SafetyFirst11May 04082011.pub
Transcription
SafetyFirst11May 04082011.pub
Safety First: Privacy and Security Online Student Workbook OASIS Connections is made possible by contributions from: The U.S. Department of Commerce Macy’s Foundation AT&T © November 2009 The OASIS Institute 7710 Carondelet Avenue, Suite 125 St. Louis, MO 63105 314-862-2933 www.oasisnet.org OASIS Connections Safety First Safety First: Privacy and Security Online Introduction The Internet facilitates a vast world of information through the ability to shop and bank online, instant message with friends, send email to family, and even meet new people. However, it can also create some threats to your personal privacy and safety. Knowing how to use websites, email, and even the telephone safely, can help protect you against fraud and other potential dangers. Today we will: • Define expectations of privacy • Learn about identity theft and phishing schemes • Discuss passwords and good security habits • Learn how to email safely and block spam • Learn all about cookies, virus protection, and firewalls • Discuss safety when using wireless Internet connections (Wi-Fi) • Learn the basics of telephone safety • Discuss safe financial transactions and online shopping • Learn about safety while communicating online • View a family safety game Phishing: When someone pretends to represent your financial institution to trick you into revealing passwords or other valuable information. Spam: Unwanted and annoying emails—including phishing emails. © Rev. 11/2009 The OASIS Institute 2 OASIS Connections Safety First Privacy Expectations When information is sent over the Internet, it may pass through many different computer systems on the way to its destination. Each of these systems may be capable of capturing and storing your personal information. There are no online activities that absolutely guarantee privacy and security, but there are ways to maximize the privacy of your online communications. There are three types of online communications. This page defines each type and the privacy risks that each one poses. 1. Public Activities—Public activities include things like newsgroups and listservs. You can find a good list of these sites at www.yahoo.com, or at www.groups.google.com. When you use a newsgroup or listserv, all communications are available to anyone who would like to see them. Most of the time, you will be receiving information from these groups rather than posting it. If you do post information, use a “screen name” or alias to identify yourself. 2. Semi-Private Activities—Some user groups and discussion forums require that you use a password to enter their forum. This does not mean that the information is private. Anyone can still access the forum by creating their own password. 3. Private Services—While email service providers are required by law to keep your communications private, there are exceptions to the law. Stored messages are given less protection than messages en route. Don’t leave your emails stored for long periods of time on your email provider’s server. Online Communications: Computer communications over a telephone, cable network, or wireless system. Online Newsgroup: A continuous public discussion about a particular topic. An online conversation between hundreds or even thousands of people. Listserv: An email program that allows you to communicate with other people who have subscribed to a list regarding the same topic of interest. When a member submits an email message to the listserv, it is forwarded to everyone on the listserv. © Rev. 11/2009 The OASIS Institute 3 OASIS Connections Safety First Understanding Identity Theft The Federal Trade Commission (FTC) estimates that as many as nine million Americans have their identities stolen each year. Identity theft occurs when someone uses your personal identifying information—such as your name, social security number, or account number—to steal money from your bank accounts, buy things on your credit cards, or even open new credit accounts in your name. Let’s look at some forms of identity theft and how to prevent them. 1. Dumpster Diving: When others rummage through your home or office trash looking for bills or other papers that have account numbers and personal identifying information on them. Always shred papers with personal information on them before recycling or throwing them away. 2. Phishing: When someone calls you or sends an email pretending to be your financial institution, or other company you do business with, to trick you into revealing passwords, pin numbers, and other personal information. Banks and businesses never call or email to verify or update your passwords or account numbers, so never reveal these via phone or email. Report such instances to your institutions. 3. Changing Your Address: When someone diverts your bills or checks to another location by completing a change of address form. Check all monthly statements for fraudulent charges. Use a free credit report website to review your credit report once a year for fraudulent accounts. 4. Stealing: Stolen wallets, computers, handheld PDA devices like Blackberries, and US mail can also supply personal information. Always keep valuables in sight. If you have a concern about mail being stolen out of your mailbox, consider getting a post office box. To learn more about preventing identity theft, go to: www.ftc.gov/idtheft. Identity Theft: When someone uses your identity to commit a crime. Personal Identifying Information: Your personal information such as name, address, social security number, account numbers, and pin numbers. Phishing: When a fraudster pretends to be from your bank to trick you into revealing account numbers, pin numbers, and passwords. © Rev. 11/2009 The OASIS Institute 4 OASIS Connections Safety First All About Passwords Many Internet sites require you to enter a password before you can access their site. Although this password does not totally secure your communication, you can improve your online security by creating a password that is hard to guess. 1. When you choose a password, as you would for Yahoo! Groups, the site will often ask you to type it in twice. This is to make sure you have typed in the exact password you wish to use. 2. Avoid common words as your password. Make it something that someone else can’t easily guess. For example, your first name or your dog’s name is a fairly obvious password. Instead, use an abbreviation or a combination of numbers and letters that you will remember, such as Ilov2Sk8. A good password will have eight characters including both numbers and letters, and using both upper and lower case. 3. Change your password periodically and don’t share it with friends, family, or coworkers. Avoid writing down your password. However, if you must write it down to remember it, keep it in a locked drawer. Below are some things to avoid putting in a password since they are easy for other people to learn about you: • Your username or login • Your real name or the names of family or pets, i.e. your grandson’s name. • Your birthday, phone number, address, or social security number © Rev. 11/2009 The OASIS Institute 5 OASIS Connections Safety First Good Security Habits You can increase your computer security and safety by practicing good habits. Many of these tips are no different than those you would use in any type of transaction. There will be more explanation on these good habits as we continue through the lesson. 1. Use a virus protection program and keep it up-to-date. 2. Use a firewall. 3. Don’t run unknown programs, i.e.: ones sent to you via email. 4. Make backup copies of important information often. 5. Turn off your computer or disconnect it when you are not using it. 6. Only use secure servers for making purchases. You can tell if you are on a secure site by looking at the Internet address of the site. If it has https:// at the beginning instead of http:// then the site is secure. 7. Read privacy statements on the websites you visit. 8. Look for sites that have been monitored by an outside source such as TRUSTe, an independent, non-profit initiative. These sites will have a seal of approval. 9. Always use caution and security common sense. 10. Assume that your communications are not private unless you use encryption software. 11. Be careful of “start-up” software. This is software that helps you fill out forms so they don’t have to be done over again. It is best to fill out forms each and every time they appear. Firewall: A combination of hardware and software that will protect your computer or computer networks. Secure Server: A computer that encrypts your personal data to protect it against third party tampering. Encryption: Jumbling the contents of an electronic message so that it cannot be read by unauthorized Internet users. © Rev. 11/2009 The OASIS Institute 6 OASIS Connections Safety First Protecting Your Email You should consider certain questions when opening, sending, or responding to email. Receiving Email: 1. Do you know the person sending the email? 2. Do you know what the attachment is before you open it? 3. Do you know where the email you received originated? 4. Do you have a program to scan email for viruses? Sending or Responding to Email 1. Are you forwarding an email from someone else? 2. Are your attachments clearly marked? 3. Have you kept your email clear of personal or private information? 4. Do you have more than one email account to use for different types of transactions? • Never open an email attachment that ends in .vbs or .exe because they contain a hidden file extension that can carry a virus. • Make sure your email software Junk Mail Filter is activated. • Never write anything in an email that you would not post on a public bulletin board. © Rev. 11/2009 The OASIS Institute 7 OASIS Connections Safety First Avoiding Email Spam Spam is unsolicited, unwanted email that can clog your email box. One way you can end up on spam mailing lists is by visiting unscrupulous websites and entering your email address. In addition to being annoying, spam can contain financial scams, malicious viruses, and inappropriate topics. Below are five tips for safely managing spam, as well as avoiding it in the first place. 1. Be Choosy—Don’t just visit unknown websites because they offer something for free or appear on a pop-up advertisement. These websites pay for their free offers by “harvesting” your personal information and selling it on mailing lists. Think carefully before entering your email address in an online form. Read the website Privacy Policy first to find out if they will keep your information confidential. 2. Fake Your Address—If you’re entering information on a website form that requires you to enter an email address, and you don’t want to share it, make a slight change to the email address so it’s wrong. You can also do this in a chat room or newsgroup. Most of the time, all the website will do is check that your email address appears to be valid, meaning it contains an @ sign and an extension like .com at the end. 3. Don’t Be Fooled—Spam email is often addressed to you or written as if the sender knows you. Don’t fall for this old trick. If you didn’t solicit an email and don’t know the sender, the email is likely to be spam. If the spammer claims that a family member or friend asked him or her to contact you, call that person and ask him or her if this is true before responding to the email. 4. Don’t Reply to the Sender—When you reply to spam, even if you are just sending them a request to remove you from their mailing list, you are letting spammers know that your email address is valid and currently in use. It’s like waving a white flag that says, “I read unsolicited email. Please send more!” The best way to “opt out” of a spammer’s mailing list is to delete the email and pretend you never received it. 5. Don’t Open Attachments—It is especially important not to open attachments or visit website links that a spam email may contain. Attachments can download malicious viruses and websites can contain dangerous financial scams. © Rev. 11/2009 The OASIS Institute 8 OASIS Connections Safety First Using Yahoo! Mail SpamGuard The best way to deal with spam is to block it before it even gets to your Inbox. If you have a Yahoo! Mail account, you can activate their free spam blocking software called SpamGuard. You can also use SpamGuard to block specific email addresses. Follow the steps below to read about how to use SpamGuard. 1. Open your Yahoo! Mail account. 2. Click on the Help menu, roll down and click Help. 3. The Search Help page will appear. Type spam into the Search box and hit Enter. 4. A list of search items will appear. Click What Can I Do To Prevent Spam? 5. A new page will appear. Scroll up and down to read the information. If you use Microsoft Outlook or Microsoft Mail as your email program, read about how to manage spam in the Appendix of this manual. © Rev. 11/2009 The OASIS Institute 9 OASIS Connections Safety First Top 10 Email Spam Scams Hundreds of thousands of email users have lost money to bogus offers that appear in their email. Con artists are very cunning; they know how to make their claims seem legitimate. These emails are from crooks trying to steal your money or your identity. Don’t be a victim. Below are ten email scams the Federal Government recommends you avoid. To read more, go to the OnGuard Online website: www.onguardonline.gov/spam.html. 1. The “Nigerian” Email Scam—Con artists claim to be officials, businesspeople, or surviving spouses of former government officials in Nigeria or another country whose money is somehow tied up for a limited time. They offer to transfer lots of money into your bank account or send you checks if you will pay a fee or “taxes” to help them access their money. They may also ask for your bank account information in order to conduct a phony wire transfer. 2. Phishing—Email or pop-up messages that claim to be from a business that you deal with (i.e. your bank) and ask you to “update” or “validate” your information such as your pin number. We’ll talk more about phishing later on in this class. 3. Work-at-Home Scams—Ads that promise steady income for minimal labor. 4. Weight Loss Claims—Emails promising a revolutionary pill, patch, cream, or other product. 5. Foreign Lotteries—Emails boasting enticing odds in foreign lotteries. You may even get a message claiming you’ve already won money in a lottery that you never even entered! Scammers will then ask you to pay “taxes” or other fees in order to “wire” you the money. Or, they will ask for your confidential bank information in order to conduct a phony wire transfer. 6. Cure-All Products—Emails claiming that a product is a “miracle cure” or an “ancient remedy.” continued on next page © Rev. 11/2009 The OASIS Institute 10 OASIS Connections Safety First Top 10 Email Spam Scams continued 7. Check Overpayment Scams—A response to your “for sale” add or online auction posting, offering to pay with a cashier’s, personal, or corporate check. At the last minute, the so-called buyer comes up with a reason for writing the check for more than the purchase price and asks you to wire back the difference after you deposit the check. However, the “buyer’s” check to you will be counterfeit. 8. Pay-in-Advance Credit Offers—News that you’ve been “pre-qualified” to get a low-interest loan or credit card, or repair your bad credit. But to take advantage of the offer, you have to pay a bogus “processing fee.” 9. Debt Relief—Emails touting a way you can consolidate your bills into one monthly payment without borrowing; stop credit harassment, foreclosures, repossessions, tax levies and garnishments; or wipe out your debt entirely. These offers often involve bankruptcy proceedings, but they rarely say so. While bankruptcy is one way to deal with serious financial problems, it’s generally considered to be a last resort. 10. Investment Schemes—Emails advertising “investments” that promise high rates of return with little or no risk. One version seeks investors to help form an “offshore” bank. Others are vague about the nature of the investment, but stress the amazing rate of return. Promoters boast of their high-level financial “connections,” the fact that they are privy to inside information, or offer to personally guarantee the investment. © Rev. 11/2009 The OASIS Institute 11 OASIS Connections Safety First Built-in Privacy & Security Information Internet Explorer has some built-in privacy and security information so you can learn about how to keep your computer safe. If you are using Windows XP, follow the instructions below to find this valuable information. If you are using Windows Vista, see the Appendix of this manual. 1. In Internet Explorer, click on the View menu, roll down and choose Privacy Report. 2. The Privacy Report dialog box will appear. Click on Learn More About Privacy 3. Click on the Contents tab and choose Sending Information Over the Internet Safely. 4. Click on a topic to read about it in the right window. Try it! Visit these two websites to learn more about online safety and security. www.staysafe.org © Rev. 11/2009 The OASIS Institute www.onguardonline.gov 12 OASIS Connections Safety First All About Cookies Have you ever re-visited a website and wondered how it knew your name? That’s done with cookies. Cookies are miniature software applications that collect and store little bits of information about you—the computer user. Cookies are transferred to your computer when you access a website such as Yahoo! The cookie then stores information such as your name, what you like to search for, and products and topics that interest you. When you go back to Yahoo! again, the information in the cookie is sent back to Yahoo! so they can personalize their response to you. Plus, every website you visit may have access to the cookie information on your computer. The original purpose of cookies was to allow the sites you visit most often to personalize their pages for you. This is a benefit that still works well and gives us good reason to be glad we have cookies. For example, Yahoo! can customize your home page just for you with your city’s weather, local news, and more. Some discussion sites can tell you which messages are new since your last visit. Cookies don’t take up much space and can help websites serve you better. Unfortunately, cookies are constantly being placed on your computer by every site you visit without your knowledge. And, they contain personal information about you that you may not want to share. The good news is that you can choose to disable cookies on your computer. © Rev. 11/2009 The OASIS Institute 13 OASIS Connections Safety First Cookies: Find Out More 1. Check out these sites to learn more about cookies. Information on Cookies from How Stuff Works www.howstuffworks.com/cookie.htm Cookie Pal Software and Online Tutorial www.kburra.com Information on Cookies from Webstreet Studios www.webstreetstudios.com/school/cookies.htm How to Disable Cookies by Website 101 www.website101.com/cookies_tutorial.html 2. See if you can find your own sites. Cookie: Small text files that are deposited on your computer which report back to a website regarding your browsing habits. HTML: Hypertext Markup Language, a uniform format for how information is written on the Internet. Privacy Statement: A website’s policy regarding what they will and won’t do with your personal information. © Rev. 11/2009 The OASIS Institute 14 OASIS Connections Safety First Virus Protection A virus is a computer program that can destroy data or create problems in your computer. Viruses can be created by accident, or intentionally created for malicious or fraudulent purposes. Malicious viruses can also steal or “harvest” information from your computer and personal email. There are several good virus protection programs on the market and they are well worth the investment to help protect your computer, your email, and your safety. Check out these anti-virus software sites on the Internet. McAfee Online www.mcafee.com Norton Antivirus www.symantec.com CERT Organizational Security www.cert.org/nav/index_green.html Online Tutorial www.cknow.com/vtutor Virus Myths and Hoaxes www.vmyths.com Keep these safety tips in mind: • Viruses can be unintentionally transmitted from a diskette or CD to your computer. Only anti-virus software can protect against this. • Make sure your anti-virus software checks incoming email for viruses and be sure this feature is turned on. • Update your anti-virus software regularly. There are always new viruses appearing on the Internet and each one needs its own fix. © Rev. 11/2009 The OASIS Institute 15 OASIS Connections Safety First All About Firewalls If you have a fast DSL or cable modem connection to the Internet at home, you may have some of the same security issues that a small company has. Because your connection is “always on,” your computer is open to the Internet at all times. Fortunately, you can use a firewall to protect your computer from offensive websites and computer hackers. A home firewall acts very much like a home security alarm system. Someone who may want to get into your home will look elsewhere because the alarm system is a deterrent. Firewalls are a deterrent to would-be hackers and can shield your computer from offensive websites. Personal firewalls are inexpensive (sometimes even free) software that are easy to install and maintain. Many firewall products now offer anti-virus software as part of the package. To find out about firewall software, explore these websites: Microsoft Windows Firewall www.microsoft.com/windowsxp/using/networking/security/winfirewall.mspx Norton 360 Firewall and Virus Protection www.symantec.com/norton/products/overview.jsp?pcid=os&pvid=n3602 McAfee Personal Firewall www.mcafee.com/us/security_wordbook/firewall.html DSL: Digital Subscriber Line, a high-speed Internet connection that allows you to use your existing phone line without tying up your telephone connection. Hacker: Someone who breaks into computers illegally with malicious or fraudulent intent. © Rev. 11/2009 The OASIS Institute 16 OASIS Connections Safety First Using Wireless Internet (Wi-Fi) Many home computers are now run on wireless connections in which the computer doesn’t have to be plugged directly into the Internet. This is called Wi -Fi. Wi-Fi technology is also used in cell phones and handheld PDAs (personal digital assistants) like Blackberries. You may also use Wi-Fi in public places such as coffee shops, libraries, and schools. These are also called Wi-Fi hotspots. While Wi-Fi is a nice convenience, it also presents some dangers. Fraudsters can attempt to tap into your computer via the Wi-Fi connection and steal information like account numbers and passwords—which can result in identity theft. Below are some tips to stay safe. 1. First of all, be aware that anything that appears on your computer screen while you’re using a wireless connection can potentially be seen by others nearby. Some fraudsters deliberately hang out in coffee shops or drive around trying to find a computer or open network to tap into. 2. If you have a wireless network set up at home, configure your router to use encryption. Follow the instructions that came with your router to do this. 3. Lock your home network by creating a password to access it. This prevents neighbors and fraudsters from using your wireless connection from nearby. 4. Consider buying wireless network security software such as Kismet or Airsnort. 5. To learn more about securing your home network, go to: http://www.auditmypc.com/freescan/readingroom/wirelesssecurity.asp. continued on next page Wi-Fi: Wireless Internet technology used in computers, phones, and PDAs. PDA: A handheld Personal Data Assistant device such as a Blackberry. Hotspot: A coffee shop, library, school, or other area that offers free Wi-Fi. Router: A device that facilitates Internet connection sharing at a home or office. © Rev. 11/2009 The OASIS Institute 17 OASIS Connections Safety First Using Wireless Internet (Wi-Fi) continued 6. Avoid entering credit card or account numbers on a Blackberry or other PDA. Wait to do sensitive transactions on a secure computer. 7. When you use a computer in public, beware of shoulder surfers who watch your computer screen in order to copy account numbers and passwords. If you suspect a shoulder surfer, report them and leave. Also consider buying an inexpensive shade for your computer screen at a computer or electronics store. This makes it difficult for others to read your computer screen. 8. If you use a laptop at a Wi-Fi hotspot, make sure you have updated anti-virus, anti-spyware, and firewall software. Also avoid conducting sensitive transactions—like online banking—over Wi-Fi networks. To learn more about Wi-Fi safety, go to the website below: http://mobileoffice.about.com/cs/findinghotspots/bb/byusehotspot.htm © Rev. 11/2009 The OASIS Institute 18 OASIS Connections Safety First Practicing Telephone Safety Most of us can’t live without a telephone or cell phone. In fact, phones have been around for so long that we forget they can be a potential safety risk. Below are some tips for telephone safety. 1. Don’t list your address in the phone book. 2. Only publish your first initial and last name in the phone book. Or, ask the phone company to make your phone number unlisted. 3. When not at home, have an answering machine to answer your calls. Your message should say, “We can’t come to the phone right now,” not that you aren’t at home. 4. Don’t give out personal information when called about surveys, contests, subscriptions drives, purchases, or deliveries unless you are certain of the source of the call. These could be calls phishing for personal identifying information. 5. Never give your name, address, or phone number to someone you don’t know—especially to someone you’ve only met online. 6. Never give any information to “wrong number” callers. 7. Always give the impression that you are not home alone. If a caller asks for someone who is not there, say they can’t come to the phone right now and take a message. 8. If you realize a caller is obscene or harassing, hang up immediately. Don’t listen, try to be polite, or show any type of emotional response. Report these incidents to the telephone company or police. 9. Don’t return calls to numbers you don’t know—especially long-distance calls or numbers beginning with area code (809). They may be bogus calls designed to keep you on the line in order to charge you as much as $25 per minute for the call. 10. If necessary, change your phone number or have it unlisted. © Rev. 11/2009 The OASIS Institute 19 OASIS Connections Safety First Safer Financial Transactions Many people are worried about using their credit cards to buy things online. A little common sense can go a long way towards making your transactions safer. Internet transactions are similar to financial transactions over the phone or even in person. There are always precautions to take. Here are some tips to make online financial transactions more reliable. 1. Fraud can occur online as well as in daily life. If an offer seems too good to be true, it probably is and should be avoided. 2. Credit rights and other consumer protection laws apply to Internet transactions. To find out about current laws go to the Better Business Bureau online: www.bbbonline.org/UnderstandingPrivacy/library/laws.asp 3. Make sure you are purchasing from a reputable business. Most of the stores you normally do business with have a website. Be sure to identify the store as a known entity before you purchase anything from their website. 4. When shopping online, use a separate credit card with a certain limit (which you set yourself) used only for Internet purchases. Avoid using a debit card for online purchases because it allows fraudsters to take money right out of your checking account. Check the following website for more information: www.ftc.gov/bcp/conline/pubs/online/payments.htm 5. When you are entering a site that will require a financial transaction, the Security Alert below may appear. DO NOT put a check mark in this box. Always watch for this message to be sure you are entering a secure site. 6. You can tell if you are on a “secure” website by looking at the Internet address of the site. If it starts with https: instead of http: then the site uses data encryption to protect your personal information. © Rev. 11/2009 The OASIS Institute 20 OASIS Connections Safety First Eight Tips for Safe Shopping Online Use these tips to help you remember how to keep your online shopping safe and secure. 1. Know the Company—Just as in mall shopping, it is a good idea to know the reputation of the company with which you are dealing. 2. Protect Your Privacy—Read the website Privacy Statement and know what information you are giving them. 3. Check for Extra Information—Find out about delivery dates, shipping and handling fees, warranties, and return policies. See if there is someone to contact if you are dissatisfied. Most contacts are made through email. 4. Safeguard Your Password—Don’t share your password with other people, even your Internet service provider. 5. Record Transaction Details—Print out or write down the transaction information, order number, amount of purchase, shipping date, tracking numbers, and any other important information. 6. Check for Encryption—Make sure the online merchant is using a secure website for your credit card information. See page 16 for a picture of the window that shows encryption by a website. 7. Be Wary of Rewards—Be wary of sites that offer some sort of prize or award in exchange for personal information. 8. Use Common Sense—Think about the information you are providing and investigate the products you are purchasing. Find more information about safety online at the Federal Consumer Information Center website: www.pueblo.gsa.gov © Rev. 11/2009 The OASIS Institute 21 OASIS Connections Safety First All About Privacy Policies and Seals of Approval Reliable websites will have a publicly posted Privacy Statement somewhere on their site. It is a good idea to look for and read these statements before you do business online with a particular site. Sometimes Privacy Policies simply state that your privacy is not protected. That is why it is important to read them for each site with whom you do business. 1. Type www.1800flowers.com into the Internet Explorer Address Box and hit Enter. Then click on Terms of Use at the very bottom of the page. Can you find their Privacy Policy? What does this site do with the information they collect about you? What do you have to do to protect yourself? 2. Look up your favorite store online and check out their Privacy Policy and Terms of Use Agreement. If you have questions about these documents, can you contact the company? Is this information prominently posted? 3. Type www.truste.org into your Address Box. Look through their website to find out about seals of approval and what to look for in a secure site. Check out File a Privacy Complaint. © Rev. 11/2009 The OASIS Institute 22 OASIS Connections Safety First The Growing Crime of Phishing There are many ways that unscrupulous people try to scam Internet users. Phishing has become a common lure for unsuspecting victims. Phishing is a term used to describe schemes that “fish” for personal information from Internet users by pretending to be reputable companies looking for updates on things like social security numbers and bank account numbers. Most phishing scams appear as emails and seem very official and amazingly realistic. They may appear to come from your bank or a credit card company such as VISA. They usually ask you to update or verify information. Know that reputable companies never ask for confidential information via email because it isn’t a secure method of communication. And while these may look official, they are almost always fake. Don’t answer any email that asks for your personal information and follow the tips below to avoid being the victim of a phishing scam. 1. If you receive an email asking for personal information, contact the company by phone to check it out. Use a reputable phone number, not the number supplied in the email. 2. Go to your credit card or banking service via the Internet address you normally use. Then compare it to the address from which the email originated. If they are at all different, then the email may be a scam. 3. Keep your Windows and Internet browser (Internet Explorer or Netscape) up-to-date as these scams often target unattended email sites. 4. Keep close track of your bank and credit card statements to make sure no one else has accessed them. 5. Always protect your social security number. Never send it via email and be extremely cautious about entering it on a website. You can report phishing email by forwarding it to the authorities at [email protected]. You can also learn more at the Federal Trade Commission site: www.ftc.gov/idtheft. © Rev. 11/2009 The OASIS Institute 23 OASIS Connections Safety First Social Dangers Online The Internet can be a wonderful new way to establish social connections. However, there are some dangers that you need to be aware of. Follow these tips when communicating via e-mail, chat rooms, and discussion groups. 1. Choose Carefully—Titles don’t always describe a chat room or discussion group accurately. Enter a chat room and just listen for a while before you decide to join to be sure the discussion is appropriate. 2. Use a Nickname—Don’t use your real name. Create and use a non-identifiable, non-gender specific screen name that is not provocative. 3. Remain Anonymous—Never give your real name, home address, phone number, or any other personal information like account numbers to someone you meet online. 4. Be Polite—Know that anything you type in a chat room can be seen by everyone who is using the chat room. Never send mean or inappropriate messages, or participate in arguments. 5. Stay Safe—Never arrange to meet someone in person that you have only met online. 6. Don’t Use AutoComplete—When you enter a User ID and Password, Internet Explorer may ask if you want to use AutoComplete to remember your User ID the next time you need to log in. This may be convenient but it makes your User ID available to other people who use that computer. If the AutoComplete box above appears, click in the box next to Don’t offer to remember any more passwords and click the No button. Turn the page to learn more about AutoComplete. © Rev. 11/2009 The OASIS Institute 24 OASIS Connections Safety First AutoComplete–Convenient, Not Safe If you wish to turn off the AutoComplete command and you are using Windows XP, follow the steps below. If you are using Windows Vista, see the Appendix of this manual. 1. Click the Start button, roll up and click on Control Panel. 2. Double-click on the Internet Options icon in the right pane. 3. The Internet Options dialog box will appear. Click on the Content tab. 4. The Content tab will appear. Click the AutoComplete Settings button. 5. The AutoComplete Setting dialog box will appear. Click in the box next to Forms to remove the check mark. 6. Click in the box next to User Names and Passwords on Forms to remove the check mark. 7. Click the Ask Me Before Saving Passwords button to add a check. 8. Click OK at the bottom. © Rev. 11/2009 The OASIS Institute 25 OASIS Connections Safety First Dos and Don’ts of Online Communication Use these guidelines when you are in chat rooms or instant messaging with someone. Some of them can also apply to other forms of online communication such as email. Do’s Be patient. Spend a few minutes just watching. Say Hi! when you enter a room. Use email etiquette and common courtesy. Pick an appropriate chat room. Follow the chat room rules. Find out who the host or monitor is in case you need them. Read the FAQs (Frequently Asked Questions). Don’ts Never give out personal or financial information. Don’t agree to meet anyone in person. Don’t send anyone pictures of yourself, or your family or friends. Don’t respond to mean or uncomfortable messages. Don’t use all capital letters. This is considered SHOUTING! Never give out your password or email address. Be very careful about opening files attached to email messages. © Rev. 11/2009 The OASIS Institute 26 OASIS Connections Safety First Security for the Whole Family Using the Internet can help you connect with friends and family members of all ages. It’s also an opportunity to share ideas and time with grandchildren, children you tutor, or other young people. You can surf the Internet, exchange emails, research specific topics, and even go shopping online together. This also creates an opportunity for you to help educate the young people in your life about online safety and security. You just might learn some new tricks yourself from the younger generation. AT&T has an initiative called Internet Safety Connections. You can log on to their website and play a game designed to teach youngsters about Internet safety. It might be fun to see how you score on the game as well. Just type the following address into the Internet Explorer Address Box and hit Enter: www.att.com/gen/general?pid=1391 © Rev. 11/2009 The OASIS Institute 27 OASIS Connections Safety First Practice Time: Good Security Habits Do the exercises below to get some practice with keeping your information secure and private. 1. Enter a chat room and use a nickname for a password. Listen to the “chatter” and then write a couple of sentences on what you thought about the chat room and whether or not you liked it. 2. Read the Privacy Policy on three different websites. Are they easy to find? Are they alike? If not, how do they differ? Here are some sites to look at or you may look at sites of your own choosing. www.oasisnet.org www.refundsweepers.com www.childrenspartnership.org www.amazon.com 3. Find three websites related to Internet safety and security. Write down the address of each site. Did you learn anything from these sites? Share them with others in class and be sure to add them to your favorites. continued on next page © Rev. 11/2009 The OASIS Institute 28 OASIS Connections Safety First Practice Time: Good Security Habits continued 4. Can you figure out how to manage cookies on your computer? If not, try finding more information on the Internet. Here are some hints: • Type the words “disable cookies” into a search engine such as Yahoo! • Go to the website www.kburra.com. • Look under the Tools menu in Internet Explorer. 5. Pop-up advertisements do not usually pose a safety or security threat, but they are annoying and can slow down your browsing. Can you find any software called Pop-Up Killers? See if you can install one of these programs on your machine. Do these sites work? Here are some hints: • Type www.popupkiller.info into the Address Box of Internet Explorer and hit Enter. • Look at this site with reviews on many products: www.reviewcentre.com. • Try the site called www.download.com. © Rev. 11/2009 The OASIS Institute 29 OASIS Connections Safety First Class Survey—What Did You Think? Your input is important to us. Please fill out a brief online survey to tell us about your Connections experience. This will help us improve our courses. 1. Go to www.oasisnet.org and the OASIS website will appear. 2. At the top of the page, click the down-arrow next to Quick Links and click Connections Surveys. 3. Click in the box and type your two-letter State. Click the Next button. 4. A list of current classes will appear as shown below. If you entered the wrong state, click the Go Back button and re-enter your two-letter State. 5. Find your Location, Class, Dates and Time. 6. Click on your class to select it. If you don’t see your class, click the My Class is Not Listed button and review the updated class list. If you still don’t see your class, click the My Class is Not Listed button again, fill in your Class and Instructor Name and click the Next button. 7. A survey will appear with your Class Name at the top. You will not be asked to put your name on the survey. continued on next page © Rev. 11/2009 The OASIS Institute 30 OASIS Connections Class Survey—What Did You Think? Safety First continued 8. Click in all the boxes that apply. A checkmark will appear in those boxes. Here are some examples. 9. Click on the appropriate circles to fill them in. Here are some examples. 10. Type your suggestions here. 11. Be sure to click Finish Survey when you are done. © Rev. 11/2009 The OASIS Institute 31 Appendix Safety First Managing Spam in Microsoft Outlook Microsoft Outlook is the email program built into Windows XP. Outlook has a built in junk email filter designed to catch spam and automatically move it to the Junk Email Folder on the left side of the screen. The junk email filter is automatically set to a “Low” setting. If you want increased spam management, follow the steps below to raise the filter level to “High.” However, be sure to open your Junk Email Folder once in a while to be sure the filter hasn’t accidentally moved legitimate emails to that folder. 1. Open Microsoft Outlook. Click on the Tools menu, roll down and click on Options. 2. The Options dialog box will appear. Click on the Junk Email button. 3. The Junk Email Options dialog box will appear on the Options tab as shown here. 4. Click in the circle next to High and click OK to close the Junk Email dialog box. 5. Click OK again to close the Options dialog box. © Rev. 4/2009 The OASIS Institute 32 Appendix Safety First Built-in Privacy & Security Information: Vista Internet Explorer has some built-in privacy and security information so you can learn about how to keep your computer safe. If you are using Windows Vista, follow the instructions below to find this valuable information. 1. In Internet Explorer, click on the Help menu, roll down and click on Contents and Index. 2. The Windows Help window appears. Type security and privacy in the Help box and hit Enter. 3. A list of topics will appear below. Click on Security and Privacy Features in Internet Explorer. 4. A list of the various privacy and security features that Internet Explorer offers will appear. 5. Click on a feature to read about it. Try it! Visit these two websites to learn more about online safety and security: www.staysafe.org onguardonline.gov © Rev. 4/2009 The OASIS Institute 33 Appendix Safety First AutoComplete–Convenient, Not Safe: Vista If you wish to turn off the AutoComplete command and you are using Windows Vista, follow the steps below. 1. From the Start button, click on Control Panel. 2. The Control Panel dialog box will appear. Type autocomplete into the Search box and hit Enter. 3. Click Turn AutoComplete in Internet Explorer On or Off. continued on next page © Rev. 4/2009 The OASIS Institute 34 Appendix Safety First AutoComplete: Vista continued 4. The Internet Properties box will appear with the Content tab showing. 5. Under AutoComplete, click the Settings button. 5. The AutoComplete Settings dialog box will appear. Click in the box next to Forms to remove the check mark. 6. Click next to User Names and Passwords on Forms to remove the check mark. 7. Click OK in the AutoComplete Settings box. 8. Click OK in the Internet Properties dialog box. © Rev. 4/2009 The OASIS Institute 35