1 POST NO BILLS RIT Information Security RIT Information Security Office.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

SPYWARE Presented by The State Security Office November 17, 2004.
INTERNET SAFETY FOR EVERYONE A QUICK AND EASY CRASH COURSE.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Teenagers and The Internet Ms Julie Clune Saint Ignatius’ College.
1 I ntegrated S ite S ecurity for G rids © Members of the ISSeG Collaboration, 2008 See: ISS e G Computer Security: Advice for computer.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
INTERNET SAFETY FOR EVERYONE
Presented by INSERT NAME RIT Information Security digital self defense.
Digital Self Defense How well do YOU know Information Security? How well do YOU know Information Security?
1 Ben Woelk RIT Information Security Office Advancing Digital Self Defense Establishing a Culture of Security Awareness at the Rochester Institute of Technology.
GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.
Threats to I.T Internet security By Cameron Mundy.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Cyber Crimes.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Staying Safe Online Keep your Information Secure.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Safer Online Shopping and Practices Presenter: Brian Moats Students Active In Leadership.
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
What is Spam? d min.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Security and Ethics Safeguards and Codes of Conduct.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
A Quick and Easy Crash Course Internet Safety for Everyone.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
Computer Security Keeping you and your computer safe in the digital world.
INTERNET SAFETY FOR EVERYONE
Learn how to protect yourself against common attacks
Unit 4 IT Security.
Protect Your Computer Against Harmful Attacks!
Internet Safety for Everyone
HOW DO I KEEP MY COMPUTER SAFE?
Internet Safety for Everyone
Internet Safety for Everyone
Internet Safety for Everyone
Internet Safety for Everyone
Presentation transcript:

1 POST NO BILLS RIT Information Security RIT Information Security Office

2 Copyright and Reuse The Digital Self Defense logo is the property of the Rochester Institute of Technology and is licensed under the Creative Commons Attribution-NonCommercial-NoDerivs License. To view a copy of this license, visit or send a letter to Creative Commons, 559 Nathan Abbott Way, Stanford, California 94305, USA. To request permission for other purposes, contact The course materials are the property of the Rochester Institute of Technology and are licensed under the Creative Commons Attribution-NonCommercial-ShareAlike License. To view a copy of this license, visit or send a letter to Creative Commons, 559 Nathan Abbott Way, Stanford, California 94305, USA. To request permission for other purposes, contact

3 Welcome to RIT You’re not at home anymore. With freedom comes responsibility. RIT has requirements: –Code of Conduct for Computer and Network Use (C8.2) –Desktop & Portable Computer Standard –Password Standard

4 RIT Information Security We’re here to protect you and RIT We can’t do it alone; We need your help: –Practice ethical computing –Watch out for each other –Keep your computer protected

5 Computer Support –All RIT users must comply with the RIT Code of Conduct for Computer and Network Use. –Resnet provides computer support for students residing at RIT. ( Resnet users must also comply with the Residential Network Appropriate Use Policy. –The ITS HelpDesk provides support for YOU.

6 Not your Father’s Network Life on a university network –The Good, the Bad, and the Ugly The Good –Power you’ll find nowhere else Internet2 Very High Speed Internet Connection Wireless access One of the most wired universities

7 Threats on the Network The Bad –College campuses make big targets –RIT faces the same challenges as other large technology universities. –Threats on our campus: Password Crackers Key Loggers Harassment Sniffing/Network Monitoring Network Worms Hacking Attempts & Rootkits Physical Theft

8 Threats Beyond the Network The Ugly External threats Phishing & Identity Theft Spyware & Adware External Hacking Attempts Botnets/Zombie PCs 2004 was the first year that proceeds from cybercrime were greater than proceeds from the sale of illegal drugs…over $105 billion. -Valerie McNiven, US Treasury - Cybercrime Advisor

9 Phishing Common Phishing Methods – s that look like they come from banks, PayPal, or other official sources appealing to greed, fear, etc. RIT’s Brightmail anti-spam filters out more than 90% of the received at RIT. –Spoofed sites that look real –Even inside RIT isn’t the only technique! –Phones, IM, in person…

10 What if it happens to me? If you believe you’ve been the victim of some form of computer security incident… –Call the ITS HelpDesk at 475-HELP –Call Resnet at –Contact before you delete anything If you believe you’ve been the victim of identity theft… –Call Campus Safety at

11 Your Role Digital Self Defense is all about protecting yourself and others. –RIT Desktop & Portable Computer Security Standard –RIT Password Standard –Paranoia & Common Sense –Ethical Computing

12 Protect Your Computer There are many types of malware circulating on the Internet. The Desktop Standard requires you to protect your computer: –Patching –Firewalls –Anti-Virus –Anti-Spyware

13 Patching –Fixes “holes” in existing software –Provides a temporary fix until next major release –May add features –Protects you against security vulnerabilities –Prevents you from infecting others You need to –Turn on auto-updating

14 Firewalls –Monitor and protect your network connections to prevent unauthorized connections from being made. You must –Enable the Windows XP Firewall for minimum protection; for better protection download and install Zone Alarm (

15 Antivirus Antivirus programs –Are an absolute “must have” before going on the Internet One in 10 s may contain viruses (as high as 7 in 10 last year) –RIT provides free McAfee AntiVirus for Windows and Virex for Macs (start.rit.edu) You must –Install an antivirus product –Update daily, scan weekly!

16 Spyware and Adware Spyware is a huge problem. –Spyware is “tracking software deployed without adequate notice, consent or control for the user.” –Adware is “software that delivers advertising content in a manner… unexpected and unwanted by users.” You must –Install anti-spyware Spybot Search & Destroy ( and Lavasoft Ad-Aware ( You should –Use more than one program

17 How do you get Spyware? You can get spyware from Browser Vulnerabilities –Instant messenger links to exploit sites –Enticing web pages/common terms –Links in spam mail File Sharing Networks –Bundled with client software Trojans –Disguised as anti-spyware programs or other popular software

18 Passwords The RIT Password Standard requires you use a complex password and change it often. MINIMUM of 8 characters UPPER and lower case Anatomy of a Secure Password Mixed numbers and letters…* *or other characters allowed by your systems administrator

19 Paranoia or Common Sense? Guard your personal information! –Even less sensitive information can be used by an attacker! –Don’t post it in public places. –Make sure you know who you’re giving it to. Be suspicious of –Never click on a link in an . –Instead, open your web browser and navigate manually. –Contact the senders and make sure they sent the .

20 Paranoia or Common Sense? Physically protect your computer –Keep your computer and mobile devices secure at all times –Lock or log out of your computers when you leave the room –Don’t allow other people to use your computer unattended Know your computer! –YOU are the first line of defense—if something goes wrong, you’ll probably be the first to know –Know what devices are registered to you—YOU are held responsible

21 Ethical Computing According to a recent study on computer use & ethics at RIT: –32% of computer crime victims on campus knew their attackers –Of that 32%, over half said their attacker was either a friend or acquaintance. RIT Computer Use and Ethics Survey, 2003

22 But everyone does it! Unauthorized File Sharing –“More RIT students face piracy lawsuits…” - Rochester Democrat & Chronicle May 28, 2005 RIT is a high profile target. 35 RIT students were subpoenaed in a six-month period last year. Hundreds received “take-down” notices. Students have gone to jail for illegal downloading of music, movies, images, etc. The MPAA will sue you for hundreds of thousands of dollars. –The average out-of-court settlement is $4000. Check out the free RIT Ctrax music download service instead.

23 Cyberbullying Harassment –13-15% of RIT students report being harassed online from within and outside of RIT. –RIT prohibits online harassment. –YOU are LEGAL ADULTS. This isn’t high school. Consequences are severe. They include fines and jail time. Law enforcement will get involved when needed. –You don’t have to take it. Report it to Campus Safety and

24 Online Blogs Use them carefully –Guard your private information –Carelessness can lead to cyberstalking –Student Judicial and Campus Safety monitor blogs –Potential employers will check you out –The information NEVER goes away Even when you delete the blog, it is cached elsewhere on the Internet. "The biggest concern I have is that students are naive about ways in which that data can be harvested and used against them in the short, medium and long term, for a variety of malicious ways.“ - Sam McQuade, RIT Professor MSNBC, June 25, 2006

25 Will I be a Victim? 2 out of 3 students at RIT will be a victim of at least one form of computer abuse or crime. 1 out of 3 students at RIT will be a victim of multiple forms of computer abuse or crime. RIT Computer Use and Ethics Survey, 2003

26 Consequences Network Quarantine –You will be denied access to the network and may not be able to complete your assignments. Student Judicial Federal, State and Local law enforcement Yes, we ARE trying to scare you.

27 Questions & Comments Send questions to View this presentation at security.rit.edu