Download presentation
Presentation is loading. Please wait.
1
Tips and Techniques: How to Protect Yourself and Others Better Jeanne Smythe February 20, 2004
2
The Troubles We’ve Seen Viruses, Worms, and other Malware I have an interesting issue that I would appreciate any insight you have to offer. This email bounced appearing to have been sent from my home email account. The issue is that I did not send the email and worse, attached to the email was a copy of my 2002 tax return …(also included an attachment your_details.zip and a “movie”) The virus spreads by emailing some text, a copy of itself, and a randomly selected file from xxxxx’s computer to everyone on xxxxx’s mailing list. In this case the file contained a report about an individual with yyyyy syndrome. The file included the name, date of birth, parents names, evaluation, follow up, and information about medical services for other family members as well.
3
Viruses, Worms, and Trojans Most common problem is confidential information is shared as email attachments Less common – but potentially more damaging – hacker discovers the mother lode
4
The Mother Lode Welcome to My Nightmares March 2003, Georgia Tech. Stolen name, address, phone number, email addresses, and credit card numbers March 2003, University of Texas at Austin – 50,000 names and social security numbers of students, staff, and other January 2003 – University of Kansas- Sevis Datbase – 1,450 foreign students – social security numbers, birth date, passpot number, country of origin
5
Minimize the Risk Minimize exposure to private information –Remove confidential data – e.g. once your taxes are done back up and remove tax info –Don’t keep shadow copies –Leave system off network when you’re away for extended periods –Beware of public systems Use good Hygiene –Use Antivirus software and keep it updated –Patch often Get regular checkups
6
Surplused Media February 19, 2004 N&O “…many state computers are not wiped clean of information such as Social Security and bank account numbers before they are offered for public sale. Some of those computers are refurbished by state inmates for use in public schools or other state agencies.” “…many state computers are not wiped clean of information such as Social Security and bank account numbers before they are offered for public sale. Some of those computers are refurbished by state inmates for use in public schools or other state agencies.”
7
Stolen Media December 2003 - Computer hard drives storing the private records of 500,000 military personnel and their families were stolen last month from Department of Defense health-care contractor TriWest Healthcare Alliance. UNC Chapel Hill A 01/28/2002 - 11/22/2003 Computer equipment 13 Laptop computer 26 Desktop computer 19 Computer equipment 13 Laptop computer 26 Desktop computer 19
8
Minimize Risk Lock down laptops Think about what you store on laptops and PDA’s Wipe all media before disposal
9
Minimize the Risk (continued) Manage your passwords –Try one for work, one for confidential personal information, one for play –Change your password periodically – and when important life changes happen Think about the media –Should I really put this in email? –What if I lost my PDA? –Can I keep track of my usb drive?
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.