Safe Computing Practices
Why would anyone want to hack me? 1 Krebs, Brian - “The Scrap Value of a Hacked PC, Revisited”, 12 Oct 2012,
Why would anyone want to hack me? - Online Card Shops “... the site is offering a pack of 1,245 cards stolen two months ago from stores in Massachusetts and Connecticut for the bargain price of USD $10,500.” 2 Krebs, Brian, “Peek Inside a Professional Carding Shop”, 14 Jun 2014,
Phishing Example 1 3
Phishing Example 1 - Red Flags 4
Phishing Example 2 5 s sent from a account!
Phishing Example 3 6
Phishing Example 4 - Malicious Attachment 7
Drive-By Downloads sites.aspx
Please don’t share passwords 9
There’s no such thing as a free lunch USB storage key 10
Data Classification – What to Collect and How 11 ● ●
Resources on Information Security Policies: Privacy Policy =Confidentiality of Data Network Monitoring Policy = Protection of College Technology Resources Technical Incident Response Policy = Response to Information Security Events Data Classification Policy = Defines Data Types Red Flags Policy = Identity Theft Protection Not presently in hand book PCI Policy = Payment Card Data Handling Web Sites: Middlebury’s Information Security Phishing Information Protect Yourself On-line Parents Resource for Kids On-line Best Practices for Home and Work Best_Practices_Datasheets.pdf
Discussion and Links Please share your thoughts! Information Security Resources: Report Information Security Events To: