CYBER SECURITY TRAINING Virginia Marine Resources Commission October 2014 How to defend your digital derrière in minutes or less. Would I lie to you? Would.

Slides:



Advertisements
Similar presentations
Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
Advertisements

Web Shift Booking System
Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Does this look familiar? Keep organized with TurboNote+, the worlds leading sticky note and instant messenger program.
Do Not Click This Button. I said don’t click it Don’t click the button.
So you wanna use …. No Problem! Setting up your is simple! Just follow these steps, and you’ll be using your new account in no time!
Use the following link to register on-line
Internet Safety Learning Disability Partnership Board 15 th October 2010 Veronica Hughes Bromley Adult Education College.
Search and Apply for Courses and Training in Leeds.
Review the Acceptable Use of Computer Click on your answer. #1 You should ask the teacher before you use a computer, TV, or phone in your classroom.
The basics of ratio. The purpose of this staff tutorial is to introduce the basic ideas of ratio and to show how ratio relates to fractions. Using this.
 Cyberbullying is when a child, preteen, or teen is tormented, harassed, threatened, or otherwise targeted by another child using the Internet, interactive.
Did you forget your checkbook and cash? Can’t return your tithes today?
Don’t be bullied, or be a bully.
We’ll be spending minutes talking about Quiz 1 that you’ll be taking at the next class session before you take the Gateway Quiz today.
What will you do when you leave school? Why is career planning important?
8 meeting Action points.
Hello, Pig! Hello, Rabbit! Look at this – I am making a list!
Writing an 1st Year Intermediate
CONDITIONAL SENTENCES: FIRST CONDITIONAL. Conditional Sentences.
Mental Health Week Introduction W e are here today to help you understand more about what gets you down and hopefully find a few ways to help. This.
Employee Self Service (ESS) Registration
Let Your Light Shine ~ learning to care and to lead for today and tomorrow.
Social Networking Brian Oswald
Internet Safety James Fuller Internet Rules To Remember When asked by friends or strangers, online or offline, never share Account IDs and Passwords.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Comergence 3/14/13. What Does Comergence Do? Comergence provides streamlined processing and centralized storage of Correspondent applications nationwide.
Overview to the Widgets App A simple overview to the functionalities of the Widgets application Approx. 20 minutes.
Click Below to Begin the Quiz
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
Social Engineering PA Turnpike Commission. “Social Engineering is the practice of obtaining confidential information by manipulation of legitimate users”
Downloading and Installing AutoCAD Architecture 2015 This is a 4 step process 1.Register with the Autodesk Student Community 2.Downloading the software.
Basics: Getting Started Uploading and Sharing Videos on YouTube. Basics: Getting Started Uploading and Sharing Videos on YouTube. 1.
Created by Mr. Hemmert.  Have you ever received a mean or instant message? Have you ever sent one? This is called cyberbullying. A cyberbully uses.
How To Protect Your Privacy and Avoid Identity Theft Online.
+ An Introduction to Safety on the Internet 1 Material and Advice provided by:
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
ESCCO Data Security Training David Dixon September 2014.
Personal Safety Unit - Level 7. The Internet is not anonymous. Your address, screen name, and password serve as barriers between you and others.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
1. Self Awareness You should only access your accounts and private informations from a safe location (only at home as necessary if at all possible) where.
Parent Portal Also known as: The next best thing to being at school with your student!
Agenda Last class: Internet Literacy Lab Today: Internet Safety.
DIGITAL CITIZENSHIP BY MAYSAA Stage 2 WHAT IS DIGITAL CITIZENSHIP? 0 Digital Citizenship is safely connecting with groups on the internet. 0 It involves.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
The Prospectus and Common Application Process My Course My Future Greater Manchester Prospectus
Candidate Portal Quick Reference Guide. Welcome to the Time Portal Access your Time Portal through Top Tip – Save the link to.
Good Day This is your 30-Second DPN Training ENJOY Click here to begin DPN.
Online Safety Objective8: Practice safe uses of social networking and electronic communication such as recognizing dangers of online predators and protecting.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
My Good Deed for Safer Internet Day Calum - 4W My good deed for Safer Internet Day 2015 is: Always try to help others and teach your parents or.
Computer Use Guidelines Business Lab. Computers are Important Tools! Internet Research Learning Software Word Processing Multimedia Presentations.
E-Safety Quiz Are you cybersafe?.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Meet Shelby the Shelf Marker!. Welcome “Hi! I’m Shelby the Shelf Marker. Welcome to the library media center!”
Log on to Your user name will be the same as your current address except after sign you must enter “irs-mos.org”.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
YEAR 6’S GUIDE TO STAYING SAFE ON THE INTERNET. CHATTING When you are chatting to people online, try not to give out any personal information about yourself.
Your good friend enjoys uploading videos to the internet sharing top tips for Minecraft. Yesterday you went to check out his latest post and.
Maryknoll Wireless Network Access Steps for Windows 7 As of Aug 20, 2012.
Online Job Applications Workshop Coordinators Sharon Feeney – Andrea Reynolds –
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Hondros College Student Mail System
As modern children, we have a huge number of electronic devices available to us. We might use computers, tablets, mobile phones or games consoles; for.
Would I lie to you? Would I try to trick you?....
How to use the internet safely and How to protect my personal data?
Company Name | Phone Number | Website | Address
Employee Cybersecurity Program
Presentation transcript:

CYBER SECURITY TRAINING Virginia Marine Resources Commission October 2014 How to defend your digital derrière in minutes or less. Would I lie to you? Would I try to trick you?.... ten

… of course I would… I’m a hacker!

I’ll schmooze you, I’ll bamboozle you, …if I can, I’ll befuddle you too. I go phishin’ I go sniffin’ I’m completely unforgivin’ I can entice you I can advise you I can delight you too I’ll invite you I’ll beguile you Then I’ll quickly surprise you! Most of all… I get your permission Then take what you have given.

Here, lemme show ya how it works…how ‘bout I call you “Pat”, you know, like Patsy, or …the “Mark”. So, I you, or have a link on a webpage you’re at, with an urgent message from your bank, or your network provider or somebody else important, someplace you keep some of your stuff that I’m lookin’ for. Anyway, it’s reeaal important that you click on the link that I provide…RIGHT away! or your account will be disabled or inaccessible or things will get lost! See…what’s really gonna happen when you click the link is you’re gonna give me something of value to both of us…access to secret, privileged data. Then I can slip into your account, your PC, your life, without your permission, or you even knowing about it…just what I want. Get it?

After we’ve gotten to know each other a little better…ok, after I’ve gotten to know you better. I’ll start using the stuff you’ve given me, to gain access to even more stuff of yours, of your family’s, of people you know, of clients, co-workers, and even strangers. It just keeps getting bigger and bigger, and better and better…for me…see? So, to make my day easier, I’d like you to do a few things for me, will ya? First, keep your passwords simple, use like, “password” or “1234”. Don’t make me type anything too hard like “I’mgonnamakeitatough1” or “that hacker is 1 ID10t” Second, don’t scramble or “encrypt” any of the secret stuff ok? Third, in case I happen to be nearby, could ya leave a sticky note on your screen with the username and password?...in case I need to check the game scores or somethin’.

Fourth, if you’re at home, just turn that ol’ firewall off an’ don’t worry about any “security patches” to your PC, unless I tell you you need it urgently, ok? Fifth, if you are in a coffee shop or someplace with an open WiFi, and you have to get some more cream or somethin’, just leave your screen unlocked…nobody’s gonna touch it. Last, and most important, if I ask you for some secret stuff, any secret stuff, like account numbers or names, client names, addresses, drivers license numbers, even harvest information, and especially credit card numbers, just hand it over will ya!? So…it’s nice knowing you….real nice. You can call me…well, never mind that. Jus’ try to remember, my job, is ta get to you…your job is ta help me do it. Got it?…cool.

The pop quiz ! If you’d like to help Harry “the hacker”, then do what he wants (operators are ready 24 hours a day). If you’d like to help yourself, your co-workers and friends, then don’t be tricked by “the hacker”. Don’t forget you are required to take a quiz after completing the training. Access the quiz by logging into the “Employee Portal”. You will find the quiz under the “System Access”. It is a multiple choice test and should only take a couple of minutes to complete. You must pass the test with a 90% - but you can take the test multiple times. If you pass the test by 90%, you will receive a “Nice Job! You've passed!” message. Employee Portal Harry “the hacker” (not his real name), will not like it. ;-)

Thanks to you… for going through the training today. Security is important in all aspects of life, at work and at home. Our information is an important part of what needs protecting. MRC security web pageMRC security web page Use our MRC security web page to access more information on security and access account request information. Also available, is the Agency Information Security Policy – all users should be familiar with the policy and their responsibilities for security as an agency employee.MRC security web page Please contact Erik Barth (x72262), Dave Lego (x72280), or your supervisor if you have any questions about this training or, information security topics in general.