CS101 Security.

Slides:



Advertisements
Similar presentations
Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
The Internet.
SECURITY CHECK Protecting Your System and Yourself Source:
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Felicia Cervantes. Using someone's personal identifying data for unlawful purpose. (This is a SERIOUS crime.) More than 8 million American Adults fell.
STAY SAFE ONLINE. STAY SAFE ONLINE! PLEASE MAKE SURE YOU LOGIN AT THE CORRECT BANK URL / ADDRESS 1.NEVER LOGIN VIA LINKS 2.NEVER REVEAL YOUR PIN.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Computer and Information Security Protecting yourself and your clients in the wild and wooly online world.
JMU GenCyber Boot Camp Summer, Cyberspace Risks and Defenses Facebook Snapchat P2P filesharing Apps Craigslist Scams JMU GenCyber Boot Camp© 2015.
By: Daniel Krueger ITC 525: Computers for Educators Summer II 2010 Click Here to Begin.
Reliability & Desirability of Data
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
IT security By Tilly Gerlack.
KEEPING YOUR COMPUTER SAFE Anna by Kristan Simonton Internet Safety.
DIGITAL SECURITY PART 2 TOOLS. phising  Internet criminals can steal your personal and banking information without you ever noticing – they can do it.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
WE ARE DATA By Hazim Zaidani Do you really think that your personal data is protected ? Well… Think Again !!!
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
SSL. Why Is Security Important ●Security is important on E-Commerce because it makes sure that your information gets from your computer to their server.
Confidentiality, Integrity, Awareness What Does It Mean To You.
CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via .
NETWORK SECURITY. What do you see THE IMPORTANCE OF SECURITY THE ARE WEBSITES ON THE INTERNET COULD INFORM PEOPLE THE RANGE AND AVAILABLE UNSECURED SITES.
Why Does The Site Need an SSL Certification?. Security should always be a high concern for your website, but do you need an SSL certificate? A secure.
Internet Safety.
Lesson 10A: The Three D’s of Identify Theft
Mark Ryan Professor of Computer Security 25 November 2009
Shopping online tips.
Hotspot Shield Protect Your Online Identity
Learn how to protect yourself against common attacks
Unit 4 IT Security.
CS101 Security.
Information Security.
Ways to protect yourself against hackers
How to build a good reputation online
OWASP CONSUMER TOP TEN SAFE WEB HABITS
Report Phishing Forward phishing s to
Introduction to Networking
Protect Your Computer Against Harmful Attacks!
Navigating the Internet
Lesson 2- Protecting Yourself Online
BP5 – encryption - Fun gym
Cybersecurity Awareness
yahoo mail technical support number
Cyberspace Risks and Defenses
Protecting Your Identity:
Internet Safety for Everyone
Starter What is identity theft?
BP5 – encryption - Fun gym
Report Phishing Forward phishing s to
If I’d only known then what I know now about phishing…
Protecting Yourself from Fraud including Identity Theft
Top Ten Cyber Security Hygiene Tips
CS101 Security.
9 ways to avoid viruses and spyware
Protecting Yourself from Fraud including Identity Theft
Internet Safety for Everyone
What is Phishing? Pronounced “Fishing”
Lesson 2- Protecting Yourself Online
Internet Safety for Everyone
Internet Safety for Everyone
Week 7 - Wednesday CS363.
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Identity Theft and Credit Safety
Presentation transcript:

CS101 Security

Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you are connected to a network

4 Areas To Secure 1) Your Computer 2) Your Network Interaction 3) Yourself 4) Your Data Elsewhere

1 ) Securing Your Computer (Do the Security Steps)

Safe computing tips Number One Best Security Method: Move away from the herd by: Do the security steps and get your layers of protection Add Virtual Box and Ubuntu and/or Mint Using less popular software to access network functions

Securing Your Network Interaction

What can happen to me when using a network? Information you send out on a network can be intercepted Hacked Sites Lots of other bad things etc

How can I secure the information I send out on a network? Make sure your connection to the network is secure Make sure that any important information you send out on a network is in encrypted form (scrambled) before it is sent (use Tor web browser) Consider a VPN (but make sure it is a good one.) Treat any unencrypted information transmitted as if it was on a postcard Change your DNS to Google or Open DNS Use Firefox for its ‘DNS to https’ capabilities. Never open or click on any item you are not 100% sure of Bookmark all web sites you need to access securely

Securing Yourself

How can I be a security risk? You do not do all the other security items listed in this PowerPoint Practice bad password practices Fall for human engineering attacks

How can I protect myself from social engineering? Treat any request for information as suspicious and either ignore or verify request via an independent method Treat any offer that sounds to good to be true as suspicious Use good password practices or consider a password manager. Use anti-phishing software.

Securing Your Data Elsewhere

What can happen to the information you no longer control? Once information is contained outside of your direct control you must protect yourself from it being used in inappropriate ways such as identity theft

How do I protect information I do not control? You can’t You can stop them from doing anything with the information Freeze your credit at all 3 credit reporting agencies and/or add an identity protection service that helps with the cleanup. You Can Now Freeze Your Credit for Free — Here’s Why You Should Do It Subscribe to a monitoring service.