Securing the Human. Presented by Thomas Nee, Computer Coordinator Town of Hanover, Massachusetts hanover-ma.gov/information-technology October is Cyber.

Slides:



Advertisements
Similar presentations
B: STUDENT DRIVE MOVE INSTRUCTIONS. Using Internet Explorer: From your computers desktop, double click on the Internet Explorer icon. (Internet Explorer.
Advertisements

Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
By Hiranmayi Pai Neeraj Jain
#10 Useful Reports Election Eligibility February
7 Effective Habits when using the Internet Philip O’Kane 1.
Facebook Security and Privacy Issues Brian Allen Network Security Analyst Washington University December 2, 2010 Alumni House.
Computer Maintenance & Safety Spring Internet Safety Keeping your computer safe What is a computer virus? A computer program that can copy itself.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
How to avoid Viruses and Malware on your Computer Use a firewall Using a firewall is like locking the front door to your house—it helps keep intruders.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
Free Software Alternatives: Avast! Anti-virus
INFORMATION SECURITY AWARENESS PRESENTED BY KAMRON NELSON AND ROYCE WILKERSON.
Security. Physical security Protection from fire/water Protection from dust and extremes of temperature.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Norman SecureSurf Protect your users when surfing the Internet.
Windows Update Jonathan Scott. What is Windows Update? Windows Update is an online program on the Microsoft Website that updates your computer. You can.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
How to maintain your computer
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Security for Seniors SeniorNet Help Desk
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.
Computer Safety Workshop Presented by Roy Coleman April 14, 2015 © 2015 Roy Coleman.
Safe Internet Use Mark Wheatley CSI Onsite
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Web Browser Security Prepared By Mohammed EL-Batta Mohammed Soubih Supervised By Eng. Eman alajrami Explain Date 10. may University of Palestine.
Securing the Human. Presented by Thomas Nee, Computer Coordinator Town of Hanover, Massachusetts hanover-ma.gov/information-technology October is Cyber.
Backing up, Updates, and New Installs… Oh My!. How often do you hear… “Everybody needs to make sure and back up their files.” But what does that really.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
#5 Useful Reports Training Record Report February
Fostering worldwide interoperabilityGeneva, July 2009 How to counter web-based attacks on the Internet in Korea Heung Youl YOUM Chairman of Korea.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
SURFING THE WEB PRIVACY, SAFETY, AND RELIABLE SOURCES.
C OMPUTER V IRUSES Julia White. W HAT ARE COMPUTER VIRUSES ? Computer viruses are small software programs that are designed to spread from one computer.
#9 Useful Reports Create Mailing Labels February
Windows Security A practical approach. Basics Passwords Passwords Strong password should:Strong password should: Be long Be long Contain: Contain: LettersLetters.
Useful Reports Certifications Report February
Small Business Security Keith Slagle April 24, 2007.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
What is Spam? d min.
#7 Useful Reports AUXOP Progress February In order to view AUXDATA reports, you must have a pdf reader program installed on your computer. Adobe’s.
Internet safety By Suman Nazir
Software for Cyber Hygiene © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
Vulnerabilities in Operating Systems Michael Gaydeski COSC December 2008.
Goals Be able to identify the parts of a URL Determine the safeness of a link Know the best places to find the info you need Know how to deal with toolbars.
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
Computer Security Keeping you and your computer safe in the digital world.
CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via .
For more information on Rouge, visit:
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
IT Security Awareness Day October 19, 2016
And Off-Season Storage
Joseph J. Malone Security for Seniors Joseph J. Malone
Three steps to prevent Malware infection
ISYM 540 Current Topics in Information System Management
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
And Off-Season Storage
How to Temporarily Disable Norton Services? Although Norton antivirus and its services are designed to keep your system safe from cyber threats. But at.
Norton technical support Norton.com/Setup | Norton Setup and Install with Product Key Norton Antvirus Activation For protection against.
Risk of the Internet At Home
Information Security Session October 24, 2005
You have Flash installed on your computer.
Connecting Remotely Winter 2014.
You have Flash installed on your computer.
Presentation transcript:

Securing the Human

Presented by Thomas Nee, Computer Coordinator Town of Hanover, Massachusetts hanover-ma.gov/information-technology October is Cyber Security Awareness Month! Originally presented 10/24/2013 Revised 10/28/2013

The Internet o Knowledge Is Power. o The Internet is the most powerful tool in human history. o Use it! Wisely! o Don’t be assimilated into a BotNet.

Security Threats o 3 New Malware Versions Released Every Second! o Zero-Day Threats o Known, Unpatched Vulnerabilities o Unapplied Security Patches

Protection Against Security Threats o Anti-Virus Updated Daily (Security Gateway and Computers). o Operating System Updated Monthly. o Other Security Patches Less Often o Long, Complex, Frequently-Changed Passwords.

Updates  Microsoft Update (Windows Update if Microsoft Office not installed)  Adobe Reader  Adobe Flash  Java (manual updates by administrator)

Reject Optional Add-Ons Uncheck!

Good Habit: Slow Down o Hover over links. o Press and hold link on a smartphone. o Do NOT click unless you know where the link goes. o Visit mainstream sites only.

Domains At A Glance o Destination determined Right-To-Left between “ and next “/” o Examples: (Goes to Iran!) (could be hosted in US or elsewhere) o See List of Country Codes: en.wikipedia.org/wiki/List_of_Internet_top- level_domains#Country_code_top-level_domains

Attack Vectors o Surfing; Drive-By Downloads. o Spam, Spam, Spam. o Infected computers and programs on network. o Flash Drives

o Phishing – generic, widely distributed spam. o Spear-Phishing – personal information included. Do not succumb to emotion! o Use browser bookmarks/favorites whenever possible instead of links in messages. o Slow Down. Use caution opening attachments.

Recommended Options o McAfee’s SiteAdvisor Browser Toolbar o Google Safe Browsing (incorporated into Chrome and Firefox); for full report on an individual site, change domain after “site=“: o Norton’s SafeWeb Website (save as Favorite/Bookmark) o Norton’s Browser Toolbar (packaged with Norton Identity Safe)