CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
POSSIBLE THREATS TO DATA
SECURITY CHECK Protecting Your System and Yourself Source:
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Computer Viruses.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
 Lesson 05: Computer Maintenance. Keep Software Up-To-Date Patches Security Holes Improves Software Stability Improves Software Performance Adds.
Quiz Review.
Viruses & Destructive Programs
Information Security Information Technology and Computing Services Information Technology and Computing Services
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
10 Tips for keeping MCL safe 1. Set up your defenses. Do you have adequate firewalls and antivirus software to protect you from hackers who could steal.
Protecting Your Computer & Your Information
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Keeping Information Safe Task 4. Basic security measures Passwords Change password on regular basis Do not use names or words easily linked to yourself.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Company LOGO Malicious Attacks Brian Duff Nidhi Doshi Timmy Choi Dustin Hellstern.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
What is a Virus? A computer virus is like a little program that can copy and paste itself onto other computers and infect them, getting rid of documents.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Computer security By Isabelle Cooper.
Topic 5: Basic Security.
What is Spam? d min.
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Computer Skills and Applications Computer Security.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Information Systems Design and Development Security Risks Computing Science.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
Computer Security Keeping you and your computer safe in the digital world.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Viruses & Destructive Programs
An Introduction to Phishing and Viruses
IT Security  .
Unit 4 IT Security.
CS101 Security.
Protect Your Computer Against Harmful Attacks!
Top Ten Cyber Security Hygiene Tips
CS101 Security.
How to keep the bad guys out and your data safe
CS101 Security.
Presentation transcript:

CS101 Lecture 14 Security

Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you are connected to a network

Safe computing tips Number One Best Security Method: Move away from the herd by using less popular software to access network functions Be smart when using a computer Make sure operating system is up-to-date Make sure all software used on network is up-to-date Access internet from standard user account Follow the rest of the advise in this presentation.

4 Areas To Secure 1) Your Computer 2) Your Network Interaction 3) Yourself 4) Your Data Elsewhere

Securing Your Computer

What can happen to my computer? Your computer can be attacked by: –Hackers –Legitimate Software –Malware –Thieves

Hackers Originally “hacker” referred to someone who wrote programming code. Now it is mostly used to refer to someone who tries to break into computers electronically. Now most hacking is automated. Most people who are hacked do not realize they have been hacked.

How can I protect my computer from hackers? Follow safe computing practices Install software and hardware (router) firewalls and then teach firewall and keep up-to-date.

Legitimate Software Spyware Dialer Remote Control Software Other

How do I protect myself from Legitimate Software? Follow safe computing practices Install malware detection software and keep software up-to-date

Malware Virus –Sneaks from computer to computer and copies self to disk. Can move about in many forms but most popular are as an attachment or infected web page image Trojan Horse –Purports to perform one function but actually performs another less desirable task. Usually the program is knowingly installed by the user Worm –Sneaks from computer to computer and copies itself into RAM. Can move about in many forms but most popular is to move about large networks Rootkits –A rootkit is malware which consists of a program (or combination of several programs) designed to take fundamental control (in Unix terms "root" access, in Windows terms, "Administrator" or "Admin" access) of a computer system, without authorization by the system's owners and legitimate managers.

How do I protect myself from malware? Follow safe computing practices Install malware detection software and keep software up-to-date Add threat detection software

Thieves Use your computer when it is unattended Steal computer

How do I protect against thieves? Use screensaver with password to wake computer Turn on OS login and have it require a password for computer access Turn on BIOS security and have it require a password for computer to boot Encrypt sensitive information stored on your hard drive Add LoJack Software Lock down computer with security lock Get laptop insurance

Securing Your Network Interaction

What can happen to me when using a network? Information you send out on a network can be intercepted You can be diverted by phishing attacks etc.

How can I secure the information I send out on a network? Follow safe computing practices Make sure your connection to the network is secure Make sure that any important information you send out on a network is in encrypted form (scrambled) before it is sent Treat any unencrypted information transmitted as if it was on a postcard Use anti-phishing software Change your DNS to Google Never open or click on any item you are not 100% sure of Bookmark all web sites you need to access securely

Securing Yourself

How can I be a security risk? You do not do all the other security items listed in this PowerPoint Practice bad password practices Fall for human engineering attacks

How can I protect myself from social engineering? Use good password practices Treat any request for information as suspicious and either ignore or verify request via an independent method Treat any offer that sounds to good to be true as suspicious Use anti-phishing software.

Securing Your Data Elsewhere

What can happen to the information you no longer control? Once information is contained outside of your direct control you must protect yourself from it being used in inappropriate ways such as identity theft

How do I protect information I do not control? You can’t You can stop them from doing anything with the information Freeze your credit at all 3 credit reporting agencies and/or add an identity protection service that helps with the cleanup. Subscribe to a monitoring service.