Cyber Security & awareness

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Let’s Talk About Cyber Security
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
CYBER-SAFETY BASICS A computer security tutorial for UC Davis students, faculty and staff.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
How It Applies In A Virtual World
Threats to I.T Internet security By Cameron Mundy.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
CYBER-SAFETY BASICS A computer security tutorial for UC Davis students, faculty and staff.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Cyber crime & Security Prepared by : Rughani Zarana.
1.1 System Performance Security Module 1 Version 5.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Cyber Security Action against cyber crime. What is cyber security?  Cyber security standards are security standards which enable organizations to practice.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Topic 5: Basic Security.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computer Security Keeping you and your computer safe in the digital world.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
Internet Safety.
CYBERSECURITY BASICS A cybersecurity tutorial for Florida State University students, faculty and staff.
INTERNET SAFETY FOR EVERYONE
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Managing Windows Security
Three steps to prevent Malware infection
What they are and how to protect against them
Done by… Hanoof Al-Khaldi Information Assurance
Learn how to protect yourself against common attacks
IT Security  .
Unit 4 IT Security.
How to build a good reputation online
Home Computer Security
CYBER-SAFETY NEED OF THE HOUR
Protect Your Computer Against Harmful Attacks!
Cybersecurity Awareness
Robert Leonard Information Security Manager Hamilton
Risk of the Internet At Home
CYBER-SAFETY BASICS A computer security tutorial for
Internet Safety for Everyone
Cyber Security & awareness
Part 3.
Is your computer being used against you while you sleep?
HOW DO I KEEP MY COMPUTER SAFE?
Top Ten Cyber Security Hygiene Tips
CYBER-SAFETY BASICS A computer security tutorial for
Internet Safety for Everyone
Cybersecurity and Cyberhygiene
Internet Safety for Everyone
Internet Safety for Everyone
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
G061 - Network Security.
FSU Basic Cybersecurity Training
Presentation transcript:

Cyber Security & awareness

introduction What is Cyber Security Terminology Cyber Crime History Threats Protection Conclusion

Cyber Security Defined Protection of information systems against unauthorized access to or modification of information, whether in storage, processing or transit, and against the denial of service to authorized users, including those measures necessary to detect, document, and counter such threats.

What is cyber security? Cyber security standards are security standards which enable organizations to practice safe security techniques to minimize the number of successful cyber security attacks. Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access, vulnerabilities and attacks delivered via the Internet by cyber criminals. Though, cyber security is important for network, data and application security.

What is….? Communication security – Protecting organization communication media, technology and content. Network security – Protection of networking components, connection and content. Information security – Protection of information and its critical elements, including the systems and hardware that use, store or transmit that information.

What is cyber crime? The former descriptions were “computer crime”, “computer-related crime” or “crime by computer”. With the pervasion of digital technology, some new terms like “high-technology” or “information-age” crime were added to the definitions. Also, Internet brought other new terms, like “cybercrime” and “net” crime. Other forms include “digital”, “electronic”, “virtual”, “IT”, “high-tech” and “technology-enabled” crime.

Cyber crime includes Illegal Access Illegal Interception System Interference Data Interference Misuse of Devices Fraud

History The first recorded cyber crime was recorded in the year 1820. The first spam email took place in 1978 when it was sent over the ARPANET. The first Virus was installed on an Apple computer in 1982.

Cyber security threats Viruses – Viruses infect computers through email attachments and file sharing. They delete files, attack other computers, and make your computer run slowly. One infected computer can cause problems for all computers on a network. Hackers - Hackers are people who “trespass” into your computer from a remote location. They may use your computer to send spam or viruses, host a Web site, or do other activities that cause computer malfunctions.

Cyber security threats Identity Thieves - People who obtain unauthorized access to your personal information, such as Social Security and financial account numbers. They then use this information to commit crimes such as fraud or theft. Spyware - Spyware is software that “piggybacks” on programs you download, gathers information about your online habits, and transmits personal information without your knowledge. It may also cause a wide range of other computer malfunctions.

Cyber security threats Ransomware - Ransomware is a type of malicious software from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid and attacks are typically carried out using a Trojan that is disguised as a legitimate file that the user is tricked into downloading or opening when it arrives as an email attachment.

Protection Install OS Software updates Run Anti-Virus Software Turn on Personal Firewalls Avoid Spyware/Adware Protect Passwords Prevent Identity Theft Backup Important Files

Install OS/Software Updates Updates-sometimes called patches-fix problems with your operating system (OS) (e.g., Windows 7, Windows 10, Mac OS X) and software programs (e.g., Microsoft Office applications). Most new operating systems are set to download updates by default. After updates are downloaded, you will be asked to install them. Click yes! To download patches for your system and software, visit: Windows Update: http://windowsupdate.microsoft.com to get or ensure you have all the latest operating system updates only. Newer Windows systems are set to download these updates by default. Microsoft Update: http://www.update.microsoft.com/microsoftupdate/ to get or ensure you have all the latest OS and Microsoft Office software updates. You must sign up for this service. Apple: http://www.apple.com/support Be sure to restart your computer after updates are installed so that the patches can be applied immediately.

Run Anti-Virus Software To avoid computer problems caused by viruses, install and run an anti-virus program like Sophos, Symantec, Norton or AVG. Periodically, check to see if your anti-virus is up to date by opening your anti-virus program and checking the Last updated date. Anti-virus software removes viruses, quarantines and repairs infected files, and can help prevent future viruses.

Turn on Personal Firewalls Check your computer's security settings for a built-in personal firewall. If you have one, turn it on. Microsoft 7/8/10 and Mac OSX have built-in firewalls. Once your firewall is turned on, test your firewall for open ports that could allow in viruses and hackers. Firewall scanners like the one on http://www.auditmypc.com/firewall-test.asp simplify this process. Firewalls act as protective barriers between computers and the internet. Hackers search the Internet by sending out pings (calls) to random computers and wait for responses. Firewalls prevent your computer from responding to these calls.

Avoid Spyware/Adware Spyware and adware take up memory and can slow down your computer or cause other problems. Use a free software such as MalwareBytes, Spybot or Ad-Aware to remove spyware/adware from your computer. Watch for allusions to spyware and adware in user agreements before installing free software programs. Be wary of invitations to download software from unknown internet sources.

Protect Passwords Do not share your passwords, and always make new passwords difficult to guess by avoiding dictionary words, and mixing letters, numbers and punctuation. Do not use one of these common passwords or any variation of them: qwerty1, abc123, letmein, password1, iloveyou1, (yourname1), baseball1. Change your passwords periodically (30 – 90 days). When choosing a password: Mix upper and lower case letters Use a minimum of 8 characters Use mnemonics to help you remember a difficult password Store passwords in a safe place. Consider using KeePass Password Safe (http://keepass.info/), Keychain (Mac) or an encrypted USB drive to store passwords. Avoid keeping passwords on a Post-it under your keyboard, on your monitor or in a drawer near your computer!

Prevent Identity Theft Don't give out financial account numbers, Social Security numbers, driver’s license numbers or other personal identity information unless you know exactly who's receiving it. Protect others people’s information as you would your own. Never send personal or confidential information via email or instant messages as these can be easily intercepted. Beware of phishing scams - a form of fraud that uses email messages that appear to be from a reputable business (often a financial institution) in an attempt to gain personal or account information. These often do not include a personal salutation. Never enter personal information into an online form you accessed via a link in an email you were not expecting. Legitimate businesses will not ask for personal information online.er a copy of your credit report from each of the three major credit bureaus-Equifax, Experian, and Trans Union. Reports can be ordered online at each of the bureaus’ Web sites. Make sure reports are accurate and include only those activities you have authorized.

Back Up Important Files Reduce your risk of losing important files to a virus, computer crash, theft or disaster by creating back-up copies. Keep your critical files in one place on your computer’s hard drive so you can easily create a back up copy. Save copies of your important documents and files to a CD, online back up service, flash or USB drive, or a server. Store your back-up media in a secure place away from your computer, in case of fire or theft. Test your back up media periodically to make sure the files are accessible and readable.

Conclusion The only system which is truly secure is one which is switched off and unplugged. The end-user is the last stand against cyber security threats so, the best way to be safe is to be aware and act smart.

Quiz time

True or False? Viruses can be transmitted via email, email attachments or IM. 2. People who seek out your personal information and then us it to commit crimes are called what? Identity Thieves 3. Which of the following are ways to help prevent identity theft. (Check all that apply.) __A. Never send personal information via email or instant messages. __B. Always send personal information via email or instant messages. __C. Lock my office door. __D. Don’t tell anybody my name. A and C

4. True or False. Iloveyou2 is a good password. Why or why not. False 4. True or False? Iloveyou2 is a good password. Why or why not? False. Iloveyou2 is a very common password 5. I just downloaded a free program online and now my computer is running very, very slowly. Which of the following most likely happened? __A. I didn’t install the program properly. __B. I didn’t have enough space on my hard drive for the new program. __C. I downloaded spyware and/or adware, too. __D. Someone snuck in while the program was downloading and changed my password. C. It’s most likely that you downloaded spyware and/or adware. 6. To fix problems with my operating system and/or application software, I should install what? OS and/or software updates or patches