privacy, reputation protection and identity theft

34
Privacy, reputation protection and identity theft

Upload: olisa

Post on 06-Jan-2016

39 views

Category:

Documents


1 download

DESCRIPTION

Privacy, reputation protection and identity theft. The dangers. Children and young people providing too much information about themselves online poses personal security threats and can lead to identity theft - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Privacy, reputation protection and identity theft

Privacy, reputation protection and identity theft

Page 2: Privacy, reputation protection and identity theft

The dangers

• Children and young people providing too much information about themselves online poses personal security threats and can lead to identity theft

• These days on the web, anybody can be a publisher, videographer or instant celebrity – which means that what young people post online might come back to haunt them by hurting their reputation and affecting future education and work prospects

Page 3: Privacy, reputation protection and identity theft

Privacy issues – posting information on websites

• Some young people have a false sense of privacy about social networking sites – they seem to believe that they offer a greater level of privacy and security than chat rooms do - unless a profile is set to private on MySpace, for example, much of what is said on the page can be viewed by anyone

Page 4: Privacy, reputation protection and identity theft

Privacy issues – information collected by websites

• Websites can invisibly collect information about children’s interests as they surf around the site - this type of information is sometimes called the click stream

• Companies can send bits of software called cookies to your computer to track information and then, for example, have pop-up ads targeted at those interests appear on screen

• You can set your browser to detect and reject these cookies

Page 5: Privacy, reputation protection and identity theft

Privacy issues – keeping emails and computer files private

• Don’t think that deleting an email from your computer means that it disappears completely - they can still be retrieved from backups, for example. If you really want to completely delete messages or files from your computer you should use a special file erasing program

• If you want to be completely sure about the privacy of your emails and files then you need encryption software which scrambles messages and files - PGP is a good encryption program - www.pgp.com

Page 6: Privacy, reputation protection and identity theft

Privacy issues – emails and computer files

• Storage security protection software helps to prevent unauthorised access to the files on your personal computer - Steganos Security Suite (www.steganos.co.uk) is an example of this type of software

Page 7: Privacy, reputation protection and identity theft

Privacy issues – surfing anonymously

• Anonymous remailers are services that take out identifying information from emails before passing them onto your intended recipient – examples include Advicebox (www.advicebox.com) and Mr Smith (www.mrsmith.com)

• Anonymous surfing services mask your identity as you surf the web - Steganos Internet Anonym (www.steganos.co.uk) is an example of this type of software

Page 8: Privacy, reputation protection and identity theft

Privacy - password security

• People worry about hackers getting into their computers to get hold of their passwords but the truth is that many people give their passwords away by being careless

• The most common mistakes are choosing a password that is easy to guess, using the same password all the time and allowing other people to know passwords

Page 9: Privacy, reputation protection and identity theft

Privacy - password security

• Young people should never let their friends have their passwords – they may not be friends forever

• Young people sometimes play pranks such as impersonating someone who has shared their password with them

Page 10: Privacy, reputation protection and identity theft

Privacy - password guess attacks

• There are ways that criminals use to try and crack login usernames and passwords:– Intelligent guess attack– Dictionary attack– Brute force attack

• It is therefore very important to choose ‘strong’ passwords

Page 11: Privacy, reputation protection and identity theft

Privacy - how to come up with a strong password

• Make it at least 7 characters long• Avoid obvious ‘dictionary’ words• Pick a combination of letters and numbers

that you will remember (but other people are unlikely to guess) but spell it by mixing lower and upper case characters

• If you must write it down, store it somewhere that is not an obvious location

Page 12: Privacy, reputation protection and identity theft

CyberSafety tips on privacy

Children and young people• Never give personal details to anyone that

you don't know • Never tell anyone your computer

passwords • Make sure other people do not watch over

your shoulder when you login to your accounts

Page 13: Privacy, reputation protection and identity theft

CyberSafety tips on privacy issues

• Check with an adult first before providing information to a website – even if it’s a well-known one

• Look for a privacy policy - if a website does not have one then never provide them with personal information

• If a site does have one, read it very carefully and only provide information if you are absolutely happy with what they say about what they do with information provided to them

Page 14: Privacy, reputation protection and identity theft

CyberSafety tips on privacy issues

Parents• Consider installing an outgoing filtering software

program onto your computer – they make sure that certain information that a child may want to share with others, can't be shared– You first input the information into the software and if

your child then tries to send their name, address or telephone number to someone via the Internet, that information does not get displayed

Page 15: Privacy, reputation protection and identity theft

CyberSafety tips

• Only provide the minimum of information needed to complete an online form – most sites display an asterisk next in mandatory information

• When shopping online, don’t provide your payment details unless you’re satisfied that the website is hosted on a secure server – check the start of the URL - it will say https instead of http if it is a secure server

Page 16: Privacy, reputation protection and identity theft

CyberSafety tips

• Watch out for phishing scams• Install a site adviser – these give you

a quick overview of the website before you visit it and let you know if it contains unsafe code or anything else which is dodgy – the best free one is McAfee Site Advisor

Page 17: Privacy, reputation protection and identity theft

CyberSafety tips

• Always set strong passwords• Consider using a password manager – examples

include www.roboform.com and www.keepass.info

• If you need to provide an email address to a website in order to, for example, activate a service and do not want to give away your main email address, get a disposable one – this is an email address that forwards to existing email address but expires after a very short period of time (www.gishpuppy.com is an example)

Page 18: Privacy, reputation protection and identity theft

CyberSafety tips

• Use a disposable payment card – www.cahoot.com offer such a system

• Their web card lets you set a limit on each online payment and generates a unique set of card details for each transaction, keeping the real ones secure

Page 19: Privacy, reputation protection and identity theft

Reputation protection

• Increasingly, videosharing and social networking sites along with personal blogs are being used for background checking by employers and universities

Page 20: Privacy, reputation protection and identity theft

Reputation protection

• Posting sexually provocative pictures or images involving alcohol or illegal drugs may seem cool or fun at the time

• Young people need to understand the legal, academic and future employment consequences of illegal or unethical behaviour

Page 21: Privacy, reputation protection and identity theft

Reputation protection

• They need to be aware of the ‘you can't take it back’ issue– Videos, photos and comments posted

online can instantly be passed along and archived on the web virtually forever, beyond the original uploader's control

Page 22: Privacy, reputation protection and identity theft

Identity theft

• Definition: – “The crime of obtaining

the personal or financial information of another person for the purpose of assuming that person's name to make purchases or to commit a crime”

Page 23: Privacy, reputation protection and identity theft

Identity theft

• Identity theft is the fastest-growing online crime

• Thieves use both online and offline methods to carry out their activities

Page 24: Privacy, reputation protection and identity theft

What identity thieves want

• They want to be able to pretend to be you

• This means they can buy things using your cards, get your money out of your account, commit crimes in your name

Page 25: Privacy, reputation protection and identity theft

Identity theft is an issue for young people as well as adults

• Although it is a problem that mainly affects adults, identity theft can cause problems for children and young people as well

• If they can steal the login of a young person they can pose as them and cause problems

Page 26: Privacy, reputation protection and identity theft

Personal information that is valuable to an identity thief

• Name and address– Has a value but not normally enough in itself to do anything

with• Telephone number

– Relatively low risk to an identity thief as long as the number is unlisted. If listed, the phone number can be used to obtain an address as well.

• Credit card numbers– Valuable to an identity thief – a credit card is the safest way to

buy anything online as it has the strongest fraud protection. The only time you should provide your credit card number online is when you are buying from a secure website

Page 27: Privacy, reputation protection and identity theft

Personal information that is valuable to an identity thief

• Driving licence number – This is potentially valuable to an identity

thief so never give it out online

• Your birth date– Never give it out as it is very valuable –

if a website you really want to use is asking for it, give a fake birth date

Page 28: Privacy, reputation protection and identity theft

Personal information that is valuable to an identity thief

• National Insurance or NHS number – never give this number out and don’t give out fake one either

• Your mother’s maiden name or the answer to any other question that is often asked for as the answer to a secret question

• The most valuable information is, of course, login details to websites such as online banks

Page 29: Privacy, reputation protection and identity theft

How identity thieves can get hold of this kind of information

• Viruses– a piece of computer code that is secretly introduced into a

system in order to corrupt it or destroy data. Often viruses are hidden in other programs or documents and when opened, the virus is let loose

• Trojan horses– this is a computer program that disguises itself as another

program - similar to a virus, these programs are hidden (they differ from viruses because they are normally not designed to replicate like a virus)

• Worms – this is a special type of virus that spreads without any user

help, typically by exploiting a flaw in software• Physically getting access to your computer

Page 30: Privacy, reputation protection and identity theft

How identity thieves can get hold of this kind of information

• Getting personal information that has been posted to a website

• Giving it away yourself by being tricked by a fake website

• Trying to guess login details and passwords

Page 31: Privacy, reputation protection and identity theft

CyberSafety tips

• Always check your bank and credit card statements

• Check your credit rating regulatory credit reference agency – Experian.co.uk, Callcredit.co.uk and Equifax.co.uk

• If you suspect that someone has stolen your credit card details contact your credit card company immediately

Page 32: Privacy, reputation protection and identity theft

CyberSafety tips

• You are entitled to some compensation under section 13 of the data protection act if an organisation has lost your details and you have suffered financial damage

• If you fail to get compensation you also have the right to go to court to retrieve the money you’ve lost

Page 33: Privacy, reputation protection and identity theft

CyberSafety tips

• Buy a shredder and use it to dispose of any bits of paper that contain personal details

• Keep any documents with personal information in a safe place and shred them when you have no further use for them

Page 34: Privacy, reputation protection and identity theft

CyberSafety tips

• If your identity is stolen you’ll find a wealth of information on what to do on a special Home Office web site – www.identity-theft.org.uk