September 2007 General Security Basics Your Responsibilities for Safe Computing.

Slides:



Advertisements
Similar presentations
Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Advertisements

Primary Threats to Computer Security
Thank you to IT Training at Indiana University Computer Malware.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
For further information computersecurity.wlu.ca
INTERNET SAFETY FOR EVERYONE A QUICK AND EASY CRASH COURSE.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
Windows Security Larry MacPhee Why Security Matters Public nuisance Loss of productivity –The cost of spam!The cost of spam! Loss of data.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
INTERNET SAFETY FOR EVERYONE
GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.
 Lesson 05: Computer Maintenance. Keep Software Up-To-Date Patches Security Holes Improves Software Stability Improves Software Performance Adds.
Lesson 10 Operating System Customization
New Data Regulation Law 201 CMR TJX Video.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
Stay Safe & Secure Online. Outline Passwords Everyday Security Security Physical Security Protecting Personal Information.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Computer Security Preventing and Detecting Unauthorized Use of Your Computer.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
Computer Security By Rachel Gaines. Computers are used for work, play, and everything in between. So here’s how to keep it fun and protected.
Computer Security 2 Keeping your computer safe. Computer Security 2 Computer Security 2 includes two lessons:  Lesson 3: Protecting yourself and your.
Digital Citizenship Project. Netiquette Do’s -Read before you post messages. -Try to keep your postings brief and easy to read. -Be kind when others make.
Viruses Hacking Backups Computer safety... Viruses A computer virus is a piece of program code that makes copies of itself by attaching itself to another.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
The Microsoft Computing Safety Index 1. Background Microsoft’s objective: Quantify consumer perceptions of Internet safety, security and privacy Construct.
For brownies this PowerPoint will help you understand computer viruses and help stop them!!!!
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Computer Safety Sid Holder 8k Viruses Hacking Backing Up.
INTERNET SAFETY FOR KIDS
Computer Security By: Alex Metzler. Table of Contents Protecting Your Personal Info Know Who You’re Dealing With Use Updated Security Software Update.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
What is Spam? d min.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Internet safety By Suman Nazir
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
Computer Hope Copyright © Cannady ACOS. All rights reserved. (R1: July 2011)
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
A Quick and Easy Crash Course Internet Safety for Everyone.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
INTERNET SAFETY FOR EVERYONE
Managing Windows Security
How to build a good reputation online
Home Computer Security
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Internet Safety for Everyone
Computer Security.
Internet Safety for Everyone
Internet Safety for Everyone
Internet Safety for Everyone
Cybersecurity at WAJ What is it? Are we at risk?.
Presentation transcript:

September 2007 General Security Basics Your Responsibilities for Safe Computing

September 2007 Agenda 1. Change Your Mindset 2. Patch Frequently 3. Antivirus, Firewall and Spyware Protection 4. Passwords, Laptops and Backup Data

September 2007 Change your Mindset “Let us not look back in anger or forward in fear, but around in awareness.” — James Thurber “The user's going to pick dancing pigs over security every time.” — Bruce Schneier

September 2007 Why Should You Care?  What does the audience think?  Quite simply, you should care about computer security because it will save you time in the long run.  In addition, your home computer is a popular target for intruders.

September 2007 What They are Looking For  The average Internet miscreant doesn’t care about your research or  Looking for credit card numbers, social security number and more personal information  Loves new operating systems that are behind on security patches

September 2007 Security Patches  Operating systems (Windows, Mac, Linux) have patching tools that automatically request vendor-supplied patches  Up to the user to tell how frequently you want to check for updates and have them installed  At CVM we approve these on your behave (yellow shield in the System Tray)

September 2007 Antivirus software and firewall  CITES offers free antivirus and spyware protection  Keep it up to date and turned on  Antivirus software available for personal use  Latest OS comes with built-in basic firewall

September 2007 Spyware  What is spyware?  Spyware is malicious software that can track your computer's Web usage, slow your system to a halt, and in some cases even report personal information like passwords and credit card numbers to unauthorized sites.  Spyware is different than viruses, and is spread differently. However, like viruses, spyware most frequently targets the Windows family of operating systems.

September 2007 Passwords Safety  Guard your passwords. Choose a password that's hard to guess but easy to remember and memorize it.  If you absolutely must have a written copy of your password, do not leave it anywhere near your computer and do not include your NetID or what application it is for on the same piece of paper.

September 2007 Laptops  Laptops = Convenient mobile devices and large security risk  Try not to keep important or personal data stored of the laptop’s physical hard drive.  Save it to external hard drive to isn’t mobile or on a secured network.  Wireless communication and internet sharing

September 2007 Backup your data  Backing up your system data regularly is an important part of overall security strategy.  Provides you with peace of mind if anything were to happen to your computer  Do you have a “spare tire”? A way to continue computing when you have a “blowout” caused by a malfunction or an intruder

September 2007 Questions Any Questions???