Tips and Techniques: How to Protect Yourself and Others Better Jeanne Smythe February 20, 2004.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

How to protect yourself, your computer, and others on the internet
Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
Thank you to IT Training at Indiana University Computer Malware.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
SECURITY CHECK Protecting Your System and Yourself Source:
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Unit 11 Communication & Collaboration.  Identify different communication methods  Identify advantages of electronic communication  Identify common.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
9/20/07 STLSecurity is Everyone's Responsibility 1 FHDA Technology Security Awareness.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!
Joel Garmon, Director, Information Security Mike Rollins, Security Architect Jeff Teague, Security Analyst, Senior 1
Hierarchical file system Hierarchical file system - A hierarchical file system is how drives, folders, and files are displayed on an operating system.
Internet safety By Lydia Snowden.
Data Security GCSE ICT.
Video Following is a video of what can happen if you don’t update your security settings! security.
Protecting Your Information Valuables in “Cyberspace” Charlie Russell Rappahannock Rotary Club May 30, 2012.
Protecting Yourself Online (Information Assurance)
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Have You Lost Your Identity? By Sierra Bowland. Deter Detect Defend.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Identity Theft By: Victoria Tuttle. DeterDetect Defend.
Stay Safe & Secure Online. Outline Passwords Everyday Security Security Physical Security Protecting Personal Information.
1.1 System Performance Security Module 1 Version 5.
Staying Safe Online Keep your Information Secure.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
By Ciaran carney. ADD COM  Etiquette – Acceptable Use Policy  Use a suitable subject in the - this helps the reader to understand what the message.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Computer Viruses... a big problem with small solutions.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
FINANCIAL MANAGEMENT 29 AUG 05 OC CARUSO. OVERVIEW BUDGETS CREDIT CARDS IDENTITY THEFT IMPORTANT FINANCIAL TOPICS FOR NEW COLLEGE STUDENTS.
Viruses Hacking Backups Computer safety... Viruses A computer virus is a piece of program code that makes copies of itself by attaching itself to another.
By Demi Gardiner 8P Who’s been on your computer??
Emily Ansell 8K viruseshackingbackups next. Viruses A virus is harmful software that can be passed to different computers. A virus can delete and damage.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
STARTFINISH DisposePrint & ScanShareStore Protect information and equipment ClassifyProtect.
We are here to help you… Fight something like this Brownies !
Cassidy Culligan Digital Citizenship Project ED 505.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
All about viruses, hacking and backups By Harriet Thomas.
Computer Skills and Applications Computer Security.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Computer Security Keeping you and your computer safe in the digital world.
Travis DeBona COSC  What is Malicious Code  Types of Malicious Code  Who’s Behind It  How To Secure My Computer.
Information Technology Security Office of the Vice President for Information Technology New Employee Orientation II.
An Introduction to Phishing and Viruses
IT Security  .
Handling Personal Data
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Protect Your Computer Against Harmful Attacks!
Computer Security.
COMPUTER SAFTEY IS IMPORTANT….
Presentation transcript:

Tips and Techniques: How to Protect Yourself and Others Better Jeanne Smythe February 20, 2004

The Troubles We’ve Seen Viruses, Worms, and other Malware  I have an interesting issue that I would appreciate any insight you have to offer. This bounced appearing to have been sent from my home account. The issue is that I did not send the and worse, attached to the was a copy of my 2002 tax return …(also included an attachment your_details.zip and a “movie”)  The virus spreads by ing some text, a copy of itself, and a randomly selected file from xxxxx’s computer to everyone on xxxxx’s mailing list. In this case the file contained a report about an individual with yyyyy syndrome. The file included the name, date of birth, parents names, evaluation, follow up, and information about medical services for other family members as well.

Viruses, Worms, and Trojans Most common problem is confidential information is shared as attachments Less common – but potentially more damaging – hacker discovers the mother lode

The Mother Lode Welcome to My Nightmares  March 2003, Georgia Tech. Stolen name, address, phone number, addresses, and credit card numbers  March 2003, University of Texas at Austin – 50,000 names and social security numbers of students, staff, and other  January 2003 – University of Kansas- Sevis Datbase – 1,450 foreign students – social security numbers, birth date, passpot number, country of origin

Minimize the Risk  Minimize exposure to private information –Remove confidential data – e.g. once your taxes are done back up and remove tax info –Don’t keep shadow copies –Leave system off network when you’re away for extended periods –Beware of public systems  Use good Hygiene –Use Antivirus software and keep it updated –Patch often  Get regular checkups

Surplused Media  February 19, 2004 N&O “…many state computers are not wiped clean of information such as Social Security and bank account numbers before they are offered for public sale. Some of those computers are refurbished by state inmates for use in public schools or other state agencies.” “…many state computers are not wiped clean of information such as Social Security and bank account numbers before they are offered for public sale. Some of those computers are refurbished by state inmates for use in public schools or other state agencies.”

Stolen Media  December Computer hard drives storing the private records of 500,000 military personnel and their families were stolen last month from Department of Defense health-care contractor TriWest Healthcare Alliance.  UNC Chapel Hill A 01/28/ /22/2003 Computer equipment 13 Laptop computer 26 Desktop computer 19 Computer equipment 13 Laptop computer 26 Desktop computer 19

Minimize Risk  Lock down laptops  Think about what you store on laptops and PDA’s  Wipe all media before disposal

Minimize the Risk (continued)  Manage your passwords –Try one for work, one for confidential personal information, one for play –Change your password periodically – and when important life changes happen  Think about the media –Should I really put this in ? –What if I lost my PDA? –Can I keep track of my usb drive?