Erez Etzion / Chris Onions ACCU Meeting December 3, 2008

Slides:



Advertisements
Similar presentations
Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Advertisements

Page 1 of 14 To the Voltage Online Training Course Voltage encryption is used to protect sensitive and personal information sent via to external.
Social Engineering Training. Training Goals Increase Laboratory Awareness. Provide the tools required to identify, avoid and report advanced Social Engineering.
Breaking Trust On The Internet
Hacker’s tricks for online users to reveal their sensitive information such as credit card, bank account, and social security. Phishing s are designed.
Welcome Overview of this Session Introduction The Migration –Active Directory (replacing Novell) – & Calendar – from iPlanet to Outlook –Network.
Social media threats. Warning! May contain mild peril.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
NCS welcome all participants on behalf of Quick Heal Anti Virus and Fortinet Firewall solution.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
1 I ntegrated S ite S ecurity for G rids © Members of the ISSeG Collaboration, 2008 See: ISS e G Computer Security: Advice for computer.
Annual Safety & Security Briefing - 9/22/04 Teresa Downey – SLAC Computer Security Group & SCS Applications Group.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Develop a Classical Group Management Site using Drupal Commons By Muhammad Iqbal.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Security Issues: Phishing, Pharming, and Spam
UCL Site Report Ben Waugh HepSysMan, 22 May 2007.
CERN IT Department CH-1211 Geneva 23 Switzerland t OIS Ideas for 2011 Prepare must be done work items –Warranty –Software maintenance –Commitments.
ITSRM report Erez Etzion ACCU Meeting December 9, 2009.
First Indico Workshop Collaborative Tools Nicola Tarocco May 2013 CERN.
Web Browser Security Prepared By Mohammed EL-Batta Mohammed Soubih Supervised By Eng. Eman alajrami Explain Date 10. may University of Palestine.
A beginner’s guide to Webmail. What do you need? A computer, or a smartphone An internet connection An account with an service provider.
HOT TOPICS Series presented by Computing Services Laptop & Desktop Security Awareness TH, Feb 6 (4-5 pm) UC Connan My Andrew Filter Tool TH, Feb.
Basics. 2 Professional Development Centre Class Outline Part 1 - Introduction –Explaining –Parts of an address –Types of services.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
By Hina Patel TCM 471 Introduction SPAM? Solicited Unsolicited How spammer gets the address Prevention from spam Conclusion.
Chapter 9 Sending and Attachments. 2Practical PC 5 th Edition Chapter 9 Getting Started In this Chapter, you will learn: − How works − How.
CALL on the cheap Using services freely available on the Internet.
October 2005Thomas Baron – CERN-IT1 CERN response to RTAG Vision shared, with a somewhat different scope CERN as focus but not sole responsible (other.
1 Collaborative CERN: Tim Smith Status of Collaborative Tools at CERN Shaping Collaboration 11 th December 2006 Tim Smith CERN/IT.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Operating Systems & Information Services CERN IT Department CH-1211 Geneva 23 Switzerland t OIS Update on Windows 7 at CERN & Remote Desktop.
DTF report Erez Etzion 78 ACCU Meeting December 5, 2007.
And more……. ‘Leadership and communication are inseparable. You can’t have one without the other.’ ---Claude I. Taylor.
Don’t send offensive pictures  This can badly offend people in many ways or they could take you to court and may get charged. Also it is illegal to send.
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
Plan for the Exchange 2000 Deployment Proposal Desktop Forum IT/IS 30/10/02.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Status of Collaborative Tools at CERN LHC RRB Scrutiny Group 31 st August 2006 Tim Smith IT/UDS.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
The New CERN Mail Services Information for group Administrators Alberto Pace for the Internet Service Group and the Mail Migration Task Force.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
What it is and how to stop it.  What spam is.  Why it can be dangerous.  How to handle it.
FUSE MAIL. ABOUT FUSE MAIL Fuse mail provides the business around the world to communicate with confidence. Use cloud based services to provide secure.
Web Application Penetration Testing ‘17
Done by… Hanoof Al-Khaldi Information Assurance
Online Training Course
Unit 4 IT Security.
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
Lesson 3 Safe Computing.
Introduction to Social Media
Law Firm Electronic security survey Results
Hotmail, undoubtedly known for its best features and a number of customers enjoy this mail service because it’s easy accessibility and user-friendly interface.
CERN Windows Roadmap Tim Bell 8th June 2011.
Information Security Session October 24, 2005
Reconnaissance Report Trillium Technologies
IIPMM Moodle Notes for Students
If I’d only known then what I know now about phishing…
Introduction to Listservs
Welcome to eScan 11.
Leaders’ Forum, March 16, 2006 The Invisible Risk: Leaders’ Role in Protecting Western’s Electronic Information.
How to Stay Safe Online Rollie Edwards.
What is Phishing? Pronounced “Fishing”
Communicating in the IT Industry
Presented by: Sehar Munawar Registration no: B2F17ASOC0035 Presented to: Sir Waseem Iqbal & management & spam.
Division of Engineering Computing Services
Presentation transcript:

Erez Etzion / Chris Onions ACCU Meeting December 3, 2008 USERS DTF report Erez Etzion / Chris Onions ACCU Meeting December 3, 2008 Historical Event - I managed to join the DTF meeting via EVO

Topics in recent meetings Computer security Security policy for IT-DES services TWiki service Update on e-groups/mailing-lists Migration Simba -> e-groups starting now Update on CERN Linux SLC5 introduction advanced as LHC delayed ACCU Meeting Desktop Forum report, Erez Etzion

Topics in recent meetings (2) New Indico features and roadmap for 2008 Subversion: Preparing CVS replacement Refurbishment of videoconference rooms in building 40 Mail evolution and anti-spam New PC models Vista ACCU Meeting Desktop Forum report, Erez Etzion 3 3

Desktop Forum report, Erez Etzion Security Access to external DNS servers was closed - no problems have been reported Principal risk: users clicking on dangerous links in emails and Web sites. The series of (spear) phishing attacks continues, Users should NEVER reply to unsolicited messages asking for confidential information. Portable users – don’t lose your computer, it contains sensitive (some of which is personal) information. Web sites - Security problem, more than 7000 web sites, need to tighten the default web site security + advertise among users. ACCU Meeting Desktop Forum report, Erez Etzion

DTF minutes/presentations Available on http://indico.cern.ch/categoryDisplay.py?categId=300 ACCU Meeting Desktop Forum report, Erez Etzion