YOUR CLASSROOM DOESN'T LOOK LIKE THIS ANYMORE
It probably looks more like this...
Our schools are now more digital than ever before and distance learning is becoming common place due to the pandemic.
It is more important that we protect our digital lives and teach our students to do the same.
Let me show you how to START
Take out the list you made at the beginning of the training!
Type just the number of accounts that you came up with in the class chat
Did you remember to include all streaming services, video games, apps, shopping sites, work sites, financial accounts, teaching websites, news websites, and any social media?
A Dashlane analysis of data from more than 20,000 users in 2015 found that the average user has...
90 ONLINE ACCOUNTS
Most of which are tied to the same singular email
To know why this is extremely bad and puts you at HIGH risk, we need to understand the mind of the hacker.
Hacking into the mind of a Hacker
This is a hacker's view of accounts on their target website. Some locks are much easier to break then others.
Instead of bolt cutters, hackers have a variety of techniques to break into these locks
How do we protect our private information?
Let's talk about what you could be doing vs. what you should be doing.
This is your digital life without security precautions
Digitally use the raise hand function if you have ever reused a password...
How do we fix this?
This is your digital life with a secure password
This is your digital data under a password management tool
write in the class chat something you notice about this picture
Searching with a VPN
Filter your searches through a virtual private network
Initializing two or multi-factor authentication
...something you know, something you have, and something you are...
Types of Attacks
- Brute Force | using a algorithm to break each unit of your password
- Extortion | threatening you into giving up your information
- Keylogging | watching you type in your password or pin
- Local Discovery | finding where you have physically writen your passwords
- Phishing | Using fake websites and links to get you to type in your credentials
- Password Spraying | Trying the most commonly used password or knowledge about the person to gain access through guessing.
- Strong Password | containing over 6 variety of characters, non-repetitive, and absent of personal information
- Password Management | a software that provides singular, very strong passwords to each of your accounts
- VPN | a virtual private network that passes your search queries through a randomly located server far away from you to provide you a certain form of anonymity.
- Two-Factor Authentication | verifying your credentials through something you know and something you have
- Multi-Factor Authentication | verifying your credentials through something you know, something you have, and something you are.
Other Key Terms
- Credential stuffing | testing stolen credentials on multiple accounts of websites in order to gain unlawful access.
- Surface Web | only 4% of the internet, this is the indexed portion accessed by search engines such as Google, Bing, or Yahoo
- Deep Web | 96% of the internet, this unindexed portion of the internet can only be accessed if you have the specific address and credentials
- Dark Web | making up only .03% of the deep web, these sites or hidden services can only be accessed through specific software like Tor that provides almost total anonymity.