Acceptable Use Policy –The Acceptable Use Policy defines the rules of the machine and internet connection you are on. –Specific policies differ by machine.

Slides:



Advertisements
Similar presentations
Privacy & Other Issues. Acceptable Use Policies When you sign up for an account at school or from an Internet Service Provider, you agree to their rules.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
How to protect yourself, your computer, and others on the internet
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
The Internet.
SECURITY CHECK Protecting Your System and Yourself Source:
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Computer Viruses.
Security, Privacy, and Ethics Online Computer Crimes.
Northwestern University Information Technology UNITS Quarterly Meeting April 29, 2004 Network Security Roger Safian
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Teach a man (person) to Phish Recognizing scams, spams and other personal security attacks July 17 th, 2013 High Tea at IT, Summer, 2013.
GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
How It Applies In A Virtual World
Information Security Information Technology and Computing Services Information Technology and Computing Services
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Protecting Yourself Online (Information Assurance)
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Staying Safe Online Keep your Information Secure.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Types of Electronic Infection
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Company LOGO Malicious Attacks Brian Duff Nidhi Doshi Timmy Choi Dustin Hellstern.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Topic 5: Basic Security.
What is Spam? d min.
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
Cyber Security and Staying Safe Online Mark D. Riley College of Health Sciences and Professions.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Computer Skills and Applications Computer Security.
Cyber Safety Jamie Salazar.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
W elcome to our Presentation. Presentation Topic Virus.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
 Chances of contracting a Virus › Every time you download software › Every time you accept attachments.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Cybersecurity Test Review Introduction to Digital Technology.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Computer Security Keeping you and your computer safe in the digital world.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Security Risks Todays Lesson Security Risks Security Precautions
An Introduction to Phishing and Viruses
Learn how to protect yourself against common attacks
IT Security  .
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Protect Your Computer Against Harmful Attacks!
Scams, Identity Theft, and Viruses Kelly & Caitlin
HOW DO I KEEP MY COMPUTER SAFE?
King Saud University- College OF Applied Studies
Presentation transcript:

Acceptable Use Policy –The Acceptable Use Policy defines the rules of the machine and internet connection you are on. –Specific policies differ by machine owner. –Most companies and universities require some form to be signed stating that the machines will be used acceptably. –Most service providers require some acknowledgment that you are aware of and will abide by a set of rules. –They typically require that you will not run your own business, violate copyrights, perform illegal or harassing activities, or view pornographic material.

Internet Privacy –There is no privacy on the Internet – yet. –Passwords - The basic defensive measure. –Hackers use machines to rapidly try combinations of passwords. –Phishing attacks attempt to fool you into giving away your password or other account information. –Use more than 6 characters and special characters to increase combinations possible. –Protecting Files –Access to files is typically given to user, group, and world. More complex schemes can be incorporated within software. –Keep truly sensitive files disconnected from the internet. –Firewalls –Attempts to control your machines access to the internet –Attempts to block unwanted access to your machine

Internet Attacks, General –All software must be executed or run before it can do anything –How does the software get on your machine? –Through an infected file. –By downloading unsafe software deliberately designed to contain the harmful software. – attachments. –HTML links running scripts. –Placed there by software. –Placed there by hackers. –Protection –Virus scanning software with constant updates. –Firewall to limit access to your machine. –Good policies: –Don’t automatically open –Don’t use program until scanned –Update scanner frequently (to get the latest viruses)

Internet Attacks, Viruses –Viruses –Act like biological viruses in that they attach themselves to a host program or . –Viruses cannot infect the machine until the host is executed. –Viruses propagate by moving the infected file from one machine to another. –Can be harmless or very harmful –Tend to affect MS products as MS is so popular.

Internet Attacks –Trojan Horses –Are embedded within useful software. –Performs a secondary function while the software is in operation. –Worms –Standalone software that propagates through the internet –Tries to find a host machine on which to run without the owners knowledge.

Internet Attacks – Attacks –These viruses, etc, use the system to propagate. –They all need your help – be careful opening attachments. –They use your address book to forward themselves to others. –Denial of Service Attacks –Floods a server with requests using multiple “robots” on multiple machines. –Currently popular form of attack –Robots can be set up over time and instructed to “attack” at once. –Protection is very difficult right now – multiple servers.

Hoaxes and Scams –Hoaxes and scams use human gullibility to achieve their aims. –Hoaxes –Designed to use up internet resources (bandwidth and your time) –Hoaxes use humans to propagate. –Recognizing them: –“Send this to everyone you know!” is a big tip off. –Typically has good sounding jargon that is really meaningless. –Typically references some authority (often non-existent) –What to do? –If suspicious, don’t send it out. –Check with web sites like

Hoaxes and Scams –Scams –Designed to separate you from your money –May try to get information from you (passwords, account numbers). –Online auctions – caveat emptor! –Recognizing them: –Unwanted solicitation –Request for instant cash (credit card # or faxing a check) –No real way to get in touch with a human (street address, phone) –What to do? –Be suspicious! Ignore un-asked for solicitations. –Check with web sites like –Online Auctions –Caveat Emptor: check out the seller’s history.

Internet Privacy –Identity Theft occurs when somebody uses your personal identification to obtain loans and services (ref and –Protection (before) –Do not keep personal information on a web-accessible machine –Do not transmit personal information unless from an encrypted web site ( ) –Read through a companies security/privacy policies to be sure. –Protection (after) –Contact all known sources of credit –Obtain a record of your credit status –Consider changing SSN and driver license