Download presentation
Presentation is loading. Please wait.
Published byEugene McLaughlin Modified over 8 years ago
1
Commission on Information and Communications Technology Cyber Security iSchools Project Team HUMAN CAPITAL DEVELOPMENT GROUP
2
iSchools - CILC for Teachers 2 Internet Positive: venue where people get together to communicate, exchange information, entertain, transact business, and understand how the world operates. Negative: playground of crooked individuals and ruthless firms who take advantage of the freedom it maintains as well as its many weaknesses.
3
iSchools - CILC for Teachers 3 Privacy? E-mail is completely insecure. Each e-mail you send results in at least 3 or 4 copies being stored on different computers. You can take measures to protect your e-mail.
4
iSchools - CILC for Teachers 4 Cyber Security Unfortunately, there's no 100% guarantee that even with the best precautions some of these things won't happen to you, but there are steps you can take to minimize the chances. BE RESPONSIBLE CYBER-CITIZENS! BE CYBER-SMART!
5
iSchools - CILC for Teachers 5 Cyber Security protecting digital information by preventing, detecting, and responding to attacks recognize the risks and become familiar with terminology associated with them
6
iSchools - CILC for Teachers 6 Security Settings High, Medium, Low Trust sites vs. Restricted sites Internet & LAN content Firewall Filters
7
iSchools - CILC for Teachers 7 Malicious Individuals Hacker, attacker, or intruder –exploit weaknesses in software and computer systems for their own gain –intentions: sometimes benign and motivated solely by curiosity –actions: typically in violation of the intended use of the systems they are exploiting
8
iSchools - CILC for Teachers 8 Malware designed “to wreak havoc on personal computers and networks” by attaching to programs (“hosts”) and spreading from one program or storage device to another ranging from silly pranks to data destruction/ theft
9
iSchools - CILC for Teachers 9 Malware Virus: attaches to various files and executes (infects the computer) when the host programs are run (or an email attachment is opened or a particular web page is visited) Worm: propagates without user intervention via email, web sites, or network-based software, clogs the system via numerous reproductions Logic Bomb: lies dormant until triggered by a certain event Trojan Horse: unsuspicous delivery program of malware
10
iSchools - CILC for Teachers 10 Spyware & Key Logger Spyware (also called sneakware or stealthware) - software that comes hidden in free downloadable software –tracks your online movements –mines the information stored on your computer –uses your computer’s CPU and storage, slows it down Key logger, or key trapper, software, -a program, when installed on a computer, records every keystroke and mouse click.
11
iSchools - CILC for Teachers 11 Spyware record keystrokes and steal private information for advertisers, hackers, and cyberthieves –Cookie - a small record deposited on your hard disk by a Web site containing information about you and your Web activities. –Adware - software to generate ads that installs itself on your computer when you download some other (usually free ) program from the Web. Earthlink (ISP) study: average computer harbors 26 spyware programs
12
iSchools - CILC for Teachers 12 Myths Anti-virus software and firewalls are 100% effective. Once software is installed on your computer, you do not have to worry about it anymore. There is nothing important on your machine, so you do not need to protect it. Attackers only target people with money. When computers slow down, it means that they are old and should be replaced.
13
iSchools - CILC for Teachers 13 Tips 1.Perform basic computer maintenance –firewall, data encryption, regular update of security patches –regularly run anti-virus and anti-spyware software 2.Don't open files from strangers/ unreliable sites –E-mail and IM –verify first 3.Help fight spam and online scams –use filters –be wary of phishing –check for secure pages (lock icon), server authentication, and message integrity –review the privacy policies of websites before entering information
14
iSchools - CILC for Teachers 14 Tips 4.learn how to protect yourself from adware/spyware –Regularly run anti-spyware software –read license agreements of freeware against attached spyware 5.take precautions when you go wireless –convenient but with security risks 6.password-protect your computer—and lock it –as first line of defense 7.back up your work
15
iSchools - CILC for Teachers 15 Safeguard your passwords! Guidelines from Learn the Net.com: 1.Although passwords should be easily remembered, do not use passwords that refer to easily obtainable personal information, such as your name, address, phone number, or birthday. 2.Avoid using common words. 3.Passwords should be at least six alphanumeric characters – meaning, combine upper and lower case letters, numbers, and symbols, e.g. 2fjm0x@Ic. NOTE: Passwords are case-sensitive.
16
iSchools - CILC for Teachers 16 Safeguard your passwords! Guidelines from Learn the Net.com: 4.Ideally, use a different password for each service you register with. For sensitive accounts, such as financial services, change your passwords frequently. 5.Never ever disclose your password/s. Don’t have your computer “remember your password”.
17
Commission on Information and Communications Technology www.us-cert.gov/cas/tips/ST04-001.html (US-CERT: US Computer Emergency Readiness Team) www.microsoft.com/athome/security/children/backtoschool.mspx www,learnthenet.com
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.