Digital safety
Safety First...
What this flyer is about
What are your rights and responsibilities in a digital world?
WHAT YOU SHOULD DO
- Be careful of the information you give on social networks
- Adjust your settings and public information to private
- Be careful of what you post; it will stay there forever
- Protect your self from online fraud
- Always report online bullying immediately
- Be responsible of what you do online
- Use information from reliable sites
- Copyright your work
- Use the security tools (e.g.PIN numbers, Encryption Biometrics etc)
- Follow AUP rules
WHAT YOU SHOULD NOT DO
- Accept people you don't know as friends
- Post inappropriate content
- Post private information
- Purchase things online from unreliable sites
- Get involved in cyber bullying
- Chat with strangers
PIN Numbers
A personal identification number is a numeric password shared between a user and a system, that can be used to authenticate the user to the system.
The user is required to provide a non-confidential user identifier or token (the user ID) and a confidential PIN to gain access to the system.
PINs are used with banking systems (where the identifying token is a card), but are also used in other, non-financial systems.
The PIN is not printed or embedded on the card but is manually entered by the cardholder during automated teller machine (ATM) and point of sale (POS) transactions (such as those that comply with EMV), and in card not present transactions, such as over the Internet or for phone banking.
PINs may also be used in door access, Internet transactions, or to log in to a restricted website.
Someone has to be very careful about what PIN they choose because it might be hacked.
Biometric Scanners
Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic. Among the features measured are face, fingerprints, hand geometry, handwriting, iris, retinal, vein, and voice.
They are more reliable than PIN because:
Fingerprints are much harder to fake than identity cards.
You can't guess a fingerprint pattern like you can guess a password.
You can't misplace your fingerprint, like you can misplace an access card.
You can't forget your fingerprints like you can forget a password.
Their use is getting more and more popular in many occasions e.g. hospitals, airports, mobile phones etc.
Encryption
The process of encoding information in such a way that only the person (or computer) with the key can decode it.
In cryptography, encryption is the process of encoding messages or information in such a way that only authorized parties can read it.
USES OF ENCRYPTION: Encryption has long been used by military and governments to facilitate secret communication. It is now commonly used in protecting information within many kinds of civilian systems.
TYPES:
symmetric-key schemes
public-key encryption schemes
Forensic Computing
Computer forensics is the practice of collecting, analysing and reporting on digital data in a way that is legally admissible. It can be used in the detection and prevention of crime and in any dispute where evidence is stored digitally. Computer forensics follows a similar process to other forensic disciplines, and faces similar issuess
Summery Of Digital Safety
…have safe fun!