Title: Nonetheless, one leading anti-spam firm which is able t
1E-mail Basics, Encryption, Passwords, and SPAM
Licking the Security Stamp
Presenter Melissa Dark CERIAS, Purdue
University
2Contact Information Judy Lewandowski K-12
Outreach Coordinator CERIAS, Purdue
University http//www.cerias.purdue.edu/K-12 judyL
_at_cerias.purdue.edu 765.496.6762
3- Todays Overview
- E-mail Basics
- Encryption
- Passwords
- SPAM
4E-mail Basics
- E-mail is similar to a postcard.
- E-mail is not securenor is it private.
- Encryption is the only way to help in preventing
others from reading your e-mail.
Due Dilligence
5Email Security Fundamentals
- Question Unsolicited Documents.
- Use attachments only when necessary.
- Question ALL executable programs received via
email. - Notify the sender of infected emails!
- Pay attention to file extensions...
6Common File Extensions
Great Resource http//www.matisse.net/files/forma
ts.html
7Finding File Extensions in Windows-based machines
- Click on START.
- Select SETTINGS
- Select CONTROL PANEL
- Select FOLDER OPTIONS
- Select VIEW
Make sure that this box is not checked.
8Encryption(Protecting sensitive information)
- Encoding information
- Secret Code Ring
- Cryptoquip
- Pig Latin
- Most common applications offer password
protection. - Confidential (not critical)---USE ENCRYPTION!!!!
- NEVER send HIGHLY SENSITIVE information through
email. (email should never be considered
secure!)
9Sample Encrypted Document
10Password Protecting Windows Documents
- File / Save As
- Click on TOOLS
- Select GENERAL OPTIONS
- Enter passwords
11Encryption Practice...
- Open Microsoft Word.
- Type in a sentence.
- Follow the directions---password protect the
document. - Close the document.
- Re-open it using your password.
12PGP Pretty Good Privacy (approx. 20 per
unit) Requires use of Public Keys Sample PGP
encrypted email
13Without the proper keys... the message is
unreadable.
14Key Component to Encryption
Using Secure Passwords!!
15FLUX!!!
16Password Protection
- Do not post or store your password near your
computer. - Require passwords to be at least 8 characters
long. - Use non-alpha characters and capital letters.
- BoilermakeR Iam_at_1016 KaTis15
- Do not use easy to guess selections.
- password 123456 computer hello love
17Passwords Continued
- Use non-personal selections.
- Avoid name, spouses name, kids, ss
- Maintain zero tolerance for password sharing.
- Avoid typing your password when someone is
watching. - Urge users to change passwords. (2-3 weeks!)
- Always remember to log out!
- Constantly reinforce the importance of password
security.
18Write a smart password for the following
fictional teacher. Be sure to follow all of the
recommendations!
Password Practice
Samuel W. Miller Greentown High School Social
Studies Teacher Harvard Graduate Likes to play
golf Has four children 1 wife named Betty Enjoys
woodworking
19BREAK!!!!!!
Please be back at......
20SPAM
- Internet Junk Mail
- Commercial
- Personal
- Unsolicited emailusually sent to many people
- According to the Gartner Group, a research firm,
about 90 of email users receive spam. - Never Respond to Spam.
- Do not sign up for Spam Removal lists.
- Sincere v. Spam Collectors
21Types of Spam
- Chain Letters
- A message that urges readers to pass the letter
on in order to receive a reward. - Hoaxes
- Chain letter that is based upon a fictitious
scenario or circumstance. - Urban Legends
- Email messages providing safety messages or
warnings.
22The Pros and Cons of Spam
- A Brainstorming Activity.
23Why Should I be Concerned about Spam?
- Costs Money.
- Recipient of the advertisement pays for the
connection time, disk space, bandwidth, etc. - Lost Productivity.
- Time, Time, Time
- Clogged Email.
- May be prevent receipt of important messages.
- Discourages Internet Use.
- May discourage others from seeing the benefits of
the WWW.
24Raising SPAM Awareness Activity
- Check the legitimacy of a message BEFORE they
send it on. - Directions Each group has been given a
keyword. Go to the Urban Legends site
(http//www.urbanlegends.com) search engine and
search for SPAM dealing with your selection. - Skim through the choices and pick the best one to
share with the group! Explain why it is a hoax.
25Specific Directions---After Sept. 11th
Go to http//www.urbanlegends.com/search/search.
html
Type in Your Keyword Here. Be sure to select
the 2nd button
26(No Transcript)
27SPAM Awareness Activity Debriefing
- Pets
- Spiders
- Perfume
- Cracker
- 809
- Disney
- Coke
- Gap
- ATM
- Needles
- Intel
- Taco Bell
28Resources to Find the Truth About Spam
- http//www.urbanlegends.com
- http//www.urbanmyths.com
- http//www.earthlink.net/internet/security/spam
- http//www.mcs.com/jcr/junkmail.html
- http//www.junkbusters.com
29Ways to Reduce Your Daily Intake of Spam
- Use a dummy account for online promotions,
games, etc. - Request that your information be removed from
Internet white pages. - Be sure to HIDE your information when joining a
listserv or mailing list. - Cut and Paste funny stories, poems, etc.
- Encourage others to do the same!
30Virus Protection Firewalls
A Few Brief Comments....
- Update Anti-Virus Frequently!!!
- Use a Firewall
- http//www.zonealarm.com
- FREE
- VERY Effective
- Easy to Use
- Blocks Incoming/Outgoing
31Questions???