310 likes | 532 Views
E-mail Basics, Encryption, Passwords, and SPAM. Licking the Security Stamp:. Presenter: Melissa Dark CERIAS, Purdue University. Contact Information: Judy Lewandowski K-12 Outreach Coordinator CERIAS, Purdue University http://www.cerias.purdue.edu/K-12 judyL@cerias.purdue.edu
E N D
E-mail Basics, Encryption, Passwords, and SPAM Licking the Security Stamp: Presenter: Melissa Dark CERIAS, Purdue University
Contact Information: Judy Lewandowski K-12 Outreach Coordinator CERIAS, Purdue University http://www.cerias.purdue.edu/K-12 judyL@cerias.purdue.edu 765.496.6762
Today’s Overview: • E-mail Basics • Encryption • Passwords • SPAM
E-mail Basics • E-mail is similar to a postcard. • E-mail is *not* secure—nor is it private. • Encryption is the only way to help in preventing others from reading your e-mail. Due Dilligence
Email Security Fundamentals • Question Unsolicited Documents. • Use attachments only when necessary. • Question ALL executable programs received via email. • Notify the sender of infected emails! • Pay attention to file extensions...
Common File Extensions Great Resource: http://www.matisse.net/files/formats.html
Finding File Extensions in Windows-based machines: • Click on START. • Select SETTINGS • Select CONTROL PANEL • Select FOLDER OPTIONS • Select VIEW Make sure that this box is *not* checked.
Encryption(Protecting sensitive information) • Encoding information • Secret Code Ring • Cryptoquip • Pig Latin • *Most* common applications offer password protection. • Confidential (not critical)---USE ENCRYPTION!!!! • NEVER send HIGHLY SENSITIVE information through email. (email should *never* be considered secure!)
Password Protecting Windows Documents • File / Save As • Click on TOOLS • Select GENERAL OPTIONS • Enter passwords
Encryption Practice... • Open Microsoft Word. • Type in a sentence. • Follow the directions---password protect the document. • Close the document. • Re-open it using your password.
PGP: Pretty Good Privacy (approx. $20 per unit) Requires use of Public Keys Sample PGP encrypted email:
Without the proper keys... the message is unreadable.
Key Component to Encryption: Using Secure Passwords!!
Password Protection • Do not post or store your password near your computer. • Require passwords to be at least 8 characters long. • Use non-alpha characters and capital letters. Boiler*makeR Iam@1016 KaTis15 • Do not use easy to guess selections. password 123456 computer hello love
Passwords Continued… • Use non-personal selections. Avoid: name, spouse’s name, kids, ss# • Maintain zero tolerance for password sharing. • Avoid typing your password when someone is watching. • Urge users to change passwords. (2-3 weeks!) • Always remember to log out! • Constantly reinforce the importance of password security.
Password Practice: Write a “smart” password for the following fictional teacher. Be sure to follow all of the recommendations! • Samuel W. Miller • Greentown High School • Social Studies Teacher • Harvard Graduate • Likes to play golf • Has four children • 1 wife named Betty • Enjoys woodworking
BREAK!!!!!! Please be back at......
SPAM • Internet “Junk” Mail • Commercial • Personal • Unsolicited email—usually sent to many people • According to the Gartner Group, a research firm, about 90% of email users receive spam. • Never Respond to Spam. • Do not sign up for “Spam Removal” lists. • Sincere v. Spam Collectors
Types of Spam • Chain Letters: • A message that urges readers to pass the letter on in order to receive a reward. • Hoaxes: • Chain letter that is based upon a fictitious scenario or circumstance. • Urban Legends: • Email messages providing “safety” messages or warnings.
The Pros and Cons of Spam A Brainstorming Activity….
Why Should I be Concerned about Spam? • Costs Money. • Recipient of the advertisement pays for the connection time, disk space, bandwidth, etc. • Lost Productivity. • Time, Time, Time • Clogged Email. • May be prevent receipt of important messages. • Discourages Internet Use. • May discourage others from seeing the benefits of the WWW.
Raising SPAM Awareness Activity • Check the legitimacy of a message BEFORE they send it on. • Directions: Each group has been given a keyword. Go to the Urban Legends site (http://www.urbanlegends.com) search engine and search for SPAM dealing with your selection. • Skim through the choices and pick the best one to share with the group! Explain why it is a hoax.
Specific Directions---After Sept. 11th: Go to: http://www.urbanlegends.com/search/search.html Type in Your Keyword Here. Be sure to select the 2nd button
SPAM Awareness Activity: Debriefing • Coke • Gap • ATM • Needles • Intel • Taco Bell • Pets • Spiders • Perfume • Cracker • 809 • Disney
Resources to Find the Truth About Spam: • http://www.urbanlegends.com • http://www.urbanmyths.com • http://www.earthlink.net/internet/security/spam • http://www.mcs.com/~jcr/junkmail.html • http://www.junkbusters.com
Ways to Reduce Your Daily Intake of Spam • Use a “dummy” account for online promotions, games, etc. • Request that your information be removed from Internet “white pages”. • Be sure to HIDE your information when joining a listserv or mailing list. • Cut and Paste funny stories, poems, etc. • Encourage others to do the same!
Virus Protection • & Firewalls A Few Brief Comments.... • Update Anti-Virus Frequently!!! • Use a Firewall: • http://www.zonealarm.com • FREE • VERY Effective • Easy to Use • Blocks Incoming/Outgoing