Personal Security for Advanced Users Group 18 Andrew Trusty, Gaurav Mullick.

Slides:



Advertisements
Similar presentations
Windows XP Tutorial Securing Windows. Introduction This presentation will guide you through basic security principles for Windows XP.
Advertisements

1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Operating System Customization
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
OAAIS Enterprise Information Security Security Awareness, Training & Education (SATE) Program or UCSF Campus VPN.
Data Security Issues in IR Eileen Driscoll Institutional Planning and Research Cornell University
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
1 Information Security for HIPAA Second Meeting for Researchers Michael Caputo February 18, 2003.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
Macintosh Configuration Management Will Jorgensen 1.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Protecting ICT Systems
DATA SECURITY AND YOU! W/ DAVE California Center for Population Research.
Configuring a Web Server. Overview Overview of IIS Preparing for an IIS Installation Installing IIS Configuring a Web Site Administering IIS Troubleshooting.
G046 Lecture 05 Task E Briefing Notes Mr C Johnston ICT Teacher
Prepared By, Mahadir Ahmad. StopBadware makes the Web safer through the prevention, mitigation, and remediation of badware websites. partners include.
Securing Microsoft® Exchange Server 2010
Computer Security By: MacKenzie Olson. To be safer and more secure online, make these seven practices part of your online routine.
Web Browser Security Prepared By Mohammed EL-Batta Mohammed Soubih Supervised By Eng. Eman alajrami Explain Date 10. may University of Palestine.
 Physical protection and Simple measures  Passwords  Firewalls  Anti-Virus, Spyware and Malware  Web browsers   Patches  Wireless  Encryption.
Malicious Attack Corporate Awareness and Walk through Date 29 September 2011.
Computer & Network Security
{ Active Directory Security Why bother?.   Law #1: Nobody believes anything bad can happen to them, until it does   Law #2: Security only works if.
Everyday Cyber Security April 27 th Why Should You Care? Ensuring your privacy and security Protecting yourself and others Practicing safe internet.
Information Collection, Storage and Sharing. The use of computers have made it easier than before, to collect, store and share large amounts of information.
3.3 Digital Communication Security. Overview Demonstrate knowledge and understanding of basic network security measures, e.g. passwords, access levels,
Computer Security By Joey Pawoll. Introduction to computer security Have you been wondering how to be safe online? Well look no further! This powerpoint.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
Computer Security By Rachel Gaines. Computers are used for work, play, and everything in between. So here’s how to keep it fun and protected.
Cyber Security Action against cyber crime. What is cyber security?  Cyber security standards are security standards which enable organizations to practice.
Protecting Students on the School Computer Network Enfield High School.
Computer Security Hacking, Phishing, Passwords Kausalya S. And Sushil Mujumdar (CCCF) 04 - Aug - 15.
Basic Skills Foundation Computing The early bird may get the worm, but the second mouse gets the cheese.
2  Supervisor : MENG Sreymom  SNA 2012_Group4  Group Member  CHAN SaratYUN Sinot  PRING SithaPOV Sopheap  CHUT MattaTHAN Vibol  LON SichoeumBEN.
Data Security Overview. Data Security Periphery –Firewalls –Web Filtering –Intrusion Detection & Prevention Internal –Virus Protection –Anti Spy-ware.
INTERNET SAFETY FOR KIDS
Computer Security By: Alex Metzler. Table of Contents Protecting Your Personal Info Know Who You’re Dealing With Use Updated Security Software Update.
Chapter 2 Securing Network Server and User Workstations.
Networks Overview of a Network Web Ftp Newsgroups.
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
NETWORKING & SYSTEM UPDATES
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Onguardonline.gov By Austin Kellogg. Main ideas  Protect your personal information  Know who your dealing with  Use security software that updates.
Personal System Administration CS5493. SA SA is a Systems Administrator The SA is responsible for maintaining the overall wellbeing of a computing system.
Network Services. Domain Controllers: – Used for Account management (e.g. user accounts, group accounts Register Hardware like Printers and PC Authentication.
Computer Security & Backups LO: Understanding the need for computer security and typical ways to ensure that a system is secure. Learning Outcome : Define.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Presented By Shrikant Ravindra Kamble MCA 3 rd year.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
COMPUTER SYSTEM FUNDAMENTAL Genetic Computer School COMPUTER AND INTERNET SECURITY LESSON 9.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Security on Peer-to-Peer Networks.
3.1 Types of Servers.
TECHNOLOGY GUIDE THREE
3.1 Types of Servers.
OWASP CONSUMER TOP TEN SAFE WEB HABITS
3.1 Types of Servers.
FTP - File Transfer Protocol
Lecture-16(B) Taking Protective Measures
Welcome To : Group 1 VC Presentation
Services Provided by Network Operating Systems
Things To Avoid: 1-Never your password to anyone.
GSBS IT Resources and Security
Chapter 27: System Security
Chapter 3: Protecting Your Data and Privacy
Welcome to all Participants
Presentation transcript:

Personal Security for Advanced Users Group 18 Andrew Trusty, Gaurav Mullick

2 Motivation  Apply security practices outside of the lab  Survey results = we are all bad at security we all care about security  Provide workable security solutions to everyday computing tasks

3 Sections  Lessons from the labs  Everyday Security  chat, , browsing, passwords, backup, remote access, disk encryption  Common Sense Security  Keeping up to date on Security

4 Everyday Security  OTR  Prism  PwdHash  Tor  SSH Proxy  Hamachi

5 Common Sense Tips Use secure passwords. Install anti-virus, anti-spyware and firewall software. Keep OS and software updated. Don't login as Administrator account for daily use Lock you computer when you leave it. Use other methods of authentication. Make and encrypt backups.

6 Common Sense Tips 2 Secure your browser. Secure you communication including file transfer Disconnect from the network when not using it for long periods of time. Uninstall any software that you don't use. Partition your disk to minimize loss of data. Encrypt or password protect important data. Keep up with security news.

7 Keeping Up To Date  Secunia.comMicrosoft.com/security Slashdot.orgLinuxSecurity.comSecureMac.com Schneier.com/blogVerySecureLinux.com Xforce.iss.net Security Now!Network Security Podcast & many more!

8 Lab Contents Personal Security Survey Review of Personal Security Tips in the Labs Security Overview for Common Chat Protocols Encryption, Anonymization, & Disposable Addons for Securing Mozilla Firefox Standalone Web Applications Anonymous Browsing with Freenet & TOR Password Management & Generation Secure Backup Secure Remote Access Disk Encryption Common Sense Security Tips 100+ websites, mailing lists, newsletters and podcasts to help you keep up with security news Questions?