Protecting Our Personal Space Security in a Virtual World by David Hines - Information Security Officer

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

The Internet = A World of Opportunities Look whats at your fingertips A way to communicate with friends, family, colleagues Access to information and.
How to protect yourself, your computer, and others on the internet
Stay Safe Online in Six Steps Presented by: Scott Rhinehart 540 Lake Center Parkway, Suite 102 Cumming, GA Office: ext Fax:
Security at Home The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
The Internet.
SECURITY CHECK Protecting Your System and Yourself Source:
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Starter for 10 Unit 3: Stay safe online Transform IT SFT03_stay_safe_online.
Teenagers and The Internet Ms Julie Clune Saint Ignatius’ College.
The Internet = A World of Opportunities
Social Networking Systems: Education Awareness Briefing.
How Secure Are You When You Use the Internet?. Overview What is the Internet? And what it is commonly used for? o Parents vs. Teens/Kids Use Ways of accessing.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Steve Riley Sr. Security Strategist Microsoft Trustworthy Computing Group SEC303.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
INTERNET SAFETY FOR STUDENTS
Protecting Our Personal Space Security in a Virtual World.
What Every Parent Needs to Know! Internet Safety Information for Parents Purpose: Provide practical information parents can use at home Present safety.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Have Fun, Be Safe Strategies for Internet and Social Media Safety.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Staying Safe Online Keep your Information Secure.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, + colleagues.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Spyware By: Sydney Langley. Spyware Is software installed on your computer without your consent Spyware monitors or controls your computer use.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Computer Security! By Bailey Hoover. Opening: “Computer viruses are an urban legend.” -Peter Norton Actually: Virus: software reproduces itself; causes.
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Information Security Sharon Welna Information Security Officer.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
Malware & Phishing By: mackenzie olson. Internet fraudsters send out spam, pop-ups, appealing websites, and desirable downloads.
Suggestions for Parents Take the time to see what your kids are doing online and what their interests are. Let them teach you about the Internet. Surf.
Cyber Security and Staying Safe Online Mark D. Riley College of Health Sciences and Professions.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Internet safety By Suman Nazir
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
Safe Computing Practices. Outline Objective Safe Computing Defined Safe Computing Methods Summary List of References.
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Internet Safety.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Unit 4 IT Security.
Protect Your Computer Against Harmful Attacks!
Internet Safety – Social Media
Presentation transcript:

Protecting Our Personal Space Security in a Virtual World by David Hines - Information Security Officer

Protecting Our Personal Space2 Computer Security at home Phishing Keeping your children safe Resources for more information

Computer Security at Home Why secure your home computer?

Would you leave your doors open?

Protecting Our Personal Space5 What Resources Do They Want? Personal information Computer resources

Protecting Our Personal Space6 What Resources Do They Want? Personal information –PII –Credit Card numbers –Bank Account numbers

Protecting Our Personal Space7 What Resources Do They Want? Computer resources –Internet connection – bandwidth –PC

Protecting Our Personal Space8 How Do They Get to Your PC? They Install “Malware” on your PC –Worms –Viruses –Trojan –Keyloggers –Backdoors

Protecting Our Personal Space9 How to keep your home computer secure

Protecting Our Personal Space10 The Basics of Cyber Safety 1.Keep your operating system updated 2.Install a software firewall – and keep it updated 3.Install an anti-virus and anti-spyware package – and keep it updated 4.Install a hardware firewall 5.Install and use a file deletion program

Protecting Our Personal Space11 What else? 1. practices a.Outgoing be careful with personal information b.Incoming be careful with attachments

Protecting Our Personal Space12 What else? 2.Be careful when downloading 3.If it is important – back it up! 4.Use strong passwords

Is it big business?

Protecting Our Personal Space14 Headlines – One week in October World Bank Hacked, Sensitive Data ExposedWorld Bank Hacked, Sensitive Data Exposed OCTOBER 10, Hacked Web servers, a stolen administrative account, and lot of unanswered questions Stolen E-Bay Accounts Found OCTOBER 13, A cache of 5,534 stolen eBay log-ins was discovered yesterday -- likely the result of successful phishing scams, researchers say. Feds Shut Down Major Spam Operation Feds Shut Down Major Spam Operation OCTOBER 14, Herbal King gang sent billions of spam messages pushing prescription drugs and phony male-enhancement products

Phishing – It Is Big Business A scam directing the recipient to click on a link that takes them to a website where they are prompted for personal information. The link and the website look authentic.

Protecting Our Personal Space16 Defend Yourself from Phishing Expeditions Be cautious about all incoming If it appears too good to be true... If it is suspicious, don’t click on any links, don’t open any attachments

Protecting Our Personal Space17 Defend Yourself from Phishing Expeditions - 2 DO NOT enter personal information in any pop-up screen If you must access the business, use your own bookmark

Children present unique security risks

Protecting Our Personal Space19 Keeping your children safe Keep your computer in a central and open location in your home and be aware of other computers your child may be using. Discuss and set guidelines and rules for computer use with your child. Post these rules by the computer as a reminder. Use the Internet with your child. Familiarize yourself with your child's online activities and maintain a dialogue with your child about what applications they are using. Implement parental control tools that are provided by some Internet Service Providers and available for purchase as separate software packages. Consider using software that allows you to monitor your child's and Web traffic.

Protecting Our Personal Space20 Keeping your children safe - 2 Know who your child's online friends are and supervise their chat areas. Teach your child never to give out personal information to people he or she meets online, such as in chat rooms or bulletin boards. Visit for detailed information.

Protecting Our Personal Space21 Resources Multi-State Information Sharing and Analysis Center Home Security: US-CERT Cyber Security Tips: Stay Safe Online: State Attorney General FBI FTC

Protecting Our Personal Space22 Resources – Is is a hoax? If you want to check the validity of an , there are Web sites that provide information about hoaxes and urban legends: Urban Legends and Folklore - Urban Legends Reference Pages - Hoaxbusters - TruthOrFiction.com - Symantec Security Response Hoaxes - McAfee Security Virus Hoaxes -

Protecting Our Personal Space23 Resources – Anti-Phishing  AntiPhishing Work Group :  OnGuard Online :  Federal Trade Commission :  National Consumer League's Internet Fraud Watch :  US CERT :  WatchGuard Video :

Protecting Our Personal Space24 Resources – Keeping Children Safe  National Cyber Security Alliance,  iKeepsafe.org,  staysafe.org,  i-Safe,  SafeKids.com,  Federal Bureau of Investigation,  Enough is Enough,

Protecting Our Personal Space Security in a Virtual World by David Hines - Information Security Officer