Instructional Technology & Design Office 217-244-4903 or 800-377-1892 Digital Security Basics Presented by Mark Baldwin &

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
September 2007 General Security Basics Your Responsibilities for Safe Computing.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Security for Seniors SeniorNet Help Desk
Your Trusted Partner In All Things IT. 20 Years of IT Experience University Automotive Food Service Banking Insurance Legal Medical Dental Software Development.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Safe computing and Malware Presentation done by Tylor Hardwick, Alex Gilsdorf, Code Forrester, Xander Winans.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.

About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
INTERNET SAFETY FOR KIDS
What is Spam? d min.
Cyber Security and Staying Safe Online Mark D. Riley College of Health Sciences and Professions.
Internet safety By Suman Nazir
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
5 different ways to get tricked on the internet. 1. Viruses A virus is a computer malware program that copies it’s files to the computer. This may allow.
Phishing Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money)
Cybersecurity Test Review Introduction to Digital Technology.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Managing Windows Security
Three steps to prevent Malware infection
What they are and how to protect against them
Unit 4 IT Security.
Name Job Title Library Name
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
ACROSS THE WORLD MCAFEE PROVIDING THE UPDATE PROTECTION SOLUTIONS TO THE COMPUTER USERS. AS SAME TO THE ERROR ABOVE, WAIT FOR FEW MINUTES AND THINK SOME.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
ACROSS THE WORLD MCAFEE PROVIDING THE UPDATE PROTECTION SOLUTIONS TO THE COMPUTER USERS. AS SAME TO THE ERROR ABOVE, WAIT FOR FEW MINUTES AND THINK SOME.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
ACROSS THE WORLD MCAFEE PROVIDING THE UPDATE PROTECTION SOLUTIONS TO THE COMPUTER USERS. AS SAME TO THE ERROR ABOVE, WAIT FOR FEW MINUTES AND THINK SOME.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Information Technology Services Education and Awareness Team
HOW DO I KEEP MY COMPUTER SAFE?
Information Technology Services Education and Awareness Team
Security in mobile technologies
Presentation transcript:

Instructional Technology & Design Office or Digital Security Basics Presented by Mark Baldwin & Brianna Walker

Objectives Gain an acquaintance with some of the basic terms and concepts related to personal web security Gain an acquaintance with some of the most common, easy-to-use security tools

Agenda Malware Types and how to defend against Phishing Tips for secure web browsing Passwords Extensions/add-ons Backups

Malware Some common types: Viruses Worms Adware Spyware Trojans Reasons behind an attack: Gather information Take control of a computer or network Crash/break a computer or network For fun (or the “lulz”)

Malware Protection Most important for Windows users (although mobile devices are beginning to be targeted more frequently) There can be only one Many great free options: Microsoft Security Essentials AVG Avast Install updates as they come Run it automatically, on a schedule if possible

Phishing What is it? From Wikipedia: “the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.” Can include phone/IM scams also (sometimes known as vishing or smishing) Be careful—investigate any site or individual that asks you for your password.

Secure Web Browsing: Passwords Strong Passwords: Don’t use dictionary words, pets’ names, birthdays Include caps, lowercase, numbers, and symbols Change often Avoid having your browser save your password Use different passwords for different sites Protect all devices that connect to the internet Use a password manager (e.g. LastPass, KeyPass, 1Password)

Secure Web Browsing: Extensions Browser add-ons/extensions: HTTPS Everywhere AdBlock Ghostery Be wary about, or avoid altogether, conducting sensitive business on public Wi-Fi (anything involving a financial transaction, for example)

Backups If you encrypt them, make sure you don't lose the password (e.g. iOS devices) Physical Hard drive (internal or external) DVD/CD Flashdrive Cloud Dropbox, Google Drive Crashplan

Further Resources Bookmark the following URL to review the some of the resources mentioned in this workshop at your leisure: Note that ITD and the GSLIS Help Desk does not officially support or endorse any of the software listed—use your best judgment! Questions? Thanks for coming!