Commission on Information and Communications Technology Cyber Security iSchools Project Team HUMAN CAPITAL DEVELOPMENT GROUP.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Spyware and Adware Rick Carback 9/18/2005
SECURITY CHECK Protecting Your System and Yourself Source:
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
INTERNET SAFETY FOR EVERYONE A QUICK AND EASY CRASH COURSE.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Unit 6 Digital Literacy Study S3 Obj 2-2
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Chapter 8 Chapter 8 Digital Defense: Securing Your Data and Privacy
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Security, Privacy, and Ethics Online Computer Crimes.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
INTERNET SAFETY FOR EVERYONE
Viruses & Destructive Programs
Chapter Nine Maintaining a Computer Part III: Malware.
Threats to I.T Internet security By Cameron Mundy.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Protecting People and Information: Threats and Safeguards
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Unit 2 - Hardware Computer Security.
Unit 19 INTERNET SECURITY
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
IT security By Tilly Gerlack.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Types of Electronic Infection
Protecting Students on the School Computer Network Enfield High School.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
INTERNET SAFETY FOR KIDS
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
What is Spam? d min.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Computer Skills and Applications Computer Security.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
A Quick and Easy Crash Course Internet Safety for Everyone.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Computer Security Keeping you and your computer safe in the digital world.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Unit 4 IT Security.
Instructor Materials Chapter 7 Network Security
Cyber Security By: Pratik Gandhi.
Protect Your Computer Against Harmful Attacks!
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Presentation transcript:

Commission on Information and Communications Technology Cyber Security iSchools Project Team HUMAN CAPITAL DEVELOPMENT GROUP

iSchools - CILC for Teachers 2 Internet Positive: venue where people get together to communicate, exchange information, entertain, transact business, and understand how the world operates. Negative: playground of crooked individuals and ruthless firms who take advantage of the freedom it maintains as well as its many weaknesses.

iSchools - CILC for Teachers 3 Privacy? is completely insecure. Each you send results in at least 3 or 4 copies being stored on different computers. You can take measures to protect your .

iSchools - CILC for Teachers 4 Cyber Security Unfortunately, there's no 100% guarantee that even with the best precautions some of these things won't happen to you, but there are steps you can take to minimize the chances. BE RESPONSIBLE CYBER-CITIZENS! BE CYBER-SMART!

iSchools - CILC for Teachers 5 Cyber Security protecting digital information by preventing, detecting, and responding to attacks recognize the risks and become familiar with terminology associated with them

iSchools - CILC for Teachers 6 Security Settings High, Medium, Low Trust sites vs. Restricted sites Internet & LAN content Firewall Filters

iSchools - CILC for Teachers 7 Malicious Individuals Hacker, attacker, or intruder –exploit weaknesses in software and computer systems for their own gain –intentions: sometimes benign and motivated solely by curiosity –actions: typically in violation of the intended use of the systems they are exploiting

iSchools - CILC for Teachers 8 Malware designed “to wreak havoc on personal computers and networks” by attaching to programs (“hosts”) and spreading from one program or storage device to another ranging from silly pranks to data destruction/ theft

iSchools - CILC for Teachers 9 Malware Virus: attaches to various files and executes (infects the computer) when the host programs are run (or an attachment is opened or a particular web page is visited) Worm: propagates without user intervention via , web sites, or network-based software, clogs the system via numerous reproductions Logic Bomb: lies dormant until triggered by a certain event Trojan Horse: unsuspicous delivery program of malware

iSchools - CILC for Teachers 10 Spyware & Key Logger Spyware (also called sneakware or stealthware) - software that comes hidden in free downloadable software –tracks your online movements –mines the information stored on your computer –uses your computer’s CPU and storage, slows it down Key logger, or key trapper, software, -a program, when installed on a computer, records every keystroke and mouse click.

iSchools - CILC for Teachers 11 Spyware record keystrokes and steal private information for advertisers, hackers, and cyberthieves –Cookie - a small record deposited on your hard disk by a Web site containing information about you and your Web activities. –Adware - software to generate ads that installs itself on your computer when you download some other (usually free ) program from the Web. Earthlink (ISP) study: average computer harbors 26 spyware programs

iSchools - CILC for Teachers 12 Myths Anti-virus software and firewalls are 100% effective. Once software is installed on your computer, you do not have to worry about it anymore. There is nothing important on your machine, so you do not need to protect it. Attackers only target people with money. When computers slow down, it means that they are old and should be replaced.

iSchools - CILC for Teachers 13 Tips 1.Perform basic computer maintenance –firewall, data encryption, regular update of security patches –regularly run anti-virus and anti-spyware software 2.Don't open files from strangers/ unreliable sites – and IM –verify first 3.Help fight spam and online scams –use filters –be wary of phishing –check for secure pages (lock icon), server authentication, and message integrity –review the privacy policies of websites before entering information

iSchools - CILC for Teachers 14 Tips 4.learn how to protect yourself from adware/spyware –Regularly run anti-spyware software –read license agreements of freeware against attached spyware 5.take precautions when you go wireless –convenient but with security risks 6.password-protect your computer—and lock it –as first line of defense 7.back up your work

iSchools - CILC for Teachers 15 Safeguard your passwords! Guidelines from Learn the Net.com: 1.Although passwords should be easily remembered, do not use passwords that refer to easily obtainable personal information, such as your name, address, phone number, or birthday. 2.Avoid using common words. 3.Passwords should be at least six alphanumeric characters – meaning, combine upper and lower case letters, numbers, and symbols, e.g. NOTE: Passwords are case-sensitive.

iSchools - CILC for Teachers 16 Safeguard your passwords! Guidelines from Learn the Net.com: 4.Ideally, use a different password for each service you register with. For sensitive accounts, such as financial services, change your passwords frequently. 5.Never ever disclose your password/s. Don’t have your computer “remember your password”.

Commission on Information and Communications Technology (US-CERT: US Computer Emergency Readiness Team) www,learnthenet.com