Digital Self Defense How well do YOU know Information Security? How well do YOU know Information Security?

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Thank you to IT Training at Indiana University Computer Malware.
INTERNET SAFETY FOR EVERYONE A QUICK AND EASY CRASH COURSE.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Protecting Yourself Online. VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One in every 200 containing.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
INTERNET SAFETY FOR EVERYONE
1 Ben Woelk RIT Information Security Office Advancing Digital Self Defense Establishing a Culture of Security Awareness at the Rochester Institute of Technology.
1 Computer Security: Protect your PC and Protect Yourself.
Threats to I.T Internet security By Cameron Mundy.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Protect Your Computer from Viruses and Other Threats! 1. Use antivirus software. 2. Run Windows updates. 3. Use a strong password. 4. Only install reputable.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Protecting Information. Who We Are We are working on our Information Assurance MBA This is part of our curriculum; to present on information security.
© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.
1 POST NO BILLS RIT Information Security RIT Information Security Office.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Learning In A Techno World How Safe is Your Cyberspace?
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Staying Safe Online Keep your Information Secure.
Section 6 Theory Software Copyright, Viruses and Hacking.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Malicious Attack Corporate Awareness and Walk through Date 29 September 2011.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Computer Security By Rachel Gaines. Computers are used for work, play, and everything in between. So here’s how to keep it fun and protected.
Company LOGO Malicious Attacks Brian Duff Nidhi Doshi Timmy Choi Dustin Hellstern.
C OMPUTER V IRUSES Julia White. W HAT ARE COMPUTER VIRUSES ? Computer viruses are small software programs that are designed to spread from one computer.
By Hyrum Wines  2. Anti-spyware: A spyware is a program which collects private information and sends it to its programmer. Spywares are considered.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
INTERNET SAFETY FOR KIDS
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Internet Safety Internet Safety LPM
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Computer Skills and Applications Computer Security.
Internet safety By Suman Nazir
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
W elcome to our Presentation. Presentation Topic Virus.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
A Quick and Easy Crash Course Internet Safety for Everyone.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Computer Security Keeping you and your computer safe in the digital world.
Managing Windows Security
Cyber Security By: Pratik Gandhi.
Protect Your Computer Against Harmful Attacks!
Lesson 2- Protecting Yourself Online
Information Security Session November 11, 2004
Information Security Session October 24, 2005
Information Security Session October 23, 2006
HOW DO I KEEP MY COMPUTER SAFE?
Lesson 2- Protecting Yourself Online
Presentation transcript:

Digital Self Defense How well do YOU know Information Security? How well do YOU know Information Security?

Copyright and Reuse The Digital Self Defense logo is the property of the Rochester Institute of Technology and is licensed under the Creative Commons Attribution- NonCommercial-NoDerivs License. To view a copy of this license, visit or send a letter to Creative Commons, 559 Nathan Abbott Way, Stanford, California 94305, USA. To request permission for other purposes, contact The course materials are the property of the Rochester Institute of Technology and are licensed under the Creative Commons Attribution-NonCommercial- ShareAlike License. To view a copy of this license, visit or send a letter to Creative Commons, 559 Nathan Abbott Way, Stanford, California 94305, USA. To request permission for other purposes, contact

Vulnerabilities On average, how long will it take for an unpatched computer to be compromised once it is connected to the Internet? A.Weeks B.Days C.Hours D.Minutes On average, how long will it take for an unpatched computer to be compromised once it is connected to the Internet? A.Weeks B.Days C.Hours D.Minutes

Vulnerabilities Answer: D - Minutes On average, it only takes minutes for an unpatched computer to be compromised after it is connected to the Internet! Answer: D - Minutes On average, it only takes minutes for an unpatched computer to be compromised after it is connected to the Internet!

Anti-Virus How often should your Anti-Virus definitions be updated? A.Monthly B.Once per Week C.Once per Day D.Once per Hour How often should your Anti-Virus definitions be updated? A.Monthly B.Once per Week C.Once per Day D.Once per Hour

Patches Answer: C – Every Day New viruses are being found so quickly that McAfee AntiVirus releases updated definitions every business day. Keep up with the definitions to stay protected! Answer: C – Every Day New viruses are being found so quickly that McAfee AntiVirus releases updated definitions every business day. Keep up with the definitions to stay protected!

Firewalls Why should you use a firewall? A.To prevent against worm infections B.To prevent attackers from accessing your computer C.To block spyware from sending your personal data over the Internet D.All of the above Why should you use a firewall? A.To prevent against worm infections B.To prevent attackers from accessing your computer C.To block spyware from sending your personal data over the Internet D.All of the above

Firewalls Answer: D – All of the above A firewall acts like a gateway between you and the Internet, allowing some types of traffic in and out while stopping others. This could stop worms, hackers and spyware from sending data to or from your computer. Answer: D – All of the above A firewall acts like a gateway between you and the Internet, allowing some types of traffic in and out while stopping others. This could stop worms, hackers and spyware from sending data to or from your computer.

Digital Self Defense 101 Take a Digital Self Defense Lesson! Sessions are scheduled throughout the year. Visit for details. Take a Digital Self Defense Lesson! Sessions are scheduled throughout the year. Visit for details.

Password Standard Which statement below is FALSE? Your RIT password must… A.Be at least 8 characters long B.Contain both UPPER and lower case letters and at least one number C.Not contain your username D.Be used for all your passwords, including online banking. Which statement below is FALSE? Your RIT password must… A.Be at least 8 characters long B.Contain both UPPER and lower case letters and at least one number C.Not contain your username D.Be used for all your passwords, including online banking.

Password Standard Answer: D – Be used for all your passwords, including online banking. FALSE! Never use your RIT network password for online banking and other web sites! While it’s difficult to memorize multiple passwords, it makes it harder for attackers to gain access to your accounts. Answer: D – Be used for all your passwords, including online banking. FALSE! Never use your RIT network password for online banking and other web sites! While it’s difficult to memorize multiple passwords, it makes it harder for attackers to gain access to your accounts.

Desktop Standard Which of the following is not required by the RIT desktop standard? A.Use of Internet Explorer as your web browser B.Up-to-date patches C.Antivirus software D.Anti-spyware Which of the following is not required by the RIT desktop standard? A.Use of Internet Explorer as your web browser B.Up-to-date patches C.Antivirus software D.Anti-spyware

Desktop Standard Answer: A – Use of Internet Explorer as your web browser You are not required to use Internet Explorer by the Desktop Standard. You are required to keep patches up to date, use antivirus, and anti-spyware. Answer: A – Use of Internet Explorer as your web browser You are not required to use Internet Explorer by the Desktop Standard. You are required to keep patches up to date, use antivirus, and anti-spyware.

Macintosh Have Macintosh computers ever been attacked at RIT? A.Yes B.No Have Macintosh computers ever been attacked at RIT? A.Yes B.No

Macintosh Answer: A - Yes Macintosh computers have been attacked at RIT within the last year. We expect Macintosh computers to be targeted more frequently in the coming months as they become more popular. Answer: A - Yes Macintosh computers have been attacked at RIT within the last year. We expect Macintosh computers to be targeted more frequently in the coming months as they become more popular.

Spyware According to the National Cyber Security Alliance, what percentage of home computers are infected with spyware? A.30% B.10% C.80% D.60% According to the National Cyber Security Alliance, what percentage of home computers are infected with spyware? A.30% B.10% C.80% D.60%

Spyware Answer: C – 80% According to the National Cyber Security Alliance, 80% percent of home computers are infected with spyware. Answer: C – 80% According to the National Cyber Security Alliance, 80% percent of home computers are infected with spyware.

Spyware Which of the following methods does spyware use to install itself on an end user's computer? A.Bundling with free peer-to-peer file sharing programs B.Exploiting web browser vulnerabilities C.Viruses and worms D.All of the above Which of the following methods does spyware use to install itself on an end user's computer? A.Bundling with free peer-to-peer file sharing programs B.Exploiting web browser vulnerabilities C.Viruses and worms D.All of the above

Spyware Answer: D – All of the above It should come as no surprise that spyware installs itself on end user computers through all of the methods listed. Answer: D – All of the above It should come as no surprise that spyware installs itself on end user computers through all of the methods listed.

Digital Self Defense 101 Come see why over 300 of your colleagues have attended DSD 101. Visit for details. Come see why over 300 of your colleagues have attended DSD 101. Visit for details.

Phishing and Other Scams How many Katrina-related websites were there as of September 14, 2005? A.20 B.500 C.1000 D.4000 How many Katrina-related websites were there as of September 14, 2005? A.20 B.500 C.1000 D.4000

Phishing and Other Scams Answer: D – 4000 According to the FBI, there were more than 4000 Katrina-related websites as of September 14, Answer: D – 4000 According to the FBI, there were more than 4000 Katrina-related websites as of September 14, 2005.

Phishing and Other Scams According to the FBI, how many of the Katrina-related websites are believed to be scams? A.10% B.30% C.60% D.90% According to the FBI, how many of the Katrina-related websites are believed to be scams? A.10% B.30% C.60% D.90%

Phishing and Other Scams Answer: C – 60% The FBI expects as many as 60% of the Katrina- related websites to be scams. Answer: C – 60% The FBI expects as many as 60% of the Katrina- related websites to be scams.

Phishing and Other Scams Which of these statements are correct about Phishing? A.It increased from 14 attempts in August 2003 to over 4.5 million in November 2004 B.It does not affect Macintosh users C.It is not a problem for users on the RIT network D.It is an outdoor recreational activity in Phinland Which of these statements are correct about Phishing? A.It increased from 14 attempts in August 2003 to over 4.5 million in November 2004 B.It does not affect Macintosh users C.It is not a problem for users on the RIT network D.It is an outdoor recreational activity in Phinland

Phishing and Other Scams Answer: A – Rise in Phishing Phishing is increasing dramatically and may affect users of any type of computer on any network. Its object is to trick users into revealing personal information they wouldn’t normally reveal. Answer: A – Rise in Phishing Phishing is increasing dramatically and may affect users of any type of computer on any network. Its object is to trick users into revealing personal information they wouldn’t normally reveal.

New this Fall! Digital Self Defense 102 training for Windows users. You’ll learn how to: –Download patches and enable Auto-Update –Create limited user accounts –Use antivirus (McAfee) –Use a firewall (Windows and ZoneAlarm) –Use anti-spyware (Spybot and Microsoft) Digital Self Defense 102 training for Windows users. You’ll learn how to: –Download patches and enable Auto-Update –Create limited user accounts –Use antivirus (McAfee) –Use a firewall (Windows and ZoneAlarm) –Use anti-spyware (Spybot and Microsoft)