© 2015 Air Force Association

Slides:



Advertisements
Similar presentations
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Advertisements

Microsoft Baseline Security Analyzer INLS 187 Security Software Presentation by Hinár György Polczer
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Protect Your Computer from Viruses and Other Threats! 1. Use antivirus software. 2. Run Windows updates. 3. Use a strong password. 4. Only install reputable.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Module 10: Configuring Windows XP Professional to Operate in Microsoft Networks.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
CSCE 201 Identification and Authentication Microsoft support Fall 2010.
1 Chapter Overview Configuring Account Policies Configuring User Rights Configuring Security Options Configuring Internet Options.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
Protecting Students on the School Computer Network Enfield High School.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Internet safety By Suman Nazir
CSCE 201 Identification and Authentication Fall 2015.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Windows Tutorial 5 Protecting Your Computer
Understanding Security Policies
Follow-up issues from the presentation on Anti-virus / Security software TD & SD have encountered problems with AVG, which also is not rated highly in.
Managing Windows Security
Methods of Securing Data in Windows Networks
Three steps to prevent Malware infection
Nassau Community College
What they are and how to protect against them
Malware and Computer Maintenance
Chapter One: Mastering the Basics of Security
Configuring Windows Firewall with Advanced Security
Chapter 5 : Designing Windows Server-Level Security Processes
Student Monmouth College
Secure Software Confidentiality Integrity Data Security Authentication
TET1 Task 1: Ethics Charles Rich 5 November, 2016.
IBM Software Group | Tivoli Brand Software
What this activity will show you
Business Risks of Insecure Networks
2017 TCS SMT Training - Dallas
Registration of Arcot Soft Token in Client Connection
Welcome To : Group 1 VC Presentation
Information Security Session November 11, 2004
Information Technology Services Education and Awareness Team
Information Security Session October 24, 2005
2017 TCS SMT Training - Dallas
Information Security Session October 23, 2006
Bethesda Cybersecurity Club
Part 3.
Information Security Awareness
King Saud University- College OF Applied Studies
Faculty of Science IT Department By Raz Dara MA.
Bethesda Cybersecurity Club
Networking for Home and Small Businesses – Chapter 8
Securing Windows 7 Lesson 10.
Security through Group Policy
Network hardening Chapter 14.
Home Security in the Age of Broadband
King Saud University- College OF Applied Studies
PLANNING A SECURE BASELINE INSTALLATION
Computer Security By: Muhammed Anwar.
Cybersecurity By Sri Kankanahalli.
Information Technology Services Education and Awareness Team
Networking for Home and Small Businesses – Chapter 8
Cybersecurity and Cyberhygiene
Networking for Home and Small Businesses – Chapter 8
Test 3 review FTP & Cybersecurity
G061 - Network Security.
6. Application Software Security
Session 1 – Introduction to Information Security
Preparing for the Windows 8. 1 MCSA Module 6: Securing Windows 8
Bethesda Cybersecurity Club
Presentation transcript:

© 2015 Air Force Association

Instructions Before playing: Identify and mark a 3-point and 4-point line away from a garbage can or another receptacle Wad up a piece of paper or have a ball handy Split into teams. Each team will start with ten Xs. Teams will take turns answering questions. If your team answers its question correctly, you can choose to take a shot from the 3-point or 4-point line. If you make your shot, you can erase a total of three or four Xs from other teams. If you miss, you can still take a total of two Xs from other teams. The last team with Xs win.

What directs traffic within a network? ANSWER: Switch

How does anti-virus software work? ANSWER: It scans your files/software for matches in a regularly updated database of known malware

What is ROM short for? ANSWER: Read-Only Memory

What do you call social engineering attempts sent by text message? ANSWER: Smishing

Confidentiality, Integrity, Availability The three main goals of info security are to maintain information C______ I______ A______ ANSWER: Confidentiality, Integrity, Availability

What do you call a password cracking attempt that tests all possible combinations of letters, numbers, and characters? ANSWER: Brute Force Cracking

What maximum password age do we recommend for standard user accounts? ANSWER: 90 days

Host [operating system] When working with virtual machines, what do you call the OS on the physical computer? ANSWER: Host [operating system]

Name at least two cybersecurity tools displayed in Action Center POSSIBLE ANSWERS: Firewall, Anti-Virus, Windows Updates

Password Policies and Account Lockout Policies What two types of security settings can you find in the Local Security Policy menu? ANSWER: Password Policies and Account Lockout Policies

What is one benefit of working with virtual machines? POSSIBLE ANSWERS: Can run multiple OSs on one computer, can use to test software in a safe environment, saves money/real estate, portable

What do we recommend for minimum password length? ANSWER: At least ten characters

How long should an account stay locked out before a user can try to log in again? ANSWER: 30 minutes

What free anti-malware program did we recommend installing? ANSWER: Microsoft Security Essentials

Where should symbols be placed in your password? ANSWER: In the middle!

What type of malware can spread without human assistance? ANSWER: Worm

Fingerprints and retina scans are examples of this type of authentication tool. ANSWER: Biometrics

What is the only type of malware that Windows Defender protects against? ANSWER: Spyware

For which of these network types should you have Windows Firewall enabled: Home, Public, Work? ANSWER: All of them

If you allow a certain program through a firewall, what are you making? ANSWER: An exception

What is the name of the day when Windows Updates are released? ANSWER: Patch Tuesday

What device is used to connect networks with each other? ANSWER: Router

Name three of the most commonly used (and insecure) passwords. POSSIBLE ANSWERS: 123456, password, qwerty, letmein, welcome, dragon, iloveyou

Your lights can be turned on by an app, your refrigerator reminds you to buy milk, you can look at your home security camera from your phone…what do we call this? ANSWER: The Internet of Things

Which of these four words does not have the same meaning as the other three: virtual machine, snapshot, image, guest. ANSWER: Snapshot

Name a limitation or downside of virtual machines. ANSWER: Performance depends on host machine, have a single point of failure, pull resources from the host

If you enable complexity requirements, how many types of characters must users have in their passwords? ANSWER: Three

How many old passwords should you set your computer to remember? ANSWER: Five