Home Computer Security Sponsored by NASA HQ ITCD Special Projects Training Presented by your Computer Training Center.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Network Login Username Login not case sensitive, but password is Password changes Keeps history of last 3 passwords Must be alpha-numeric & or use upper/lowercase.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Configuring your Home Network Configuring your Home Network Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
evidence. Safety To stay safe on the internet there are many points you need to follow. The first point is to change your password regularly, you.
Securing Your Home Computer Presenter: Donnie Green Date: February 11, 2009 National Aeronautics and Space Administration
Threats to I.T Internet security By Cameron Mundy.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
P6 - CONFIGURE THE SOFTWARE. CONFIGURE SOFTWARE Most software can be configured to suit an individual user, for example by changing the appearance of.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.
SACHIN DEDHIA Cyber Crime Investigator Cert. Ethical Hacker(USA)
Keeping Information Safe Task 4. Basic security measures Passwords Change password on regular basis Do not use names or words easily linked to yourself.
IT Security for Users By Matthew Moody.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Stay Safe & Secure Online. Outline Passwords Everyday Security Security Physical Security Protecting Personal Information.
Staying Safe Online Keep your Information Secure.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
 Physical protection and Simple measures  Passwords  Firewalls  Anti-Virus, Spyware and Malware  Web browsers   Patches  Wireless  Encryption.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Computer Security Preventing and Detecting Unauthorized Use of Your Computer.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Etiquette – a list of rules that we observe Phishing - sending an to a user falsely claiming to be a legitimate company to scam the user into providing.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Stay Safe Online. Use strong passwords Using the same password for all your accounts makes it easy to remember. However, it also means a hacker needs.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Internet Security and Your Computer Welcome to Boot Camp.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
Internet Safety Internet Safety LPM
Cyber Security and Staying Safe Online Mark D. Riley College of Health Sciences and Professions.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Policies and Security for Internet Access
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Computer Security Keeping you and your computer safe in the digital world.
Internet Safety.
Windows Tutorial 5 Protecting Your Computer
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
Unit 4 IT Security.
Personal spaces.
Lesson 3 Safe Computing.
Cyber Security By: Pratik Gandhi.
Protect Your Computer Against Harmful Attacks!
Risk of the Internet At Home
Bethesda Cybersecurity Club
Presentation transcript:

Home Computer Security Sponsored by NASA HQ ITCD Special Projects Training Presented by your Computer Training Center

10 Mistakes Hackers Love Weak Passwords No Admin User Accounts Lame Protection Software Skimpy System Scans Lack of Security No Software Updates Rabid Browsing Downloads Gone Wild Default Firewalls Cheesy Wi-Fi Security 6/10/2014 Information Technology & Communications Division

Click to edit Master title style #10 CHEESY WIFI SECURITY 6/10/2014 Information Technology & Communications Division

WiFi Security 40% to 56% WiFi’s have no security −Change administrator password −Disallow remote management −Set a complex Network Security Key −Do not broadcast your SSID −WEP – easy to crack with freeware −WPA, WPA2 – and variants are better 6/10/2014 Information Technology & Communications Division

Is This You? 6/10/2014 Information Technology & Communications Division

Have You Been Logged? 6/10/2014 Information Technology & Communications Division

WIGLE.NET as of August 8, 2013 Wireless Geographic Logging Engine 103,597,112 - Unique WiFi networks 1,950,190,421 – Unique WiFi’s in DB 5.2% networks with Default SSID (5+M) 17% networks without crypto (17M+) Single day – 33,698 networks identified with location! Check your home at 6/10/2014 Information Technology & Communications Division

Click to edit Master title style #9 DEFAULT FIREWALLS 6/10/2014 Information Technology & Communications Division

Firewalls Firewalls - Hardware or software that checks info from the internet or a network, and then either blocks it or allows it to pass through to your computer. Does not prevent viruses or phishing scams. Router based - Protection from computers on the internet, not from computers on your home network. (i.e. mobile computer infected and you plug it into your network.) 6/10/2014 Information Technology & Communications Division

#8 Downloads Gone Wild! 6/10/2014 Information Technology & Communications Division

Downloads Know and trust the source Trust your instincts Save to desktop and scan before opening If someone handed out free front door locks, would you accept one? Must act now or deal goes away! Really? Free Scans aka Free Scams 6/10/2014 Information Technology & Communications Division

#7 Rabid Browsing! 6/10/2014 Information Technology & Communications Division

Safe Browsing Do not use “remember passwords” Do not click on pop ups Do not open error dialogs Do not use auto fill Set your Internet security levels Make sure you are on a HTTPS site prior to putting in your personal info Use a toolbar that rates sites 6/10/2014 Information Technology & Communications Division

#6 No Software Updates! 6/10/2014 Information Technology & Communications Division

Software Updates Operating System Microsoft Office/Office Suites Internet Browsers Anti-Virus/AV Suites Printer Drivers Peripheral/External Drives Drivers Games Specialty Software 6/10/2014 Information Technology & Communications Division

#5 Lack of Security! 6/10/2014 Information Technology & Communications Division

Security Scan s and attachments Delete unsolicited cards and s Set Junk and Spam filters Never send PII through Do not forward chain s Do not click on links Would your bank REALLY ask for your user ID and/or password? 6/10/2014 Information Technology & Communications Division

#4 Skimpy System Scans! 6/10/2014 Information Technology & Communications Division

System Scans Keep protection software up to date Scan all files and folders Scan your system routinely Scan external drives automatically Scan incoming and outgoing s Scan during times of little usage Scan downloads before opening Scan as Administrator 6/10/2014 Information Technology & Communications Division

#3 Lame Protection Software! 6/10/2014 Information Technology & Communications Division

Protection Software Anti-Virus −Detect, prevent and quarantine items −Stops someone from adding your computer to a Botnet or Zombie Army Anti-Spyware −Stops spyware from being installed Software Suites −All encompassing, often cost saving 6/10/2014 Information Technology & Communications Division

#2 Admin User Accounts! 6/10/2014 Information Technology & Communications Division

User Accounts Administrator Add/Remove Programs Standard User Add/Remove User Accounts Execute All Software Edit Registry Update Software Change Security Settings Install Printers/Devices Unlock Guest Accounts ANYTHING YES NO 6/10/2014 Information Technology & Communications Division

#1 Weak Passwords! 6/10/2014 Information Technology & Communications Division

Passwords Acceptable t~ Unacceptable Pa$$w0rd1 _ or * Ptrouard1234 Fovyopmstu (one off of ‘dictionary’) MyDogCaesar MyCatBrutus Iwerkwithengines xylophone 6/10/2014 Information Technology & Communications Division

Make a Strong Password Think of a sentence with meaning to you. “My little furry meth house rescue dog’s name is Ti-Tye.” Mlfmhrdnit-t ^^LF^^Hr-n1t-t 6/10/2014 Information Technology & Communications Division Add length with punctuation and symbols before and after. Take the first letter of each word. Add complexity −A-M Upper Case −Change some letters to symbols (i.e. I=1, D=-, O=0, 0=O, M=^^)

Questions? For assistance, contact the Enterprise Service Desk (ESD): submit a ticket online at esd.nasa.gov; or call 358-HELP (4357) or NASAHQ ( ).esd.nasa.gov For additional support on Home Computer Security, as well as training or support on any MSOffice application, contact the Computer Training Center located at extension.1111 or visit the CTC website at 6/10/2014 Information Technology & Communications Division