9
Protecting Your Identity © 2014 Project Lead The Way, Inc. Computer Science and Software Engineering

Protecting Your Identity © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering

Embed Size (px)

Citation preview

Page 1: Protecting Your Identity © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering

Protecting Your Identity

© 2014 Project Lead The Way, Inc.Computer Science and Software Engineering

Page 2: Protecting Your Identity © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering

• More than 50% of employers now use social media to screen candidates

Why Protect Your Public Persona

Why Protect Your Private Data• Identity theft: Predators borrow

money in your name• Malware uses your personal data to

attack your friends• Most identity theft from 18-29 year

olds

Page 3: Protecting Your Identity © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering

• Malware steals your data and makes your devices slow or non-functioning

• Criminals attack others from your devices

• More than 30% of devices are compromised, but most attacks can be prevented with simple measures

Why Protect Devices and Software

Page 4: Protecting Your Identity © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering

• Assume digital data are "forever"• Assume digital data are public

How to Protect Your Privacy

Page 5: Protecting Your Identity © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering

• Don’t reveal personal information• Don't share name and address• Be skeptical• Review and adjust privacy settings

when creating an account• Beware default settings• Remember posts are permanent and

public

Safety on Social Sites

Page 6: Protecting Your Identity © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering

• Use strong passwords: mix cases, numbers, and symbolsuse many characters, not just

words• Use different passwords on different

systems• Memorable doesn't have to be easy

to guess. E.g., use mnemonic passphrases:

Nd!2singsonGs (No doubt! to sing songs)

Good Passwords

Page 7: Protecting Your Identity © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering

• Never send or use password "in the clear," i.e., unencrypted

• Don't share passwords• Don't store passwords in the

browser• Look away when someone types a

password

Respect Passwords

Page 8: Protecting Your Identity © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering

• Read your bank statement• Check your credit report annually

annualcreditreport.com but beware spoofs of that address

Monitor for Identity Theft

Page 9: Protecting Your Identity © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering

• Use credit card rather than debit card

• Use a secondary email for public use

Safe Shopping