They’re out to get you Security Awareness Campaign Elise Roders Rhodes, TNC 2004 6-6-2004.

Slides:



Advertisements
Similar presentations
Internet Safety Rockingham County Public Schools
Advertisements

How to protect yourself, your computer, and others on the internet
Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Tomi Dolenc Arnes, p.p. 7, SI Ljubljana TF-CPR Meeting, Ljubljana SAFE NRENs The role of NRENs in national campaigns.
Computer security Viruses Hacking Backups
Mountain Lion Security Mac OS X Strong Passwords Every Mac needs a login name and password Every user on every Mac should have their own account.
Putting It All Together 1.  Maintaining a Hard Drive Ch 4 Lab  Hardware cleaning tips ▪ Microsoft Tips Microsoft Tips ▪ Computer Hope Tips Computer.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
MY INTERNSHIP AT TFA BY: LARRY NGUYEN. WHAT I LEARNED  TECHNICAL  TECHNICAL SKILLS  TEAM  TEAM WORK  BASIC  BASIC FUNDAMENTALS  COMPUTER  COMPUTER.
IT security Are you protected against hackers?. Why are we in danger?  The Internet is worldwide, publicly accessible  More and more companies and institutes.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Web Server Administration
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
INTERNET SAFETY FOR STUDENTS
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Threats and ways you can protect your computer. There are a number of security risks that computer users face, some include; Trojans Conficker worms Key.
Software. stands for electronic mail. software enables you to send an electronic message to another person anywhere in the world. The message.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
China Science & Technology Network Computer Emergency Response Team Botnet Detection and Network Security Alert Tao JING CSTCERT,CNIC.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Digital Citizenship By Web Design.  It is a system to teach students and teachers the way to use technology correctly. As new technology appears we all.
Protecting Yourself Online (Information Assurance)
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Cyber crime & Security Prepared by : Rughani Zarana.
Technical Training Manual Adding & Updating Boring Information HTMLHTTPTLSTCP CSSFTPWANLAN DDoSCMSNATIP David White Web Developer / Systems Administrator.
Chapter 3.  Help you understand different types of servers commonly found on a network including: ◦ File Server ◦ Application Server ◦ Mail Server ◦
Chapter 8 The Internet: A Resource for All of Us.
Securing the Human. Presented by Thomas Nee, Computer Coordinator Town of Hanover, Massachusetts hanover-ma.gov/information-technology October is Cyber.
IT security By Tilly Gerlack.
Instant Messaging for the Workplace A pure collaborative communication tool that does not distract users from their normal activities.
Technology in the Bellingham School District. Bellingham School District Network §Connectivity §Communication §Research Practice Responsible Use.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
DIGITAL CITIZENSHIP PROJECT Susan Abernathy. THINGS TO REMEMBER DURING THE UPCOMING YEAR!
HDSB Security Awareness Training. Introduction Good security standards follow the 90/10 rule: 10% of security safeguards are technical. 90% of security.
Remote Controller & Presenter Make education more efficiently
Introduction to Student Name Student Class.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Catania, 16 May 2006 Reaching both institutions and users Educating the educators Elise Roders, SURFnet bv.
Internet Security and Your Computer Welcome to Boot Camp.
Computer Security Presented By : Ebtihal Mohammed AL-Amro.
By: Atheer, Kristelle and jia. Computer worms are malicious software applications designed to spread via computer networks. Computer worms are one form.
Computer Security Status Update FOCUS Meeting, 28 March 2002 Denise Heagerty, CERN Computer Security Officer.
Internet safety By Suman Nazir
SURFnet’s Community Support Reaching end users in the Netherlands (and staying in touch!) Poznan, 8 June 2005, TNC2005 Elise Roders, SURFnet.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
‘INNOVATING TOGETHER - COMMUNICATING TOGETHER’ TNC Maastricht Lonneke Walk, SURFnet.
Foundation year Lec.4: Lec.4: Communication Software Internet & Security Lecturer: Dalia Mirghani Year : 2014/2015.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Canon Printer Support Phone Number
Dial Canon printer Tech support toll free number to resolve customer technical troubleshooting issues and Install Driver provides 24/7 tech support service.instant solution for all the Canon printer issues through their experts technicians
Managing Windows Security
Using a Computer Network
Navigating the Internet
EU Security Awareness Campaign
Unit 4 IT Security Kerris Davies.
What is Information Security?
Presentation transcript:

They’re out to get you Security Awareness Campaign Elise Roders Rhodes, TNC

2 The development of a national campaign Brief history Results and current status Plans for the near future European campaign?

3 Why did SURFnet start ‘They’re out to get you’? Internet worms and viruses present network administrators with high workload. Many students and researchers have always- on connections to the local university network. Many institutions started their own awareness campaigns. SURFnet-CERT was asked to provide an efficient solution.

4 List of demands The campaign had to be general enough to be used widely The message had to be clear and simple The campaign had to focus on network related issues (so spam and illegal downloads are not addressed) Some universities did ask for back-ups to be highlighted

5 The’re out to get you 3 Golden Rules 1.Install security software and updates 2.Keep passwords to yourself 3.Back-up your files

6 Message distributed widely 2500 posters 200,000 freecards Website: Newsletter Press release Screensaver Etc.

7 Plans for future More publicity Give-aways (pens, keyrings etc.) More interactivity New functionality on website

8 They’re out to get you beyond our borders? The campaign which has been developed by SURFnet can be used internationally. NRENs may use the Dutch concept (we will get you in touch with the designers) A truly European campaign may be developed (any thoughts on this are welcome!)

9 Any questions? For more information: Elise Roders Manager Community Support SURFnet bv