CS101 Security.

Slides:



Advertisements
Similar presentations
Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
Advertisements

SECURITY CHECK Protecting Your System and Yourself Source:
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Social media threats. Warning! May contain mild peril.
Bsharah Presentation Threats to Information Security Protecting Your Personal Information from Phishing Scams.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
INTERNET SAFETY FOR STUDENTS
Felicia Cervantes. Using someone's personal identifying data for unlawful purpose. (This is a SERIOUS crime.) More than 8 million American Adults fell.
Quiz Review.
November 2009 Secure Data Transmission May 2014 What are Secure Methods of Transmission? Encrypted Services Encrypted Memory Sticks Fax Secure.
STAY SAFE ONLINE. STAY SAFE ONLINE! PLEASE MAKE SURE YOU LOGIN AT THE CORRECT BANK URL / ADDRESS 1.NEVER LOGIN VIA LINKS 2.NEVER REVEAL YOUR PIN.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
JMU GenCyber Boot Camp Summer, Cyberspace Risks and Defenses Facebook Snapchat P2P filesharing Apps Craigslist Scams JMU GenCyber Boot Camp© 2015.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Year 9 Autumn Assessment Computer system/Information security-Planning, Communicating, Information. By Louis Smith-Lassey 9k 9Y1.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
WE ARE DATA By Hazim Zaidani Do you really think that your personal data is protected ? Well… Think Again !!!
Stay Safe Online. Use strong passwords Using the same password for all your accounts makes it easy to remember. However, it also means a hacker needs.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
HOW TO PREVENT IDENTITY THEFT ONLINE TIPS 1.WATCH OUT FOR PHISHING WEBSITES.
SSL. Why Is Security Important ●Security is important on E-Commerce because it makes sure that your information gets from your computer to their server.
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
Cybersecurity Test Review Introduction to Digital Technology.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Information Systems Design and Development Security Risks Computing Science.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Computer Security Keeping you and your computer safe in the digital world.
Cyber security. Malicious Code Social Engineering Detect and prevent.
Internet Safety.
Lesson 10A: The Three D’s of Identify Theft
Mark Ryan Professor of Computer Security 25 November 2009
Hotspot Shield Protect Your Online Identity
IT Security  .
Unit 4 IT Security.
Level 2 Diploma Unit 11 IT Security
Information Security.
Report Phishing Forward phishing s to
How to Protect Yourself from ID Theft and Social Engineering
Protect Your Computer Against Harmful Attacks!
Lesson 2- Protecting Yourself Online
How to Protect your Identity Online PIYUSH HARSH
Cybersecurity Awareness
Practice Safe Computing
Mary Kummer Jim McNall PRIMA Spring Training 2018
4 ways to stay safe online 1. Avoid viruses and phishing scams
Scams, Identity Theft, and Viruses Kelly & Caitlin
Cyberspace Risks and Defenses
Starter What is identity theft?
Report Phishing Forward phishing s to
If I’d only known then what I know now about phishing…
Protecting Yourself from Fraud including Identity Theft
Top Ten Cyber Security Hygiene Tips
CS101 Security.
9 ways to avoid viruses and spyware
How to keep the bad guys out and your data safe
What is Phishing? Pronounced “Fishing”
Lesson 2- Protecting Yourself Online
Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
CS101 Security.
Identity Theft and Credit Safety
Presentation transcript:

CS101 Security

Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you are connected to a network

http://map.norsecorp.com

Safe computing tips Number One Best Security Method: Move away from the herd by using less popular software to access network functions Go do all the security steps from the Security Lecture from the beginning of the semester.

4 Areas To Secure 1) Your Computer 2) Your Network Interaction 3) Yourself 4) Your Data Elsewhere

Securing Your Computer

What can happen to my computer? Your computer can be attacked by: Hackers Legitimate Software Malware Thief

How can I protect my computer from all of those things? Go do all the security steps from the Security Lecture from the beginning of the semester.

Securing Your Network Interaction

What can happen to me when using a network? Information you send out on a network can be intercepted Redirect Attack Too much to list on one slide etc

How can I secure the information I send out on a network? Make sure your connection to the network is secure Make sure that any important information you send out on a network is in encrypted form (scrambled) before it is sent Treat any unencrypted information transmitted as if it was on a postcard Use anti-phishing software Change your DNS to Google Never open or click on any item you are not 100% sure of Bookmark all web sites you need to access securely

Securing Yourself

How can I be a security risk? You do not do all the other security items listed in this PowerPoint Practice bad password practices Fall for human engineering attacks

How can I protect myself from social engineering? Use good password practices Treat any request for information as suspicious and either ignore or verify request via an independent method Treat any offer that sounds to good to be true as suspicious Use anti-phishing software.

Securing Your Data Elsewhere

What can happen to the information you no longer control? Once information is contained outside of your direct control you must protect yourself from it being used in inappropriate ways such as identity theft

How do I protect information I do not control? You can’t You can stop them from doing anything with the information Freeze your credit at all 3 credit reporting agencies and/or add an identity protection service that helps with the cleanup. How To Freeze Your Credit Report at Each Credit Bureau Subscribe to a monitoring service.