Secure Computing Initiative Dr. Barbara J. Belon Work Home Threats Communication link.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Primary Threats to Computer Security
Thank you to IT Training at Indiana University Computer Malware.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
1 Computer and Internet Security JCCAA Presentation 03/14/2009 Yu-Min (Phillip) Hsieh Sr. System Administrator Information Technology Rice University.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
INTERNET SAFETY FOR STUDENTS
Chapter 9: Privacy, Crime, and Security
Chapter 8 Chapter 8 Digital Defense: Securing Your Data and Privacy
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Define and identify unethical practices such as hacking, phone fraud, online piracy, cyberstalking, and data vandalism. Use of employer’s computers for.
Bruce Schneier Lanette Dowell November 25, Introduction  “It is insufficient to protect ourselves with laws; we need to protect ourselves with.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
INTERNET SAFETY FOR STUDENTS
1 Computer Security: Protect your PC and Protect Yourself.
E - Safety What is it?. When do we need to be e-safe?
Information Security Information Technology and Computing Services Information Technology and Computing Services
Protecting Yourself Antivirus Programs By: Stephanie Shaughnessy.
Trojan Horse Implementation and Prevention By Pallavi Dharmadhikari Sirisha Bollineni VijayaLakshmi Jothiram Vasanthi Madala.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Viruses.
Unit 19 INTERNET SECURITY
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
IT Security for Users By Matthew Moody.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Staying Safe Online Keep your Information Secure.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
IT security By Tilly Gerlack.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Computer & Network Security
Legal Division CSAA Insurance Group, a AAA Insurer Protecting Your Identity: What to Know, What to Do 2015 Risky Business Week.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
DIGITAL SECURITY PART 2 TOOLS. phising  Internet criminals can steal your personal and banking information without you ever noticing – they can do it.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Computer Security By Rachel Gaines. Computers are used for work, play, and everything in between. So here’s how to keep it fun and protected.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Ethics. Ethics are the principles and standards we use to decide how to act.
Computer Skills and Applications Computer Security.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Do not give out personal information. Never meet someone face - to - face (FTF) that you have met on the Internet or have them visit you.
Security and Ethics Safeguards and Codes of Conduct.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Writing an message Finish off your slide on recommendations of how to write an .
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
Any criminal action perpetrated primarily through the use of a computer.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
James Paik. What is a virus? A virus is a malicious program that can be executed on the computer and can cause damage to it.
Best Free Key logger Download Computer & Internet Monitoring Software.
Chapter 40 Internet Security.
Hotspot Shield Protect Your Online Identity
Introduction to Web Safety
IT Security  .
Personal spaces.
Presentation transcript:

Secure Computing Initiative Dr. Barbara J. Belon Work Home Threats Communication link

Students asked to do online research, visit websites, send to instructors Business employees conduct research online from home Cost of commercial security software prohibits use by students “Security through obscurity” – attitude of the uninformed Given: Secure Computing Initiative

How do we insure the security of our online experience at home? Problem: Secure Computing Initiative

Build awareness of threats/risks Supply information on free security products Objective:

Threat Landscape WorkHome Threats Communication link

Threat Agents Work Home Threats Communication link Trusted insider Playmates “The Clueless” Consultants Cleaning crew Disgruntled employee

Threat Agents Outsiders Rogue hacker / script kiddies Organized hackers Organized crime State-sponsored hackers Competitor espionage Terrorists “Sickos” - CyberStalkers Work Home Threats Communication link

What’s at Risk? Your identity Your finances Your data Your privacy Your family Work Home Threats Communication link

What could happen? Things you see – New files/folders – Erased files/folders – Changed settings (Registry, browser)

What could happen? Things you don’t see – Malicious cookies – Keystroke loggers – Trojans bearing executable code – Hacker tool kits – Zombie (external control)

What Can We Do? FIRST – “sanitize” your machine NEXT – Apply security software – Change browser settings – Install Antivirus software – Install Firewall – Install secure Instant Messaging software – Apply for personal digital certificate

Secure Computing Initiative Keep software current Continually educate yourself Help someone else Work Home Threats Communication link

Reference Document “Secure Computing Initiative” Download site: Work Home Threats Communication link