Basic mobile and internet security

32
Online and Mobile Basic Security NGETH Moses ICT Project Coordinator Community Legal Education Center (CLEC)

Transcript of Basic mobile and internet security

Page 1: Basic mobile and internet security

Online and Mobile Basic Security

NGETH MosesICT Project Coordinator

Community Legal Education Center (CLEC)

Page 2: Basic mobile and internet security

“No place like 127.0.0.1”

• 2nd Step Verification and Set up• Remote your smart phone• Easy to set up “strong” passwords

not a long passwords

Page 3: Basic mobile and internet security

2nd Step Verification(For Google user ONLY)

• Stronger security for your Google Account

• With 2-Step Verification, you’ll protect your account with both your password and your phone

Page 4: Basic mobile and internet security

Why you needs it

Page 5: Basic mobile and internet security

Why you needs it

Page 6: Basic mobile and internet security

How it works

Page 7: Basic mobile and internet security

How it works

Page 8: Basic mobile and internet security

How it protects you

Page 9: Basic mobile and internet security

How it protects you

Page 10: Basic mobile and internet security

How it protects you

Page 11: Basic mobile and internet security

How to set up 2nd step verification

Page 12: Basic mobile and internet security

Sup 2nd step verification

• Go to your Gmail account

Page 13: Basic mobile and internet security

Set up 2nd step verification

• Go to “Security Tap”

• Click on “Setup”

Page 14: Basic mobile and internet security

Set up 2nd step verification

• Click on “Start setup”

• Re-type your password

Page 15: Basic mobile and internet security

Set up 2nd step verification

• Type your phone number

• Note: you either choose Google to send “Text message (SMS” or Call you “Voice Call”

Page 16: Basic mobile and internet security

Set up 2nd step verification

• Go to icon of you profile photo at the top right side

Page 17: Basic mobile and internet security

Set up 2nd step verification

• Code was sent to your number.

• Fill in the 6 digits in a blank box

• Note: Mobile and Metfone doesn’t work well.

Page 18: Basic mobile and internet security

Set up 2nd step verification

• If you are setting up on somebody els’ computer, please un-tick “Trust this computer”.

• Recommend to set up on your computer ONLY

• Click Next

Page 19: Basic mobile and internet security

Set up 2nd step verification

• Just to make sure you got the right phone number.

• Click Confirm to finish the setup

Page 20: Basic mobile and internet security

Set up 2nd step verification

• NOTE:

– After finish setup 2nd step verification, all your social media that uses with this Gmail account will be sign out. It means you can’t log in to those account with your current password. It needs a one-time “App-specific passwords”. (Explanation off slide presentation)

Page 21: Basic mobile and internet security

Remote your smart phone

1. First you need to make sure that you have turned it on, which you can do by following this quick tutorial:

2. Go to the Google Setttings of your Android device.3. Tap on Android Device Manager at the bottom of the list4. Check the box for Remotely locate this device5. Check box for remote lock and factory reset.6. To the Settings of your phone.7. Tap on Security and then Device administrator. Make sure the Android

Device Manager is ticked off there.8. Now that you have done this, you can remotely lock and wipe your

device in case of theft or loss. To do this, go to the Device Manager website.

9. The path to activate this feature might differ depending on your device, but in general should be the same as it's a Google service and not one from your phone's manufacturer.

Page 22: Basic mobile and internet security

Remote your smart phone

Page 23: Basic mobile and internet security

Remote your smart phone

Page 24: Basic mobile and internet security

Remote your smart phone

Page 25: Basic mobile and internet security

Remote your smart phone

Page 26: Basic mobile and internet security

Remote your smart phone (On Device)

Page 27: Basic mobile and internet security

Remote your smart phone (On Device)

Page 28: Basic mobile and internet security

Easy create “Strong Password” not “Long Password”

Page 29: Basic mobile and internet security

“Strong Password” not “Long Password”

It is important to use different types of characters when choosing a password. This can be done in various ways:

• Varying capitalisation, such as: 'My naME is Not MR. MarSter'

• Alternating numbers and letters, such as: 'a11 w0Rk 4nD N0 p14Y'

• Incorporating certain symbols, such as: 'c@t(heR1nthery3'

• Using multiple languages, such as: 'Let Them Eat 1e gateaU au ch()colaT

Page 30: Basic mobile and internet security

“Strong Password” not “Long Password”

• Passwords can also take advantage of more traditional mnemonic devices, such as the use of acronyms. This allows long phrases to be turned into complex, seemingly-random words:

• 'To be or not to be? That is the question' becomes '2Bon2B?TitQ’

• 'We hold these truths to be self-evident: that all men are created equal' becomes 'WhtT2bs-e:taMac=’

• 'Are you happy today?' becomes 'rU:-)2d@y?'

Page 31: Basic mobile and internet security

“Strong Password” not “Long Password”

• A little effort to make the password more complex goes a very long way. Increasing the length of a password even just by a few characters, or by adding numbers or special characters, makes it much more difficult to crack. For demonstrative purposes, the table below shows how much longer it may take a hacker to break a list of progressively more complex passwords by trying different combinations of the password one after another.

Page 32: Basic mobile and internet security

“Strong Password” not “Long Password”