e-mail basics, encryption, passwords, and spam presenter: melissa dark cerias, purdue university

31
E-mail Basics, Encryption, Passwords, and SPAM Presenter: Melissa Dark CERIAS, Purdue University

Upload: jordan-mitchell

Post on 27-Dec-2015

218 views

Category:

Documents


0 download

TRANSCRIPT

E-mail Basics, Encryption,

Passwords, and SPAM

Presenter: Melissa Dark

CERIAS, Purdue University

Contact Information:

Judy Lewandowski

K-12 Outreach Coordinator

CERIAS, Purdue University

http://www.cerias.purdue.edu/K-12

[email protected]

765.496.6762

Today’s Overview:

• E-mail Basics

• Encryption

• Passwords

• SPAM

E-mail Basics

E-mail is similar to a postcard. E-mail is *not* secure—nor is it private. Encryption is the only way to help in

preventing others from reading your e-mail.

Email Security Fundamentals

Question Unsolicited Documents.

Use attachments only when necessary.

Question ALL executable programs received via email.

Notify the sender of infected emails!

Pay attention to file extensions...

Common File ExtensionsGreat Resource:http://www.matisse.net/files/formats.html

Extension Type

.html .htm Webpage

.doc Word Document

.gif .jpg Graphic

.exe Program—self extracting (*caution!)

Make sure that this box is *not* checked.

Finding File Extensions in

Windows-based machines:

1. Click on START.

2. Select SETTINGS

3. Select CONTROL PANEL

4. Select FOLDER OPTIONS

5. Select VIEW

Encryption(Protecting sensitive information)

Encoding information– Secret Code Ring– Cryptoquip– Pig Latin

*Most* common applications offer password protection.

Confidential (not critical)---USE ENCRYPTION!!!!

NEVER send HIGHLY SENSITIVE information through email. (email should *never* be considered secure!)

Sample Encrypted Document:

1. File / Save As

2. Click on TOOLS

3. Select GENERAL OPTIONS

4. Enter passwords

Password Protecting Windows

Documents

Encryption Practice...

Open Microsoft Word. Type in a sentence. Follow the directions---password

protect the document. Close the document. Re-open it using your password.

PGP: Pretty Good Privacy(approx. $20 per unit)

Requires use of Public Keys

Sample PGP encrypted email:

Without the proper keys...

the message is unreadable.

Key Component to Encryption:

Password Protection

1. Do not post or store your password near your computer.

2. Require passwords to be at least 8 characters long.

3. Use non-alpha characters and capital letters.

Boiler*makeR Iam@1016 KaTis15

4. Do not use easy to guess selections.

password 123456 computer hello love

Passwords Continued…

5. Use non-personal selections.Avoid: name, spouse’s name, kids, ss#

6. Maintain zero tolerance for password sharing.

7. Avoid typing your password when someone is watching.

8. Urge users to change passwords. (2-3 weeks!)

9. Always remember to log out!

10. Constantly reinforce the importance of password security.

Write a “smart” password for the following fictional teacher. Be sure to follow all of the recommendations!

Samuel W. MillerGreentown High SchoolSocial Studies TeacherHarvard GraduateLikes to play golfHas four children1 wife named BettyEnjoys woodworking

Password Practice:

BREAK!!!!!!

Please be back at......

SPAM Internet “Junk” Mail

– Commercial– Personal

Unsolicited email—usually sent to many people According to the Gartner Group, a research firm,

about 90% of email users receive spam. Never Respond to Spam. Do not sign up for “Spam Removal” lists.

– Sincere v. Spam Collectors

Types of Spam

Chain Letters: – A message that urges readers to pass the letter on in order to

receive a reward. Hoaxes:

– Chain letter that is based upon a fictitious scenario or circumstance. Urban Legends:

– Email messages providing “safety” messages or warnings.

The Pros and Cons of Spam

A Brainstorming Activity….

Why Should I be Concerned about Spam?

Costs Money. – Recipient of the advertisement pays for the connection time, disk space, bandwidth, etc.

Lost Productivity.– Time, Time, Time

Clogged Email.– May be prevent receipt of important messages.

Discourages Internet Use.– May discourage others from seeing the benefits of the WWW.

Raising SPAM Awareness Activity

Check the legitimacy of a message BEFORE they send it on.

Directions: Each group has been given a keyword. Go to the Urban Legends site (http://www.urbanlegends.com) search engine and search for SPAM dealing with your selection.

Skim through the choices and pick the best one to share with the group! Explain why it is a hoax.

Specific Directions---After Sept. 11th:

Go to:http://www.urbanlegends.com/search/search.html

Type in Your Keyword Here. Be sure to select the 2nd button

SPAM Awareness Activity: Debriefing

Coke Gap ATM Needles Intel Taco Bell

Pets Spiders Perfume Cracker 809 Disney

Resources to Find the Truth About Spam:

http://www.urbanlegends.com

http://www.urbanmyths.com

http://www.earthlink.net/internet/security/spam

http://www.mcs.com/~jcr/junkmail.html

http://www.junkbusters.com

Ways to Reduce Your Daily Intake of Spam

Use a “dummy” account for online promotions, games, etc.

Request that your information be removed from Internet “white pages”.

Be sure to HIDE your information when joining a listserv or mailing list.

Cut and Paste funny stories, poems, etc.– Encourage others to do the same!

Update Anti-Virus Frequently!!! Use a Firewall:

– http://www.zonealarm.com• FREE• VERY Effective• Easy to Use• Blocks Incoming/Outgoing

Virus Protection & Firewalls

A Few Brief Comments....

Questions???