Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
Security Training Lunch ‘n Learn. Agenda  Threat Analysis  Legal Issues  Threat Mitigation  User Security  Mobile Security  Policy Enforcement.
Part 2 of Evil Lurking in Websites Data Security at the University of Wisconsin Oshkosh.
Facebook Security and Privacy Issues Brian Allen Network Security Analyst Washington University December 2, 2010 Alumni House.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
How to avoid Viruses and Malware on your Computer Use a firewall Using a firewall is like locking the front door to your house—it helps keep intruders.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
1 Computer Security: Protect your PC and Protect Yourself.
Quiz Review.
THE WONDERFUL HISTORY OF COMPUTERS FROM THE BEGINNING HARDWARE, SOFTWARE,SAFTEY, AND COMPUTER ETHICS.
Securing Your Home Computer Presenter: Donnie Green Date: February 11, 2009 National Aeronautics and Space Administration
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Learning In A Techno World How Safe is Your Cyberspace?
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
ESCCO Data Security Training David Dixon September 2014.
Staying Safe Online Keep your Information Secure.
Web Browser Security Prepared By Mohammed EL-Batta Mohammed Soubih Supervised By Eng. Eman alajrami Explain Date 10. may University of Palestine.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
DIGITAL SECURITY PART 2 TOOLS. phising  Internet criminals can steal your personal and banking information without you ever noticing – they can do it.
Computer Security By Rachel Gaines. Computers are used for work, play, and everything in between. So here’s how to keep it fun and protected.
Types of Electronic Infection
Protecting Students on the School Computer Network Enfield High School.
Specialist communication channel. Sarah-Jane king.
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
Personal Online Safety Information Security Systems Community Outreach Program McKinley Middle School April 23, 2013.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Internet Security and Your Computer Welcome to Boot Camp.
What is Spam? d min.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Internet safety By Suman Nazir
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Computer Security Sample security policy Dr Alexei Vernitski.
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
Computer Security Keeping you and your computer safe in the digital world.
Windows Tutorial 5 Protecting Your Computer
Managing Windows Security
Unit 4 IT Security.
OWASP CONSUMER TOP TEN SAFE WEB HABITS
ISB Computer Security Training
ITS Security Training Fall 2017
Connecting Remotely Winter 2014.
9 ways to avoid viruses and spyware
Presentation transcript:

Security Awareness ITS SECURITY TRAINING

Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.  You are a primary target, or rather, your data and access are the target.  Gaining access to your personal data allows criminals to take your research or your personal information. It also allows them to impersonate you, or your computer, to gain access to other systems and data.

Security Basics  University Policies  Passwords  Browsing   Desktop and Mobile Device Security  Data Security and Encryption  Remote Access / VPN

University Policies  UM1337 – Data Access  UM1535 – Acceptable Use of IT Resources  UM1566 – Security and Protection of IT Resources  UM1691 – Campus Data Security  FERPA – Federal Educational Rights and Privacy Act  University Policies Site –

Passwords  Password Complexity  Hackers and tool kits anticipate patterns and context, so avoid words like “memphis” in your UofM password or “credit” on your credit card account.  Using personally identifiable information will also be anticipated, so avoid passwords containing words or names from your family and public record.  The University of Memphis enforces a standard set of complexity requirements.  Password Change Frequency  Frequency can be as important as complexity. Expired passwords are useless.  The University of Memphis currently enforces a 180 day expiration policy.  Password Reuse  Maintain different credentials per service. Hackers know it’s hard to keep up with multiple passwords. If they get one, they will use it against other services hoping to gain additional access. Never use your University of Memphis credentials with another service.  Password Management/Identity Vault  ITS will never ask you for your password.  Avoid writing passwords down or keeping them in a text file or document.  is not a password management system. Never your password to anyone (including yourself).  A password management utility is one option for storing personal passwords. Many exist that work on desktops and mobile devices. These encrypt your passwords and many will also help you generate nicely complex passwords.

Browsing Safe Browsing  Keep your browser software version up-to-date.  Keep any browser plug-ins up-to-date; especially Adobe Flash and Java, as these are targeted frequently.  Make use of pop-up and ad blockers.  Be careful when downloading software from the internet.  Social networking sites, by definition, collect, maintain, and share personal identification. Be mindful of this when interacting with these sites both on and off campus.  If a website requests user information of any kind, make sure that website is using HTTPS.  HTTPS is the secure web protocol. This can be seen in a web address such as This ensures that the specific web session between your browser and the https website is all transmitted in an encrypted manner.

Safe Browsing Confirming a secure connection (https) with Internet Explorer

Safe Browsing Confirming a secure connection (https) with Firefox

 Keep your program up-to-date.  Most programs do not encrypt your messages, subjecting them to possible interception by others.  Messages can contain a virus or other malicious software that could infect your computer or device  Never click on a link sent to you in an unless you are absolutely sure it is safe.  Never click on or download an attachment from an unless you are absolutely sure it is safe.  Be wary of from an unknown sender.  Use the “Report Junk” option to mark spam. Review/Empty your “Junk ” folder periodically.  The University of Memphis service (UMMail) includes special server tools to help recognize and quarantine suspicious .

Be wary of SPAM . Here is an example of SPAM:

 Phishing  A phishing attempts to fool a user into thinking it originated from a trusted person or business. These often contain web links or attachments asking for personal information or leading to a questionable web site that attempts to collect sensitive information.  Typically, phishing s appear to come from:  A trusted source, such as the University of Memphis  Co-workers, friends, or family  A “help desk” or “service desk”  Financial institutions  Social media sites

Examples of phishing s:

Desktop and Mobile Device Security  Never leave your laptop or device unattended.  Your PC/device should be set to automatically install security updates.  Have anti-virus and anti-spyware software installed and enabled.  Ensure your firewall is turned on and set to block all incoming traffic, allowing only the specific services you need.  The SafeConnect NAC (Network Access Control) requires users to login before accessing the campus network, and also ensures your PC has the latest security updates and anti-virus protection. Also, ITS performs periodic network scans to proactively remove threats.  Ensure access to your mobile device is protected with a passcode.  Consider using a remote tracking/wipe function if supported. For iOS devices, iCloud provides the “Find my iPhone” service for free.

Data Security and Encryption  Sensitive data should be encrypted whenever possible. Here are some examples:  Research data  Student data (FERPA)  Personally Identifiable Information  Financial Information  There are a variety of disk encryption methods available:  Microsoft Bitlocker (Windows)  Apple FileVault (Mac OSX)  Keeping sensitive data on campus servers alleviates the risk of a stolen mobile device or compromised home computer.  When disposing of old devices (desktops, laptops, flash drives, phones), ensure all sensitive data has been securely deleted.

Remote Access / VPN  VPNs provide secure, encrypted communication between off-campus devices and on-campus resources.  The VPN application is freely available and fully supported on Windows, Mac OSX, and iOS (iPhone, iPad) devices.  Some of the typical campus resources accessed via the VPN are Remote Desktop, Banner INB and departmental file shares.  Remote Desktop applications allow you to control your desktop PC from off-campus. This allows sensitive data to remain on campus.

Remote Access / VPN The following diagram illustrates how the VPN encrypts your network traffic. Note that only specific connections to on- campus resources are protected by the VPN tunnel.

Remote Access / VPN Install the client:

Open Discussion

THANK YOU! ITS Security