Computer Security Awareness at Home. Presented By Gavin Worden
|
|
- Alexander Clark
- 8 years ago
- Views:
Transcription
1 Computer Security Awareness at Home Presented By Gavin Worden
2 Agenda What is Computer Security? What is at Risk? What can be done to protect your computer? Overview of the Internet and World Wide Web Protecting your Home Network Protecting your Home Computer General On-Line Security Strategies Social Networking Security Privacy and the Internet Smart Phone Security
3 From the News The IC³, which is a partnership between the FBI and the National White Collar Crime Center (NW3C), received an average of 25,317 cybercrime complaints per month last year, noted the 2010 Internet Crime Report. A sophisticated data mining virus (Zeus Trojan) that has emptied bank accounts in the United Kingdom was found to have infected a computer in the Virginia Tech controller's office. About 370 people were affected. Botnets used in banking credential theft and other criminal enterprises made huge gains in 2010, claiming more than seven times as many victims as the previous year, according to a report issued by a security firm that follows the large networks of infected machines.
4 From the News Security experts are warning of a new Facebook phishing scam designed to harvest log-in credentials. The scam promises address to those who register, but is actually a trap to gather log-ins and passwords for the site. A new IRS scam looks convincing. With a subject line declaring "TAX EXEMPTION NOTIFICATION," the message told the recipient to fill out and fax an attached form that asked for personal information so he would not miss out on a special tax immunity. In New York, scam callers have been indicating that they are from the Bureau of Criminal Investigations or the Cyber Crime Unit of the New York State Police and requesting money for a bad debt or an unpaid loan, according to a press release from the New York State
5 What is Computer Security?
6 What is Computer Security? According to the Computer Emergency Response Team (CERT) at Carnegie Mellon University: Computer security is the process of preventing and detecting unauthorized use of your computer. Prevention measures help you to stop unauthorized users (also known as "intruders") from accessing any part of your computer system. Detection helps you to determine whether or not someone attempted to break into your system, if they were successful, and what they may have done.
7 Why should you care about Computer Security?
8 Why should you care about Computer Security? Once again, according to CERT: We use computers for everything from banking and investing to shopping and communicating with others through or chat programs. Although you may not consider your communications "top secret," you probably do not want strangers reading your , using your computer to attack other systems, sending forged from your computer, or examining personal information stored on your computer (such as financial statements).
9 How easy is it to break into your computer? Unfortunately, intruders are always discovering new vulnerabilities (informally called "holes") to exploit in computer software. The complexity of software makes it increasingly difficult to thoroughly test the security of computer systems. There is no such thing as a 100% secure computer. - CERT Coordination Center Home Network Security, (2001),
10 Why would someone break into your computer? Intruders often want to gain control of your computer so they can use it to launch attacks on other computer systems. Having control of your computer gives them the ability to hide their true location as they launch attacks, often against highprofile computer systems such as government or financial systems. Intruders may be able to watch all of your actions on the computer, or cause damage to your computer by reformatting your hard drive or changing your data. - CERT Coordination Center Home Network Security, (2001),
11 What is at risk? Your Personal Information Your Financial Assets Your computer being used to attack others And more
12 What can be done to protect your computer? Use the strategy of Defense in Depth Utilize multiple security layers and methods to reduce the likelihood that you will fall victim to an intruder. Examples include: Use a network firewall and a software firewall on your PC. Perform regular software updates on your operating system and installed applications Install anti-malware software and keep it up to date.
13 Overview of the Internet and the World Wide Web
14 Overview of the Internet and the World Wide Web The History of the Internet: In the 1960 s, basic networking technologies were being developed in support of the telephone systems. In 1969, the Advanced Research Projects Agency (ARPA) launched ARPAnet the foundation for the modern Internet. ARPAnet connected to a number of other networks resulting in a Network of Networks. Between 1972 and 1980, ARPAnet and its partner networks grew from 15 interconnected computerrs to over 100, Kurose, J., & Ross, K. (2008). Computer Networking, 4 th Edition. Boston, MA: Pearson Education.
15 Overview of the Internet and the World Wide Web Video The History of the Internet (YouTube)
16 Overview of the Internet and the World Wide Web The History of the World Wide Web: The Internet is a network that data travels over, while the World Wide Web is a graphical user interface that we interact with directly through web pages. The Web was invented at the European Council for Nuclear Research (CERN) by Tim Berners-Lee between 1989 and Berners-Lee and his associates developed the initial versions of Hypertext Markup Language (HTML), Hypertext Transfer Protocol (HTTP), a web server, and a web browser the four key components of the Web. - Kurose, J., & Ross, K. (2008). Computer Networking, 4 th Edition. Boston, MA: Pearson Education.
17 Protecting your home network
18 Protecting your home network Use a hardware firewall on your home network. Never directly connect your computer to your Internet Service Provider (ISP). Hardware firewalls are often bundled with inexpensive consumer Internet share devices like cable modems, gateways, or wireless routers.
19 Protecting your home network Wireless Security Wireless Security Basics: 1. Change the default password on your wireless router per the manufacturer s instructions. The DEFAULT password is openly published on the internet, allowing anyone with in range to access your wireless network and make security configuration changes. 2. Hide the name of your wireless network. The technical name of your wireless network is the SSID. Change the default SSID name and select the option DO NOT BROADCAST SSID. This means people cannot easily locate and connect to your wireless network without knowing your new SSID.
20 Protecting your home network Wireless Security Wireless Security Basics Continued: 3. Be sure to enable wireless encryption (WPA2 is recommended) per the manufacturer s instructions. Enabling WPA2 will also require that you set a passphrase for access your wireless network. This means that only computers that are configured with your WPA2 passphrase will be able to connect to your wireless network. This will reduce the likely hood of someone stealing your bandwidth or trying to hack your wireless network.
21 Protecting your Computer (Laptop, Tablet, etc.)
22 Protecting your Computer (Laptop, Tablet, etc.) Be sure to install a security software suite that includes at least the following security components: A software firewall Intrusion Prevention Anti-malware (anti-virus, anti-spyware, etc)
23 Protecting your Computer (Laptop, Tablet, etc.) Schedule automatic updates for your computer s operating system. This reduces the number of security wholes that an attacker can use to gain access to your computer. Routinely update the applications installed on your computer. Many software applications now include software update utilities that notify you when new software updates are available.
24 General On-Line Security Strategies
25 General On-Line Security Strategies Be sure to use STRONG PASSWORDS on websites that store personal or otherwise sensitive information. What makes a strong password? Make it lengthy. Each character that you add to your password increases the protection that it provides many times over. Your passwords should be 8 or more characters in length; 14 characters or longer is ideal. Many systems also support use of the space bar in passwords, so you can create a phrase made of many words (a "pass phrase"). A pass phrase is often easier to remember than a simple password, as well as longer and harder to guess. Combine letters, numbers, and symbols. The greater variety of characters that you have in your password, the harder it is to guess. - How to Create and Use Strong Passwords, Microsoft,
26 General On-Line Security Strategies What makes a strong password? (continued) Use words and phrases that are easy for you to remember, but difficult for others to guess. The easiest way to remember your passwords and pass phrases is to write them down. Contrary to popular belief, there is nothing wrong with writing passwords down, but they need to be adequately protected in order to remain secure and effective. In general, passwords written on a piece of paper are more difficult to compromise across the Internet than a password manager, Web site, or other software-based storage tool, such as password managers. - How to Create and Use Strong Passwords, Microsoft,
27 General On-Line Security Strategies Examples of WEAK Passwords: george (someone s name) (someone s birthdate) 1234 (simple number strings) Examples of STRONG Passwords: des*3r!9 (completely random) LO0k@m3! (approximates a word or phrase using special characters)
28 General On-Line Security Strategies How do you securely store all of your passwords? Most if not all of the major consumer security software vendors offer some sort of secure password vault. Secure Password Vault = Encrypted application to securely store usernames and passwords. Many smart phones include secure password vault applications for access to your passwords on the go. IMPORTANT! Only use secure password storage applications from companies you trust! Also, avoid on-line password managers they are only as secure as the company and applications storing your information.
29 General On-Line Security Strategies What is Social Engineering? Social engineering is the act of manipulating people into performing actions or divulging confidential information, rather than by breaking in or using technical cracking techniques.
30 General On-Line Security Strategies Three important Social Engineering concepts: Pretexting Phishing Spoofing
31 General On-Line Security Strategies Pretexting is the act of creating and using an invented scenario (the pretext) to engage a targeted victim in a manner that increases the chance the victim will divulge information or perform actions that would be unlikely in ordinary circumstances. Involves prior research for impersonation (e.g., information about you, your agency, our organization, etc.) to establish legitimacy in the mind of the target.
32 General On-Line Security Strategies Phishing is a technique of fraudulently obtaining private information. The phisher sends an that appears to come from a legitimate source like a government agency requesting information and warning of some dire consequence if it is not provided. The may contain links to a fraudulent web page that seems legitimate with agency logos and content and may initiate a download that is ultimately malware.
33 General On-Line Security Strategies spoofing is a term used to describe activity in which the sender address and other parts of the header are altered to appear as though the originated from a different source.
34 General On-Line Security Strategies Pretexting, Spoofing, & Phishing are often used together. Spear Phishing is a targeted phishing attack specific organizations or individuals are targeted.
35 General On-Line Security Strategies Phishing Examples: Security experts are warning of a new Facebook phishing scam designed to harvest log-in credentials. The scam promises address to those who register, but is actually a trap to gather log-ins and passwords for the site. IRS scam looks convincing. With a subject line declaring "TAX EXEMPTION NOTIFICATION," the message told the recipient to fill out and fax an attached form that asked for personal information so he would not miss out on a special tax immunity. In New York, scam callers have been indicating that they are from the Bureau of Criminal Investigations or the Cyber Crime Unit of the New York State Police and requesting money for a bad debt or an unpaid loan, according to a press release from the New York State
36 General On-Line Security Strategies Important tips for avoiding Phishing scams: Never open an attachment if you have not first verified that both the sender and the attachment are legitimate. Never click on a hyperlink in an until you have verified the sender and know that the link is legitimate. Do not assume that an is legitimate solely based on the sender s address.
37 Social Networking Security
38 Social Networking Security What are some examples of social networking sites that you are aware of?
39 Social Networking Security Social Networking site examples include: Classmates Facebook Flickr Friendster LinkedIn MySpace Twitter Yelp And the list goes on and on
40 Social Networking Security Be careful about what information you post on Social Media Sites! Why??
41 Social Networking Security Information that you post on Social Media sites can potentially reveal sensitive information, including: Your full name Date of birth Address Family members (Mother s Maiden Name) Work and/or work location You schedule (when you are away from home)
42 Social Networking Security When aggregated, these pieces of information can increase your risk of identity theft. Information commonly posted on social networking sites can be used for password retrieval on other sites. Information about your location or schedule can aid burglars and other criminals.
43 Social Networking Security Be sure to use social networking site security features to their maximum potential! Limit who can see your information on-line. Think twice about posting or tweeting information about your location or schedule. Do not post information or pictures that reveal your address. Do not post your full date of birth. Avoid posting information that can be aggregated for use with a password recovery program: High School, Place of Birth, Maiden Name, Etc.
44 Social Networking Security Do YOU know of any examples of Social Networking security mistakes? Let s hear them!
45 Privacy and the Internet
46 Privacy and the Internet Be careful about making personal information available on the Internet. The Internet is a public medium accessible by people all over the world. Think beyond traditional social networking applications. Consider blogs, news articles, school work, business marketing material, etc.
47 Privacy and the Internet Even on protected sites, your information is only as secure as the web application or company that stores your information. Information you put on the Internet may still be available long after you delete it. Information about you can be gathered from all over the internet into a single report for use by the good guys, or the bad guys.
48 Privacy and the Internet Information Aggregators What are Personal Information Aggregators? Personal information aggregators aggregate and display personal information collected from a variety of public sources (such as social network accounts, blog posts, phone book listings, customersubmitted reviews, real estate listings, and databases of other aggregators) and sell detailed reports on individuals for anyone who pays for them (free reports are often available as well). - Spokeo. Snopes.com. (2011). Retrieved from
49 Privacy and the Internet Information Aggregators What are personal information aggregators used for? Personal Information Aggregators operate in much the same way as other data aggregators (financial, topical, social). They use automated processes and custom algorithms to gather and correlate related data from across the Internet. The idea is to create a convenient centralized location to access data that normally resides in multiple locations.
50 Privacy and the Internet Information Aggregators Examples of Personal Information Aggregators: Spokeo.com Pipl.com Zabasearch.com There are many more
51 Privacy and the Internet Information Aggregators Often times, personal information aggregators contain more personal information than a person is comfortable with. Identity thieves, or others with bad intentions, can use this information in support of their criminal pursuits.
52 Privacy and the Internet Information Aggregators Threat Mitigation Strategies: Many of these aggregators offer a way to Opt Out for free (still need to deal with source data). Limit the personal information that you put on the Internet. Limit the personal information that you supply to retailers. Conduct regular personal reconnaissance and damage control by researching your personal information that is available on search engines and aggregator sites.
53 Smart Phone Security
54 Smart Phone Security Today s Smart Phones are essentially fully functional hand held computers. Smart Phones can: Browse the web. Provide access. Take and send pictures or video to anyone anywhere Support numerous applications that take advantage of state of the art technology like the Internet and global positioning systems (GPS).
55 Smart Phone Security Location-Based Services Location-Based Services: Use internet-connected mobile devices geolocation capabilities to let users notify others of their locations by checking in to that location. Some of these geosocial services emphasize social networking functions, and can notify friends on the service when the user is nearby. Other services take a gaming approach, in which check-ins are used to unlock levels or badges, or can be used to earn a certain title when the user has checked in to that location more than any other user. - Zickuhr, K., and Smith, A. 4% of online Americans use location-based services. Pew Internet. November 4, 2010.
56 Smart Phone Security Location-Based Services Foursquare is a web and mobile application that allows registered users to connect with friends and update their location. Points are awarded for "checking in" at venues. Users can choose to have their check-ins posted on their accounts on Twitter, Facebook or both. Facebook Places Facebook Places, like existing location-based apps, uses GPS so people can "check in" on their mobile phones, letting friends know where they are and what they're up to. Gowalla Primarily a mobile web application that allows users to checkin to locations that they visit using their mobile device. Upon checking-in, users may receive items as a bonus and these can be swapped or dropped at Spots. - Wikipeida.org
57 Smart Phone Security Geotagging Geotagging is the process of adding geographical identification information to various media such as photographs, video, websites, SMS messages, or RSS feeds. It is commonly used for photographs. Some cell phones like the iphone and Motorola Backflip utilize a GPS chip along with built-in cameras to allow users to automatically geotag photos. Geographic coordinates can also be added to a photograph after the photograph is taken by attaching the photograph to a map using programs such as Flickr and Panoramio. - Geotagging. Wikipedia. Retrieved from
58 Read the full story here: Smart Phone Security - U.S. ARMY Social Medaia Roundup. Geotags and Location-Based Social Networking. Retreived from Geotagging In August of 2010, Adam Savage, of MythBusters, took a photo of his vehicle using his smartphone. He then posted the photo to his Twitter account including the phrase off to work. Since the photo was taken by his smartphone, the image contained metadata reveling the exact geographical location the photo was taken. So by simply taking and posting a photo, Savage revealed the exact location of his home, the vehicle he drives and the time he leaves for work.
59 Smart Phone Security Risks of using Location-Based Services and geotagging: Establishing patterns of where you go and when. Could be used to determine when you are not home. Could be used to determine the location of your home and/or work. These pieces of information can be used by criminals or other ill-intentioned individuals.
60 Conclusion Review: What is Computer Security? What is at Risk? What can be done to protect your computer? Overview of the Internet and World Wide Web Protecting your Home Network Protecting your Home Computer General On-Line Security Strategies Social Networking Security Privacy and the Internet Smart Phone Security
61 Conclusion 1. Be aware of basic computer security concepts. 2. Protect your personal information. 3. Protect your home network (Wireless Security!) 4. Protect your home computers 5. Be SMART when you are on-line! 6. Avoid publicly sharing personal information 7. Be aware of the security risks with mobile computing devices (Smart Phones)
62 QUESTIONS??
63 Computer Security at Home Presented By Gavin Worden
Malware & Botnets. Botnets
- 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online
More informationSocial Media and Cyber Safety
Social Media and Cyber Safety Presented to the National Association of REALTORS by Andrew Wooten Safety and Security Consultant andrew@justbesafe.com Social Media and Cyber Safety Our instructor today
More informationAVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out
More informationProtect Yourself. Who is asking? What information are they asking for? Why do they need it?
Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary
More informationMarlon R Clarke, Ph. D., CISSP, CISM Director Network Operations and Services, NSU 10-17-2013
Marlon R Clarke, Ph. D., CISSP, CISM Director Network Operations and Services, NSU 10-17-2013 Todays Discussion Overview of Computer and Internet Security What is Computer and Internet Security Who Should
More informationTips for Banking Online Safely
If proper attention is given to safety and security, banking and monetary activities can be completed online in a convenient and effective fashion. This guide helps to establish procedures for remaining
More informationWhite paper. Phishing, Vishing and Smishing: Old Threats Present New Risks
White paper Phishing, Vishing and Smishing: Old Threats Present New Risks How much do you really know about phishing, vishing and smishing? Phishing, vishing, and smishing are not new threats. They have
More informationNational Cyber Security Month 2015: Daily Security Awareness Tips
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
More informationSecure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,
More informationLearn to protect yourself from Identity Theft. First National Bank can help.
Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone
More informationOnline Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange
The responsibility of safeguarding your personal information starts with you. Your information is critical and it must be protected from unauthorised disclosure, modification or destruction. Here we are
More informationHigh Speed Internet - User Guide. Welcome to. your world.
High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a
More informationProtection from Fraud and Identity Theft
Table of Contents Protection from Fraud & Identity Theft... 1 Simple Steps to Secure Your Devices... 1 Setting Up Your Computer and/or Mobile Device... 2 Adding Security Software... 2 Internet Safety Tips...
More informationONLINE IDENTITY THEFT KEEP YOURSELF SAFE FROM BESTPRACTICES WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR
ONLINE IDENTITY THEFT KEEP YOURSELF SAFE FROM BESTPRACTICES 01 One must remember that everyone and anyone is a potential target. These cybercriminals and attackers often use different tactics to lure different
More informationONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS
$ ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS Boston Private Bank & Trust Company takes great care to safeguard the security of your Online Banking transactions. In addition to our robust security
More informationThe following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015.
The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015. By completing this module and the quiz, you will receive credit for CW 170, which is required
More informationOnline Banking Fraud Prevention Recommendations and Best Practices
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee at Continental National Bank of Miami needs to know
More informationOPSEC and Safe Social Networking
OPSEC and Safe Social Networking Agenda Introduction Did you know? Social media access What not to post Privacy settings Geotagging Social Media OPSEC for units Social media concerns for Families and Family
More informationFraud Prevention Tips
Fraud Prevention Tips The best defense against fraud or identity theft is a proactive approach. Here are a few steps you can take to help protect yourself. Protect your identity Copy the front and back
More informationWhen visiting online banking's sign-on page, your browser establishes a secure session with our server.
The privacy of communications between you (your browser) and our servers is ensured via encryption. Encryption scrambles messages exchanged between your browser and our online banking server. How Encryption
More informationBE SAFE ONLINE: Lesson Plan
BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take
More information10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
More informationProactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID
Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation By Marc Ostryniec, vice president, CSID The increase in volume, severity, publicity and fallout of recent data breaches
More informationIdentity Theft and Online Security
Identity Theft and Online Security ACI-588788 American Century Investment Services, Inc. Goals for Presentation Identity Theft - What is it and how are we at risk? Social Media - How much online security
More informationSpam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning
Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Lee Zelyck Network Administrator Regina Public Library Malware, Spyware, Trojans
More information10 Quick Tips to Mobile Security
10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22
More informationNATIONAL CYBER SECURITY AWARENESS MONTH
NATIONAL CYBER SECURITY AWARENESS MONTH Tip 1: Security is everyone s responsibility. Develop an awareness framework that challenges, educates and empowers your customers and employees to be part of the
More informationIt may look like this all has to do with your password, but that s not the only factor to worry about.
Account Security One of the easiest ways to lose control of private information is to use poor safeguards on internet accounts like web-based email, online banking and social media (Facebook, Twitter).
More informationSafe Practices for Online Banking
November 2012 Follow these guidelines to help protect your information while banking online. At First Entertainment Credit Union, our goal is to provide you with the best all around banking experience.
More informationChapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers 2012. Your Interactive Guide to the Digital World
Chapter 11 Manage Computing Securely, Safely and Ethically Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Define the term, computer security risks, and briefly
More informationInternet Scout Patch Workbook
Workbook This workbook can help you but you still need to read the program guide. The work space provided for each requirement should be used by the Scout to make notes for discussing the item with his
More informationRemote Deposit Quick Start Guide
Treasury Management Fraud Prevention How to Protect Your Business Remote Deposit Quick Start Guide What s Inside We re committed to the safety of your company s financial information. We want to make you
More informationINFOCOMM SEC RITY. is INCOMPLETE WITHOUT. Be aware, responsible. secure!
INFOCOMM SEC RITY is INCOMPLETE WITHOUT Be aware, responsible secure! U HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD FASTEN UP!
More informationINTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org
INTERNET & COMPUTER SECURITY March 20, 2010 Scoville Library ccayne@biblio.org Internet: Computer Password strength Phishing Malware Email scams Identity Theft Viruses Windows updates Browser updates Backup
More informationWhy is a strong password important?
Internet Security Why is a strong password important? Identity theft motives: To gain access to resources For the challenge/fun Personal reasons Theft methods Brute forcing and other script hacking methods
More informationTahoe Tech Group serves as your technology partner with a focus on providing cost effective and long term solutions.
Tahoe Tech Group LLC Cyber Security Briefing Truckee Donner Chamber of Commerce March 6, 2015 Tahoe Tech Group serves as your technology partner with a focus on providing cost effective and long term solutions.
More informationCyber Security. Securing Your Mobile and Online Banking Transactions
Cyber Security Securing Your Mobile and Online Banking Transactions For additional copies or to download this document, please visit: http://msisac.cisecurity.org/resources/guides 2014 Center for Internet
More informationDesktop and Laptop Security Policy
Desktop and Laptop Security Policy Appendix A Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious
More informationThe Hidden Dangers of Public WiFi
WHITEPAPER: OCTOBER 2014 The Hidden Dangers of Public WiFi 2 EXECUTIVE SUMMARY 4 MARKET DYNAMICS 4 The Promise of Public WiFi 5 The Problem with Public WiFi 6 MARKET BEHAVIOR 6 Most People Do Not Protect
More information1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.
Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone who can potentially harm your good name and financial well-being. Identity theft
More informationReliance Bank Fraud Prevention Best Practices
Reliance Bank Fraud Prevention Best Practices May 2013 User ID and Password Guidelines Create a strong password with at least 8 characters that includes a combination of mixed case letters and numbers.
More informationDigital Safety and Privacy
Digital Safety and Privacy Class Description: As computers and the Internet become more and more the way we communicate, we need to be aware of potential threats to our security online. This class discusses
More informationInformation Security It s Everyone s Responsibility
Information Security It s Everyone s Responsibility Developed By The University of Texas at Dallas (ISO) Purpose of Training As an employee, you are often the first line of defense protecting valuable
More informationIntroduction to Cyber Security
Mark R. Herring Attorney General Commonwealth of Virginia Office of the Attorney General 900 East Main Street Richmond, Virginia 23219 (804) 786-2071 (Telephone) (804) 786-1991 (Facsimile) Introduction
More informationCyber Security Awareness
Cyber Security Awareness User IDs and Passwords Home Computer Protection Protecting your Information Firewalls Malicious Code Protection Mobile Computing Security Wireless Security Patching Possible Symptoms
More informationCommon Cyber Threats. Common cyber threats include:
Common Cyber Threats: and Common Cyber Threats... 2 Phishing and Spear Phishing... 3... 3... 4 Malicious Code... 5... 5... 5 Weak and Default Passwords... 6... 6... 6 Unpatched or Outdated Software Vulnerabilities...
More informationRetail/Consumer Client. Internet Banking Awareness and Education Program
Retail/Consumer Client Internet Banking Awareness and Education Program Table of Contents Securing Your Environment... 3 Unsolicited Client Contact... 3 Protecting Your Identity... 3 E-mail Risk... 3 Internet
More informationSTOP. THINK. CONNECT. Online Safety Quiz
STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.
More informationWhat are the common online dangers?
ONLINE SECURITY GUIDELINES Internet Banking is convenient and times saving. You can do remittances, place online deposit and other transactions through online banking with the convenience and privacy of
More informationPROTECT YOUR COMPUTER AND YOUR PRIVACY!
PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That
More informationINFORMATION SECURITY FOR YOUR AGENCY
INFORMATION SECURITY FOR YOUR AGENCY Presenter: Chad Knutson Secure Banking Solutions, LLC CONTACT INFORMATION Dr. Kevin Streff Professor at Dakota State University Director - National Center for the Protection
More informationBasic Security Considerations for Email and Web Browsing
Basic Security Considerations for Email and Web Browsing There has been a significant increase in spear phishing and other such social engineering attacks via email in the last quarter of 2015, with notable
More information2016 Digital Safety Class UNDERSTAND YOUR RISKS AND STAY TOTALLY SECURE JESSE ROBERTSON, TECH 4 LIFE
2016 Digital Safety Class UNDERSTAND YOUR RISKS AND STAY TOTALLY SECURE JESSE ROBERTSON, TECH 4 LIFE WHO ARE WE? 12 years of local Tech, Training and Website services Service the 4 areas of life Regularly
More informationWhat you need to know to keep your computer safe on the Internet
What you need to know to keep your computer safe on the Internet Tip 1: Always install Operating System updates The most important steps for any computer user is to always install updates, especially security
More informationBusiness Identity Fraud Prevention Checklist
Business Identity Fraud Prevention Checklist 9 Critical Things Every Business Owner Should Do Business identity thieves and fraudsters are clever and determined, and can quickly take advantage of business
More informationDefense Media Activity Guide To Keeping Your Social Media Accounts Secure
Guide To Keeping Your Social Media Accounts Secure Social media is an integral part of the strategic communications and public affairs missions of the Department of Defense. Like any asset, it is something
More informationPayment Systems Department
v Note: Please follow these guidelines for your safety as you enjoy the convenience of technology. However these guidelines are general; therefore, specific precautions may be taken as warranted by the
More informationFraud Detection and Prevention. Timothy P. Minahan Vice President Government Banking TD Bank
Fraud Detection and Prevention Timothy P. Minahan Vice President Government Banking TD Bank Prevention vs. Detection Prevention controls are designed to keep fraud from occurring Detection controls are
More informationBasic Computer Security Part 2
Basic Computer Security Part 2 Presenter David Schaefer, MBA OCC Manager of Desktop Support Adjunct Security Instructor: Walsh College, Oakland Community College, Lawrence Technology University Welcome
More informationCybercrimes NATIONAL CRIME PREVENTION COUNCIL
NATIONAL CRIME PREVENTION COUNCIL What is Cybercrime? A crime committed or facilitated via the Internet is a cybercrime. Cybercrime is any criminal activity involving computers and networks. It can range
More informationCyber Security. Maintaining Your Identity on the Net
Cyber Security Maintaining Your Identity on the Net Why Cyber Security? There are three points of failure in any secure network: Technology (hardware and software) Technology Support (ITS) End Users (USD
More informationUnderstand What s Going On
Internet Safety Tips For Dummies In This Book Recognizing how online risks occur Staying safer with technology Taking care with shared photos Understanding how crooks collect information Reporting fraud
More informationInfocomm Sec rity is incomplete without U Be aware,
Infocomm Sec rity is incomplete without U Be aware, responsible secure! HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD [ 2 ] FASTEN
More informationRecognizing Spam. IT Computer Technical Support Newsletter
IT Computer Technical Support Newsletter March 23, 2015 Vol.1, No.22 Recognizing Spam Spam messages are messages that are unwanted. If you have received an e-mail from the Internal Revenue Service or the
More informationCyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014
Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014 Lisa D. Traina, CPA, CITP, CGMA Lisa Traina utilizes her 30+ years of experience as a CPA, CITP and CGMA
More informationGeneral Security Best Practices
General Security Best Practices 1. One of the strongest physical security measures for a computer or server is a locked door. 2. Whenever you step away from your workstation, get into the habit of locking
More informationProtecting Yourself Against Identity Theft. Identity theft is a serious. What is Identity Theft?
Protecting Yourself Against Identity Theft Identity theft is a serious crime. Identity theft happens when someone steals your personal information and uses it without your permission. It is a growing threat
More informationSMALL BUSINESS IT SECURITY PRACTICAL GUIDE
SMALL BUSINESS IT SECURITY PRACTICAL GUIDE How to make sure your business has comprehensive IT security protection #protectmybiz Small businesses come in all shapes and sizes. But in today s world, no
More informationAnti-Phishing Best Practices for ISPs and Mailbox Providers
Anti-Phishing Best Practices for ISPs and Mailbox Providers Version 2.01, June 2015 A document jointly produced by the Messaging, Malware and Mobile Anti-Abuse Working Group (M 3 AAWG) and the Anti-Phishing
More informationGetting a Secure Intranet
61-04-69 Getting a Secure Intranet Stewart S. Miller The Internet and World Wide Web are storehouses of information for many new and legitimate purposes. Unfortunately, they also appeal to people who like
More informationCreating a Culture of Cyber Security at Work
Creating a Culture of Cyber Security at Work Webinar Why is this important? Cybersecurity is a people problem. Cybersecurity is no longer just the IT department s responsibility. It is everyone s responsibility.
More information9 Simple steps to secure your Wi-Fi Network.
9 Simple steps to secure your Wi-Fi Network. Step 1: Change the Default Password of Modem / Router After opening modem page click on management - access control password. Select username, confirm old password
More informationSTOP THINK CLICK Seven Practices for Safer Computing
Seven Practices for Safer Computing Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than earlier generations
More informationInternet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
More informationCourse: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems
Course: Information Security Management in e-governance Day 1 Session 5: Securing Data and Operating systems Agenda Introduction to information, data and database systems Information security risks surrounding
More informationCyber Security Awareness
Cyber Security Awareness William F. Pelgrin Chair Page 1 Introduction Information is a critical asset. Therefore, it must be protected from unauthorized modification, destruction and disclosure. This brochure
More informationFirewalls for small business
By James Thomas DTEC 6823 Summer 2004 What is a firewall? Firewalls for small business A firewall is either hardware, software or a combination of both that is used to prevent, block or should I say try
More informationHow-To Guide: Cyber Security. Content Provided by
How-To Guide: Cyber Security Content Provided by Who needs cyber security? Businesses that have, use, or support computers, smartphones, email, websites, social media, or cloudbased services. Businesses
More informationWHAT YOU NEED TO KNOW ABOUT CYBER SECURITY
SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes
More informationWelcome To The L.R.F.H.S. Computer Group Wednesday 27 th November 2013
Welcome To The L.R.F.H.S. Computer Group Wednesday 27 th November 2013 BACKUP SECURITY AND THE CLOUD BACK UP ALWAYS BACK UP TO AN EXTERNAL DEVICE OR REMOVAL MEDIA- NEVER DIRECTLY ON TO YOUR COMPUTER IF
More informationAvoid completing forms in email messages that ask for personal financial information.
INTERNET FRAUD Online scams and viruses are constantly evolving and they threaten the security of computers worldwide. As criminals evolve their tactics, you need to keep your PC's security software (virus
More informationTMCEC CYBER SECURITY TRAINING
1 TMCEC CYBER SECURITY TRAINING Agenda What is cyber-security? Why is cyber-security important? The essential role you play. Overview cyber security threats. Best practices in dealing with those threats.
More informationComputer Security Maintenance Information and Self-Check Activities
Computer Security Maintenance Information and Self-Check Activities Overview Unlike what many people think, computers are not designed to be maintenance free. Just like cars they need routine maintenance.
More informationProtecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
More informationGovernment Entity located in St. Louis Serving Government for over 40 Years
Government Entity located in St. Louis Serving Government for over 40 Years Primary Focus - Law Enforcement/Court Systems, Infrastructure Support, and Colocation Services 140 employees (100+ are IT) Dumb
More informationDeter, Detect, Defend
Deter, Detect, Defend Deter Never provide personal information, including social security number, account numbers or passwords over the phone or Internet if you did not initiate the contact Never click
More informationDetailed Description about course module wise:
Detailed Description about course module wise: Module 1: Basics of Networking and Major Protocols 1.1 Networks and its Types. 1.2 Network Topologies 1.3 Major Protocols and their Functions 1.4 OSI Reference
More informationCorporate Account Take Over (CATO) Guide
Corporate Account Take Over (CATO) Guide This guide was created to increase our customers awareness of the potential risks and threats that are associated with Internet and electronic- based services,
More informationAdvice about online security
Advice about online security May 2013 Contents Report a suspicious email or website... 3 Security advice... 5 Genuine DWP contacts... 8 Recognising and reporting phishing and bogus emails... 9 How DWP
More informationHelping you to protect yourself against fraud and financial crime
Helping you to protect yourself against fraud and financial crime first direct takes fraud & other financial crimes very seriously. Even though we have market-leading fraud detection systems, we want you
More informationSecurity Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.
IDENTITY THEFT Security Breaches Our economy generates an enormous amount of data. Most users of that information are from honest businesses - getting and giving legitimate information. Despite the benefits
More informationWhat s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. AGENDA Current State of Information Security Data Breach Statics Data Breach Case Studies Why current
More informationYour Personal Information: Protecting it from Exploitation
Your Personal Information: Protecting it from Exploitation Data breaches involving personal information result in a broad range of risks to individuals and organizations. This includes identity theft,
More informationIt s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions
It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions Your home is your business and your farm is your network. But who has access to it? Can you protect
More informationBest Practices Guide to Electronic Banking
Best Practices Guide to Electronic Banking City Bank & Trust Company offers a variety of services to our customers. As these services have evolved over time, a much higher percentage of customers have
More informationOpen an attachment and bring down your network?
Open an attachment and bring down your network? Many people think this will never happen to them, but virus attacks can come from unlikely sources and can strike when you least expect it. They can wreak
More informationStatistical Analysis of Internet Security Threats. Daniel G. James
Statistical Analysis of Internet Security Threats Daniel G. James ABSTRACT The purpose of this paper is to analyze the statistics surrounding the most common security threats faced by Internet users. There
More informationOCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875
OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,
More informationProtecting Yourself from Identity Theft
Protecting Yourself from Identity Theft Guide 4 Because you don t have to be the next victim Desert Schools Money Matters Series Guiding you toward financial success Table of Contents How ID theft happens.............................
More informationIdentity Theft. Protecting Yourself and Your Identity. Course objectives learn about:
financialgenius.usbank.com Course objectives learn about: Avoiding Identity Theft Recognize Phishing Attempts Getting Help for ID Theft Victims Identity Theft Protecting Yourself and Your Identity Index
More information