Download presentation
Presentation is loading. Please wait.
Published byTiffany Quinn Modified over 9 years ago
1
Safe Computing Practices
2
Why would anyone want to hack me? 1 Krebs, Brian - “The Scrap Value of a Hacked PC, Revisited”, 12 Oct 2012, http://krebsonsecurity.com/2012/10/the-scrap-value-of-a-hacked-pc-revisited/
3
Why would anyone want to hack me? - Online Card Shops “... the site is offering a pack of 1,245 cards stolen two months ago from stores in Massachusetts and Connecticut for the bargain price of USD $10,500.” 2 Krebs, Brian, “Peek Inside a Professional Carding Shop”, 14 Jun 2014, http://krebsonsecurity.com/2014/06/peek-inside-a-professional-carding-shop/ http://krebsonsecurity.com/2014/06/peek-inside-a-professional-carding-shop/
4
Phishing Example 1 3
5
Phishing Example 1 - Red Flags 4
6
Phishing Example 2 5 Emails sent from a compromised @middlebury.edu email account!
7
Phishing Example 3 6
8
Phishing Example 4 - Malicious Attachment 7
9
Drive-By Downloads 8 -- http://www.microsoft.com/security/sir/glossary/drive-by-download- sites.aspx
10
Please don’t share passwords 9
11
There’s no such thing as a free lunch USB storage key 10
12
Data Classification – What to Collect and How 11 ●http://go.middlebury.edu/sensitivedata ●http://go.miis.edu/sensitivedata
13
Resources on Information Security Policies: Privacy Policy =Confidentiality of Data http://go.middlebury.edu/privacy Network Monitoring Policy = Protection of College Technology Resources http://go.middlebury.edu/netmon Technical Incident Response Policy = Response to Information Security Events http://go.middlebury.edu/tirp Data Classification Policy = Defines Data Types http://go.Middlebury.edu/dcp Red Flags Policy = Identity Theft Protection Not presently in hand book PCI Policy = Payment Card Data Handling http://go.middlebury.edu/pcipolicy Web Sites: Middlebury’s Information Security http://go.middlebury.edu/infosec Phishing Information http://go.middlebury.edu/phish http://www.phishing.org/ Protect Yourself On-line http://www.onguardonline.gov/ Parents Resource for Kids On-line http://getnetwise.org/ Best Practices for Home and Work http://www.nsa.gov/ia/_files/factsheets/ Best_Practices_Datasheets.pdf
14
Discussion and Links Please share your thoughts! Information Security Resources: http://go.middlebury.edu/infosec http://go.miis.edu/infosec http://go.middlebury,.edu/infosecneo Report Information Security Events To: infosec@middlebury.edu
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.