Luís Filipe Roque February 19th , 2019.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Let’s Talk About Cyber Security
Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access and attacks delivered.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
The Internet.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Company LOGO Internet Safety A Community Approach.
How To Protect Your Privacy and Avoid Identity Theft Online.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
How It Applies In A Virtual World
Internet safety By Lydia Snowden.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Cyber Crimes.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Staying Safe Online Keep your Information Secure.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Topic 5: Basic Security.
Computer Skills and Applications Computer Security.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
Any criminal action perpetrated primarily through the use of a computer.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
Protecting Your Assets By Preventing Identity Theft
INTERNET SAFETY FOR EVERYONE
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Viruses & Destructive Programs
Managing Windows Security
What they are and how to protect against them
IT Security  .
Unit 4 IT Security.
Information Security.
Information Security 101 Richard Davis, Rob Laltrello.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Protect Your Computer Against Harmful Attacks!
Lesson 2- Protecting Yourself Online
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Cybersecurity Awareness
Robert Leonard Information Security Manager Hamilton
Scams, Identity Theft, and Viruses Kelly & Caitlin
Risk of the Internet At Home
Internet Safety for Everyone
The Internet of Unsecure Things
Staying safe on the internet
Understanding Browsers
Part 3.
HOW DO I KEEP MY COMPUTER SAFE?
Internet Safety for Everyone
Chapter 3: Protecting Your Data and Privacy
Faculty of Science IT Department By Raz Dara MA.
Bethesda Cybersecurity Club
Cyber security and Computer Misuse
Internet Safety – Social Media
Internet Safety for Everyone
Internet Safety for Everyone
Computer Security By: Muhammed Anwar.
Security in mobile technologies
Internet Safety for Everyone
Internet Safety for Everyone
G061 - Network Security.
Week 7 - Wednesday CS363.
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Luís Filipe Roque February 19th , 2019

responsible for entire school group Teachers Trainer @Luís Roque ICT Teacher ICT Coordinator responsible for entire school group Teachers Trainer 2

Concerns as Citizens 4

Concerns as Teachers 5

How to make a PC safe? A German security specialist presented its already famous "2 rules" of total security

The 2 rules of Herbert Rule number 1 Don´t buy a computer!

The 2 rules of Herbert Rule number 2 If you purchased a computer, do not turn it on!

What is CyberSpace? Norbert Wiener, an American mathematician, was the first, in 1948, to speak about Cyberspace.

technological equipment and digital networks, including the internet What is CyberSpace? Complex environment, values and interests materializing an area of collective responsibility, which results from the interaction between people, information, information systems, technological equipment and digital networks, including the internet

What is CyberSecurity? Set of measures and actions of prevention, monitoring, detection, reaction, analysis and correction which aim to maintain the desired security state and guarantee the confidentiality, integrity and availability of information, digital networks and information systems in cyberspace

Dimensions of Safety Physical Security Logical Security Best Practices

Physical security How to protect equipment and information against users who do not have authorization to access them.

Logic Security A set of resources run to protect the system, data and programs against attempts by unknown people or programs.

I have nothing to hide Automatic access to websites (e.g. Bank accounts ) Miscellaneous Documents Conversations with family and friends Photos Videos Lists of passwords … 15

Main Types of CyberAttacks Password Attacks Malware Phishing DDoS Drive-by Download Rogue Software Man in the middle Malvertis ing

Malware Malicious software is any part of software that has been written to cause damage to data, devices, or persons

Phishing Attacks usually carried out by e- mails apparently from trusted entities where people are invited to enter sensitive data

Passwords Attacks An attempt to obtain or decrypt a user’s password for ilegal use. Hackers can use cracking programs, dictionary attacks, and password sniffers in password attacks.

DDoS Distributed denial of services (DDoS) attacks are a subclasse of denial of services (DoS) attacks. A DDoS attack envolves multiple connected online devices, collectively know as a botnet, wich are used to overwhelm a target website with fake traffic.

Man in the middle Form of attack in which the data exchanged between two parties (e.g. you and your bank) are somehow intercepted, recorded and possibly altered by the attacker without the victims noticing

Drive-by download Occur when vulnerable computers get infected by just visiting a website. Findings from latest Microsoft Security Intelligence Report and many of its previous volumes reveal that Drive-by Exploits have become the top web security threat to worry about.

Malvertising Criminally-controlled adverts which intentionally infect people and businesses. These can be any ad on any site – often ones which you use as part of your everyday Internet usage.

Rogue Software Also called smitfraud or scareware, this type of software is defined as malware. It is designed specifically to damage or disrupt a computer system. In this case, not only is the software going to disrupt your system, it´s going to try and trick you into making a purchase using your credit card.

Do Backup The loss of personal information can cause even more problems than the loss of the device itself. So, make sure that all your important information is well stored in various places.

Stay up to date Make sure your device's operating systems and applications have up-to- date security updates. This prevents software with known vulnerabilities from being abused by cybercriminals.

Use Robust Passwords With 10 or more characters Character combination Words with purposeful errors They do not derive from the name of the user or any close relative Not derived from personal information

Passwords Fails @2013, SplashData

Block intruders Regardless of the devices, make sure that your screen is protected with a strong and unique password or PIN code, or one of the biometric authentication methods available, such as fingerprint reader or facial recognition.

Reduce Digital Footprint Consider becoming a digital minimalist for a while and leave most of your devices at home. In this way, not only will you have less equipment than you can afford to lose as you are giving less opportunities for personal information being stolen by cybercriminals.

Moderate in Social Networks Resist the temptation to share on social networks, for example, that you and your family will be away from home in a certain period of time. Doing so may expose you to a physical intrusion of your home.

Browse incognito

Use a secure email

Beware of Wi-Fi free zones Carefully choose the network Disable file sharing and mark the Wi-Fi connection as a public network Never make updates or install applications using these networks Use two-factor authentication Make sure to log off after accessing any service you have accessed Forget the network after using it

Beware of card cloning Card cloning happens when all information about a particular card (your PIN - Personal Identification Number and its number) is copied

Beware of Card Payments When making payments at establishments never lose sight of your card When entering the PIN code, be discreet and try to make sure no one is trying to watch you Avoid choosing a PIN code that is too obvious Do not provide data about your cards over the phone, even if the person asking you to identify yourself as an employee of your bank Avoid carrying out ATM operations in low-traffic areas Do not shop online in computers with access to public Wi-Fi networks and prefer sites with "https: //" in the URL

Be careful: leaving the e-mail open

Be Careful: Passwords saved in browsers

Be careful: Students knowing passwords

Be careful: Accessing Insecure Sites

Be Careful: Computer Maintenance Companies

In Summary +Caution -Risk +Safety -Privacy

Thank you