Session 1: Foundation Security
Digital Threats in Student Life
“Understanding what you’re up against”
Phishing Attacks on Students
Chapter: Digital Threats in Student Life
- Fake financial aid notifications
- Bogus scholarship opportunities
- Fraudulent university communications
- Job scam emails
Campus-Specific Threats
Chapter: Digital Threats in Student Life
- Public Wi-Fi vulnerabilities
- Shared computer risks
- Dormitory network security gaps
- Library and lab device threats
Academic Work Targeting
Chapter: Digital Threats in Student Life
- Thesis and research theft
- Assignment plagiarism
- Intellectual property violations
- Academic collaboration exploitation
Financial Targeting
Chapter: Digital Threats in Student Life
- Student loan fraud
- Credit card applications
- Bank account takeovers
- Scholarship scams
Password Security for Students
“Your first line of defense”
Why Student Passwords Fail
Chapter: Password Security for Students
- University name + graduation year
- Dormitory + room number
- Pet name + birth year
- Same password everywhere
Strong Password Creation
Chapter: Password Security for Students
- Minimum 12 characters
- Mix of letters, numbers, symbols
- Unique for each account
- Not based on personal information
Password Manager Benefits
Chapter: Password Security for Students
- Generate complex passwords
- Store them securely
- Auto-fill login forms
- Sync across devices
Recommended Password Managers
Chapter: Password Security for Students
- Bitwarden - free for students
- 1Password - educational discounts
- Dashlane - student pricing
- Built-in browser managers - basic option
Multi-Factor Authentication
Chapter: Password Security for Students
- University accounts - always enable
- Email accounts - critical protection
- Banking - financial security
- Social media - identity protection
MFA Methods for Students
Chapter: Password Security for Students
- Authenticator apps - most secure
- SMS codes - convenient but less secure
- Hardware tokens - university may provide
- Backup codes - store safely
Device Protection Strategies
“Securing your digital workspace”
Laptop Security Basics
Chapter: Device Protection Strategies
- Enable full disk encryption
- Set up screen lock with password
- Auto-lock after inactivity
- Regular software updates
Mobile Device Security
Chapter: Device Protection Strategies
- Strong passcode or biometrics
- Enable find my device
- App permissions review
- Regular OS updates
Campus Computer Safety
Chapter: Device Protection Strategies
- Always log out completely
- Don’t save passwords
- Use private/incognito mode
- Check for shoulder surfing
Physical Security
Chapter: Device Protection Strategies
- Never leave devices unattended
- Use cable locks in study areas
- Secure storage in dorms
- Insurance for expensive devices
Safe Browsing Practices
“Navigating the web securely”
Browser Security Setup
Chapter: Safe Browsing Practices
- Enable automatic updates
- Use ad blockers
- Install privacy extensions
- Configure security settings
Recognizing Suspicious Websites
Chapter: Safe Browsing Practices
- Check for HTTPS (lock icon)
- Verify domain spelling
- Look for professional design
- Trust your instincts
Download Safety
Chapter: Safe Browsing Practices
- Official sources only
- Scan with antivirus
- Check file extensions
- Avoid pirated software
Research and Academic Browsing
Chapter: Safe Browsing Practices
- Use university databases
- Verify source credibility
- Check for paywalls scams
- Bookmark trusted sites
Hands-On Exercise 1
Chapter: Session 1 - Practice
Password Manager Setup
- Install password manager
- Create strong master password
- Import existing passwords
- Generate new passwords for key accounts
Exercise 1 Checklist
Chapter: Session 1 - Practice
- ✓ University email - new strong password
- ✓ Student portal - unique password
- ✓ Banking - separate strong password
- ✓ Social media - individual passwords
Session 1 Break
15-minute break
Coming up in Session 2: - Social media security - Academic data protection - Privacy techniques - Real-world scenarios
Session 2: Advanced Protection
Privacy Settings Review
Chapter: Social Media Security
- Make profiles private
- Limit who can find you
- Control post visibility
- Disable location sharing
What Not to Share
Chapter: Social Media Security
- Full birth date
- Home address
- Class schedules
- Travel plans
- Financial information
Professional Image Protection
Chapter: Social Media Security
- Google yourself regularly
- Clean up old posts
- Think before posting
- Consider future employers
Social Engineering Awareness
Chapter: Social Media Security
- Fake friend requests
- Phishing via social media
- Romance scams
- Too-good-to-be-true offers
Academic Data Protection
“Safeguarding your intellectual work”
Cloud Storage Security
Chapter: Academic Data Protection
- Use university-provided storage
- Enable two-factor authentication
- Understand sharing permissions
- Regular access reviews
Backup Strategies
Chapter: Academic Data Protection
- 3-2-1 backup rule
- Automate backups
- Test restore procedures
- Version control for code/documents
Collaboration Security
Chapter: Academic Data Protection
- Verify team members
- Use secure sharing platforms
- Set expiration dates
- Monitor access logs
Intellectual Property Protection
Chapter: Academic Data Protection
- Watermark important documents
- Use version tracking
- Limit sharing scope
- Know your rights
Privacy Protection Techniques
“Controlling your digital footprint”
Email Privacy
Chapter: Privacy Protection Techniques
- Use university email for official business
- Separate personal email
- Be cautious with mailing lists
- Regular inbox cleanup
Search Engine Privacy
Chapter: Privacy Protection Techniques
- Use DuckDuckGo for private searches
- Clear search history regularly
- Understand data collection
- Use incognito/private mode
VPN Usage
Chapter: Privacy Protection Techniques
- University VPN for campus resources
- Personal VPN for public Wi-Fi
- Choose reputable providers
- Understand limitations
Campus Network Security
“Staying safe on university networks”
Wi-Fi Security on Campus
Chapter: Campus Network Security
- Use official university Wi-Fi
- Avoid unknown networks
- Check network names carefully
- Use VPN on public networks
Ethernet vs Wi-Fi
Chapter: Campus Network Security
- Ethernet is more secure
- Faster and more reliable
- Less susceptible to attacks
- Use when available
Shared Resource Security
Chapter: Campus Network Security
- Lab computers - always log out
- Printers - don’t leave documents
- Shared drives - check permissions
- Public displays - no sensitive info
Real-World Scenarios
“Applying what you’ve learned”
Scenario 1: Phishing Email
Chapter: Real-World Scenarios
“Urgent: Financial Aid Suspended”
- Check sender carefully
- Look for urgency tactics
- Verify through official channels
- Don’t click suspicious links
Scenario 2: Public Wi-Fi
Chapter: Real-World Scenarios
Coffee shop near campus
- Avoid sensitive activities
- Use HTTPS websites only
- Enable VPN if available
- Check network legitimacy
Scenario 4: USB Device Found
Chapter: Real-World Scenarios
USB drive in library
- Never plug into your device
- Could contain malware
- Report to IT security
- Not worth the risk
Hands-On Exercise 2
Chapter: Session 2 - Practice
Privacy Settings Audit
- Review social media privacy
- Update browser settings
- Configure cloud storage
- Set up secure backup
Exercise 2 Checklist
Chapter: Session 2 - Practice
- ✓ Facebook/Instagram - private profile
- ✓ LinkedIn - professional settings
- ✓ Google Drive - sharing permissions
- ✓ Browser - privacy extensions
Building Security Habits
“Making security second nature”
Daily Security Routine
Chapter: Building Security Habits
- Lock screen when leaving
- Check for software updates
- Review new emails carefully
- Back up important work
Weekly Security Tasks
Chapter: Building Security Habits
- Review social media privacy
- Update password manager
- Check account activity
- Clean up downloads folder
Monthly Security Review
Chapter: Building Security Habits
- Audit connected apps
- Review sharing permissions
- Update security software
- Check credit reports
Semester Security Goals
Chapter: Building Security Habits
- Complete privacy audit
- Organize digital files
- Update all passwords
- Review and improve backup strategy
Emergency Response Plan
“When things go wrong”
If Your Account is Compromised
Chapter: Emergency Response Plan
- Change password immediately
- Enable MFA if not already
- Check recent activity
- Notify contacts if needed
If Your Device is Stolen
Chapter: Emergency Response Plan
- Use remote wipe feature
- Change all passwords
- Contact your bank
- File police report
If You Fall for a Scam
Chapter: Emergency Response Plan
- Don’t panic or feel embarrassed
- Document everything
- Report to authorities
- Learn from the experience
Campus Resources
Chapter: Emergency Response Plan
- IT Help Desk - technical support
- Campus Security - physical threats
- Financial Aid Office - financial scams
- Counseling Services - emotional support
Key Takeaways
Chapter: Course Summary
- Strong passwords + MFA are essential
- Think before you click or share
- Keep devices updated and secured
- Privacy settings need regular review
- Security is a habit, not a one-time task
Your Security Action Plan
Chapter: Course Summary
- Set up password manager today
- Enable MFA on all critical accounts
- Review privacy settings this week
- Create backup strategy this month
- Make security a daily habit
Additional Resources
Chapter: Course Summary
- University IT Security - campus-specific guidance
- NIST Cybersecurity Guide - comprehensive framework
- KnowBe4 Security Awareness - training materials
- Have I Been Pwned - breach checking
Course Completion
Congratulations! 🎓
You now have the essential skills to: - Protect your digital identity - Secure your academic work - Navigate threats safely - Build lifelong security habits
Stay Connected
Chapter: Course Completion
- Follow security news and updates
- Join cybersecurity communities
- Share knowledge with peers
- Keep learning as threats evolve
Questions & Discussion
Thank you for participating!
Alin Mechenici - Chen.ist office@chen.ist
Stay secure, stay smart!
Final Exercise: Security Pledge
Make a commitment to yourself:
“I pledge to practice good cyber hygiene, protect my digital identity, and help others stay secure online.”
Sign your name and take this commitment seriously!
Social Media Security