PRESENTATION TITLE 1 The Streetwise Security Awareness Non-Trivial Quiz Version 1.0 Compiled by Scott Wright The Streetwise Security Coach

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
SECURITY CHECK Protecting Your System and Yourself Source:
7 Effective Habits when using the Internet Philip O’Kane 1.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Breaking Trust On The Internet
SECURITY AND SOCIAL ENGINEERING US Department of Commerce Office of Security Updated 09/26/11 Security is Everyone's Responsibility – See Something, Say.
Jason Rich CIS  The purpose of this project is to inform the audience about the act of phishing. Phishing is when fake websites are created.
James Sees Senior Network Administrator Management Analyst Cyber Protection Strategies White Hall Business Association - Cyber Security & Awareness Conference.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
How To Open an Account Tech Tools Project Joanna Conrad-Pacelli Last Updated: 6/3/11.
INFORMATION SECURITY AWARENESS PRESENTED BY KAMRON NELSON AND ROYCE WILKERSON.
Introducing Quick Heal Endpoint Security 5.3. “Quick Heal Endpoint Security 5.3 is designed to provide simple, intuitive centralized management and control.
Digital Self Defense How well do YOU know Information Security? How well do YOU know Information Security?
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Morris Bennett Altman Director of Network Services Internet Security Officer Queens College, CUNY Are You Exposed? Network Security.
Information Assurance Outreach. Overview Survey Results Password Security Safety Internet Privacy Social Media Privacy and Safety Technology Demonstration.
Quiz Review.
Threats and ways you can protect your computer. There are a number of security risks that computer users face, some include; Trojans Conficker worms Key.
Securing Your Home Computer Presenter: Donnie Green Date: February 11, 2009 National Aeronautics and Space Administration
Alisha horsfield.  Computer virus is something that copies itself to computer software.  Virus can delete the hosts important documents which includes.
Threats to I.T Internet security By Cameron Mundy.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Commercial eSecurity Training and Awareness. Common Online Threats Most electronic fraud falls into one of three categories:  PHISHING – Fraudulent s.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Introducing Quick Heal Endpoint Security 5.2. “Quick Heal Endpoint Security 5.2 is designed to provide simple, intuitive centralized management and control.
Security Chapter What Should I Ask Santa Claus For? spoofing: fraudulent activity in which the sender address and other parts of the.
Keeping Information Safe Task 4. Basic security measures Passwords Change password on regular basis Do not use names or words easily linked to yourself.
By: Daniel Krueger ITC 525: Computers for Educators Summer II 2010 Click Here to Begin.
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
IT Security for Users By Matthew Moody.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Connecting to USF Network for Web Site SSH Secure Shell is the FTP program you will use to download your http files onto the USF server. To get the SSH.
 We all know we need to stay safe while using the Internet, but we may not know just how to do that. In the past, Internet safety was mostly about.
Section 6 Theory Software Copyright, Viruses and Hacking.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
 Facebook  Twitter  MySpace  Windows LiveSpace.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Copyright Scott Wright. All rights reserved. 1 SC Selling the Streetwise Security Awareness Program.
INTERNET: The Good, The Bad and The Ugly
Small Business Security Keith Slagle April 24, 2007.
Desktop Security: Making Sure Your Office Environment is Secure.
Internet Safety Internet Safety LPM
Activity 4 Protecting Ourselves. Keeping Safe There are lots of different ways we can be at risk on the Internet. How can we protect ourselves and keep.
Elementary Computers Instructions Begin Game. Welcome to Tech-O-Fortune! As you continue, you will see a hint for each puzzle. Guess a letter to check.
Internet Dangers Technology Communication Tools E-Literate.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
“2 million Facebook, Gmail and Twitter passwords stolen in massive hack”
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Return to the PC Security web page Lesson 4: Increasing Web Browser Security.
Privacy and Security Challenge Just Browsing Keep out - Private! Pushing IT You sound like a broken record Legal Beagles
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
An Introduction to Phishing and Viruses
Secure Software Confidentiality Integrity Data Security Authentication
I S P S loss Prevention.
Fix Gmail Error 404 Call Gmail Helpline.
Instructor Name Instructor Title Library Name
Computer Security.
Presentation transcript:

PRESENTATION TITLE 1 The Streetwise Security Awareness Non-Trivial Quiz Version 1.0 Compiled by Scott Wright The Streetwise Security Coach Score 10 points for each correct answer…

Creative Commons Licensed by Scott Wright. 2 Identity Theft Who had their Yahoo account hacked in 2008? 1. 1.Osama Bin Laden 2. 2.Stephen Harper 3. 3.Sarah Palin 4. 4.Brittany Spears

Creative Commons Licensed by Scott Wright. 3 Identity Theft Who had their Yahoo account hacked in 2008? 1. 1.Osama Bin Laden 2. 2.Stephen Harper 3. 3.Sarah Palin 4. 4.Brittany Spears Most of the answers to Sarah Palin’s Yahoo password reset questions were available from Wikipedia. The hacker guessed where she met her husband… Wasilla High School, Alaska

Creative Commons Licensed by Scott Wright. 4 Safe Web Browsing You can tell if a browser session is secure if… 1. 1.The URL is prefixed with “secure://” 2. 2.A pop-up dialog says “This is a secure session” 3. 3.“Verified by Visa” appears on the web page 4. 4.A “lock” icon appears beside the URL, or at the bottom of the browser window

Creative Commons Licensed by Scott Wright. 5 Safe Web Browsing You can tell if a browser session is secure if… 1. 1.The URL is prefixed with “secure://” 2. 2.A pop-up dialog says “This is a secure session” 3. 3.“Verified by Visa” appears on the web page 4. 4.A “lock” icon appears beside the URL, or at the bottom of the browser window

Creative Commons Licensed by Scott Wright. 6 Endpoint Security Antivirus programs are only effective when… 1. 1.Viruses are at least 2 weeks old 2. 2.Used together with Firewalls 3. 3.Virus definitions are updated regularly 4. 4.Computers are scanned in Safe Mode

Creative Commons Licensed by Scott Wright. 7 Endpoint Security Antivirus programs are only effective when… 1. 1.Viruses are at least 2 weeks old 2. 2.Used together with Firewalls 3. 3.Virus definitions are updated regularly 4. 4.Computers are scanned in Safe Mode

Creative Commons Licensed by Scott Wright. 8 Information Security Risks What is the most risky Internet application for enterprises? (according to Ponemon Research Study 2008) 1. 1.Limewire 2. 2.Gmail 3. 3.YouTube 4. 4.Hotmail

Creative Commons Licensed by Scott Wright. 9 Information Security Risks What is the most risky Internet application for enterprises? (according to Ponemon Research Study 2008) 1. 1.Limewire 2. 2.Gmail 3. 3.YouTube 4. 4.Hotmail Top 10 risky applications… 1- Limewire 2- YouTube 3- Gmail 4- Hotmail 5- Myspace 6- Facebook 7- Skype 8- Google Desktop Search 9- AIM 10- Google Talk Rated by IT Security Professionals in Enterprises (330 responses)

Creative Commons Licensed by Scott Wright Information Security Risks Use of unauthorized applications causes over half of reported… 1. 1.Lost productivity 2. 2.Identity theft 3. 3.Virus infections on networks 4. 4.Data loss incidents

Creative Commons Licensed by Scott Wright Information Security Risks Use of unauthorized applications causes over half of reported… (according to InsightExpress Study 2008) 1. 1.Lost productivity 2. 2.Identity theft 3. 3.Virus infections on networks 4. 4.Data loss incidents Other causes of Data Loss 1- Misuse of corporate computers 2- Unauthorized physical or network access 3- Remote worker network copying 4- Sharing of passwords, or weak passwords 100 IT professionals and 100 users surveyed.

Creative Commons Licensed by Scott Wright Information Security Threats Phishing is a type of attack where… 1. 1.Hackers probe a network looking for valuable information 2. 2.An employee takes property from work without permission s contain links to forged websites that collect usernames, passwords and other personal information 4. 4.An employee is bribed for inside information

Creative Commons Licensed by Scott Wright Information Security Threats Phishing is a type of attack where… 1. 1.Hackers probe a network looking for valuable information 2. 2.An employee takes property from work without permission s contain links to forged websites that collect usernames, passwords and other personal information 4. 4.An employee is bribed for inside information

Creative Commons Licensed by Scott Wright Join The Streetwise Security Zone Empower yourself and your team through Governance by Graffiti - Collaborating to secure your foundation for future growth Customize this presentation yourself, or get updates from…

Creative Commons Licensed by Scott Wright This work is licensed under a Creative Commons Attribution 2.5 License. Creative Commons Attribution 2.5 License You may use it and change it, but please keep the attributions to the original author.