Security 101 Harper P. Johnson Information Technology Services Director of Information Security.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Keep Your PC Safe (Windows 7, Vista or XP) Nora Lucke 02/05/2012 Documents - security.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
10 Things You Can do to Secure Your PC Presented by Peter Nowak OIS Client Services Manager.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
SECURITY CHECK Protecting Your System and Yourself Source:
1 Identity Theft and Phishing: What You Need to Know.
PC Security 101 Keeping your data and your computer safe.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Computer Viruses.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
ONLINE SAFETY Online safety Money Works: Level 1 Topic 3.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Network & Computer Security Training.  Prevents unauthorized access to our network and your computer  Helps keep unwanted viruses and malware from entering.
Windows Security Larry MacPhee Why Security Matters Public nuisance Loss of productivity –The cost of spam!The cost of spam! Loss of data.
Use computer and internet safely Dave Dai Computer security Malware Virus: a program that copies itself and infect a computer without permission.
Security. Physical security Protection from fire/water Protection from dust and extremes of temperature.
How It Applies In A Virtual World
Threats to I.T Internet security By Cameron Mundy.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Protect Your Computer from Viruses and Other Threats! 1. Use antivirus software. 2. Run Windows updates. 3. Use a strong password. 4. Only install reputable.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.
Learning In A Techno World How Safe is Your Cyberspace?
IT Security for Users By Matthew Moody.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Stay Safe & Secure Online. Outline Passwords Everyday Security Security Physical Security Protecting Personal Information.
Staying Safe Online Keep your Information Secure.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
IT security By Tilly Gerlack.
Donette Mullinix ED 505 UWA Clipart:
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
safety Bailey mullan. dangers ing has become on of the main sources for communicating. When using it is more likely for someone.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
Cybersecurity Test Review Introduction to Digital Technology.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Computer Security Sample security policy Dr Alexei Vernitski.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Computer Security Keeping you and your computer safe in the digital world.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Unit 4 IT Security.
Home Computer Security
Protecting Your Identity:
HOW DO I KEEP MY COMPUTER SAFE?
Bethesda Cybersecurity Club
Presentation transcript:

Security 101 Harper P. Johnson Information Technology Services Director of Information Security

Security 101 Confidentiality Integrity Availability At the Intersection: Secure Productivity

Security 101 Identity and Information Theft

Passwords Weak passwords cracked in seconds Don’t use common words or text phrases Choose a combination of letters, numbers, caps/lowercase, and non-alpha-numeric (Special characters) Sharing is bad (sorry)

SPAM Don’t be a spam zombie

Viruses Previous: Viruses written by anti-social misfits Current: financial gain, hackers-for-hire write viruses Deliver infected machines to spammers Going rate: $600 per 10,000 machines per week If you don’t know the source don’t click it, delete it

Phishing Affected up to 4.7% of Americans (1.78M) “Phishing”: collecting private info through various scams, ~ 3.2% of current s Exploding: $1.2B toll to US banks, credit card companies, now more regionalized Desired success rate: 3% Typical: starts with purporting to be from established company (eBay, bank, etc.) For more info:

Local Phishing sample Dear Customer, We are contacting you to remind you that our Account Review Team identified some unusual activity in your account. In accordance with Arizona State Savings & Credit Union's User Agreement and to ensure that your account has not been compromised, access to your account was limited. Your account access will remain limited until this issue has been resolved. We encourage you to sign on and perform the steps necessary to restore your account access as soon as possible. Allowing your account access to remain limited for an extended period of time may result in further limitations on the use of your account and possible account closure. To view and perform the verification process, please click on the link below: Arizona State Savings & Credit Union is committed to maintaining a safe environment for our customers. To protect the security of your account, our bank employs some of the most advanced security systems in the world and our anti-fraud teams regularly screen the Online Banking system for unusual activity. Thank you for your prompt attention to this matter. Please understand that this is a security measure meant to help protect you and your account. We apologize for any inconvenience. Sincerely, Arizona State Savings & Credit Union, Customer Service.

Real site

Sample Phishing site

Sample phishing information

Desktop/Laptop Security S-A-F-E S oftware Updates A ntivirus Protection F irewall E radicate Spyware

Software Updates –Top priority in securing your PC. –Most obvious are Windows & Office Updates. –Most updates close security “holes” in software products

Antivirus A ntivirus Protection –Lots to choose from! –What to look for when selecting a product: Able to scan as well as hard drive Able to create a scan schedule Able to automate the update process Price Bundled with other things (OneCare) –NAU provides to Faculty and Staff

Firewall –A primary method for keeping a computer secure from intruders –Built into recent versions of major OS Windows XP SP2 Mac OS X –Limits network traffic in and out of your computer –Wireless networks at home? Firewall (usually comes turned off) Limit access to your MAC addresses

Spyware E radicate Spyware –What spyware is Malicious software Intercepts or takes partial control of a computer's operation Without the knowledge or consent of that machine's owner –What spyware does The not-so-bad –Monitors where you go online –Marketers The really bad –Can give someone else control of your computer –Can record keystrokes

Physical Security

Lock/Log Off/Turn Off –Lock when you walk away –Log Off overnight –Turn Off for the weekend –Lock your office door Back Up and Clean Up –Prevent Lost work and productivity –Don’t dispose of old computers unless properly degaussed

Incident Reporting Know your local contacts Other national sites: For everyone: For Parents and kids: For Phishing: – Arizona: – s_and_links.htmhttp://gita.state.az.us/security/security_web_site s_and_links.htm ID Theft: Spam:

Summary –Be cautious and think before providing personal data –Protect your passwords –Update frequently (automatically!) Home and Office –Use your antivirus software & keep it updated If you don’t have it, get it! –Scan for spyware frequently –Have a firewall in place –Remember physical access restrictions