Computer Security at HomeSlide 1 Computer Security Major Security and Privacy Threats Using The Internet At Home.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Review Ch. 3 – Connecting to the Worlds Information © 2010, 2006 South-Western, Cengage Learning.
Smartphone and Mobile Device Security IT Communication Liaisons Meeting October 11, 2012 Theresa Semmens, CITSO.
Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Let’s Talk About Cyber Security
Thank you to IT Training at Indiana University Computer Malware.
® Microsoft Office 2010 Browser and Basics.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
SECURITY CHECK Protecting Your System and Yourself Source:
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Facebook Security and Privacy Issues Brian Allen Network Security Analyst Washington University December 2, 2010 Alumni House.
UT Wing Civil Air Patrol. Objective Identify network and cyber vulnerabilities and mitigations Social Media/Metadata/Exfil data MITM Attacks Malware Social.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Don’t Lose Your Identity – Protect Yourself from Spyware Dan Frommer Sherry Minton.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
Protecting Our Personal Space Security in a Virtual World.
Securing Your Home Computer Presenter: Donnie Green Date: February 11, 2009 National Aeronautics and Space Administration
Hierarchical file system Hierarchical file system - A hierarchical file system is how drives, folders, and files are displayed on an operating system.
Protecting Our Personal Space Security in a Virtual World by David Hines - Information Security Officer
Internet safety By Lydia Snowden.
Security for Seniors SeniorNet Help Desk
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Keeping Information Safe Task 4. Basic security measures Passwords Change password on regular basis Do not use names or words easily linked to yourself.
Unit 19 INTERNET SECURITY
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Staying Safe Online Keep your Information Secure.
 We all know we need to stay safe while using the Internet, but we may not know just how to do that. In the past, Internet safety was mostly about.
You, Me & Technology. Overview Technology –Our relationship with technology Threats –What, Who, When, Where, Why & How Protection –What we can do to protect.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Spam Act 2003 Consumer Education and Awareness. About the ACA Independent government regulator Ensures industry compliance with legislation (Telecommunications.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Safer Online Shopping and Practices Presenter: Brian Moats Students Active In Leadership.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
What is Spam? d min.
Internet safety By Suman Nazir
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Year 10 ICT. What is it about?  This module sets out essential concepts and skills relating to the ability to understand main concepts underlying the.
Cybersecurity Test Review Introduction to Digital Technology.
Policies and Security for Internet Access
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Computer Security Sample security policy Dr Alexei Vernitski.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Cyber Security and Computer Safety
Joseph J. Malone Security for Seniors Joseph J. Malone
Unit 4 IT Security.
Protect Your Computer Against Harmful Attacks!
Staying safe on the internet
Cyber Security and Computer Safety
Presentation transcript:

Computer Security at HomeSlide 1 Computer Security Major Security and Privacy Threats Using The Internet At Home

Computer Security at HomeSlide 2 Agenda What is the Internet? Identity and Social Engineering Malware – what is it? Online Banking Actions you can take to protect yourself Online Resources Your turn!

Computer Security at HomeSlide 3 What Is The “Internet”? “Global system of interconnected networks” Each network is operated by individual entities Only connections are managed The rest is NOT managed –Wild West! No Borders! Tool for communication –Makes it easier –Makes it faster –Makes it cheaper

Computer Security at HomeSlide 4 “Identity” is Never Guaranteed

Computer Security at HomeSlide 5 Social Engineering Manipulating people into performing an action Phone calls from the “security department” Clicking on links and attachments – , web sites, twitter, MSN, … Lost USB sticks Software “updates” Nigerian “419” scams Requests for help from friends overseas “If it sounds too good to be true, it probably is”

Computer Security at HomeSlide 6 Malware Also known as Virus, Worm, Trojan Horse, Adware, Spyware, Scareware, Pestware, Crimeware, Rootkit Downloading software from the Internet Sharing USB sticks, software CDs and DVDs Opening untrusted attachments File sharing “drive by” attacks from malicious web sites Ignoring security warnings

Computer Security at HomeSlide 7 On-Line Banking Many sites offer additional SMS security: Commonwealth NetCode Westpac Protect SMS Code NAB SMS Security PayPal Security Key Used to send SMS codes to mobile phone Authorising “higher risk” transactions Authenticating to login to the account

Computer Security at HomeSlide 8 Validating Web Sites Slide sub-heading (manual text box) Look for “Extended Validation” Certificates – click on green bar to see details

Computer Security at HomeSlide 9 Actions Technical: Ensure that automatic updates are enabled Ensure adequate antivirus is operating –Microsoft Security Essentials is pretty good Ensure adequate firewall is in place –Most modern routers will do this for you –But direct connection to modems will not!! Use at least WPA or WPA2 on your WLAN Shred any paper with names/addresses Simple steps you can take to improve your online security

Computer Security at HomeSlide 10 Actions Personal: Ensure adequate and regular backups NEVER click on links/attachments –Especially in unsolicited or web sites –Type the URL in yourself, or use bookmarks Use separate computers for important tasks –Online banking, superannuation, tax –Online shopping, social networking –General browsing, downloaded software Simple steps you can take to improve your online security

Computer Security at HomeSlide 11 Actions Personal: NEVER send personal details –Credit cards, bank accounts, addresses –Drivers licence, passport, date of birth Especially by , over the phone, at the door, or entered into a web site –Unless it is for a specific purpose Don’t sign anything until you have read and understood it completely Simple steps you can take to improve your online security

Computer Security at HomeSlide 12 Actions Passwords: Use different passwords for each account Make them “strong” passwords –Almost impossible to do if you have a lot of accounts to protect –Use passwords made from your favourite sayings and songs Create “classes” of passwords – I use three! –“throwaway”; “moderate”; “secure” Simple steps you can take to improve your online security

Computer Security at HomeSlide 13 Actions My favourite Firefox add-ons: AdBlock Plus –Block web page components from Ad sites –Makes browsing MUCH faster Noscript –Disable Javascript – requires configuration Flashblock –Stop those annoying flash moving images –… until you want to see them! For the VERY technical audience

Computer Security at HomeSlide 14 Resources To validate rumours and scams: To reduce telemarketers: Information for the more technically minded: