Information Security in an Introductory Course. Introduction Kathy Winters University of Tennessee at Chattanooga Department of Computer Science and Engineering.

Slides:



Advertisements
Similar presentations
Review Ch. 3 – Connecting to the Worlds Information © 2010, 2006 South-Western, Cengage Learning.
Advertisements

Putting It All Together 1.  Maintaining a Hard Drive Ch 4 Lab  Hardware cleaning tips ▪ Microsoft Tips Microsoft Tips ▪ Computer Hope Tips Computer.
9/20/07 STLSecurity is Everyone's Responsibility 1 FHDA Technology Security Awareness.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
Lecture 22: Internet Security Intro to IT COSC1078 Introduction to Information Technology Lecture 22 Internet Security James Harland
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Internet Security In the 21st Century Presented by Daniel Mills.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Computer Security: How to Protect Your Computer By Roopa Mathur Computer Information Management Irvine Valley College
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Computing Concepts – Part 2 Getting Started with Applied Computer Concepts Computing Concepts: Part 2 1.
A First Course in Information Security
© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
You, Me & Technology. Overview Technology –Our relationship with technology Threats –What, Who, When, Where, Why & How Protection –What we can do to protect.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
IT security By Tilly Gerlack.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
Advanced CIS NAME: ___________________. OBJECTIVE: Maintaining, Managing, and Troubleshooting Systems Maintenance includes following established procedures.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
7 Information Security.
Lecture Computer Security Ports, Firewalls, Passwords, and Malware.
Review 2 Chapters 7, 8, 9. 2  Define a network and its purpose.  Explain how communications technologies are used in our every day lives.  Understand.
3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook.
1/19/2010Cyber Security Spring 2010 Introduction to Cyber Security Lab CS460 Susan Hinrichs Spring 2010.
Data Security Overview. Data Security Periphery –Firewalls –Web Filtering –Intrusion Detection & Prevention Internal –Virus Protection –Anti Spy-ware.
 Introduction to Computing  Computer Programming  Terrorisom.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
1 C12 - March 19, 2008 Business 54 - Introduction to eCommerce Spring 2008 C12 - March 19, 2008.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
COLLEGE OF COMMUNICATION AND INFORMATION FLORIDA STATE UNIVERSITY PRESENTED BY THE I.T. LEADERSHIP TEAM: EVAN MILLER JOAQUIN COSTON RICHARD KIRK SHANNON.
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Privacy, Security and Ethics
By Jessica Parkinson. Mobile phones have allowed our generation to connect with others all over the world. However, the potential threats are numerous,
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
SECURITY ISSUES. TYPES BLUE JACKING SENDING MESSAGES TO OPEN BLUETOOTH CONNECTION VIRUSES HARMFUL PROGRAMS THAT SPREAD WITHIN DIGITAL DEVICES COOKIES.
Technology and You Chapter 7. Definitions: complete the definition for the following terms. Hardware Central Processing Unit (CPU) USB Flash Drive Peripherals.
Cybersecurity Test Review Introduction to Digital Technology.
NGfL CYMRU GCaD NEXT. NGfL CYMRU GCaD On the next slide choose a number and work out the definition in response.
Koji OKAMURA Cybersecurity Center, Kyushu University Advanced Cybersecurity Education Course Program using Cyber Range.
IT has had a big impact social in many different ways. Facebook is a social networking site that allows people to communicate and stay in touch with friends.
Lesson 3 Human Computer – Part 2 To understand the term “back-up” and why it is needed To explore the different methods of data storage and how we can.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Technological Awareness for Teens and Young Adults.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
ASH INFO 103 E NTIRE C OURSE W ITH F INAL Check this A+ tutorial guideline at For more classes.
Safety.
IT Security  .
Lecture 5. Security Threats
Network security threats
Lecture-16(B) Taking Protective Measures
Norton.com/Setup | +1(844) | Norton Internet Security
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web Lecture 4 This material was developed by Oregon.
Philip Nichilo Vincent Carestia
Level 2 Diploma Unit 11 IT Security
Computer Security.
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Computer Science Courses in the Major
Presentation transcript:

Information Security in an Introductory Course

Introduction Kathy Winters University of Tennessee at Chattanooga Department of Computer Science and Engineering Coordinator of Computer Literacy Lecturer – Java, Information Security, Capstone

Introductory Course Definition Depends 2 or 4 year school Course of study Web development Information Technology Information Management Computer Science Service Course

Questions To Be Answered What do we teach? When do we teach it? Who do we teach it to?

Routine / Traditional / Minimal > Passwords/ID > Malware > Theft of Computer > Spyware & Pop ups > Secure Connections > Spam > Firewalls > Service Pack Updates > Cookies > Encryption > Data Backups > Phishing

What Do We Teach Social Engineering Shoulder surfing Thumb drives Technicians Clean people Students in the lab Not closing our applications Giving away our info

What Do We Teach Social Networks Dangers of sharing information Future employers are using these to screen applicants Posting pictures of our families with identifying information Impersonation

What Do We Teach Internet searches Know the source – Is it reliable Wikipedia Source for papers Source of code Does it contain a virus Copyright violations Music, games

Consolidation of Data Search patterns Google Open docs Data mining

Other General Topics Sexting????

What Do We Teach Web Design Classes Cleaning input Input size checking Special character checking SQL injection

What Do We Teach Networking Security issues History and why Basics of securing wireless transmissions Encrypted transmission

What Do We Teach Programming Classes Buffer overflows Secure coding Defensive programming Trap doors Testing