In today’s digital world, in an almost constantly connected digital landscape, online security should be a priority for everyone who interacts with others and shares information online.
Online security refers to the rules you follow, the actions you take and the processes that happen to help ensure you are safe on the internet. Online security is our intended result of using a wide range of protective measures that enable us to perform our mission and critical functions despite risks posed by threats to our use of technology and the internet.
Learning objective: You will know how to manage the security of your devices, applications, often known as apps, and passwords.
Your personal devices, such as cell phones, laptops, and smartwatches are powerful tools for communicating with others, connecting to the internet, and engaging in life in the digital age. Because these devices can contain so much personal information, it is important to treat them with care.
Be careful who you give access to your personal devices
Shared devices include devices at home or in an office setting where multiple people use the same device.
Public devices include devices in a public location, such as an internet cafe, public library or school computer lab. Using public devices is like using other public resources. It can be convenient, but it may also come with added risks. And just like with other public resources, it is important to be careful while using them.
A wireless network is how most people access the internet. It is a computer network that uses wireless data connections between network nodes. Public wireless networks are convenient, but present additional security risks since they are open to the public.
Use HTTPS instead of HTTP, sometimes appearing with a green lock icon in website URLs. This lets you know your connection is likely safe and secure. But not everything you do on the internet is going to be secure this way. Avoid banking, paying bills, shopping, accessing personal accounts, social media or private information on a public wireless networks as they can be compromised. The only true way to be safe on a public wireless network is to utilize a VPN connection, which simulates a private encrypted network.
An app is an application as downloaded by a user to a mobile device. To be safe, only download applications from reputable vendors such as Play Store, App Store.
A web browser (such as Chrome, Firefox, Safari) is an application that gives you access to the internet.
A password is a sequence of characters which may include letters, numbers or symbols used to access a device or personal account on a website.
A passphrase is a longer sequence of characters, numbers or symbols, often crafted as a phrase or complete sentence, used to access a device or personal account on a website.
Create a separate password or passphrase for every account. If that one password is compromised, then all the accounts will also be compromised. Never use personal information, like birthdays, email addresses or usernames, that are publicly available. This makes it easier to guess passwords. Avoid using words that can be found in the dictionary. Try to include lowercase and uppercase letters, numbers and symbols. Use a longer password with at least eight characters. In general, the more characters in a password, the harder it is to guess or crack.
Two-factor authentication is a security feature that helps protect your accounts and your passwords.
Knowledge: username & Password, PIN Possession: Cellphone, authenticator apps Inherent: fingerprints, eye scans, and face or voice recognition
Two-factor authentication uses two distinct authentication factors to log in
Multi-factor authentication requires users to provide multiple of above factors to log in
Setting up two-factor authentication on Facebook
Setting up two-factor authentication on Instagram
Setting up two-factor authentication on Whatsapp
Learning objective: You will be able to use Security Checkup features to manage your online accounts.
A password manager is an encrypted digital vault that stores login information for all of your digital accounts including apps, social media and other websites. Some password managers also utilize a password generator to help you create new passwords.
A password generator is a program or service that automatically creates randomized, strong passwords to ensure that you are using unique passwords for each account.
When using password-management software, you will still need to memorize a single master password to access your information.
Make sure that your master password is extremely strong, but also make sure you have it memorized.
know how to change your passwords and be sure to change them after any incident and every three to six months
If someone seems suspicious, try to verify their identity & then report suspicion
oversharing can be a potential security risk, both online and offline
Editing location services and third-party application access
You can unfriend & block users & block, delete, filter, hide or pin comments
In this activity, you will review your security settings on your selected social media profiles.
Learning objective: You will recognize when your own or others’ accounts may be compromised and know what steps to take next.
Hacking is unauthorized access to your accounts or devices. There are different methods for hacking, including brute force, phishing and scams.
Once a hacker has access to your device or personal accounts and information, they may try to:
Recovery steps will be different depending on whether you can still access your account and variety of other factors.
Report compromised account on Facebook
Report compromised account on Instagram
Report compromised account on WhatsApp
SCENARIO I: Alem logged on to her social media account and noticed a message from her friend Fenet. The message from Fenet said that her account was hacked and that Alem’s might be hacked too. The message included a link to an external website where Alem could put in her login information to check if her account was also hacked.
Was Fenet’s account hacked? How do you know?
What should Alem do next?
SCENARIO II: Nebil turned on his laptop to check his email and noticed that it took a long time to open his web browser. He tried to open a word processing program to draft an email, but it crashed before he could open the program.
Was Nebil’s laptop compromised? How do you know?
What should Nebil do next?