Cyber Security. Security – It’s About Layers There’s no one stop solution to protection Each layer you add, an additional tool will be needed to pierce.

Slides:



Advertisements
Similar presentations
GCSE ICT Networks & Security..
Advertisements

1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
Online Learning and the Laptop Initiative Hidden Valley High School Roanoke County Public Schools 2006.
Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Mobile Devices and Wireless Tracy Jackson Liz Nenni Matt Hinson Chris Eiben.
10 Things You Can do to Secure Your PC Presented by Peter Nowak OIS Client Services Manager.
Mountain Lion Security Mac OS X Strong Passwords Every Mac needs a login name and password Every user on every Mac should have their own account.
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
For further information computersecurity.wlu.ca
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
9/20/07 STLSecurity is Everyone's Responsibility 1 FHDA Technology Security Awareness.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Configuring your Home Network Configuring your Home Network Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
Simple ways to secure Wireless Computers Jay Ferron, ADMT, CISM, CISSP, MCSE, MCSBA, MCT, NSA-IAM, TCI.
N ETWORK S ECURITY Presented by: Brent Vignola. M ATERIAL OVERVIEW … Basic security components that exist in all networks Authentication Firewall Intrusion.
Beyond WiFi: Securing Your Mobile Devices Thomas Kuhn Information Technology Assistance Center (iTAC) Kansas State University.
Data Security Issues in IR Eileen Driscoll Institutional Planning and Research Cornell University
Chapter 7 Securing your Wireless Network (WIFI). Synopsis What is a wireless home network? What damage can a wireless network snoop do? Who are the snoopers?
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Wireless Security Focus on Encryption Steps to secure a Wi-Fi Network.
10 Essential Security Measures PA Turnpike Commission.
Mobile Phone Theft. Serving our communities and protecting them from harm Introduction Mobile Phone Theft There were an estimated 742,000 victims of mobile.
Securing a Wireless Network
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
10 Tips for keeping MCL safe 1. Set up your defenses. Do you have adequate firewalls and antivirus software to protect you from hackers who could steal.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Laptops, Notebooks, & Tablets, Oh My! Kathleen Hamby M.S. CBPA Governors State University.
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
ESCCO Data Security Training David Dixon September 2014.
Wireless Security: Protect yourself when you’re mobile.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
© CCI Learning Solutions Inc. 1 Lesson 5: Basic Troubleshooting Techniques Computer performance Care of the computer Working with hardware Basic maintenance.
Information Security Awareness Training. Why Information Security? Information is a valuable asset for all kinds of business More and more information.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Information Systems Security
STARTFINISH DisposePrint & ScanShareStore Protect information and equipment ClassifyProtect.
Wireless Network Security Presented by: Prabhakaran Theertharaman.
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
Started using security software on new Dell computers in mid-2004 Currently purchase 3 year licenses for desktop, laptop, and netbook computers Points.
Joel Rosenblatt Director, Computer and Network Security September 10, 2013.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Computer Security By Duncan Hall.
Network Security.  With an increasing amount of people getting connected to networks, the security threats that cause massive harm are increasing also.
Securing A Wireless Home Network. Simple home wired LAN.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
© 2010 Chevron Anti-Carjacking Lito Balanial Security.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Physical Security Concerns for LAN Management By: Derek McQuillen.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Brianne Stewart.   A wireless network is any computer network that is not connected with a cable  Many homes use this type of internet access  Less.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
Cyber Security: Today’s Threats and Mitigations Jonathan Homer, Cyber Security Analyst Idaho National Laboratory.
Digital & Internet Safety. Understanding your personal data Defining “Big Data” Protecting your data, computer & devices Avoiding identity theft.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Common Methods Used to Commit Computer Crimes
Contact Norton Support Canada for Firewall Issues.
Information Security Awareness 101
12 STEPS TO A GDPR AWARE NETWORK
Handling Information Securely
Presentation transcript:

Cyber Security

Security – It’s About Layers There’s no one stop solution to protection Each layer you add, an additional tool will be needed to pierce the layer We’ll show you some common vulnerabilities and the tools to layer up with

Wi-Fi Vulnerability 3 Main Tips for securing Wi-Fi at home –Hide Your Network SSID –Strong Password –Device Filtering

Wifi Tip 1 – Ninja Mode ON Why should you hide your network name? How do you hide your network name? How will you connect to it if you can’t see it?

Wifi Tip 2 – A Herculean Password Why are complex passwords important? How do I go about creating a strong, complex password? How can you remember these easily and have different ones for each website you use? security/password-checker.aspx

Wifi Tip 3 – Ask for ID Why should you limit the devices allowed on your network? How can you set this up at home? Where will I find the “MAC” address for a device?

Hardware & Software Firewalls What is a firewall, and why use one? What’s a hardware firewall? What’s a software firewall?

Types of Threats

In the News Maybe current events that can catch their attention??? miss-teen-usa-reacts-to-cyber-crime

Why is Cyber Security important? Direct Observation Interception of Data Transmission Electromagnetic Interception

Direct Observation- Requires that an individual be close enough to the information to breach confidentiality. Such as Shoulder Surfing

Interception of Data Transmission Attackers can access the media transmitting the data, they needn’t be anywhere near the source of the information. Such as Sniffers or tapping into your wireless network and keylogging

Electromagnetic Interception Electricity moving through cables emits electromagnetic signals ( EM). It is possible to eavesdrop on these signals and therefore determine the data carried on the cables without actually tapping into them. For example, Scientists have determined that certain devices with LED displays actually emit information encoded in the light that pulses in these LEDs.

Securing Mobile Devices Don’t leave a laptop in an unlocked vehicle, even if the vehicle is in your driveway or garage, and never leave it in plain sight, even if the vehicle is locked— that’s just invit-ing trouble. If you must leave your laptop in a vehicle, the best place is in a locked trunk. If you don’t have a trunk, cover it up and lock the doors.

Securing Mobile Devices Parking garages are likely areas for thefts from vehicles, as they provide numerous choices and cover for thieves. Again, never leave your laptop in plain sight; cover it or put it in the trunk. Do be aware of the damage extreme temperatures can cause to computers.

Securing Mobile Devices Carry your laptop in a nondescript carrying case, briefcase, or bag when moving about. Placing it in a case designed for computers is an immediate alert to thieves that you have a laptop. Never leave your mobile device unattended.

Securing Mobile Devices Apply distinctive paint markings to make your laptop unique and easily identifiable. Liquid white- out is a good substance to apply. Be aware that if your computer is stolen, automatic logins can make it easy for a thief to send inappropriate messages with your account.

Securing Mobile Devices Consider purchasing one of the new theft alarm systems specially made for laptops. Back up your information on disks today, and store the disks at home or the office. Install and update antivirus and firewall software. Password protect your screensaver Make sure your laptop is up to date with patches

Securing Mobile Devices Disable auto complete and password memory. Disable sharing of laptop services. Disable guest account and rename the administrator account.

Stop tags are small devices that are placed on the back of the LCD screen of your laptop. If this device is ever removed, it releases a chemical that will render the LCD unusable. It will also acid etch the words “Stolen Property” into the back plastics of the laptop. For more information visit:

Computrace is a radio frequency beacon that is placed internally within you laptop. If the laptop is stolen the company can remotely turn on this beacon. If the laptop is connected to any network for a given period of time the company is then able to track your laptop and help you recover it. If the laptop can not be found the company will refund you up to $1,000 for your loss.