Identity Theft and Safe Computing Keeping yourself You by good habits and good technology.

Slides:



Advertisements
Similar presentations
Computer Security What to Know and What to Do Presented to CUGG Jamie Leben IT-Works Computer Services
Advertisements

Primary Threats to Computer Security
SPYWARE Presented by The State Security Office November 17, 2004.
1 Alcatel Onetouch Antivirus. 2 Thinking about security on your smartphone Alcatel OneTouch? We have the solution. Among the applications on your smartphone,
SECURITY CHECK Protecting Your System and Yourself Source:
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Chapter 8 Chapter 8 Digital Defense: Securing Your Data and Privacy
Starting up a Security Class for Students Created by: Beth Byrnes Larry James Zac Reimer For Information Services University of Nebraska-Lincoln.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
Don’t Lose Your Identity – Protect Yourself from Spyware Dan Frommer Sherry Minton.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Basic Computer Maintenance Chatham University Information Technology Team.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.
Spyware & Internet Security
Information Security Information Technology and Computing Services Information Technology and Computing Services
Security Issues: Phishing, Pharming, and Spam
Adware Spyware Anti-Virus Presented by: Forrest Fosheim Network Coordinator Southwest Telecommunications Coop.
Protect Your Computer from Viruses and Other Threats! 1. Use antivirus software. 2. Run Windows updates. 3. Use a strong password. 4. Only install reputable.
Computer Security: How to Protect Your Computer By Roopa Mathur Computer Information Management Irvine Valley College
Security for Seniors SeniorNet Help Desk
Securing Information Systems
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
Protecting Your Computer & Your Information
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Security Chapter What Should I Ask Santa Claus For? spoofing: fraudulent activity in which the sender address and other parts of the.
Keeping Information Safe Task 4. Basic security measures Passwords Change password on regular basis Do not use names or words easily linked to yourself.
Unit 19 INTERNET SECURITY
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Staying Safe Online Keep your Information Secure.
IT security By Tilly Gerlack.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
PC Maintenance How to keep your computer healthy.
 Physical protection and Simple measures  Passwords  Firewalls  Anti-Virus, Spyware and Malware  Web browsers   Patches  Wireless  Encryption.
Network Security Lecture 28 Presented by: Dr. Munam Ali Shah.
Everyday Cyber Security April 27 th Why Should You Care? Ensuring your privacy and security Protecting yourself and others Practicing safe internet.
Types of Electronic Infection
Safer Online Shopping and Practices Presenter: Brian Moats Students Active In Leadership.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
Ch9QQ T F 1.Hacking is an example of unauthorized access. T F 2.A Trojan horse is a type of malware that masquerades as another type of program. T F 3.A.
CHAPTER 1 PROTECT YOUR TURF. Netizen – A citizen of cyberspace (ie. Internet) Any person using the Internet to participate in online social communities.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
Safe Downloading & Malware Prevention. Adobe Flash Update One program that will ask you to update often is Adobe Flash. While updating Flash is important,
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Internet Security and Your Computer Welcome to Boot Camp.
Saphe surfing! 1 SAPHE Secure Anti-Phishing Environment Presented by Uri Sternfeld.
What is Spam? d min.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Computer Skills and Applications Computer Security.
Introduction to Desktop Security Protecting your computer and your data.
Internet safety By Suman Nazir
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
Computer Essentials by Mark White. Computer Essentials Firewalls Anti-Virus Software Spyware Adware.
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Cybersecurity Test Review Introduction to Digital Technology.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
Computer Security Keeping you and your computer safe in the digital world.
Information Technology Security Office of the Vice President for Information Technology New Employee Orientation II.
Protect Your Computer Against Harmful Attacks!
Presentation transcript:

Identity Theft and Safe Computing Keeping yourself You by good habits and good technology

The Threats Malware Malware Adware Adware Spyware Spyware Worms Worms Viruses Viruses Trojan Horses Trojan Horses Bots/Zombies Bots/Zombies

The Threats Phishing and Pharming Phishing and Pharming

Safe Computing Safe Surfing (safe web, , IM) Safe Surfing (safe web, , IM) Safe Passwords Safe Passwords Safe Systems (making your computer help you) Safe Systems (making your computer help you)

Safe Surfing Windows popup or web popup? Windows popup or web popup? Careful where you click Careful where you click URL Spoofing URL Spoofing Vulnerabilities (IE/Firefox spoofs) Vulnerabilities (IE/Firefox spoofs) Others Others

Safe Surfing URL Spoofing examples: URL Spoofing examples: Mouseovers Mouseovers HEX Encoding HEX Encoding Decimal IP address Decimal IP address and web and web

Safe Surfing Under Lock and Key Under Lock and Key SSL SSL Terminology Terminology Certificate Certificate Certificate Authority Certificate Authority How to Check it How to Check it

(Shows live phishing sites)

Safe Surfing Safe Safe Unexpected attachments Unexpected attachments Guilty until proven innocent Guilty until proven innocent No real security No real security From/Reply-to arbitrary From/Reply-to arbitrary Encryption / Authentication Encryption / Authentication

Safe Surfing Spoofing Spoofing Embedded forms Embedded forms URL spoofing in URL spoofing in ‘Account Updates’ ‘Account Updates’ ‘Security Notices’ ‘Security Notices’

Safe Surfing Safe IM Safe IM Similar to Similar to Same defenses Same defenses

Safe Surfing Summary Summary is untrustworthy is untrustworthy Watch the URLs Watch the URLs Common sense Common sense

Safe Passwords New Campus Policies New Campus Policies Why do we have this policy? Why do we have this policy? Single point of failure Single point of failure Tradeoffs Tradeoffs

Safe Passwords Making good passwords Making good passwords Phrases Phrases Lyrics, poems, quotes Lyrics, poems, quotes Obfuscate Obfuscate Storing your password Storing your password Protect like a credit card Protect like a credit card Password vault Password vault Multi-factor protection Multi-factor protection

Safe Systems Check with your local support staff Check with your local support staff Anti-virus Anti-virus McAfee is FREE! McAfee is FREE! Necessary, but not enough to be safe Necessary, but not enough to be safe

Safe Systems Anti-spyware Anti-spyware Ad-aware Ad-aware Spybot Search and Destroy Spybot Search and Destroy Still not enough! Still not enough!

Safe Systems Automatic Updates Automatic Updates Most important, and very nearly enough Most important, and very nearly enough

Safe Systems Alternate Browsers Alternate Browsers IE vulnerabilities IE vulnerabilities Opera Opera Firefox (mozilla) Firefox (mozilla)

Summary Secure your machine Secure your machine Choose good passwords and protect them Choose good passwords and protect them Be careful how you surf Be careful how you surf At Home / At Work At Home / At Work

Questions? Jordan Wiens Security Team