Presented by INSERT NAME RIT Information Security 585.475.4122 digital self defense.

Slides:



Advertisements
Similar presentations
Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
How to protect yourself, your computer, and others on the internet
Cyber Safety Assessment Review
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
INTERNET SAFETY FOR EVERYONE A QUICK AND EASY CRASH COURSE.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Internet Safety/Cyber Ethics
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Teenagers and The Internet Ms Julie Clune Saint Ignatius’ College.
Security, Privacy, and Ethics Online Computer Crimes.
1 I ntegrated S ite S ecurity for G rids © Members of the ISSeG Collaboration, 2008 See: ISS e G Computer Security: Advice for computer.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
What is spyware? Supervisor dr. lo’ay tawalbeh Search By Mahmoud al-ashram Soufyan al-qblawe.
Staying Safe, Having Fun, And Cruising The ‘Net Daniel Owens IT Security Professional.
INTERNET SAFETY FOR EVERYONE
Digital Self Defense How well do YOU know Information Security? How well do YOU know Information Security?
1 Ben Woelk RIT Information Security Office Advancing Digital Self Defense Establishing a Culture of Security Awareness at the Rochester Institute of Technology.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
WhatsApp – Tweaking Security -The new face of Information Technology Services 1.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
1 POST NO BILLS RIT Information Security RIT Information Security Office.
Cyber Crimes.
Digital Citizenship By: Miranda Scorver.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Oswego School District 308 Internet Safety and Ethics Review Plank Jr. High – Tech 6 Mr. Brown.
Ashley Chambliss ED 505 Fall 2. “Digital Citizenship is a way for teachers to prepare you for a world full of technology.” (Ribble, ) “A means.
Staying Safe Online Keep your Information Secure.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Digital Citizenship Created By: Kelli Stinson June 2011.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
Digital Citizenship By: Amanda Thurber. Netiquette on Social Media Sites According to networketiquette.net, netiquette is the social code of the internet.
Safer Online Shopping and Practices Presenter: Brian Moats Students Active In Leadership.
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
It’s more than a game, it’s your life… What do you do online?
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Digital Citizenship. What is Netiquette? Netiquette is known as the “social code of the internet.” Netiquette comes from the words “network” and “etiquette.”
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
What are ____ 1 ______? Rules of behavior that you should follow when using computers and the Internet for the rest of your life Plank Jr. High – Tech.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Awareness raising session for Parents and Carers June Todd Awareness raising session for Parents and Carers June Todd.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
A Quick and Easy Crash Course Internet Safety for Everyone.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Technological Awareness for Teens and Young Adults.
Digital Citizenship Project Justin Lann. Netiquette Netiquette on Social Media Sites – A set of social conventions that facilitate interactions over networks.
Safety.
Freedom Independence Transition
Internet Safety & Acceptable Use Standards
Information Security 101 Richard Davis, Rob Laltrello.
Warrior Wednesday DIGITAL CITIZENSHIP.
HOW DO I KEEP MY COMPUTER SAFE?
The Issues with Technology in education
Presentation transcript:

Presented by INSERT NAME RIT Information Security digital self defense

2 Copyright and Reuse The Digital Self Defense logo is the property of the Rochester Institute of Technology and is licensed under the Creative Commons Attribution-Non-Commercial-No Derivative Works 3.0 United States License. To view a copy of this license, visit or send a letter to Creative Commons, 171 Second Street, Suite 300, San Francisco, California 94105, USA.To request permission for other purposes, contact The course materials are the property of the Rochester Institute of Technology and are licensed under the Creative Commons Attribution-Non-Commercial-Share Alike 3.0 United States License. To view a copy of this license, visit or send a letter to Creative Commons, 171 Second Street, Suite 300, San Francisco, California 94105, USA. To request permission for other purposes, contact

3 How Well Do You Know RIT? Throughout this presentation, look for pictures of RIT buildings and landmarks The first person to name the location correctly wins a prize!

4 Name the Building! This building was named after the founder of Kodak.

5 You’re not at home anymore. With freedom comes responsibility. RIT has requirements: –Student Rights and Responsibilities Handbook –Code of Conduct for Computer and Network Use (C8.2) –Desktop & Portable Computer Standard –Password Standard Welcome to RIT! Padlock with modem cords. Retrieved 18 July, 2007, from Welcome to RIT

6 RIT Information Security We’re here to protect you and RIT We can’t do it alone; We need your help: –Keep your computer protected –Watch out for each other –Practice ethical computing Hand on Mouse. Retrieved 18 July

7 Computer Support –All RIT users must comply with the RIT Code of Conduct for Computer and Network Use and relevant information security standards. –Resnet provides computer support for students residing at RIT. ( Resnet users must also comply with the Residential Network Appropriate Use Policy. –The ITS HelpDesk provides support for YOU. Help Key. Retrieved 18 July

8 Life on a University Network The Good –Power you’ll find nowhere else Internet2 Very High Speed Internet Connection Wireless access One of the most wired universities RIT Stock Photo

9 Network Threats The Bad College campuses make big targets RIT faces the same challenges as other large technology universities. Threats on our campus: –Password Crackers –Key Loggers –Harassment –Sniffing/Network Monitoring –Network Worms –Hacking Attempts & Rootkits –Physical Theft Laptop with ‘Danger’ tape. Retrieved 18 July

10 External Threats The Ugly Hacking Attempts Botnets/Zombie PCs Identity Theft Phishing 2004 was the first year that proceeds from cybercrime were greater than proceeds from the sale of illegal drugs…over $105 billion. -Valerie McNiven, US Treasury - Cybercrime Advisor Gloved hands and keyboard. Retrieved 18 July

11 External Hacking Attempts Hackers are always looking for ways to access your account Protect yourself –Protect your password –Follow the desktop standard Copyright 2003 D. Seah Bigger than Cheese

12 Botnets & Zombie PCs What is a botnet? –A large number of computers that have been compromised with remote control software –The botnet is then used to create and send out adware, spyware, spam, etc. Protect your computer –Patch regularly Botnet illustration. Retrieved 18 July

13 Phishing and Spam What is phishing? – s that look like they come from banks, PayPal, or other official sources appealing to greed, fear, etc. How much spam at RIT? –RIT’s Brightmail anti-spam filters out >95% of the received.

14 Identity Theft 15% of RIT students are victims of identity theft. RIT Computer Use and Ethics Survey, 2003

15 Name the Structure! Since being built in 2003, this prominent structure caught the attention of “alert” visitors

16 Your Role Practice Digital Self Defense –Understand the Dangers –Follow RIT Security Standards –Practice Ethical Computing –Use Common Sense

17Passwords The RIT Password Standard requires you use a complex password and change it often. MINIMUM of 8 characters UPPER and lower case Anatomy of a Secure Password Mixed numbers and letters…* *or other characters allowed by your systems administrator MINIMUM of 8 characters UPPER and lower case Anatomy of a Secure Password Mixed numbers and letters…* *or other characters allowed by your systems administrator

18 Protect your Computer There are many types of malware circulating on the Internet. The Desktop Security Standard requires you to protect your computer: –Updating –Firewalls –Anti-Virus –Anti-Spyware Lock on keyboard graphic. Retrieved 18 July

19 Updating / Patching Patching: –Fixes “holes” in existing software –Provides a temporary fix until next major release –Protects you against security vulnerabilities You need to: –Turn on auto-updating

20Firewalls Firewalls –Monitor and protect your network connections to prevent unauthorized connections from being made. You must use a firewall –Windows XP Firewall –Basic Zone Alarm ( Graphic of fire. Retrieved 18 July

21 Name the Structure! Built by José de Rivera in 1968, this structure stands in the middle of one of RIT’s busiest quads.

22Antivirus Antivirus programs: –Are an absolute “must have” before going on the Internet –RIT provides free McAfee AntiVirus for Windows and Macs (start.rit.edu) You must: –Install an antivirus product –Update daily, scan weekly! Antivirus graphic. Retrieved 18 July images/security_news_2005/images/antivirus_l.jpg

23Anti-Spyware Spyware is a huge problem. –Spyware is “tracking software deployed without adequate notice, consent or control for the user.” You must –Install anti-spyware –Good Choices: Spybot Search & Destroy ( Lavasoft Ad-Aware ( Microsoft Defender ( –Mac computers don’t need anti-spyware You should –Use more than one program Computer ‘Spy’. Retrieved 18 July HSK_Spyware_computer-spy.jpg

24 How do You Get Spyware? You can get spyware from: Browser Vulnerabilities – or Instant messenger links to exploit sites –Enticing web pages/common search terms File Sharing Networks –Bundled with client software Trojans –Disguised as anti-spyware programs or other popular software Stressed woman photo. Retrieved 18 July

25 Paranoia or Common Sense? Guard your personal information! Even less sensitive information can be used by an attacker! Don’t post it in public places. Make sure you know to whom you’re giving it. Macbook. Retrieved 18 July

26 Physical Protection Protect Your Computer Keep your computer and mobile devices secure at all times Lock or log out of your computers when you leave the room Don’t allow others to use your computer unattended Computer protection image. Retrieved 18 July

27 Name the Building! This multi-million dollar facility is one of the newest additions to the RIT landscape.

28 Know Your Computer! YOU are the first line of defense—if something goes wrong, you’ll probably be the first to know Know what devices are registered to you—YOU are held responsible Hand on mouse. Retrieved 18 July

29 Illegal File Sharing is only one type of copyright violation Text, photos, graphics, music, movies, etc., are all copyrighted There are educational fair uses of copyrighted materials –The bottom line—are you taking sales away from the original owner? –Must cite the source Student Guide to Copyright and Plagiarism ( Copyright and File Sharing

30 Weird Al: Don’t Download This SongDon’t Download This Song ( Illegal File Sharing

31 Illegal File Sharing: Some Quick Facts The Recording Industry Association of America (RIAA) is cracking down on illegal downloading on campuses nationwide Your IP Address is easily recorded, even on a wireless network The RIAA has started issuing ‘pre-litigation’ letters –Students are given the option to ‘settle’ without ever going to court –The cost of hiring a lawyer often exceeds the settlement cost –The average settlement is around $3000

32 What’s Illegal? Can’t distribute copyrighted music, movies or software without authorization from the copyright owner Distribution can mean: –“Sharing" files on the Internet –Burning multiple copies of copyrighted files onto blank CD-Rs –Selling or giving copies of files to others while you keep the originals. Taken from an RIAA-endorsed websitewww.campusdownloading.com

33 What’s Legal? Sharing music you own the copyright to Downloading music from an authorized site Making a copy of music you own for your own personal use

34 The RIAA and RIT RIT is a high profile target. –23 RIT students received pre-litigation letters from the RIAA in Spring 2007 Experts expect this number to increase as the RIAA continues to crack down on high-tech universities. –In the past year, over 750 students received “take-down” notices. –If the case goes to court, criminal charges may be pressed This could mean jail time.

35 Name the Building! If you’re an IT, Computer Engineering or Software Engineering major, you can expect to spend a lot of time here.

36 What You Should Do Delete any illegally downloaded movies or music If you don’t need file sharing/P2P software, delete it –File shares such as the I2 Hub are NOT endorsed by RIT! Image courtesy of

37 What You Should Do… Continued Download music and videos legally –Ruckus.com available for Windows users –See Wikipedia for a comprehensive list of legal services Often, academic software is free or deeply discounted for students –Check with your department and the RIT bookstore

38 Too Late… If you’ve received a preservation order or a settlement letter: DO NOT delete the files or software. Consider obtaining legal advice Man behind bars. Retrieved 18 July You don’t want this to be you!...

39 Name that Place! This on-campus coffee house might become your home away from home, especially if you have class at 8 a.m.

40 Safer Social Networking

41 And Now, a Few Questions… Do you use Facebook or MySpace?

42 Facebook & MySpace: the Stats MySpace –Launched in 2004 –67+ million members –250,000 new members daily Facebook –Also launched in 2004 –Now has 27+ million members –100,000 new members every day Social networking graphic. Retrieved 18 July

43 Not yourSpace Many students think that only their friends and peers look at their profiles –Despite the name, this is not your space! –Even if your profile is private, your information may be revealed through search results Facebook stalker graphic. Retrieved 18 July

44 You never know who might be watching! YouTube: Facebook Stalker (

45 Name that Building! This ice arena is home to RIT Hockey, which recently became a Division I team.

46 Facebook and MySpace at RIT Here at RIT: Information Security has a Facebook account Many professors and staff have Facebook accounts Facebook claims more than 17,000 accounts with RIT connections

47 Social Networking DOs DO use these sites to: Make new friends Use privacy settings Be conscious of the image you project

48 Social Networking DON’Ts DON’T use these sites to: Post personal information Post inappropriate photos –Be aware of what photos you are being ‘tagged’ in Tell people where you’ll be

49 Who Uses Social Networking Sites? Don’t let what you post today affect your future –“Google” yourself regularly to see the kind of image you are projecting! Employers (on and off campus) often “facebook” or “google” job candidates –A study in 2006 indicated that 27% of organizations have “googled” or “facebooked” potential employees.

50 Other Social Networking Dangers! Cyber stalking Identity theft Information harvesting

51 Name that Structure! This strange looking structure on the dorm side actually has a purpose. What is it?

52 "The biggest concern I have is that students are naive about ways in which that data can be harvested and used against them in the short, medium and long term, for a variety of malicious ways.“ - Sam McQuade, RIT Professor MSNBC, June 25, 2006 What Happens to Your Info?

53 What is Ethical Computing? Scales graphic. Retrieved 18 July es/scales.gif

54 Ethical Computing According to a recent study on computer use & ethics at RIT: 32% of computer crime victims on campus knew their attackers Of that 32%, over half said their attacker was either a friend or acquaintance. RIT Computer Use and Ethics Survey, 2003

55Cyberbullying Harassment –Almost 15% of RIT students report being harassed online. –RIT prohibits harassment. –YOU are LEGAL ADULTS. This isn’t high school. Consequences include: Fines Jail time A permanent record –If you are being cyber bullied: Report it to Public Safety, Talk to your RA or FYE Mentor

56 Will I Be a Victim? 2 out of 3 students at RIT will be a victim of at least one form of computer abuse or crime. 1 out of 3 students at RIT will be a victim of multiple forms of computer abuse or crime. - RIT Computer Use and Ethics Survey, 2003 Crime tape graphic. Retrieved 18 July

57 What if it Happens to Me? Computer incident? Contact before you delete anything ITS HelpDesk at 475-HELP Resnet at Identity theft? Call Public Safety at

58Consequences Network Quarantine –You will be denied access to the network and may not be able to complete your assignments. Student Conduct Process Federal, State and Local law enforcement Gavel image. Retrieved 18 July

59 For More Information Student Rights and Responsibilities Handbook –All the information you need to know about what you can and should be doing at RIT! –Has Alcohol Policy, Drug Policy, Computer Code of Conduct and other policies –

60 + Drawing for free iPod shuffle on September 17, 2007 Add RIT Information Security as your Facebook friend by September 16th and be entered to win a FREE iPod shuffle! = A Simple Equation

61Questions?