How Do People Use Security in the Home

Size: px
Start display at page:

Download "How Do People Use Security in the Home"

Transcription

1 How Do People Use Security in the Home Kaarlo Lahtela Helsinki University of Technology Abstract This paper investigates home security. How much people know about security and how they use it. Six person were interviewed and observed how they use computer especially in relation to how they handled the security features. What was found, was that the main basics and terms were mostly known to everyone. They were avoiding using security, if it brings too much trouble to them. Many users have nowadays wireless network connection, which have encryption enabled. Users have anti-virus and firewall softwares installed to their computers, and they work fine. Private mail is not kept so vulnerable for attacked that they would use encrypted mail. KEYWORDS: home security, security threats, user point of view, wireless network, private . 1 Introduction World is going to use more and more technology, which means that we relate on computers more. Sensitive materials, namely passwords, financial information and personal documents, are stored in computer and also transferred through networks. These new techniques produce new threats to us. Attackers can get information from us easily, even in a way that we do not recognise that the attacker gets the information from us. In the past, attacks had to be done in a way where attacker was close to the victim, in other words, now attacks can be safely done from distance. There are several examples to describe the new threats. First, people use their bank account from home, in other words they pay the bills from the home computer. So they do not have to go to a city and join a queue in bank to get the bills paid. Second, there are also people who work at home or when they are travelling. Nowadays they have to connect to company s network. This creates new security issues to the company to keep their information secure. Although distance work is more employee s company s problem, but the company have to be aware of the lack of the employee s home network security. Third, our messages can be read, when message encrypting is not in use. This leads to easy access to our messages So there are different level of new threats that users have to acknowledged. The main point is here that normal users also need education of security when using computers and mobile devices, and connect them to Internet. Few years ago there were no fixed Internet connections, just dial-up connections. This fixed connection brings us threat that can attack any time. Web browsers and instant messaging applications have very much vulnerabilities, meaning that we have threats in the most common software that users exploit [4]. Nowadays, just learning to use the equipment may cause serious security problems, if there is not any knowledge of security. There are lots of different security methods that normal user should know. I do not present them here. I will briefly go throw, what kind of aspects I have in my research. Short introduction to these techniques can be found in Home Network Security [7]. Banking connections are made with HTTPS [2] connection, what means that connection is encrypted. So attacker who is listening to the connection cannot see what information is transferred. Encrypted connection is recommended, when user is transferring sensitive information, for example user name and password. Internet bank services use this kind of encrypted connections. In this connection the encryption is also verified by certificate so that user connecting, for example to the bank, can see that it is the bank s service and not some attacker s fake service. If connection is not encrypted, the attacker could have this way user s log in name and password. Wireless networks are becoming more common, because of the lack of wires and laptops and mobile computers are becoming more popular. Wireless connection is easier to use, because there is no need to plug the wire, just use it. Wireless connections brings more new threats to users [9]. Attacker can just scan radio waves from distance, and do not need to be connected to the network by wire. Users send in plain text. There is also possibility to send encrypted . Most common is PGP [1]. At least encrypted is used in companies, but how much is it used in home, and for personal communication? is also used by attacker for sending viruses that could take over user s computer. Virus attacks are used for disturb user or to take control computer for larger attacks to somewhere. Computer worms have come more common by spreading in . There is also risk having a with a virus. What kind of protection does users have? 2 Related Work In the article The Work to Make a Home Network Work [8] is written how home networks are becoming wider and more complex. How these new bigger networks could be maintained and kept secured. I research in this paper how well users know home networks and security. How much people really know about security and are they able to contain it to software. When do we know software

2 is secure enough? We can make software to handle security [6], but we should be able to make users use security and not bypass it. Nucleus Research and KnowledgeStorm made a research, where was investigated that one third of employees write down their password on a paper [3]. This gives advantage to attacker to steel the passwords strait from the papers. This is one kind of risk, what user do. 3 The Study I made few interviews regarding user s knowledge of security. First, I collected background information of users. This helps us to categorise them in different groups. Second, I discussed about their knowledge of basic and advanced security terms. I asked them to explain them. Also investigated how they use them, if they are familiar with them. Finally, I made few tests with them and collected information of their behaviour in security aspect. 3.1 Test Procedure To get information about security behaviours in person s home, I went to person s home and made my research there. These persons, who are in my research, have many different profiles of using computers. The scale was from young to old and from beginner to expert. First, I made an interview and collected background information about of the user, such as education, age and how long they have been using computer. The latter was usually easier for them to remember as the same day when they or their parent bought the first computer. They had to describe how much they have been using computer in that time, meaning like couple hours a week or several hours in a day. Next I asked about how much they use computer in their work. Does the work relate to computers, like software development, document writing or graphical design, or is their work more like physical work, where they do not use computers. Same kind of question, related to school, were asked, if the user were studying and did not have job yet. Computer can be used in several purposes, so I had to resolve where the computer was mainly used. Is it just for checking , playing video games or was it like a hobby for the user. Second, there was several questions about how well they know security. I went through threat terms like virus, computer worm, spyware, Trojan horse and phishing. This reveals how much they know about basic language on computer security and as well reveals if they have some wrong believes, what some of those mean. About the software they are using, I wanted to know from anti-virus program. How often they scan their hard drives and have updates to virus databases. Are they using some sort of firewall and is it configured by themselves or someone else. And if they are configured, is there basically the default setting or do they know how to make secure settings. In addition, I went though their local network. Were they using wireless networks, and if were, what kind of security practises were used. Was there encryption over the air, like WEP or WPA. Last, users told what kind of other security practises they were using. And I also asked question related to their previous answers, so that I could have clearer vision about their real knowledge of security in their home. 3.2 Users Brief description of users. First little about their background, meaning users age, education, computer knowledge and computer habits. And then following the security knowledge of computers and networks Retired computer beginner Background This is an older person, who has been few years retired. He started using computers about five years ago. Mainly he uses the computer to pay bills in Internet bank and he sends couple messages in a week. Other things he does with computer is storing pictures from digital camera and finding information from Google and Wikipedia. He can use only Finnish, because he do not know any English. Knowledge Security issues are not familiar to him. Antivirus is installed to his computer, but he do not administrate the computer. Windows Security Center and anti-virus software updates themselves for critical updates and virus databases, but still one of his children checks that new security updates are installed. He has Windows of local language, but his anti-virus and firewall software are in English. That is big disadvantage for his security behaviour. Usually he allows the question that comes from the firewall, but when something unfamiliar happens, he calls to his child and tries to explain what is going on. Usually the call resolves the problem, but sometimes it is hard to find a solution. Wireless network is also found in his home, but he does not use it. He uses network cable connection. He has been taught how to bay bills in Internet bank, but he do not actually know about certificates or secure HTTP connection. In problems he has someone to call, as described above. Security threat terms are familiar to him, but he was not sure about their meaning. The basics were quite correct, when he was explaining the meanings of the terms. Phishing was familiar from news couple weeks ago. He is protected from viruses, computer worms and spam in software. At least he has not had any bigger problems with the computer. Computer is only used for couple basic purposes Senior Software Engineer Background Next we have on person, who is in late thirties. He had used computer since he were little child. He has graduated to Bachelor of Business Administration. Now he is working in large software company as Senior Software Engineer, for four years now. He uses computer daily few hours at home, excluding his work. Computer is used in almost any possible way.

3 Knowledge He knows about security quite well. Uses antivirus software and updates virus databases regularly. He knows what viruses are and last time had virus attack in early 90 s, which deleted all files from his hard drive. This was the only attack that made something harmful to him. He has software and hardware firewalls to prevent attacks from Internet and also from suspicious behaviour of software, which are trying to send information to network. Wireless network is installed to his home, but he uses mainly network cable to connect computers. Wireless network is used for laptops and mobile phones. It uses WEP encryption and MAC filtering, to prevent unwanted users to the network. Certificate and encrypted HTTP connections are familiar to him. Secure HTTPS connection is always used, when he enters user name and password and when sensitive information is transferred. He do not empty web browser cache, because he is using own computer for viewing bank information and no one else has access to that computer. Mail is sent using plain text, no PGP or other encryption is used. He describes that there is no need to encrypt the messages, and so few of his friends have capability to receive encrypted messages. Connection to the mail server is encrypted. Trojan horse, computer worm, phishing and spyware are well-known to him. He is aware of these attacks. In addition he uses McAfee SiteAdvisor and NetCraft plugins in his web browser to notice attacks Journalist Background Then we have almost thirty years old journalist. He works with the computer everyday, especially with word processing, sheet charts, layout design and listening for music. He is almost ready Master of Economics, and is mainly working nowadays. Writing articles is the main task in work. Knowledge He does not have own computer at home and uses the laptop computer from work. There are Anti-virus and firewall software from company he works. He knows the basics of these softwares, but mainly keeps them at default settings. He has avoided been attacked by viruses. At home he uses wireless network, because it is easy to use and do not need to connect cables. He did not know, if there is used an encryption in the network connection, but as I checked there were strong WEP encryption. Someone helped him to install the network and obviously he also enabled the encryption. Different kinds of security threats were familiar to him. He knows viruses, spyware, computer worms and Trojan horse. Some of those had small guesses and he was not sure about the meaning, but mainly it was knowledge. What he was not aware of was the phishing threat, but after giving some examples, he recognises it. So he knew the threat, but only the term was new. Certificates were familiar, and he said that banks have some kind of high level certificates. He was not so familiar of how they work, and how to see threats on other sites. What was more concerning that he did not know about the HTTPS connection. In banking he noticed that it was used, but did not demand encrypted connection on other web pages, where user name and password are required. He told that after this he is more aware of demanding HTTPS connections when it is needed Physiotherapist Background A physiotherapist is in mid thirties. She has been using computes for about ten years. Now she uses computer in work also, meaning basic softwares, like documenting. She uses computer occasionally at home. The main usage is creating documents, browsing Internet and checking . Knowledge She is not very familiar with the security terms. She have heard about them, but do not know their exact meaning. She uses the basic windows firewall, to prevent attacks from Internet. The cable modem has as well basic firewall, which prevents attacks. Anti-virus software is installed to her laptop, by recommendation of her friend. Her laptop is connected by the wireless connection of her cable modem. It is encrypted. When she is using the banking service, she checks that web browser has a sign of lock that tells it is encrypted. She did not know about certificates, or that it is recommended to see who the owner of secured connection is. Encrypted mail is not used and she uses basic webmail user interface University student Background A young student, namely early twenties, is studying English Philosophy in University. Her computer is Macintosh laptop, what mainly differs from other users that I have interviewed. She has been using computers for about ten years now. She has computer at work also, so she uses computer often. Computer is mainly used for creating documents and browsing Internet. Knowledge Basic security is not very known to her. She believes that her computer is safer than Windows computers, and no virus can attack to her computer. She was not aware, if the computer had anti-virus and firewall installed. The terms virus, computer worm and Trojan horse was familiar to her. The newest term, phishing, she was not familiar with. Wireless network is used at home, at least when it works, which means that she sometimes uses a network cable to connect Internet. The wireless network is secured, which means, in this situation, WEP encryption. She is using Internet also for paying bills in Internet. Certificates are not familiar to her. She is also unaware of encrypted HTTP connection. She just used the bank services and did not know any threats that could happen to her. She believed that paying bills was safe in the Internet Helsinki Business Polytechnic student Background Last we have a student from Helsinki Business Polytechnic and he is graduating in next year as Bachelor of Business Administration. He has been computing almost ten years, starting from upper level school. Computer is used to make homework from school. In other words, word

4 processing and sheet charts are used. Games are also played with the computer. He uses the computer several hours a day. Knowledge He has some knowledge of security threats. He uses anti-virus and software firewall, knowing also the purpose of those softwares. There is as well firewall from the Internet service provider. He still do not care so much of the warnings of the firewall, meaning that he allows almost any question from the firewall. The main point is that the software, he is using, is working. He is not so keen of solving which of warnings can be harmful. Virus and spyware terms were the only two that he knew the meaning. When describing about the computer worm, Trojan horse and phishing, he did not actually knew what they were or described them wrong. Paying bills is something what he does in Internet, but he did not know anything about security of Internet banks. He was satisfied when he did not get any claims not paying the bills. When bringing topics like certificate and encrypted HTTP connection, he did not know anything about those two. I see this as a big risk. Mail he uses from basic front end in web. Mail encryption was unknown to him, and did not found any reason to use encryption. 4 Discussion Short wrap up from the interviews I made. Second, brief comments of good design in secure equipment and services available. 4.1 Test Result Computers in home are used in basic needs, which are writing a document, browsing Internet for information and reading . They use computers mainly everyday from few minutes to several hour. Three hours being the average using time. This does not include the distance work. Users have mainly good knowledge of basic security terms. They know what a virus or a computer worm is. Trojan horse was also known quite well. Newer term like phishing was familiar for only couple. And the meaning was actually more familiar than the term it self. Very few noticed that they have been attacked by virus or other threats. Usually firewalls and anti-virus programs have taken care of threat and gave notice to user that threat has been defeated. So attacks have been taken care of before they could produce any harm. Users usually just install the firewall and antivirus software, and leave them then in background. Only few made configuration on them. On the basic configuration they update them selves and notice the user, if attention is needed. They work quite well in background with default configuration. Most users have also wireless network connection, at least if they have laptop computer. Access points were using encrypting connection to the mobile devices. It was the older WEP encryption, but the main point is that there was some kind of protection. No one could even accidentally connect to these networks. They have to know the key to the access point, if they want to connect to the access point. One Property u1 u2 u3 u4 u5 u6 Virus x x x x x x Computer Worm x x x Trojan horse x x x Phishing x x x Encrypted WLAN x x x HTTPS x x Certificate x x sum Table 1: A table about how users know different terms and security techniques of the users used also MAC filtering, so only preconfigured users could connect to the access point. This is a good solution, when the users are known in advantage, and so could be configured to access point. He was more advantage user and clearly knew more of security risks. Mail privacy was not concerning almost anybody s mind. They were happy to things as they are now. It was enough for them to have encrypted connection to mail server, but nobody actually saw benefit from encrypted mail. The trouble was bigger than benefit. It is like good enough quality for software as here for privacy. 4.2 How to make existing techniques easier and more secure As the results of this study can be seen that users have wireless connection encrypted. These kind of techniques, like one button configuration for secure the wireless connection, should be more [5]. No more access points with large amount of help pages, to guide the user to enable encryption. Internet bank services use encrypted transport protocols and it is easy to notice from web browser, that it is used. The lock sign next to URL or in status bar. User does not have to activate it in any way. Users cannot even bypass the encryption, because it is required from the service provider. So they cannot do it wrong. These are good examples of implementing security. 5 Conclusion Security is usually avoided, if it is to hard to use. Users are more likely to disable the security configurations, if they bring more work to them. This happens especially when they do not see the treats that can affect to them. The security should be more automatic, other words user should not notice much difference if he is using the security or not. It would be better, if there were some kind of security sign in the service, if security or encryption is enabled. That way it is fast to see if security is enabled. Warning would come in non-secure services. This way users more likely have security, because it is less work. User should have more education of security before they use new services and softwares. First there should be some kind of driving license, as cars do have, that person is capable of using the equipment of program. It is a risk to when you

5 cannot see or do not know the threats, that can make harm to you. 5.1 Further work This was just a small research and gives some hypotheses to larger scale interviews and tests. These security studies were just a random pick, with very mixed profiles. These hypotheses can be used in future tests. This just brings some kind of direction what kind of result it might bring along. References [1] Pgp message exchange formats, August [2] Http over tls, May [3] One in three employees compromise corporate security through lax password practices, nucleus research study finds. web, October releases/prpassword1006.html. [4] Sans institute, the top 20 most critical internet security vulnerabilities. web, October [5] D. Balfanz, G. Durfee, R. E. Grinter, D. K. Smetters, and P. Stewart. network-in-a-box: How to set up a secure wireless network in under a minute in proceedings of the usenix security symposium pages , August [6] P. Dourish. Security in the wild: user strategies for managing security as an everyday, practical problem. Personal Ubiquitous Comput., 8(6): , November [7] C. Ellison. Home network security. Intel Technology Journal, interoperable Home Infrastructure, 6(4):36 48, November [8] R. E. Grinter, W. K. Edwards, M. W. Newman, and N. Ducheneaut. the work to make the home network work: in proceedings of the 9th european conference on computer supported cooperative work (ecscw 05). pages , September [9] V. Gupta and S. Gupta. Securing the wireless internet. IEEE Communications Magazine, 39(12):68 74, December 2001.

Essentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library

Essentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library Essentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library Why should you be concerned? There are over 1 million known computer viruses. An unprotected computer on the

More information

Computer Security Maintenance Information and Self-Check Activities

Computer Security Maintenance Information and Self-Check Activities Computer Security Maintenance Information and Self-Check Activities Overview Unlike what many people think, computers are not designed to be maintenance free. Just like cars they need routine maintenance.

More information

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org INTERNET & COMPUTER SECURITY March 20, 2010 Scoville Library ccayne@biblio.org Internet: Computer Password strength Phishing Malware Email scams Identity Theft Viruses Windows updates Browser updates Backup

More information

HomeNet. Gateway User Guide

HomeNet. Gateway User Guide HomeNet Gateway User Guide Gateway User Guide Table of Contents HomeNet Gateway User Guide Gateway User Guide Table of Contents... 2 Introduction... 3 What is the HomeNet Gateway (Gateway)?... 3 How do

More information

High Speed Internet - User Guide. Welcome to. your world.

High Speed Internet - User Guide. Welcome to. your world. High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a

More information

Malware & Botnets. Botnets

Malware & Botnets. Botnets - 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online

More information

Cyber Security: Beginners Guide to Firewalls

Cyber Security: Beginners Guide to Firewalls Cyber Security: Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers This appendix is a supplement to the Cyber Security: Getting Started

More information

For assistance with your computer, software or router we have supplied the following information: Tech Support 1-855-546-5000, press 1

For assistance with your computer, software or router we have supplied the following information: Tech Support 1-855-546-5000, press 1 For assistance with your computer, software or router we have supplied the following information: Tech Support 1-855-546-5000, press 1 Talk America Services Customer Service 1-855-546-5000, press 3 TALK

More information

References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household

References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household This appendix is a supplement to the Cyber Security: Getting Started Guide, a non-technical reference essential for business managers, office managers, and operations managers. This appendix is one of

More information

Cyber Security Beginners Guide to Firewalls A Non-Technical Guide

Cyber Security Beginners Guide to Firewalls A Non-Technical Guide Cyber Security Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers Multi-State Information Sharing and Analysis Center (MS-ISAC) U.S.

More information

Internet Quick Start Guide. Get the most out of your Midco internet service with these handy instructions.

Internet Quick Start Guide. Get the most out of your Midco internet service with these handy instructions. Internet Quick Start Guide Get the most out of your Midco internet service with these handy instructions. 1 Contents Internet Security................................................................ 4

More information

Why is a strong password important?

Why is a strong password important? Internet Security Why is a strong password important? Identity theft motives: To gain access to resources For the challenge/fun Personal reasons Theft methods Brute forcing and other script hacking methods

More information

Business Internet Banking / Cash Management Fraud Prevention Best Practices

Business Internet Banking / Cash Management Fraud Prevention Best Practices Business Internet Banking / Cash Management Fraud Prevention Best Practices This document provides fraud prevention best practices that can be used as a training tool to educate new Users within your organization

More information

Stable and Secure Network Infrastructure Benchmarks

Stable and Secure Network Infrastructure Benchmarks Last updated: March 4, 2014 Stable and Secure Network Infrastructure Benchmarks 501 Commons has developed a list of key benchmarks for maintaining a stable and secure IT Infrastructure for conducting day-to-day

More information

Business ebanking Fraud Prevention Best Practices

Business ebanking Fraud Prevention Best Practices Business ebanking Fraud Prevention Best Practices User ID and Password Guidelines Create a strong password with at least 8 characters that includes a combination of mixed case letters, numbers, and special

More information

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange The responsibility of safeguarding your personal information starts with you. Your information is critical and it must be protected from unauthorised disclosure, modification or destruction. Here we are

More information

Infocomm Sec rity is incomplete without U Be aware,

Infocomm Sec rity is incomplete without U Be aware, Infocomm Sec rity is incomplete without U Be aware, responsible secure! HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD [ 2 ] FASTEN

More information

STOP. THINK. CONNECT. Online Safety Quiz

STOP. THINK. CONNECT. Online Safety Quiz STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.

More information

The Hidden Dangers of Public WiFi

The Hidden Dangers of Public WiFi WHITEPAPER: OCTOBER 2014 The Hidden Dangers of Public WiFi 2 EXECUTIVE SUMMARY 4 MARKET DYNAMICS 4 The Promise of Public WiFi 5 The Problem with Public WiFi 6 MARKET BEHAVIOR 6 Most People Do Not Protect

More information

Basic Computer Security Part 2

Basic Computer Security Part 2 Basic Computer Security Part 2 Presenter David Schaefer, MBA OCC Manager of Desktop Support Adjunct Security Instructor: Walsh College, Oakland Community College, Lawrence Technology University Welcome

More information

Online Banking Fraud Prevention Recommendations and Best Practices

Online Banking Fraud Prevention Recommendations and Best Practices Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee at Continental National Bank of Miami needs to know

More information

National Cyber Security Month 2015: Daily Security Awareness Tips

National Cyber Security Month 2015: Daily Security Awareness Tips National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.

More information

Internet basics 2.3 Protecting your computer

Internet basics 2.3 Protecting your computer Basics Use this document with the glossary Beginner s guide to Internet basics 2.3 Protecting your computer How can I protect my computer? This activity will show you how to protect your computer from

More information

Internet tools and techniques at this level will be defined as advanced because:

Internet tools and techniques at this level will be defined as advanced because: Unit Title: Using the Internet OCR unit number: 41 Level: 3 Credit value: 5 Guided learning hours: 40 Unit reference number: F/502/4298 Unit purpose and aim This is the ability to set up and use appropriate

More information

Email Security. 01-15-09 Fort Mac

Email Security. 01-15-09 Fort Mac Email Security 01-15-09 Fort Mac Most Common Mistakes in Email Security Email Security 1. Using just one email account. 2. Holding onto spammed-out accounts too long. 3. Not closing the browser after logging

More information

Network Security. Demo: Web browser

Network Security. Demo: Web browser Network Security Demo: Web browser Email Messages An email message can be instantly forwarded around the globe, even if accidentally. Do not write anything in a message that you will later regret! Read

More information

Thank you for choosing Zoom Internet!

Thank you for choosing Zoom Internet! Thank you for choosing Zoom Internet! We know you are going to love the speed, convenience and reliability of Zoom s super fast, always on connectivity to the Web! This guide provides helpful information

More information

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Lee Zelyck Network Administrator Regina Public Library Malware, Spyware, Trojans

More information

Reliance Bank Fraud Prevention Best Practices

Reliance Bank Fraud Prevention Best Practices Reliance Bank Fraud Prevention Best Practices May 2013 User ID and Password Guidelines Create a strong password with at least 8 characters that includes a combination of mixed case letters and numbers.

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions 1) What does SkyBest Internet Guardian do? Prevents e-mail and image spam from reaching your inbox Halts access to dangerous Web pages Stops Web sites from installing dangerous

More information

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0 BCS IT User Syllabus IT for Users Level 2 Version 1.0 June 2009 ITS2.1 System Performance ITS2.1.1 Unwanted messages ITS2.1.2 Malicious ITS2.1.1.1 ITS2.1.1.2 ITS2.1.2.1 ITS2.1.2.2 ITS2.1.2.3 ITS2.1.2.4

More information

N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work

N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work How Firewalls Work By: Jeff Tyson If you have been using the internet for any length of time, and especially if

More information

Information Security. Louis Morgan, CISSP Information Security Officer

Information Security. Louis Morgan, CISSP Information Security Officer Information Security By Louis Morgan, CISSP Information Security Officer Why Bother with IT Security? Recent estimate - 900 million personal computers worldwide. Computer hackers are out there. How long

More information

Data protection. Protecting your personal information online

Data protection. Protecting your personal information online Data protection Protecting your personal information online 3 Introduction More and more people are conducting their personal affairs online. Online shopping, social networking, job hunting and the ability

More information

NewNet 66 Network Security

NewNet 66 Network Security NewNet 66 Network Security Spyware... Understanding the Threat What is Spyware? Spyware is an evolved term. In the mid 90s, it was used to refer to high-tech espionage gadgets. By the late 90s, it became

More information

Securing Your Wireless Network

Securing Your Wireless Network Choosing A Wireless Router You might already have a wireless router provided to you by your Internet Service Provider. Otherwise, if you are intending to get one or decide to upgrade your old router, look

More information

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

PROTECT YOUR COMPUTER AND YOUR PRIVACY! PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That

More information

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know

More information

Countermeasures against Unauthorized Access

Countermeasures against Unauthorized Access Countermeasures against Unauthorized Access Is your computer really safe? For PC Users Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ What is Unauthorized Access?

More information

Welcome. Thank you for choosing Cogeco High Speed Internet.

Welcome. Thank you for choosing Cogeco High Speed Internet. Welcome Welcome Thank you for choosing Cogeco High Speed Internet. Welcome to the endless range of possibilities available to you with your new High Speed Internet service. When it comes to speed, you

More information

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out

More information

Internet Security for Windows XP and Vista

Internet Security for Windows XP and Vista Welcome Windows XP and Vista Users Welcome to Alliance Internet. You have joined one of the fastest growing Internet providers in the area. This information will help you understand how your Internet works.

More information

avast! Free Antivirus for Mac Quick Start Guide avast! Free Antivirus for Mac Quick Start Guide

avast! Free Antivirus for Mac Quick Start Guide avast! Free Antivirus for Mac Quick Start Guide avast! Free Antivirus for Mac Quick Start Guide 1 Introduction Welcome to avast! Free Antivirus for Mac. avast! Free Antivirus for Mac contains the same ICSA Certified scan engine as all avast! antivirus

More information

Airtel PC Secure Trouble Shooting Guide

Airtel PC Secure Trouble Shooting Guide Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does

More information

CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere.

CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere. Benefits & Features CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere. What can I do with Internet Banking? You can inquire

More information

CLEO Remote Access Services CLEO Remote Desktop Access User Guide v1.3

CLEO Remote Access Services CLEO Remote Desktop Access User Guide v1.3 CLEO ~Remote Access Services Remote Desktop Access User guide CLEO Remote Access Services CLEO Remote Desktop Access User Guide v1.3 August 2007 page 1 of 16 CLEO 2007 CLEO Remote Access Services 3SGD

More information

How to prevent computer viruses in 10 steps

How to prevent computer viruses in 10 steps How to prevent computer viruses in 10 steps Following on from our advice on how to keep your online data secure, we ve created a follow-up outlining how you can keep your computer itself safe. Not only

More information

Contents. McAfee Internet Security 3

Contents. McAfee Internet Security 3 User Guide i Contents McAfee Internet Security 3 McAfee SecurityCenter... 5 SecurityCenter features... 6 Using SecurityCenter... 7 Fixing or ignoring protection problems... 16 Working with alerts... 21

More information

McAfee S DO s AnD DOn ts Of Online Shopping

McAfee S DO s AnD DOn ts Of Online Shopping McAfee s Do s and don ts OF Online Shopping Table of Contents Foreword by Parry Aftab, 3 Online Safety Expert Online Shopping: The Real Deal 4 The DO s and DON Ts 5 Summary 17 Resources 18 Happy Online

More information

STRONGER ONLINE SECURITY

STRONGER ONLINE SECURITY STRONGER ONLINE SECURITY Enhanced online banking without compromise Manage your business banking efficiently and securely Internet banking has given business leaders and treasurers greater control of financial

More information

Section 12 MUST BE COMPLETED BY: 4/22

Section 12 MUST BE COMPLETED BY: 4/22 Test Out Online Lesson 12 Schedule Section 12 MUST BE COMPLETED BY: 4/22 Section 12.1: Best Practices This section discusses the following security best practices: Implement the Principle of Least Privilege

More information

Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org

Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org Cyber Security Awareness Internet Safety Intro www.staysafeonline.org 1 What is Cyber Security? Cyber Security is the body of technologies, processes and practices designed to protect from attack, damage

More information

VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong

VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY AUTHOR: Raúl Siles Founder and Security Analyst at Taddong Hello and welcome to Intypedia. Today we will talk about the exciting world of security

More information

Cyber Security Awareness

Cyber Security Awareness Cyber Security Awareness User IDs and Passwords Home Computer Protection Protecting your Information Firewalls Malicious Code Protection Mobile Computing Security Wireless Security Patching Possible Symptoms

More information

Customer Awareness for Security and Fraud Prevention

Customer Awareness for Security and Fraud Prevention Customer Awareness for Security and Fraud Prevention Identity theft continues to be a growing problem in our society today. All consumers must manage their personal information wisely and cautiously to

More information

User Guide. You will be presented with a login screen which will ask you for your username and password.

User Guide. You will be presented with a login screen which will ask you for your username and password. User Guide Overview SurfProtect is a real-time web-site filtering system designed to adapt to your particular needs. The main advantage with SurfProtect over many rivals is its unique architecture that

More information

First of all Let's look at how you would connect your laptop via Ethernet, as it is the easier of the two methods.

First of all Let's look at how you would connect your laptop via Ethernet, as it is the easier of the two methods. How to get a Internet Connection on your laptop This guide will help you to get an internet connection on your laptop either via Wi-Fi (e.g. in a café or hotel) or via Ethernet (the RJ45 type connector

More information

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services Malware, Spyware, Adware, Viruses Gracie White, Scott Black Information Technology Services The average computer user should be aware of potential threats to their computer every time they connect to the

More information

F-Secure Internet Security 2012

F-Secure Internet Security 2012 F-Secure Internet Security 2012 F-Secure Internet Security 2012 TOC 3 Contents Chapter 1: Getting started...7 How to use automatic updates...8 Check the update status...8 Change the Internet connection

More information

This guide will go through the common ways that a user can make their computer more secure.

This guide will go through the common ways that a user can make their computer more secure. A beginners guide in how to make a Laptop/PC more secure. This guide will go through the common ways that a user can make their computer more secure. Here are the key points covered: 1) Device Password

More information

Payment Systems Department

Payment Systems Department v Note: Please follow these guidelines for your safety as you enjoy the convenience of technology. However these guidelines are general; therefore, specific precautions may be taken as warranted by the

More information

Countering and reducing ICT security risks 1. Physical and environmental risks

Countering and reducing ICT security risks 1. Physical and environmental risks Countering and reducing ICT security risks 1. Physical and environmental risks 1. Physical and environmental risks Theft of equipment from staff areas and Theft of equipment from public areas Theft of

More information

Basic computer security

Basic computer security Mag. iur. Dr. techn. Michael Sonntag Basic computer security E-Mail: sonntag@fim.uni-linz.ac.at http://www.fim.uni-linz.ac.at/staff/sonntag.htm Institute for Information Processing and Microprocessor Technology

More information

Common Cyber Threats. Common cyber threats include:

Common Cyber Threats. Common cyber threats include: Common Cyber Threats: and Common Cyber Threats... 2 Phishing and Spear Phishing... 3... 3... 4 Malicious Code... 5... 5... 5 Weak and Default Passwords... 6... 6... 6 Unpatched or Outdated Software Vulnerabilities...

More information

Internet Basics. Meg Wempe, Adult Services Librarian ABOUT THIS CLASS. P a g e 1

Internet Basics. Meg Wempe, Adult Services Librarian ABOUT THIS CLASS. P a g e 1 P a g e 1 Internet Basics ABOUT THIS CLASS This class is designed to provide a basic introduction to accessing and navigating the internet (a.k.a. the world wide web or the web ). Throughout the class,

More information

OKPAY guides. Security Guide

OKPAY guides. Security Guide Название раздела OKPAY guides www.okpay.com Security Guide 2012 Contents SECURITY GUIDE Contents Introduction 1. OKPAY Security Overview 2. Security Tips 3. Security Center 3.1. Basic Protection 3.2. Email

More information

Cyber Security. Maintaining Your Identity on the Net

Cyber Security. Maintaining Your Identity on the Net Cyber Security Maintaining Your Identity on the Net Why Cyber Security? There are three points of failure in any secure network: Technology (hardware and software) Technology Support (ITS) End Users (USD

More information

AVeS Cloud Security powered by SYMANTEC TM

AVeS Cloud Security powered by SYMANTEC TM Protecting your business from online threats should be simple, yet powerful and effective. A solution that secures your laptops, desktops, and servers without slowing down your systems and distracting

More information

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS $ ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS Boston Private Bank & Trust Company takes great care to safeguard the security of your Online Banking transactions. In addition to our robust security

More information

Certified Secure Computer User

Certified Secure Computer User Certified Secure Computer User Exam Info Exam Name CSCU (112-12) Exam Credit Towards Certification Certified Secure Computer User (CSCU). Students need to pass the online EC-Council exam to receive the

More information

BE SAFE ONLINE: Lesson Plan

BE SAFE ONLINE: Lesson Plan BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take

More information

Cyber Opsec. Protecting Yourself Online. Think. Protect. OPSEC. www.ioss.gov

Cyber Opsec. Protecting Yourself Online. Think. Protect. OPSEC. www.ioss.gov Cyber Opsec Protecting Yourself Online Think. Protect. OPSEC. www.ioss.gov CYBER OPSEC: section 1 Internet Communication in General Our carelessness makes the job easy for the adversary. The Internet was

More information

Corporate Account Takeover & Information Security Awareness. Customer Training

Corporate Account Takeover & Information Security Awareness. Customer Training Corporate Account Takeover & Information Security Awareness Customer Training No computer system can provide absolute security under all conditions. NO SECURITY MEASURE OR LIST OF SECURITY MEASURES CAN

More information

Your Guide to Email Security

Your Guide to Email Security Your Guide to Email Security Protect your Information Email is a powerful way to connect with people. Unfortunately it also makes us vulnerable targets of scammers that can affect us from thousands of

More information

Top tips for improved network security

Top tips for improved network security Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a

More information

Learn to protect yourself from Identity Theft. First National Bank can help.

Learn to protect yourself from Identity Theft. First National Bank can help. Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone

More information

How to stay safe online

How to stay safe online How to stay safe online Everyone knows about computer viruses...or at least they think they do. Nearly 30 years ago, the first computer virus was written and since then, millions of viruses and other malware

More information

Configuring, Customizing, and Troubleshooting Outlook Express

Configuring, Customizing, and Troubleshooting Outlook Express 3 Configuring, Customizing, and Troubleshooting Outlook Express............................................... Terms you ll need to understand: Outlook Express Newsgroups Address book Email Preview pane

More information

Brazosport College VPN Connection Installation and Setup Instructions. Draft 2 March 24, 2005

Brazosport College VPN Connection Installation and Setup Instructions. Draft 2 March 24, 2005 Brazosport College VPN Connection Installation and Setup Instructions Draft 2 March 24, 2005 Introduction This is an initial draft of these instructions. These instructions have been tested by the IT department

More information

October Is National Cyber Security Awareness Month!

October Is National Cyber Security Awareness Month! (0 West Virginia Executive Branch Privacy Tip October Is National Cyber Security Awareness Month! In recognition of National Cyber Security Month, we are supplying tips to keep you safe in your work life

More information

Certified Secure Computer User

Certified Secure Computer User Certified Secure Computer User Course Outline Module 01: Foundations of Security Essential Terminologies Computer Security Why Security? Potential Losses Due to Security Attacks Elements of Security The

More information

Protect yourself online

Protect yourself online Protect yourself online Advice from Nottinghamshire Police s Pre Crime Unit Get daily updates: www.nottinghamshire.police.uk www.twitter.com/nottspolice www.facebook.com/nottspolice www.youtube.com/nottinghampolice

More information

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

When you listen to the news, you hear about many different forms of computer infection(s). The most common are: Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than ever. Thanks to the Internet, you can conduct your banking,

More information

Keeping you and your computer safe in the digital world.

Keeping you and your computer safe in the digital world. Keeping you and your computer safe in the digital world. After completing this class, you should be able to: Explain the terms security and privacy as applied to the digital world Identify digital threats

More information

Get Started Guide - PC Tools Internet Security

Get Started Guide - PC Tools Internet Security Get Started Guide - PC Tools Internet Security Table of Contents PC Tools Internet Security... 1 Getting Started with PC Tools Internet Security... 1 Installing... 1 Getting Started... 2 iii PC Tools

More information

Is Skype Safe for Judges?

Is Skype Safe for Judges? Is Skype Safe for Judges? By Martin Felsky, PhD, JD, for the Canadian Judicial Council, 1 Version 3.0 January 17, 2014 Microsoft Skype is a software application that permits its tens of millions of subscribers

More information

CNA NetProtect Essential SM. 1. Do you implement virus controls and filtering on all systems? Background:

CNA NetProtect Essential SM. 1. Do you implement virus controls and filtering on all systems? Background: 1. Do you implement virus controls and filtering on all systems? Anti-Virus anti-virus software packages look for patterns in files or memory that indicate the possible presence of a known virus. Anti-virus

More information

Safe Practices for Online Banking

Safe Practices for Online Banking November 2012 Follow these guidelines to help protect your information while banking online. At First Entertainment Credit Union, our goal is to provide you with the best all around banking experience.

More information

Mifflinburg Bank & Trust. Corporate Account Takeover & Information Security Awareness

Mifflinburg Bank & Trust. Corporate Account Takeover & Information Security Awareness Mifflinburg Bank & Trust Corporate Account Takeover & Information Security Awareness The information contained in this session may contain privileged and confidential information. This presentation is

More information

Cyber Security Awareness

Cyber Security Awareness Cyber Security Awareness William F. Pelgrin Chair Page 1 Introduction Information is a critical asset. Therefore, it must be protected from unauthorized modification, destruction and disclosure. This brochure

More information

Cox High Speed InternetSM Connect to your online world faster than you can imagine. Plus, access a whole host of tools to make your Internet

Cox High Speed InternetSM Connect to your online world faster than you can imagine. Plus, access a whole host of tools to make your Internet Cox High Speed InternetSM Connect to your online world faster than you can imagine. Plus, access a whole host of tools to make your Internet experience friendlier, easier and more cutting edge. 43 Connecting

More information

HIPAA Privacy and Security

HIPAA Privacy and Security HIPAA Privacy and Security Course ID: 1020 - Credit Hours: 2 Author(s) Kevin Arnold, RN, BSN Accreditation KLA Education Services LLC is accredited by the State of California Board of Registered Nursing,

More information

Computer Security Literacy

Computer Security Literacy Computer Security Literacy Staying Safe in a Digital World Douglas Jacobson and Joseph Idziorek CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is an imprint of the Taylor & Francis

More information

Fraud Detection and Prevention. Timothy P. Minahan Vice President Government Banking TD Bank

Fraud Detection and Prevention. Timothy P. Minahan Vice President Government Banking TD Bank Fraud Detection and Prevention Timothy P. Minahan Vice President Government Banking TD Bank Prevention vs. Detection Prevention controls are designed to keep fraud from occurring Detection controls are

More information

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers 2012. Your Interactive Guide to the Digital World

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers 2012. Your Interactive Guide to the Digital World Chapter 11 Manage Computing Securely, Safely and Ethically Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Define the term, computer security risks, and briefly

More information

10605164 Medical Networks and Operating Systems

10605164 Medical Networks and Operating Systems Western Technical College 10605164 Medical Networks and Operating Systems Course Outcome Summary Course Information Description Instructional Level Total Credits 4.00 Total Hours 108.00 A course studying

More information

Frequently Asked Questions

Frequently Asked Questions FAQs Frequently Asked Questions Connecting your Linksys router to the Internet 1 What computer operating systems does my Linksys router support? 1 Why can t I connect my computer or device to my router?

More information

Corporate Account Takeover & Information Security Awareness

Corporate Account Takeover & Information Security Awareness Corporate Account Takeover & Information Security Awareness The information contained in this session may contain privileged and confidential information. This presentation is for information purposes

More information

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15. NCS 330 Information Assurance Policies, Ethics and Disaster Recovery NYC University Polices and Standards 4/15/15 Jess Yanarella Table of Contents: Introduction: Part One: Risk Analysis Threats Vulnerabilities

More information

Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer?

Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer? Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer? 1 2 This is the second part of a two-part course on spyware and adware. In this portion of the course we will: Review

More information