Who wants to track you?
- The government and law enforcement
- Private companies (to sell you things and learn your shopping habits)
- Criminals (to learn your patterns)
- Friends, family and potential friends (“Facebook helps you connect and share with the people in your life.”)
How can you be tracked?
- Data traces left on your computer (e.g. browsing history, browser cache)
- Interactions with your Internet Service Provider (ISP)
- “Like” buttons and advertisements
- Browser toolbars
- Logs on the websites you visit
- Wifi (and wired) snooping
- Mysterious shadowy government projects that may or may not exist
Scary Elaborations, and what to do: Local privacy, Online privacy, and Legislation
This session will attempt to focus on the most common security problems that regular home users run into.
Phishing, Spam, Viruses, Botnets, Wireless Security, Data Theft and Loss
Encryption is the process of scrambling data so that only somebody with the right authorization (i.e. the right key) can unscramble the data.
Types of Encryption, Secure Web Browsing, Secure Email, Trusting Keys
Because several participants would not have been able to make it, we decided to defer this week’s Computer Security class. Instead, we will meet on Tuesday, March 27, Tuesday, April 3 and Tuesday, April 10.
Some topics we will cover over the next few weeks include:
- Verifying identity (secure web browsing, encrypting email…)
- What should we be worried about?
- Email phishing and scams
- Privacy and tracking
- Firewalls, Routers, and Wifi
There is still space left in the course, so feel free to register by leaving a comment below.
Passwords are like housekeys for computer services. They are intended to be secrets that allow you to access resources, but deny access to others.
Here are some questions to ask yourself about passwords:
- What are the passwords protecting?
- If one password is breached how many other computer services become vulnerable?
- Who else knows your passwords? How much do you trust them?
- What services have your passwords? How much do you trust them?
- How many passwords do you have to manage?
- How do you manage your computer passwords?
Password cracking, password strength, managing passwords, overall security thinking, and homework!
It is late to be advertising this course on the blog, but there is still space in the course if you would like to participate.
This course is about computer security. Computer security is a huge and complicated topic, so to keep it manageable here are the primary goals:
- To understand some of the security threats that exist in the big scary world, as well as the resources you might want to protect
- To make better security choices without being terrified into paralysis
- To have you identify, analyse and improve aspects of computer security as they relate to your own life
The course will be held Tuesday evenings from 7-9pm starting on March 13, at the Working Centre’s main building, 58 Queen Street South, Kitchener. It will run 3-5 weeks depending on student interest. In the first week we will discuss general security principles, talk about managing passwords, and choose topics for future sessions.
This course is directed towards non-experts. We hope there will be lots of interaction and a friendly, nonintimidating atmosphere.
In order to sign up you can leave a comment on this blog post, write the facilitator at his yahoo.ca address (username: paul_nijjar) or just show up on Tuesday.
Again, there are no right or wrong answers to this survey.
If you don’t do the survey in class you can complete it by e-mail and send it to Paul.
Your answers in the survey will help improve future editions of the course (if there are any).
Take the survey!