Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.

Slides:



Advertisements
Similar presentations
Transfer Content to a Website What is FTP? File Transfer Protocol FTP is a protocol – a set of rules Designed to allow files to be transferred across.
Advertisements

Unit 11 Using the Internet & Browsing the Web.  Define the Internet and the Web  Set up & troubleshoot an Internet connection  Categorize webs sites.
How the Internet Works Course Objectives Introduce the various web browsers Introduce some new terms Explain the basic Internet to PC hookup  ISP  Wired.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Protecting Yourself Against Identity Theft TSCPA Member Name, CPA Firm/Company Name.
Software programs that enable you to view world wide web documents. Internet Explorer and Firefox are examples. Browser.
Introducing K12Planet.com What is K12Planet.com? Who can access it? Is it secure? What do I need to use it? Can I control the information I see?
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Aim: What strategies can we use to keep our financial information safe online? Do Now: What do you do to protect your information online?
Configuring your Home Network Configuring your Home Network Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
Introduction E-Commerce is firmly established: –1997: $500M –2001: $50B Amazon.com: –First big online retailer –New business model: no brick-and-mortar.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Security Awareness: Applying Practical Security in Your World
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Unit 28- Website Development Assignment 1- THEORY P3
ONLINE SHOPPING BY ROMIL SOMAIYA FOR CLASH GROUP community LEICESTER ARTHERITIS SELF HELP ©
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Internet safety By Lydia Snowden.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
Computing Concepts – Part 2 Getting Started with Applied Computer Concepts Computing Concepts: Part 2 1.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
The Office Procedures and Technology
A look at networking and its main components. NETWORK A network is a group of connected computers that allow people to share information and equipment.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
3.3 Internet Services. Overview Demonstrate knowledge and understanding of the following internet services and describe the advantages and disadvantages.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Chapter 10B Doing Business in the Online World.
Internet Security for Small & Medium Business Week 6
Course ILT Internet transactions and security Unit objectives Learn how to purchase goods online by using credit cards and Web-based forms Describe the.
WIRELESS CONNECTIONS & E-COMMERCE. Presentation Credits “Introduction to Computers” by Peter Norton “Using Information Technology” by V. Rajaraman.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Chapter 9B Doing Business in the Online World.
PLUG IT IN SIX Protecting Your Information Assets.
Networked Information Systems Network Security. Network Physical Security File server failure can severely affect network users. Server security: Locked.
Networks.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
Networking Components Michelle Vega Network System Administrations LTEC /026 Mr. West.
McLean HIGHER COMPUTER NETWORKING Lesson 8 E-Commerce Explanation of ISP Description of E-commerce Description of E-sales.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Data Security.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Networking Basics Objectives: 1. Utilize appropriate vocabulary to communicate effectively in a technological society. 6. Describe uses of a networked.
NETWORKING & SYSTEM UPDATES
Computer Hardware Software, Memory & Storage Internet & EthicsPowerPoint
Networking E-commerce. E-commerce ► A general term used to describe the buying and selling of products or services over the Internet. ► This covers a.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
SMART SHOPPING ONLINE. VOCABULARY: 30 Day Rule: merchants ship goods within 30 days or inform the customer of delays and their right to cancel the order.
.  Hubs send data from one computer to all other computers on the network. They are low-cost and low-function and typically operate at Layer 1 of the.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Any criminal action perpetrated primarily through the use of a computer.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Protecting Yourself Against Identity Theft A Financial Literacy Presentation by.
Home Business Shopping Online – Purchasing goods and services using the Internet.
Dr. Pipat Sookavatana. IT for Business Communication and Information Exchange Web access File and Printer Sharing Information Access Advertisement.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
START. A room full of computers Two or more computers connected together in order to communicate A computer that can communicate with every living thing.
Why Does The Site Need an SSL Certification?. Security should always be a high concern for your website, but do you need an SSL certificate? A secure.
Hotspot Shield Protect Your Online Identity
TECHNOLOGY GUIDE THREE
Doing Business in the Online World
Browsing and Searching the Web
Using a Computer Network
Network Models, Hardware, Protocols and number systems
Unit 4 IT Security Kerris Davies.
Internet.
Presentation transcript:

Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part 2 Presenter, Title University of ________________ 9/22/2015Security Squad Video Series

9/22/2015Security Squad Video Series The Security Plan Plan Overview

Inventory – Tallying What you Have Passwords – Creating Strong Passwords Backups – Making Secured Copies Viruses – Protecting Your Office from Malware Wireless – Limiting Your Exposure Firewalls – Stopping Hackers at the Door E-commerce – Buying and Selling Safely Online Employee Policies – Protecting the Company and Employees Security Plan Topics 9/22/2015Security Squad Video Series

9/22/2015Security Squad Video Series WirelessWireless Limiting Your Exposure

Wireless Network security protocols Public vs. private networks Encryption levels – WPA2 – MAC identification Web interface agreement Broadcast network? Key Points – Wireless 9/22/2015Security Squad Video Series

Wireless Devices Bluetooth settings – Recognize connections – Encryption software Wireless printers Key Points – Wireless 9/22/2015Security Squad Video Series

9/22/2015Security Squad Video Series FirewallsFirewalls Stopping Hackers at the Door

Hardware Firewalls Install on the cable or DSL Uses a web-based interface Inexpensive can be combined with routers Network server behind firewall Key Points - Firewalls 9/22/2015Security Squad Video Series

Software Firewalls Install on every computer Turn on pre-installed firewalls Commercial software Use only one software firewall Applications require firewall permissions Key Points - Firewalls 9/22/2015Security Squad Video Series

9/22/2015Security Squad Video Series FirewallsFirewalls What is your current firewall protection? Do you have hardware/software protections? Is the firewall activated? Who’s in charge of backing up files?

9/22/2015Security Squad Video Series E-commerceE-commerce Buying and Selling Safely Online

Secured Socket Layering (SSL) Identifiers Locked padlock will appear in the browser status, or Green safety bar will appear in the browser address bar, and URL address will begin with instead of the usual Key Points – E-Commerce 9/22/2015Security Squad Video Series

Website Authenticity 3 rd Party verification – Security protocols – Company – Domain name $$$ to $$$$ Purchase services Key Points – E-Commerce 9/22/2015Security Squad Video Series

Include company contact information Privacy Policy Internal policy for record keeping and disposal No credit card information in , mail Limit employee exposure Work with ISP and merchant account rep. for best credit card security. Good Practices - E-Commerce 9/22/2015Security Squad Video Series

Cookies – Advantages – Plugs in information, saves time – Personalizes website Disadvantages – Auto-fills sensitive information Store or not-to-store Do not have browser store passwords Good Practices - E-Commerce 9/22/2015Security Squad Video Series

9/22/2015Security Squad Video Series E-CommerceE-Commerce What are your website e-commerce protocols? Do you have encryption protections? Is your website trusted by your customers? Do you have good online purchasing practices?

9/22/2015Security Squad Video Series Employee Policies Protecting the Company and Employees

Business Owner Responsibilities – Administrative Rights – Evaluate employee access rights – Encrypt sensitive files – Complete Inventory list Key Points – Employee Policies 9/22/2015Security Squad Video Series

Employee Technology Rules – Approved File portability – Work from home policies – Smart phone/PDAs – Secure the workspace – Employee training Key Points – Employee Policies 9/22/2015Security Squad Video Series

/Internet Use – Monitoring – Acceptable Internet Use policies – Illegal activity and consequences Key Points – Employee Policies 9/22/2015Security Squad Video Series

Handling Sensitive Data – Secure sensitive documents – Cross-cut shredder – Credit Card procedures Key Points – Employee Policies 9/22/2015Security Squad Video Series

9/22/2015Security Squad Video Series Employee Policies Review your employee technology use policies Are they applicable and current? Are they attorney reviewed? Do they reflect new security policies and practices?

Security Squad – Part 2 Contact: _________________________ _________________________ 9/22/2015Security Squad Video Series