1 / 31

E-mail Basics, Encryption, Passwords, and SPAM

E-mail Basics, Encryption, Passwords, and SPAM. Licking the Security Stamp:. Presenter: Melissa Dark CERIAS, Purdue University. Contact Information: Judy Lewandowski K-12 Outreach Coordinator CERIAS, Purdue University http://www.cerias.purdue.edu/K-12 judyL@cerias.purdue.edu

nhi
Download Presentation

E-mail Basics, Encryption, Passwords, and SPAM

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. E-mail Basics, Encryption, Passwords, and SPAM Licking the Security Stamp: Presenter: Melissa Dark CERIAS, Purdue University

  2. Contact Information: Judy Lewandowski K-12 Outreach Coordinator CERIAS, Purdue University http://www.cerias.purdue.edu/K-12 judyL@cerias.purdue.edu 765.496.6762

  3. Today’s Overview: • E-mail Basics • Encryption • Passwords • SPAM

  4. E-mail Basics • E-mail is similar to a postcard. • E-mail is *not* secure—nor is it private. • Encryption is the only way to help in preventing others from reading your e-mail. Due Dilligence

  5. Email Security Fundamentals • Question Unsolicited Documents. • Use attachments only when necessary. • Question ALL executable programs received via email. • Notify the sender of infected emails! • Pay attention to file extensions...

  6. Common File Extensions Great Resource: http://www.matisse.net/files/formats.html

  7. Finding File Extensions in Windows-based machines: • Click on START. • Select SETTINGS • Select CONTROL PANEL • Select FOLDER OPTIONS • Select VIEW Make sure that this box is *not* checked.

  8. Encryption(Protecting sensitive information) • Encoding information • Secret Code Ring • Cryptoquip • Pig Latin • *Most* common applications offer password protection. • Confidential (not critical)---USE ENCRYPTION!!!! • NEVER send HIGHLY SENSITIVE information through email. (email should *never* be considered secure!)

  9. Sample Encrypted Document:

  10. Password Protecting Windows Documents • File / Save As • Click on TOOLS • Select GENERAL OPTIONS • Enter passwords

  11. Encryption Practice... • Open Microsoft Word. • Type in a sentence. • Follow the directions---password protect the document. • Close the document. • Re-open it using your password.

  12. PGP: Pretty Good Privacy (approx. $20 per unit) Requires use of Public Keys Sample PGP encrypted email:

  13. Without the proper keys... the message is unreadable.

  14. Key Component to Encryption: Using Secure Passwords!!

  15. FLUX!!!

  16. Password Protection • Do not post or store your password near your computer. • Require passwords to be at least 8 characters long. • Use non-alpha characters and capital letters. Boiler*makeR Iam@1016 KaTis15 • Do not use easy to guess selections. password 123456 computer hello love

  17. Passwords Continued… • Use non-personal selections. Avoid: name, spouse’s name, kids, ss# • Maintain zero tolerance for password sharing. • Avoid typing your password when someone is watching. • Urge users to change passwords. (2-3 weeks!) • Always remember to log out! • Constantly reinforce the importance of password security.

  18. Password Practice: Write a “smart” password for the following fictional teacher. Be sure to follow all of the recommendations! • Samuel W. Miller • Greentown High School • Social Studies Teacher • Harvard Graduate • Likes to play golf • Has four children • 1 wife named Betty • Enjoys woodworking

  19. BREAK!!!!!! Please be back at......

  20. SPAM • Internet “Junk” Mail • Commercial • Personal • Unsolicited email—usually sent to many people • According to the Gartner Group, a research firm, about 90% of email users receive spam. • Never Respond to Spam. • Do not sign up for “Spam Removal” lists. • Sincere v. Spam Collectors

  21. Types of Spam • Chain Letters: • A message that urges readers to pass the letter on in order to receive a reward. • Hoaxes: • Chain letter that is based upon a fictitious scenario or circumstance. • Urban Legends: • Email messages providing “safety” messages or warnings.

  22. The Pros and Cons of Spam A Brainstorming Activity….

  23. Why Should I be Concerned about Spam? • Costs Money. • Recipient of the advertisement pays for the connection time, disk space, bandwidth, etc. • Lost Productivity. • Time, Time, Time • Clogged Email. • May be prevent receipt of important messages. • Discourages Internet Use. • May discourage others from seeing the benefits of the WWW.

  24. Raising SPAM Awareness Activity • Check the legitimacy of a message BEFORE they send it on. • Directions: Each group has been given a keyword. Go to the Urban Legends site (http://www.urbanlegends.com) search engine and search for SPAM dealing with your selection. • Skim through the choices and pick the best one to share with the group! Explain why it is a hoax.

  25. Specific Directions---After Sept. 11th: Go to: http://www.urbanlegends.com/search/search.html Type in Your Keyword Here. Be sure to select the 2nd button

  26. SPAM Awareness Activity: Debriefing • Coke • Gap • ATM • Needles • Intel • Taco Bell • Pets • Spiders • Perfume • Cracker • 809 • Disney

  27. Resources to Find the Truth About Spam: • http://www.urbanlegends.com • http://www.urbanmyths.com • http://www.earthlink.net/internet/security/spam • http://www.mcs.com/~jcr/junkmail.html • http://www.junkbusters.com

  28. Ways to Reduce Your Daily Intake of Spam • Use a “dummy” account for online promotions, games, etc. • Request that your information be removed from Internet “white pages”. • Be sure to HIDE your information when joining a listserv or mailing list. • Cut and Paste funny stories, poems, etc. • Encourage others to do the same!

  29. Virus Protection • & Firewalls A Few Brief Comments.... • Update Anti-Virus Frequently!!! • Use a Firewall: • http://www.zonealarm.com • FREE • VERY Effective • Easy to Use • Blocks Incoming/Outgoing

  30. Questions???

More Related