SLAC Computer Security Annual Safety and Security Briefing 10/11/2007 Teresa Downey.

Slides:



Advertisements
Similar presentations
Instant Messages: I am bored. Social Networks: Facebook, Myspace.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Social Engineering Training. Training Goals Increase Laboratory Awareness. Provide the tools required to identify, avoid and report advanced Social Engineering.
SLAC Computer Security Annual Safety and Security Briefing 2006.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
NCS welcome all participants on behalf of Quick Heal Anti Virus and Fortinet Firewall solution.
Social Engineering J Nivethan. Social Engineering The process of deceiving people into giving away access or confidential information Onlinne Phone Offline.
Basics. 2 Class Outline Part 1 - Introduction –Explaining –Parts of an address –Types of services –Acquiring an account.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Annual Safety & Security Briefing - 9/22/04 Teresa Downey – SLAC Computer Security Group & SCS Applications Group.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
PASSWORD MANAGER Why you need one 1. WHAT IS A PASSWORD MANAGER? A modern Password Manager is a browser extension (Chrome, Internet Explorer, Firefox,
Security Awareness Cloud Phishing Attacks
August 15 click! 1 Basics Kitsap Regional Library.
Format Scandisk Defragmentation Antivirus Compression Software
This is the first page of the log in, this is were you enter your unique details.
Quiz Review.
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
Company/Product Overview. You have lots of files all over the place.
Windows XP 101: Using Windows XP Professional in the Classroom.
E safety. Ads It’s always best to not click on ads when you see them, and it’s always a good idea to ignore them, but if there are too many you can always.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Topics Basic Internet Concepts. Types of Information. Search Tools & Techniques. Managing Internet Resources. Browsing a mail. Composing a mail. Attaching.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
Social Engineering Training. Why Social Engineering Training? The Department of Energy (DOE) authorized the Red Team to perform vulnerability assessments.
Your Trusted Partner In All Things IT. 20 Years of IT Experience University Automotive Food Service Banking Insurance Legal Medical Dental Software Development.
OCR Nationals – Unit 1 AO2 (Part 2) – s. Overview of AO2 (Part 2) To select and use tools and facilities to download files/information and to send.
Information guide.
Web Browser Security Prepared By Mohammed EL-Batta Mohammed Soubih Supervised By Eng. Eman alajrami Explain Date 10. may University of Palestine.
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
IT security By Tilly Gerlack.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
NARFE Configuration Advisory Board (CAB) Web Page.
Computer stuff LIBS100.
Basics. 2 Professional Development Centre Class Outline Part 1 - Introduction –Explaining –Parts of an address –Types of services.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Tired of Spam? The solution is MailWasher
Microsoft Outlook Objective The learner will be able to perform basic tasks in Microsoft Outlook 2003.
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.

Phillip Dinh, Fofanova, 1301, UH Internet Security By Phillip Dinh 1301 Spring 2007 University of Houston.
 Introduction to Computing  Computer Programming  Terrorisom.
Phishing: Trends and Countermeasures Blaine Wilson.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Phishing Dennis Schmidt, CISSP Director, Office of Information Systems HIPAA Security Officer UNC School of Medicine UNC School of Medicine.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
How to use By Lauren Fowler. Adding Attachments Attachments are pictures, videos and files that you have on your computer. You can add these to.
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Safety in the digital world. Survey Thank you for completing the Information Security Survey!
How to create an educational wiki. Laurie Roberts 2010.
 Open and copy the Agenda.  Create a new folder in your file: Lesson 5  Today, you will be working on a new assignment. Unfinished assignments should.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
KS2 E-Safety assembly How to be smart and keep safe online.
ASSESSMENT TOOL The assessment tool comprises 3 sections: o Infrastructure o Policy o Practice Schools self-assess two-yearly, and for each assessment.
ARE YOU A CYBER SECURITY RISK?. Pass the Hat Al QaedaFARCHezbollahIRAHAMAS.
Windows Vista Configuration MCTS : Productivity Applications.
For more information on Rouge, visit:
Cyber security. Malicious Code Social Engineering Detect and prevent.
IT Security Awareness Day October 19, 2016
How to apply your signature
Why is it important? ❏ Most website owners do not think that if they paste address on page or post than they have too much risk of spam. ❏
Information is at the heart of any University, and Harvard is no exception. We create it, analyze it, share it, and apply it. As you would imagine, we.
Lesson 2: Epic Security Considerations
If I’d only known then what I know now about phishing…
9 ways to avoid viruses and spyware
Presentation transcript:

SLAC Computer Security Annual Safety and Security Briefing 10/11/2007 Teresa Downey

National Cyber Security Awareness Month – October 2007 Month-long effort – new topic daily Linked from Computer Security page:

Security Policies DOE says… –Computer Security is as important as Physical Safety More reviews/audits –Spring ‘08 Policies –Not always a bad thing… –Set consistent boundaries –Enforce good practices

Recent SLAC Incidents User installed operating system but default password not changed –lesson: use SCCS installation/mgmt tools Person reading offsite and clicked on [infected] executable attachment –lesson: pay attention to the a/v warnings User passwords stolen offsite, several systems compromised here –lesson: protect passwords physically and electronically

Forged = Strange Bounces I didn’t send this , why am I getting this? Easy for spammers, virus writers, and me…

Forgery Example – Part 1 YIKES! Is this real??? Let’s look at headers… Click on View; then click Options

Forgery Example – Part 2 This isn’t from a SLAC computer!

Phishing - HTML Which is it? or ? That’s a lot of “teresa’s” That’s not my bank URL looks real… matches the From: line

This link would take me to somewhere in Latvia…! Phishing – Plain Text What if the bank name was correct? and only addressed to me? and the typos were gone? My only clue is the URL now Outlook converted to plain text View as HTML by right-click gray bar $ Downey, Teresa L.

Phishing - Headers Wow! This comes from somewhere in The Netherlands… Click on View; then Options

Safer Practices Convert to Plain Text automatically Can easily change to HTML if needed Set a good example: –Send Plain Text s! –Only use HTML when REALLY needed…

Social Engineering USB drive left laying around Official looking CD arrives in mail Phone calls asking for information Desperate pleas for help Dumpster diving

Reporting Security Issues Report all suspicious activity –Send to: –If urgent: call HelpDesk at x4357 (24x7) Questions? –SLAC Computer Security in breezeway today