Basic mobile and internet security

Post on 16-Jul-2015

59 views 1 download

Transcript of Basic mobile and internet security

Online and Mobile Basic Security

NGETH MosesICT Project Coordinator

Community Legal Education Center (CLEC)

“No place like 127.0.0.1”

• 2nd Step Verification and Set up• Remote your smart phone• Easy to set up “strong” passwords

not a long passwords

2nd Step Verification(For Google user ONLY)

• Stronger security for your Google Account

• With 2-Step Verification, you’ll protect your account with both your password and your phone

Why you needs it

Why you needs it

How it works

How it works

How it protects you

How it protects you

How it protects you

How to set up 2nd step verification

Sup 2nd step verification

• Go to your Gmail account

Set up 2nd step verification

• Go to “Security Tap”

• Click on “Setup”

Set up 2nd step verification

• Click on “Start setup”

• Re-type your password

Set up 2nd step verification

• Type your phone number

• Note: you either choose Google to send “Text message (SMS” or Call you “Voice Call”

Set up 2nd step verification

• Go to icon of you profile photo at the top right side

Set up 2nd step verification

• Code was sent to your number.

• Fill in the 6 digits in a blank box

• Note: Mobile and Metfone doesn’t work well.

Set up 2nd step verification

• If you are setting up on somebody els’ computer, please un-tick “Trust this computer”.

• Recommend to set up on your computer ONLY

• Click Next

Set up 2nd step verification

• Just to make sure you got the right phone number.

• Click Confirm to finish the setup

Set up 2nd step verification

• NOTE:

– After finish setup 2nd step verification, all your social media that uses with this Gmail account will be sign out. It means you can’t log in to those account with your current password. It needs a one-time “App-specific passwords”. (Explanation off slide presentation)

Remote your smart phone

1. First you need to make sure that you have turned it on, which you can do by following this quick tutorial:

2. Go to the Google Setttings of your Android device.3. Tap on Android Device Manager at the bottom of the list4. Check the box for Remotely locate this device5. Check box for remote lock and factory reset.6. To the Settings of your phone.7. Tap on Security and then Device administrator. Make sure the Android

Device Manager is ticked off there.8. Now that you have done this, you can remotely lock and wipe your

device in case of theft or loss. To do this, go to the Device Manager website.

9. The path to activate this feature might differ depending on your device, but in general should be the same as it's a Google service and not one from your phone's manufacturer.

Remote your smart phone

Remote your smart phone

Remote your smart phone

Remote your smart phone

Remote your smart phone (On Device)

Remote your smart phone (On Device)

Easy create “Strong Password” not “Long Password”

“Strong Password” not “Long Password”

It is important to use different types of characters when choosing a password. This can be done in various ways:

• Varying capitalisation, such as: 'My naME is Not MR. MarSter'

• Alternating numbers and letters, such as: 'a11 w0Rk 4nD N0 p14Y'

• Incorporating certain symbols, such as: 'c@t(heR1nthery3'

• Using multiple languages, such as: 'Let Them Eat 1e gateaU au ch()colaT

“Strong Password” not “Long Password”

• Passwords can also take advantage of more traditional mnemonic devices, such as the use of acronyms. This allows long phrases to be turned into complex, seemingly-random words:

• 'To be or not to be? That is the question' becomes '2Bon2B?TitQ’

• 'We hold these truths to be self-evident: that all men are created equal' becomes 'WhtT2bs-e:taMac=’

• 'Are you happy today?' becomes 'rU:-)2d@y?'

“Strong Password” not “Long Password”

• A little effort to make the password more complex goes a very long way. Increasing the length of a password even just by a few characters, or by adding numbers or special characters, makes it much more difficult to crack. For demonstrative purposes, the table below shows how much longer it may take a hacker to break a list of progressively more complex passwords by trying different combinations of the password one after another.

“Strong Password” not “Long Password”