TECHNOLOGY GUIDE THREE

Slides:



Advertisements
Similar presentations
Network Security.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Configuring your Home Network Configuring your Home Network Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Chapter 7 Securing your Wireless Network (WIFI). Synopsis What is a wireless home network? What damage can a wireless network snoop do? Who are the snoopers?
Cyber Security – Our Approach James Clement Network Specialist ETS: Communications & Network Services
Wireless Security Focus on Encryption Steps to secure a Wi-Fi Network.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Remote Networking Architectures
TECHNOLOGY GUIDE 3 1 Protecting Your Information Assets.
TECHNOLOGY GUIDE 5: Protecting Your Information Assets
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
NetComm Wireless VPN Functionality Feature Spotlight.
Securing a Wireless Network
Chapter 3 Ethics, Privacy & Security
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Course 201 – Administration, Content Inspection and SSL VPN
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
Securing Information Systems
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Protecting Your Information Assets
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 19 PCs on the Internet.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
 Physical protection and Simple measures  Passwords  Firewalls  Anti-Virus, Spyware and Malware  Web browsers   Patches  Wireless  Encryption.
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
C3 confidentiality classificationIntegrated M2M Terminals Introduction Vodafone MachineLink 3G v1.0 1 Vodafone MachineLink 3G VPN functionality Feature.
PLUG IT IN SIX Protecting Your Information Assets.
Data Security Overview. Data Security Periphery –Firewalls –Web Filtering –Intrusion Detection & Prevention Internal –Virus Protection –Anti Spy-ware.
1 After completing this lesson, you will know: What computers need to operate—basic hardware and peripheral devices Why and how to protect your computer.
IT tools to communicate By Suleman Kalam. Podcast What is Podcasts? A podcasts is a downloadable media file which can be downloaded into many electronic.
What is Spam? d min.
Understand Internet Security LESSON Security Fundamentals.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
Cyber Security: Today’s Threats and Mitigations Jonathan Homer, Cyber Security Analyst Idaho National Laboratory.
Windows Vista Configuration MCTS : Network Security.
NETWORK SECURITY. What do you see THE IMPORTANCE OF SECURITY THE ARE WEBSITES ON THE INTERNET COULD INFORM PEOPLE THE RANGE AND AVAILABLE UNSECURED SITES.
SOHO Security Recommendations. Change default user/password Of the AP/router Typical  admin – admin  root – root  root – 1234  Admin - There are web.
Defining Network Infrastructure and Network Security Lesson 8.
Securing Information Systems
Hotspot Shield Protect Your Online Identity
Working at a Small-to-Medium Business or ISP – Chapter 8
OWASP CONSUMER TOP TEN SAFE WEB HABITS
Working to Keep our Children Safe in a World Filled with Technology
Welcome To : Group 1 VC Presentation
Protecting Your Information Assets
Chapter 3: Protecting Your Data and Privacy
Implementing Client Security on Windows 2000 and Windows XP Level 150
Cybersecurity and Cyberhygiene
Designing IIS Security (IIS – Internet Information Service)
LM 5. Wireless Network Security
INTERNET SECURITY.
Presentation transcript:

TECHNOLOGY GUIDE THREE Protecting Your Information Assets

TECHNOLOGY GUIDE OUTLINE TG3.1 Introduction TG3.2 Behavioral Actions to Protect Your Information Assets TG3.3 Computer-based Actions to Protect Your Information Assets

LEARNING OBJECTIVES Identify the various behavioral actions you can take to protect your information assets. Identify the various computer-based actions you can take to protect your information assets.

Behavioral Actions Do not provide personal information to strangers in any format. Protect your social security number. Use credit cards with your picture on them. Use virtual credit cards. Know your credit card billing cycles.

Behavioral Actions (continued) Limit use of debit cards. Do not use a personal mailbox at home or at an apartment. Use a cross-cut (confetti) shredder. Sign up with a company that provides proactive protection of your personal information.

Computer-Based Actions Never open unrequested attachments to e-mail files, even those from people you know and trust. Never open attachments or Web links in e-mails from people you do not know. Never accept files transferred to you during Internet chat or instant messaging sessions. Never download any files or software over the Internet from a Web site that you do not know.

Computer-Based Actions (continued) Never download files or software that you have not requested. Test your system. Run free malware scans on your computer. Have an anti-malware product on your computer and use it (ideally at least once per week). Have a firewall on your computer.

Computer-Based Actions (continued) Have an antispyware product on your computer. Have a rootkit detection product on your computer. Have a monitoring software on your computer. Have content filtering software on your computer. Have antispam software on your computer.

Computer-Based Actions (continued) Have proactive intrusion detection and prevention software on your computer. Manage patches. Use a browser other than Internet Explorer. Travel with a “sterile” laptop or no laptop. Use two-factor authentication. Use encryption.

Computer-Based Actions (continued) Use laptop tracing tools or device reset/remote kill tools. Turn off peer-to-peer (P2P) file sharing. Look for new and unusual files. Detect fake Web sites. Use strong passwords. Surf the Web anonymously. E-mail anonymously.

Computer-Based Actions (continued) Adjust privacy settings on your computer. Erase your Google search history. Personal disaster preparation: backup, backup, backup!

Wireless Security Hide your Service Set Identifier (SSID). Use encryption. Filter out media access control (MAC) addresses. Limit Internet Protocol (IP) addresses. Sniff out intruders. Change the default administrator password on your wireless router to something not easily guessed.

Wireless Security (continued) Use virtual private networking (VPN) technology to connect to your organization’s network. Use Remote Desktop to connect to a computer that is running at your home. Configure windows firewall to be “on with no exceptions.”

Wireless Security (continued) Only use Web sites that use Secure Sockets Layer (SSL) for any financial or personal transactions (discussed in Chapter 3). Use wireless security programs.