• Online Strangers• Cyber bullying• Internet Addictions• Reputation problems• Inappropriate or violent content
What You Worry About (Maybe)• Online “drama”• Will my friends embarrass me?• Will my secret stuff get out?• Who are my real friends?• Will I be judged by my:
•Facebook •Twitter •YouTube stuff
![Page 8: Building Trust in the Digital Age](https://reader035.vdocuments.us/reader035/viewer/2022081518/549e9632ac7959504c8b4626/html5/thumbnails/8.jpg)
What we all should worry about
Create a Positive Digital Footprint
Protect Our Privacy
Protect Our Money
Protect Ourselves from Bullies
Protect Ourselves from Predators
Protect Ourselves from Ourselves
![Page 9: Building Trust in the Digital Age](https://reader035.vdocuments.us/reader035/viewer/2022081518/549e9632ac7959504c8b4626/html5/thumbnails/9.jpg)
What we all should worry about
Create a Positive Digital Footprint
Protect Our Privacy
Protect Our Money
Protect Ourselves from Bullies
Protect Ourselves from Predators
Protect Ourselves from Ourselves
![Page 10: Building Trust in the Digital Age](https://reader035.vdocuments.us/reader035/viewer/2022081518/549e9632ac7959504c8b4626/html5/thumbnails/10.jpg)
Our digital footprintis the evidence of ouronline activities.
![Page 11: Building Trust in the Digital Age](https://reader035.vdocuments.us/reader035/viewer/2022081518/549e9632ac7959504c8b4626/html5/thumbnails/11.jpg)
![Page 12: Building Trust in the Digital Age](https://reader035.vdocuments.us/reader035/viewer/2022081518/549e9632ac7959504c8b4626/html5/thumbnails/12.jpg)
You want toleave positive
digital footprints
In the future, your "digital footprint" will carry far more weight than anything you might include on a resume.
Chris Betcher
![Page 13: Building Trust in the Digital Age](https://reader035.vdocuments.us/reader035/viewer/2022081518/549e9632ac7959504c8b4626/html5/thumbnails/13.jpg)
What we all should worry about
Create a Positive Digital Footprint
Protect Our Privacy
Protect Ourselves from Identity Theft
Protect Ourselves from Bullies
Protect Ourselves from Predators
Protect Ourselves from Yourself
![Page 14: Building Trust in the Digital Age](https://reader035.vdocuments.us/reader035/viewer/2022081518/549e9632ac7959504c8b4626/html5/thumbnails/14.jpg)
A HELPFUL VENN DIAGRAM
THE INTERNET YOUR PRIVACY
![Page 15: Building Trust in the Digital Age](https://reader035.vdocuments.us/reader035/viewer/2022081518/549e9632ac7959504c8b4626/html5/thumbnails/15.jpg)
Who’s peeking?
• Friends\family• Friends of friends\family• Parents• Employers and co-workers
– Dec 2009 study commissioned by Microsoftsaid 79% of recruiters & hiring mgrs researched applicants online
– CareerBuilder.com study – 45% of employersuse social networks to screen job candidates
Everyone is!
• Customers• Universities• Marketing companies\vendors• Criminals\hackers• Government agencies (IRS, SRS!)
![Page 16: Building Trust in the Digital Age](https://reader035.vdocuments.us/reader035/viewer/2022081518/549e9632ac7959504c8b4626/html5/thumbnails/16.jpg)
Do not inadvertently reveal personal information online
Protect Our Privacy
1
Be conscious of Web Security3
Be conscious of security on shared computers4
Be wary of unsecured WIFI5
Do not reply to Spammers, EVER2
![Page 17: Building Trust in the Digital Age](https://reader035.vdocuments.us/reader035/viewer/2022081518/549e9632ac7959504c8b4626/html5/thumbnails/17.jpg)
Do not inadvertently reveal personal information online
Protect Our Privacy
1
Be conscious of Web Security3
Be conscious of security on shared computers4
Be wary of unsecured WIFI5
Do not reply to Spammers, EVER2
![Page 18: Building Trust in the Digital Age](https://reader035.vdocuments.us/reader035/viewer/2022081518/549e9632ac7959504c8b4626/html5/thumbnails/18.jpg)
One message before Social Media…
![Page 19: Building Trust in the Digital Age](https://reader035.vdocuments.us/reader035/viewer/2022081518/549e9632ac7959504c8b4626/html5/thumbnails/19.jpg)
![Page 20: Building Trust in the Digital Age](https://reader035.vdocuments.us/reader035/viewer/2022081518/549e9632ac7959504c8b4626/html5/thumbnails/20.jpg)
![Page 21: Building Trust in the Digital Age](https://reader035.vdocuments.us/reader035/viewer/2022081518/549e9632ac7959504c8b4626/html5/thumbnails/21.jpg)
One message after Social Media…
![Page 22: Building Trust in the Digital Age](https://reader035.vdocuments.us/reader035/viewer/2022081518/549e9632ac7959504c8b4626/html5/thumbnails/22.jpg)
The message isdistributed
across Social Media
channels…
![Page 23: Building Trust in the Digital Age](https://reader035.vdocuments.us/reader035/viewer/2022081518/549e9632ac7959504c8b4626/html5/thumbnails/23.jpg)
![Page 24: Building Trust in the Digital Age](https://reader035.vdocuments.us/reader035/viewer/2022081518/549e9632ac7959504c8b4626/html5/thumbnails/24.jpg)
![Page 25: Building Trust in the Digital Age](https://reader035.vdocuments.us/reader035/viewer/2022081518/549e9632ac7959504c8b4626/html5/thumbnails/25.jpg)
Safe Social Networking – 5 tips
Tip #1: Remember that even people you know can
be identity thieves Tip #5: Limit the amount of personal information available
on your social networking profile. (don’t publicize your
unlisted phone number!)
Tip #2: Learn how to change your privacy
settings
Tip #3: Only accept friend requests from people you
knowTip #4: Limit the amount of "time and place" data that you expose through
social networking
![Page 26: Building Trust in the Digital Age](https://reader035.vdocuments.us/reader035/viewer/2022081518/549e9632ac7959504c8b4626/html5/thumbnails/26.jpg)
Do not inadvertently reveal personal information online
Protect Our Privacy
1
Be conscious of Web Security3
Be conscious of security on shared computers4
Be wary of unsecured WIFI5
Do not reply to Spammers, EVER2
![Page 27: Building Trust in the Digital Age](https://reader035.vdocuments.us/reader035/viewer/2022081518/549e9632ac7959504c8b4626/html5/thumbnails/27.jpg)
What is Spam?
• Unwanted emails• Up to 80% of world’s email is spam• Some is dangerous:
− links to websites with malware− attachments that have− viruses in them− Phishing emails: offers that are dangerous or fake
![Page 28: Building Trust in the Digital Age](https://reader035.vdocuments.us/reader035/viewer/2022081518/549e9632ac7959504c8b4626/html5/thumbnails/28.jpg)
The “Golden Rules” for email safety
Rule #1: If you don’t immediately recognize the sender, don’t open it, just
delete it
Rule #2: Never send personal information via email > call them
Rule #3: Never click on a link from an email
unless is from a friend and it sounds like is
from them
![Page 29: Building Trust in the Digital Age](https://reader035.vdocuments.us/reader035/viewer/2022081518/549e9632ac7959504c8b4626/html5/thumbnails/29.jpg)
Email ScamsChain Letters
• They instruct to “forward to 10 other people” or “everyone you know”• Sometimes sounds well-meaning: “raise awareness to a good cause”, “bring luck”, etc.• Often their purpose is to spread a dangerous virus! Delete them, Don’t click on any link, If sent by a friend, ask them not to forward them to you because of the risks involved
‘Get Rich Quick’ Themes• Promise earning money for selling items for them• Become a ‘professional shopper’• Process an inheritance or other payment for people other of the country Don’t click on links; delete
Financial Institution Asking for Personal Information • Your bank, insurance, broker etc. asking to verify your password, social security number, etc.• Usually with an excuse: ‘need to verify …”, ‘need to update every year …”, “we have detected potential fraud …”, etc.• They will look EXACTLY as the institution you do business withDon’t reply; don’t click on links; Call them; Legitimate companies will NEVER ask for personal information via email; they will call you or send you a letter
11
22
33
![Page 30: Building Trust in the Digital Age](https://reader035.vdocuments.us/reader035/viewer/2022081518/549e9632ac7959504c8b4626/html5/thumbnails/30.jpg)
Self-defense against Internet and email scams
• Instead of clicking a suspicious link from an email, type the web address yourself when you want to visit the site. – This is especially important for bank, credit card, and IRS websites.
![Page 31: Building Trust in the Digital Age](https://reader035.vdocuments.us/reader035/viewer/2022081518/549e9632ac7959504c8b4626/html5/thumbnails/31.jpg)
Do not inadvertently reveal personal information online
Protect Our Privacy
1
Be conscious of Web Security3
Be conscious of security on shared computers4
Be wary of unsecured WIFI5
Do not reply to Spammers, EVER2
![Page 32: Building Trust in the Digital Age](https://reader035.vdocuments.us/reader035/viewer/2022081518/549e9632ac7959504c8b4626/html5/thumbnails/32.jpg)
Passwords
DO’s• Unique, complex, try a code that can be customized• Not a dictionary word or name• Not a phrase• Nothing a good friend might guess (like an address, pet’s name,
birthday, nickname)• Use a different password for each site• Most important passwords are for email and social network
DON’Ts• DON’T store your password list on your computer in a file called “passwords.”• DON’T keep your passwords with your account information.• DON’T tell your password to other people Not with a sibling, BFF, or from one website to another. You can tell your parent. • DON’T let other people watch you enter your passwords.• DON’T stay logged in on a public computer
![Page 33: Building Trust in the Digital Age](https://reader035.vdocuments.us/reader035/viewer/2022081518/549e9632ac7959504c8b4626/html5/thumbnails/33.jpg)
http://
https://
Encryption
![Page 34: Building Trust in the Digital Age](https://reader035.vdocuments.us/reader035/viewer/2022081518/549e9632ac7959504c8b4626/html5/thumbnails/34.jpg)
Virus, Spyware, Adware and Malwareis a program capable of continually replicating with little or no user
intervention.
is malicious computer program that does exactly what its name implies-i.e.,
spies on you.
is any software that, once installed on your computer, tracks your
internet browsing habits and sends you popups containing
advertisements related to the sites and topics you've visited.
is short for malicious software. Malware is a broad term that encompasses computer viruses, worms, Trojan horses, spyware,
adware, and others.
A Virus
A Spyware
A Malware
An Adware
![Page 35: Building Trust in the Digital Age](https://reader035.vdocuments.us/reader035/viewer/2022081518/549e9632ac7959504c8b4626/html5/thumbnails/35.jpg)
Dangerous downloadsClicking on ads, linksVisiting infected websitesBuying into “security” alerts & scare tactics by unknown companiesPeer-to-peer file sharing networksThrough “holes” left by web
browser vulnerabilities
Virus, Spyware, Adware and MalwareHow do Computers get infected?
![Page 36: Building Trust in the Digital Age](https://reader035.vdocuments.us/reader035/viewer/2022081518/549e9632ac7959504c8b4626/html5/thumbnails/36.jpg)
• Computer runs slowly or trouble starting• Programs might not start, esp. security software• Flickering hard drive light• Strange programs listed in task manager• OFTEN YOU CAN’T EVEN TELL!!!• Best bet: run security software at all times, regularly scan the
computer and let your parents know if something weird happens when you are online. i.e Symantec Endpoint Protection or Norton Internet Security
Virus, Spyware, Adware and MalwareHow to spot them?
![Page 37: Building Trust in the Digital Age](https://reader035.vdocuments.us/reader035/viewer/2022081518/549e9632ac7959504c8b4626/html5/thumbnails/37.jpg)
Do not inadvertently reveal personal information online
Protect Our Privacy
1
Be conscious of Web Security3
Be conscious of security on shared computers4
Be wary of unsecured WIFI5
Do not reply to Spammers, EVER2
![Page 38: Building Trust in the Digital Age](https://reader035.vdocuments.us/reader035/viewer/2022081518/549e9632ac7959504c8b4626/html5/thumbnails/38.jpg)
Log out or sign out every time you leave the computer.
Be aware of “shoulder
surfers” who might try to peek at your passwords
Create “strong”
passwords that are hard for others to
guess
Do not share account
information or passwords with others Log out or
sign out every time you leave
the computer
SecuriSecurityty
ONON ShareSharedd
ComputeComputersrs
![Page 39: Building Trust in the Digital Age](https://reader035.vdocuments.us/reader035/viewer/2022081518/549e9632ac7959504c8b4626/html5/thumbnails/39.jpg)
Do not inadvertently reveal personal information online
Protect Your Privacy
1
Be conscious of Web Security3
Be conscious of security on shared computers4
Be wary of unsecured WIFI5
Do not reply to Spammers, EVER2
![Page 40: Building Trust in the Digital Age](https://reader035.vdocuments.us/reader035/viewer/2022081518/549e9632ac7959504c8b4626/html5/thumbnails/40.jpg)
![Page 41: Building Trust in the Digital Age](https://reader035.vdocuments.us/reader035/viewer/2022081518/549e9632ac7959504c8b4626/html5/thumbnails/41.jpg)
What we all should worry about
Create a Positive Digital Footprint
Protect Our Privacy
Protect Our Money
Protect Ourselves from Bullies
Protect Ourselves from Predators
Protect Ourselves from Ourselves
![Page 42: Building Trust in the Digital Age](https://reader035.vdocuments.us/reader035/viewer/2022081518/549e9632ac7959504c8b4626/html5/thumbnails/42.jpg)
Online Shopping • Most retailers have a website and allow you to browse for items and make purchases.
– It is always best to only shop from Retailers you are familiar with.
– Check the reputation e.g. http://norton.safeweb.com
• Choose a secure password
• Print out all receipts or save them on your computer
• Make sure it is the real store website
– Don’t click on links in e-mails
– The website should start with https://www
It is always best to pay with a Credit Card. Do not ever send cash, check or money order.
– Check your Credit Card statement frequently
– You do not have to complete surveys after you make a purchase.
![Page 43: Building Trust in the Digital Age](https://reader035.vdocuments.us/reader035/viewer/2022081518/549e9632ac7959504c8b4626/html5/thumbnails/43.jpg)
Online Banking
• Banks provide online services
– To check account balances, pay bills, make transfers
– Check the reputation at http://norton.safeweb.com
• Always carefully type the bank website
• Never send account details via e-mail
• Ignore e-mails requesting you to reset your password
– If in doubt, phone your bank to confirm
![Page 45: Building Trust in the Digital Age](https://reader035.vdocuments.us/reader035/viewer/2022081518/549e9632ac7959504c8b4626/html5/thumbnails/45.jpg)
What we all should worry about
Create a Positive Digital Footprint
Protect Our Privacy
Protect Our Money
Protect Ourselves from Bullies
Protect Ourselves from Predators
Protect Ourselves from Ourselves
![Page 46: Building Trust in the Digital Age](https://reader035.vdocuments.us/reader035/viewer/2022081518/549e9632ac7959504c8b4626/html5/thumbnails/46.jpg)
• IM/Text harassment
• Stealing passwords
• Blogs
• Web sites
• Sending pictures through email & cell phones
• Internet polling
• Interactive gaming
• Malicious code
• Sending porn or junk email
• Impersonation
• Cyberbullying by proxy
What is Cyberbullying?
![Page 47: Building Trust in the Digital Age](https://reader035.vdocuments.us/reader035/viewer/2022081518/549e9632ac7959504c8b4626/html5/thumbnails/47.jpg)
Tips for Dealing with Cyberbullying
Most kids don’t cyberbully!•Work together as a community•If you see cyberbullying, don’t be a silent bystander. Do something!•Talk to your classmates if they are being teased online, be a friend!•Involve your parents, teachers and other adults.•If there’s too much “drama”, turn it off. Get off the computer, mobile phone and find something else to do.
Talk about it beforeit happens
Don’t reply,Keep copies
Ask your friends and parents for help
Bystanders CanHelp!
![Page 48: Building Trust in the Digital Age](https://reader035.vdocuments.us/reader035/viewer/2022081518/549e9632ac7959504c8b4626/html5/thumbnails/48.jpg)
What we all should worry about
Create a Positive Digital Footprint
Protect Our Privacy
Protect Our Money
Protect Ourselves from Bullies
Protect Ourselves from Predators
Protect Ourselves from Ourselves
![Page 49: Building Trust in the Digital Age](https://reader035.vdocuments.us/reader035/viewer/2022081518/549e9632ac7959504c8b4626/html5/thumbnails/49.jpg)
Emotionally
vulnerable Seeking
attention
Seeking
affectionSeeking
validation
Who is the Online Predator?
![Page 50: Building Trust in the Digital Age](https://reader035.vdocuments.us/reader035/viewer/2022081518/549e9632ac7959504c8b4626/html5/thumbnails/50.jpg)
What we all should worry about
Create a Positive Digital Footprint
Protect Our Privacy
Protect Our Money
Protect Ourselves from Bullies
Protect Ourselves from Predators
Protect Ourselves from Ourselves
![Page 51: Building Trust in the Digital Age](https://reader035.vdocuments.us/reader035/viewer/2022081518/549e9632ac7959504c8b4626/html5/thumbnails/51.jpg)
Embrace technology
Remain alert
Keep a low profile
Trust your instincts
Control your information
BE
![Page 52: Building Trust in the Digital Age](https://reader035.vdocuments.us/reader035/viewer/2022081518/549e9632ac7959504c8b4626/html5/thumbnails/52.jpg)
Interested in Technology?
Technovation Challenge:http://iridescentlearning.org/programs/technovation-challenge/
Techgirlhttp://exchanges.state.gov/non-us/program/techgirls
![Page 53: Building Trust in the Digital Age](https://reader035.vdocuments.us/reader035/viewer/2022081518/549e9632ac7959504c8b4626/html5/thumbnails/53.jpg)
Copyright © 2013 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
Want a copy of this presentation?Join Norton Zone www.nortonzone.com and drop me an [email protected]