Security Awareness Our security depends on you. What IT Security Protects ECU Campus network and everything attached to it Information –personal data.

Slides:



Advertisements
Similar presentations
Keep Your PC Safe (Windows 7, Vista or XP) Nora Lucke 02/05/2012 Documents - security.
Advertisements

Acceptable Use Policy –The Acceptable Use Policy defines the rules of the machine and internet connection you are on. –Specific policies differ by machine.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
1 I ntegrated S ite S ecurity for G rids © Members of the ISSeG Collaboration, 2008 See: ISS e G Computer Security: Advice for computer.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Protect Your Computer Protect Your Work Computing & Communications.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
IT Security Essentials Ian Lazerwitz, Information Security Officer.
Computer Networks IGCSE ICT Section 4.
1 of 13 Back to Start Working Remotely Your company’s Windows SBS computer network makes it easy for you and your coworkers to work remotely—and to stay.
GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.
Quiz Review.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Protect Your Computer from Viruses and Other Threats! 1. Use antivirus software. 2. Run Windows updates. 3. Use a strong password. 4. Only install reputable.
Program Objective Security Basics
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
Data Security.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.
Chapter 2 Securing Network Server and User Workstations.
Internet Security and Your Computer Welcome to Boot Camp.
What is Spam? d min.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computer Security Sample security policy Dr Alexei Vernitski.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Security on Peer-to-Peer Networks.
ITS220 – How To Prevent Your PC From Infected by Virus presented by Desmond Ho.
How To Make The Backup Of AVG Antivirus 2017 Definitions.
Viruses & Destructive Programs
Joseph J. Malone Security for Seniors Joseph J. Malone
Managing Windows Security
Three steps to prevent Malware infection
3.1 Types of Servers.
Malware and Computer Maintenance
Discovering Computers 2012: Chapter 8
Chapter 6 Application Hardening
Cyber Security & awareness
Common Methods Used to Commit Computer Crimes
Backdoor Attacks.
3.1 Types of Servers.
I S P S loss Prevention.
Computer Security Std XI– Chapter 8.
Security in the Workplace: Information Assurance
Home Computer Security
Information Security 101 Richard Davis, Rob Laltrello.
Computer Worms & Viruses
Protect Your Computer Against Harmful Attacks!
ISB Computer Security Training
Information Security Session October 24, 2005
Information Security Session October 23, 2006
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
Cyber Security & awareness
Part 3.
Information Security Awareness
HOW DO I KEEP MY COMPUTER SAFE?
King Saud University- College OF Applied Studies
King Saud University- College OF Applied Studies
Division of Engineering Computing Services
Presentation transcript:

Security Awareness Our security depends on you

What IT Security Protects ECU Campus network and everything attached to it Information –personal data –patient/student records and billing –payroll –research –

IT Security Affects You We all share the same network and networked resources We all share responsibility for security If the network goes down, nobody can access , Internet, Purchase Order system, patient records and billing, secured areas, VOIP devices (telephones), etc.

Security Fallacies We have antivirus software, so we’re secure. We have a firewall, so we’re secure. Most security threats come from outside. I don’t care about security because I backup my data daily. Responsibility for security rests with IT Security staff.

Security Assessment Open ports and mail relays Software patches Weak passwords We do not scan your personal data If we detect weaknesses, we do not exploit them We report weaknesses to you for your benefit

Security Policies Continuous cooperative effort between IT Security staff and all users Develop, implement, and enforce effective security policies and procedures Provide maximal security with minimal inconvenience to users

IT Security Components Firewalls Intrusion Detection Systems Antivirus software Updated OS and apps Continual education for staff and users User cooperation and compliance –most critical component –most difficult to achieve

Security Threats Malware—viruses, worms, trojans, etc. Security patches not applied Hacking and network scanning Social engineering Chat and Instant Messaging software Weak passwords Ignorance, carelessness, and…

File Sharing Software Kazaa, eDonkey, Morpheus, etc. Contains trojans and spyware Advertises your computer on Internet Hogs shared network capacity Sharing copyrighted material—music, video, or data—violates federal law Violators referred to appropriate authorities

Hacking Steps Reconnaissance –high tech: network port scans –mid tech: impersonation, phone calls, phishing –low tech: dumpster diving Identification Coordination Exploitation

What You Can Do Use/update antivirus software Patch OS and apps Use strong passwords Use prudently Don’t use chat or IM software Don’t use P2P file sharing software Don’t use personal firewalls

Campus Antivirus Policy All networked Windows and Macintosh computers must run AV software Site license for Symantec Antivirus –free copy for every Windows or Macintosh computer on campus –free copy to load on your home computer Infected computers removed from the network until cleaned

Free Antivirus Software Sources for antivirus software: –ITCS installs on campus computers –CD-ROMs available in Austin 208 –Download from ITCS website Instructions on ITCS web page: –go to Software, Software Documentation –get, install, configure, use, update

Use Antivirus Software Always use the latest version Update definitions daily, before retrieving Scan all files weekly Beware of virus hoaxes Campus computer infected? –notify IT Support Services at –notify your coworkers

Patch Your Software Windows Update website –critical updates for OS –Start menu, Windows Update Microsoft Office Update website –link on Windows Update web page Microsoft Baseline Security Analyzer –checks for security flaws –analyzes OS, IE, Office, IIS, SQL

Windows Update Go to Start, Windows Update (Win2k and XP) Three update types –Critical: Apply all of these. –Windows: Apply those marked “recommended” and avoid the others. –Drivers: Don’t apply these. Get them from your hardware vendor.

Office Update Linked from the Windows Update web page Find link at top of WU page Apply all updates for English versions of Office Avoid updates for foreign language versions

Baseline Security Analyzer Free download from Microsoft Checks OS, Office, IE, IIS, SQL Direct links to missing hotfixes Updates every time you run it Additional security advice

Passwords At least 8 characters long, including: –at least one letter –at least one number –at least one special character (e.g., #, ?, >) –no repeated characters Make it obscure. Keep it secret. When in doubt, change it NOW 90-day expiration

Exchange Never open attachments –save the attachment to your hard drive –scan the attachment with SAV Don’t spam other users –spam is electronic junk mail –if you wouldn’t want to receive it, don’t send it Don’t use other programs on campus: AOL, Yahoo, Hotmail, etc.

Personal Firewalls Designed to work on stand-alone home computers, not complex networks No centralized management Interfere with antivirus software Interfere with network management Not supported by ITCS

Use Common Sense Be suspicious—don’t believe unknown visitors or phone calls Use your locks—door and computer Going home? Turn off your computer! Don’t reveal your password to anybody Don’t reveal confidential information Don’t install unauthorized software If you’ve been hacked, change all your passwords

Problems and Questions? Don’t call individual ITCS employees Call IT Support Services at –single point of contact –all calls forwarded to appropriate consultant Open a Service Request – –go to Client Services section

Questions?