You are on page 1of 18

Keeping your data safe

Using computers safely, effectively


and responsibly
3rd Edition
Objectives
• Learn how to create a secure, memorable password
• Learn how to identify a phishing scam
• Learn how to avoid being a victim of an email scam
Keeping your data safe
Using computers safely, effectively and responsibly

When do you use a password?


• Your password can get you access to parts of a
computer system

• Can you think of any rules for choosing a password and


keeping it safe?
Keeping your data safe
Using computers safely, effectively and responsibly

Passwords and encryption can


also protect data on:
• USB drives

• Backup hard drives

• Memory cards in phones


and cameras
Keeping your data safe
Using computers safely, effectively and responsibly

Password security
• Do NOT:
• Write it down
• Tell anyone
• Use something easy to guess such as your name or date of
birth, or a word in the dictionary
• Use the same password for all your online accounts
Keeping your data safe
Using computers safely, effectively and responsibly

Password security
• Automated hacking tools can hack passwords of up
to 10 characters!
• Use at least 8 characters
• Use a mixture of UPPERCASE and lowercase
letters, numbers and symbols
• How can you choose a memorable password?
Keeping your data safe
Using computers safely, effectively and responsibly

Strong passwords you can


remember
• Start with a sentence that you can easily remember,
maybe for a personal reason, for example “I left my
coat on the bus”
• Remove the spaces and misspell a word or two;
“Leftcoatonbuss”
• Or, remove some words and add a number e.g. the date:
“Leftcoat2411”
• Now make one up for yourself!
Keeping your data safe
Using computers safely, effectively and responsibly

Change default passwords


• Devices like mobile phones may come with a
standard (default) password or PIN
• You need to change this to something else before you start to
use it
Keeping your data safe
Using computers safely, effectively and responsibly

Patterns
• A pattern can be easier to
remember than a PIN
Keeping your data safe
Using computers safely, effectively and responsibly

Other security methods


• Biometrics
• Physical security
• Anti-virus updates
• Encryption
Keeping your data safe
Using computers safely, effectively and responsibly

Stopping robots
• One way to stop automated, repeating attempts to
enter passwords is to lock the system after 3 tries,
for half an hour
• Another is to send an image of a spoken phrase, for you
to enter
• This is called Captcha
Keeping your data safe
Using computers safely, effectively and responsibly

Worksheet 3
• Look at Task 1 and check some passwords
for “strength”
Keeping your data safe
Using computers safely, effectively and responsibly

Identity theft
• Could someone else find out enough
about you online to pretend to be
you?
• What would they need?
• Could you fall victim to a scam?
Keeping your data safe
Using computers safely, effectively and responsibly

Phishing
• A phishing email is one from a criminal trying
to find out personal information about you
such as password and account information
• It tries to get you to click on a link in the email
• Don’t take the bait!
Keeping your data safe
Using computers safely, effectively and responsibly

A typical phishing email

From: HighSave Bank accounts@login-highsavebank.com


Subject: Please update your account information
Date: 12 November 2014
Dear pdfurguson

As part of our security procedures, we at HighSave Bank carry out regular


check on our account information verification process. During most recent
proces, we found we could not verify your account.

In order to ensure your account information is not vulnerable to hackers,


please visit http://www.com.highsavebank.account-verification.com

Please click on the above link to confirm or update your account information.
If you do not do so within 48 hours, you will not be able to use your account
for 30 days, as your account will not be secure.
Keeping your data safe
Using computers safely, effectively and responsibly

What to look out for


• Greeting: The phishers don’t know your name, so the greeting is not
personalised
• The sender’s address is often a variation on a genuine address
• Forged link: The link looks genuine, but it may not link to the website
given. Roll your mouse over it to check
• Request for personal information: Genuine organisations never ask
you to provide personal information via email
• Sense of urgency: Criminals try to persuade you that something bad
will happen if you don’t act fast
• Poor spelling and grammar: Generally phishers are not good
proofreaders!
Keeping your data safe
Using computers safely, effectively and responsibly

Worksheet 3
• Look at Task 2
• What signs can you spot that warn you not to click on the link
in the email?
• What should you do with the email?
Keeping your data safe
Using computers safely, effectively and responsibly

Report it and delete it

You might also like