Cyber Hygiene for Students 2025

Essential Digital Security for University Life

Open4Tech Summer School

2025-06-25

Cyber Hygiene for Students 2025

Welcome to Digital Security

Essential Skills for University Life

Open4Tech Summer School

4-hour intensive course
2 sessions × 2 hours each

Why Students Need Cyber Hygiene

You’re a high-value target

Your data is valuable

Your future depends on it

Student-Specific Risks

  • Academic work theft and plagiarism
  • Financial aid fraud targeting
  • Identity theft for loans/credit
  • Social media manipulation
  • Campus network vulnerabilities

Course Objectives

  • Identify digital threats in student life
  • Protect academic work and personal data
  • Secure devices and accounts
  • Practice safe browsing and social media
  • Develop lifelong security habits

Session 1 Overview

  • Digital threats for students
  • Password security and management
  • Device protection strategies
  • Safe browsing practices
  • Hands-on exercises

Session 2 Overview

  • Social media security
  • Academic data protection
  • Privacy techniques
  • Real-world scenarios
  • Building security habits

Session 1: Foundation Security

Digital Threats in Student Life

“Understanding what you’re up against”

Phishing Attacks on Students

Chapter: Digital Threats in Student Life

  • Fake financial aid notifications
  • Bogus scholarship opportunities
  • Fraudulent university communications
  • Job scam emails

Campus-Specific Threats

Chapter: Digital Threats in Student Life

  • Public Wi-Fi vulnerabilities
  • Shared computer risks
  • Dormitory network security gaps
  • Library and lab device threats

Academic Work Targeting

Chapter: Digital Threats in Student Life

  • Thesis and research theft
  • Assignment plagiarism
  • Intellectual property violations
  • Academic collaboration exploitation

Financial Targeting

Chapter: Digital Threats in Student Life

  • Student loan fraud
  • Credit card applications
  • Bank account takeovers
  • Scholarship scams

Password Security for Students

“Your first line of defense”

Why Student Passwords Fail

Chapter: Password Security for Students

  • University name + graduation year
  • Dormitory + room number
  • Pet name + birth year
  • Same password everywhere

Strong Password Creation

Chapter: Password Security for Students

  • Minimum 12 characters
  • Mix of letters, numbers, symbols
  • Unique for each account
  • Not based on personal information

Password Manager Benefits

Chapter: Password Security for Students

  • Generate complex passwords
  • Store them securely
  • Auto-fill login forms
  • Sync across devices

Multi-Factor Authentication

Chapter: Password Security for Students

  • University accounts - always enable
  • Email accounts - critical protection
  • Banking - financial security
  • Social media - identity protection

MFA Methods for Students

Chapter: Password Security for Students

  • Authenticator apps - most secure
  • SMS codes - convenient but less secure
  • Hardware tokens - university may provide
  • Backup codes - store safely

Device Protection Strategies

“Securing your digital workspace”

Laptop Security Basics

Chapter: Device Protection Strategies

  • Enable full disk encryption
  • Set up screen lock with password
  • Auto-lock after inactivity
  • Regular software updates

Mobile Device Security

Chapter: Device Protection Strategies

  • Strong passcode or biometrics
  • Enable find my device
  • App permissions review
  • Regular OS updates

Campus Computer Safety

Chapter: Device Protection Strategies

  • Always log out completely
  • Don’t save passwords
  • Use private/incognito mode
  • Check for shoulder surfing

Physical Security

Chapter: Device Protection Strategies

  • Never leave devices unattended
  • Use cable locks in study areas
  • Secure storage in dorms
  • Insurance for expensive devices

Safe Browsing Practices

“Navigating the web securely”

Browser Security Setup

Chapter: Safe Browsing Practices

  • Enable automatic updates
  • Use ad blockers
  • Install privacy extensions
  • Configure security settings

Recognizing Suspicious Websites

Chapter: Safe Browsing Practices

  • Check for HTTPS (lock icon)
  • Verify domain spelling
  • Look for professional design
  • Trust your instincts

Download Safety

Chapter: Safe Browsing Practices

  • Official sources only
  • Scan with antivirus
  • Check file extensions
  • Avoid pirated software

Research and Academic Browsing

Chapter: Safe Browsing Practices

  • Use university databases
  • Verify source credibility
  • Check for paywalls scams
  • Bookmark trusted sites

Hands-On Exercise 1

Chapter: Session 1 - Practice

Password Manager Setup

  • Install password manager
  • Create strong master password
  • Import existing passwords
  • Generate new passwords for key accounts

Exercise 1 Checklist

Chapter: Session 1 - Practice

  • University email - new strong password
  • Student portal - unique password
  • Banking - separate strong password
  • Social media - individual passwords

Session 1 Break

15-minute break

Coming up in Session 2: - Social media security - Academic data protection - Privacy techniques - Real-world scenarios

Session 2: Advanced Protection

Social Media Security

“Protecting your digital reputation”

Privacy Settings Review

Chapter: Social Media Security

  • Make profiles private
  • Limit who can find you
  • Control post visibility
  • Disable location sharing

What Not to Share

Chapter: Social Media Security

  • Full birth date
  • Home address
  • Class schedules
  • Travel plans
  • Financial information

Professional Image Protection

Chapter: Social Media Security

  • Google yourself regularly
  • Clean up old posts
  • Think before posting
  • Consider future employers

Social Engineering Awareness

Chapter: Social Media Security

  • Fake friend requests
  • Phishing via social media
  • Romance scams
  • Too-good-to-be-true offers

Academic Data Protection

“Safeguarding your intellectual work”

Cloud Storage Security

Chapter: Academic Data Protection

  • Use university-provided storage
  • Enable two-factor authentication
  • Understand sharing permissions
  • Regular access reviews

Backup Strategies

Chapter: Academic Data Protection

  • 3-2-1 backup rule
  • Automate backups
  • Test restore procedures
  • Version control for code/documents

Collaboration Security

Chapter: Academic Data Protection

  • Verify team members
  • Use secure sharing platforms
  • Set expiration dates
  • Monitor access logs

Intellectual Property Protection

Chapter: Academic Data Protection

  • Watermark important documents
  • Use version tracking
  • Limit sharing scope
  • Know your rights

Privacy Protection Techniques

“Controlling your digital footprint”

Email Privacy

Chapter: Privacy Protection Techniques

  • Use university email for official business
  • Separate personal email
  • Be cautious with mailing lists
  • Regular inbox cleanup

Search Engine Privacy

Chapter: Privacy Protection Techniques

  • Use DuckDuckGo for private searches
  • Clear search history regularly
  • Understand data collection
  • Use incognito/private mode

VPN Usage

Chapter: Privacy Protection Techniques

  • University VPN for campus resources
  • Personal VPN for public Wi-Fi
  • Choose reputable providers
  • Understand limitations

Digital Footprint Management

Chapter: Privacy Protection Techniques

  • Regular online presence audits
  • Request data deletion
  • Opt out of data brokers
  • Monitor your reputation

Campus Network Security

“Staying safe on university networks”

Wi-Fi Security on Campus

Chapter: Campus Network Security

  • Use official university Wi-Fi
  • Avoid unknown networks
  • Check network names carefully
  • Use VPN on public networks

Ethernet vs Wi-Fi

Chapter: Campus Network Security

  • Ethernet is more secure
  • Faster and more reliable
  • Less susceptible to attacks
  • Use when available

Shared Resource Security

Chapter: Campus Network Security

  • Lab computers - always log out
  • Printers - don’t leave documents
  • Shared drives - check permissions
  • Public displays - no sensitive info

Real-World Scenarios

“Applying what you’ve learned”

Scenario 1: Phishing Email

Chapter: Real-World Scenarios

“Urgent: Financial Aid Suspended”

  • Check sender carefully
  • Look for urgency tactics
  • Verify through official channels
  • Don’t click suspicious links

Scenario 2: Public Wi-Fi

Chapter: Real-World Scenarios

Coffee shop near campus

  • Avoid sensitive activities
  • Use HTTPS websites only
  • Enable VPN if available
  • Check network legitimacy

Scenario 3: Social Media Request

Chapter: Real-World Scenarios

Unknown person wants to connect

  • Verify mutual connections
  • Check profile authenticity
  • Don’t accept blindly
  • Report suspicious accounts

Scenario 4: USB Device Found

Chapter: Real-World Scenarios

USB drive in library

  • Never plug into your device
  • Could contain malware
  • Report to IT security
  • Not worth the risk

Hands-On Exercise 2

Chapter: Session 2 - Practice

Privacy Settings Audit

  • Review social media privacy
  • Update browser settings
  • Configure cloud storage
  • Set up secure backup

Exercise 2 Checklist

Chapter: Session 2 - Practice

  • Facebook/Instagram - private profile
  • LinkedIn - professional settings
  • Google Drive - sharing permissions
  • Browser - privacy extensions

Building Security Habits

“Making security second nature”

Daily Security Routine

Chapter: Building Security Habits

  • Lock screen when leaving
  • Check for software updates
  • Review new emails carefully
  • Back up important work

Weekly Security Tasks

Chapter: Building Security Habits

  • Review social media privacy
  • Update password manager
  • Check account activity
  • Clean up downloads folder

Monthly Security Review

Chapter: Building Security Habits

  • Audit connected apps
  • Review sharing permissions
  • Update security software
  • Check credit reports

Semester Security Goals

Chapter: Building Security Habits

  • Complete privacy audit
  • Organize digital files
  • Update all passwords
  • Review and improve backup strategy

Emergency Response Plan

“When things go wrong”

If Your Account is Compromised

Chapter: Emergency Response Plan

  • Change password immediately
  • Enable MFA if not already
  • Check recent activity
  • Notify contacts if needed

If Your Device is Stolen

Chapter: Emergency Response Plan

  • Use remote wipe feature
  • Change all passwords
  • Contact your bank
  • File police report

If You Fall for a Scam

Chapter: Emergency Response Plan

  • Don’t panic or feel embarrassed
  • Document everything
  • Report to authorities
  • Learn from the experience

Campus Resources

Chapter: Emergency Response Plan

  • IT Help Desk - technical support
  • Campus Security - physical threats
  • Financial Aid Office - financial scams
  • Counseling Services - emotional support

Key Takeaways

Chapter: Course Summary

  • Strong passwords + MFA are essential
  • Think before you click or share
  • Keep devices updated and secured
  • Privacy settings need regular review
  • Security is a habit, not a one-time task

Your Security Action Plan

Chapter: Course Summary

  • Set up password manager today
  • Enable MFA on all critical accounts
  • Review privacy settings this week
  • Create backup strategy this month
  • Make security a daily habit

Additional Resources

Chapter: Course Summary

  • University IT Security - campus-specific guidance
  • NIST Cybersecurity Guide - comprehensive framework
  • KnowBe4 Security Awareness - training materials
  • Have I Been Pwned - breach checking

Free Security Tools

Chapter: Course Summary

  • Bitwarden - password manager
  • uBlock Origin - ad blocker
  • DuckDuckGo - private search
  • Signal - secure messaging

Course Completion

Congratulations! 🎓

You now have the essential skills to: - Protect your digital identity - Secure your academic work - Navigate threats safely - Build lifelong security habits

Stay Connected

Chapter: Course Completion

  • Follow security news and updates
  • Join cybersecurity communities
  • Share knowledge with peers
  • Keep learning as threats evolve

Questions & Discussion

Thank you for participating!

Open4Tech Summer School
contact@open4tech.org

Stay secure, stay smart!

Final Exercise: Security Pledge

Make a commitment to yourself:

“I pledge to practice good cyber hygiene, protect my digital identity, and help others stay secure online.”

Sign your name and take this commitment seriously!