Computer Security Self-Test: Questions & Scenarios
|
|
|
- Dwayne McCormick
- 10 years ago
- Views:
Transcription
1 Computer Security Self-Test: Questions & Scenarios Rev. Sept 2015
2 Scenario #1: Your supervisor is very busy and asks you to log into the HR Server using her user-id and password to retrieve some reports. What should you do? a) It s your boss, so it s okay to do this. b) Ignore the request and hope she forgets. c) Decline the request and remind your supervisor that it is against UC policy. See next page for answer 2
3 Scenario #1: Answer: C. User IDs and passwords must not be shared. If pressured further, report the situation to management, the ITS Support Center ( or the Whistleblower Office ( 3
4 Scenario #2: You receive the following from the Help Desk: Dear UCSC User, Beginning next week, we will be deleting all inactive accounts in order to create space for more users. You are required to send the following information in order to continue using your account. If we do not receive this information from you by the end of the week, your account will be closed. *Name (first and last): * Login: *Password: *Date of birth: *Alternate Please contact the Webmail Team with any questions. Thank you for your immediate attention. What should you do? 4
5 Scenario #2: Answer: This is a classic example of phishing trying to trick you into biting. They want your information. Don't respond to , instant messages (IM), texts, phone calls, etc., asking you for your password or other private information. You should never disclose your password to anyone, even if they say they work for UCSC, ITS, or other campus organizations. If you receive phishing or spam in your Google , report it to Google: 5
6 Scenario #3: A friend sends an electronic Hallmark greeting card (e-card) to your work . You need to click on the attachment to see the card. What should you do? 6
7 Scenario #3: Answer: Delete the message. This one has four big risks: 1. Some attachments contain viruses or other malicious programs, so just in general, it s risky to open unknown or unsolicited attachments. 2. Also, in some cases just clicking on a malicious link can infect a computer, so unless you are sure a link is safe, don t click on it. 3. addresses can be faked, so just because the says it is from someone you know, you can t be certain of this without checking with the person. 4. Finally, some websites and links look legitimate, but they re really hoaxes designed to steal your information. 7
8 Scenario #4: Real-life Scenario: One of the staff members in ITS subscribes to a number of free IT magazines. Among the questions she was asked in order to activate her subscriptions, one magazine asked for her month of birth, a second asked for her year of birth, and a third asked for her mother's maiden name. Q: What do you think might be going on here? See next page for one possible answer 8
9 Scenario #4: Possible answer: All three newsletters probably have the same parent company or are distributed through the same service. The parent company or service can combine individual pieces of seemingly-harmless information and use or sell it for identity theft. It is even possible that there is a fourth newsletter that asks for day of birth as one of the activation questions. Note: Often questions about personal information are optional. In addition to being suspicious about situations like the one described here, never provide personal information when it is not legitimately necessary, or to people or companies you don t personally know. 9
10 Scenario #5: Real-life Scenario: We saw a case a while back where someone used their yahoo account at a computer lab on campus. She made sure her yahoo account was no longer open in the browser window before leaving the lab. Someone came in behind her and used the same browser to re-access her account. They started sending s from it and caused all sorts of mayhem. Q: What do you think might be going on here? 10
11 Scenario #5: Possible answers: The first person probably didn't log out of her account, so the new person could just go to history and access her account. Another possibility is that she did log out, but didn t clear her web cache. (This is done through the browser menu to clear pages that the browser has saved for future use.) 11
12 Scenario #6: Two different offices on campus are working to straighten out an error in an employee s bank account due to a direct deposit mistake. Office #1 s the correct account and deposit information to office #2, which promptly fixes the problem. The employee confirms with the bank that everything has, indeed, been straightened out. Q: What s wrong here? 12
13 Scenario #6: Answer: Account and deposit information is sensitive data that could be used for identity theft. Sending this or any kind of sensitive information by is very risky because is typically not private or secure. Anyone who knows how can access it anywhere along its route. As an alternative, the two offices could have called each other or worked with ITS to send the information a more secure way. 13
14 Scenario #7: Real-life Scenario: In our computing labs and departments, print billing is often tied to the user's login. People login, they print, they (or their department) get a bill. Sometimes people call to complain about bills for printing they never did only to find out that the bills are, indeed, correct. Q: What do you think might be going on here? 14
15 Scenario #7: Possible answer: Sometimes they realize they loaned their account to a friend who couldn't remember his/her password, and the friend did the printing. Thus the charges. It s also possible that somebody came in behind them and used their account. This is an issue with shared or public computers in general. If you don t log out of the computer properly when you leave, someone else can come in behind you and retrieve what you were doing, use your accounts, etc. Always log out of all accounts, quit programs, and close browser windows before you walk away. 15
16 Scenario #8: The mouse on your computer screen starts to move around on its own and click on things on your desktop. What do you do? <Select all that apply> a) Call your co-workers over so they can see b) Disconnect your computer from the network c) Unplug your mouse d) Tell your supervisor e) Turn your computer off f) Run anti-virus g) All of the above See next page for answer 16
17 Scenario #8: Answer: B & D. This is definitely suspicious. Immediately report the problem to your supervisor and the ITS Support Center: itrequest.ucsc.edu, 459-HELP (4357), [email protected] or Kerr Hall room 54, M-F 8AM-5PM Also, since it seems possible that someone is controlling the computer remotely, it is best if you can disconnect the computer from the network (and turn off wireless if you have it) until help arrives. If possible, don t turn off the computer. 17
18 Scenario #9: Which of the following passwords meets UCSC s password requirements? B. akhgksmln C. UcSc4Evr! D. Password1 18
19 Scenario #9: Answer: C. UcSc4Evr! This is the only choice that meets all of the following UCSC requirements: l l l At least 8 characters in length Contains at least 3 of the following 4 types of characters: lower case letters, upper case letters, numbers, special characters Not a word preceded or followed by a digit 19
20 Scenario #10: You receive an from your bank telling you there is a problem with your account. The provides instructions and a link so you can log in to your account and fix the problem. What should you do? 20
21 Scenario #10: Answer: Delete the . Better yet, use the web client (e.g. gmail, yahoo mail, etc.) and report it as spam or phishing, then delete it. Any unsolicited or phone call asking you to enter your account information, disclose your password, financial account information, social security number, or other personal or private information is suspicious even if it appears to be from a company you are familiar with. Always contact the sender using a method you know is legitimate to verify that the message is from them. 21
22 Scenario #11: A while back, the IT folks got a number of complaints that one of our campus computers was sending out Viagra spam. They checked it out, and the reports were true: a hacker had installed a program on the computer that made it automatically send out tons of spam without the computer owner s knowledge. Q: How do you think the hacker got into the computer to set this up? 22
23 Scenario #11: Answer: This was actually the result of a hacked password. Using passwords that can't be easily guessed, and protecting your passwords by not sharing them or writing them down can help to prevent this. Passwords should be at least 8 characters in length and use a mixture of upper and lower case letters, numbers, and symbols. Even though in this case it was a hacked password, other things that could possibly lead to this are: l Out of date patches/updates l No anti-virus software or out of date anti-virus software l Clicking an unknown link or attachment l Downloading unknown or unsolicited programs on to your computer 23
24 Phishing and Spam Quiz SonicWALL has a fun, informative quiz to test how well you distinguish between schemes and legitimate . Check it out at: 24
25 Would you like to: (please click on an option) Start again Finish & go to the certificate Go to the main Computer Security training page 25
Introduction to Computer Security
Introduction to Computer Security Rev. Sept 2015 What is Computer Security? 2 Computer Security is the protection of computing systems and the data that they store or access 3 Why is Computer Security
Recognizing Spam. IT Computer Technical Support Newsletter
IT Computer Technical Support Newsletter March 23, 2015 Vol.1, No.22 Recognizing Spam Spam messages are messages that are unwanted. If you have received an e-mail from the Internal Revenue Service or the
Tips for Banking Online Safely
If proper attention is given to safety and security, banking and monetary activities can be completed online in a convenient and effective fashion. This guide helps to establish procedures for remaining
CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere.
Benefits & Features CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere. What can I do with Internet Banking? You can inquire
INTERNET SAFETY: VIRUS: a computer program that can copy itself and infect your computer. CAPTCHAS: type the letters to set up an online account
INTERNET SAFETY: VIRUS: a computer program that can copy itself and infect your computer Malware: Harmful software programs designed to damage your computer without you knowing. Spyware: Undetected programs
Advice about online security
Advice about online security May 2013 Contents Report a suspicious email or website... 3 Security advice... 5 Genuine DWP contacts... 8 Recognising and reporting phishing and bogus emails... 9 How DWP
Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange
The responsibility of safeguarding your personal information starts with you. Your information is critical and it must be protected from unauthorised disclosure, modification or destruction. Here we are
Email Security. 01-15-09 Fort Mac
Email Security 01-15-09 Fort Mac Most Common Mistakes in Email Security Email Security 1. Using just one email account. 2. Holding onto spammed-out accounts too long. 3. Not closing the browser after logging
NEVER guess an e-mail address. Your mail will nearly always go to the wrong person.
16. WebMail (E-mail) E-mail is a mechanism for sending messages and information between computer users. Individuals are identified by their e-mail address, which is used in much the same way as a postal
Learn to protect yourself from Identity Theft. First National Bank can help.
Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out
OKPAY guides. Security Guide
Название раздела OKPAY guides www.okpay.com Security Guide 2012 Contents SECURITY GUIDE Contents Introduction 1. OKPAY Security Overview 2. Security Tips 3. Security Center 3.1. Basic Protection 3.2. Email
Protecting your business from fraud
Protecting your business from fraud KEY TAKEAWAYS > Understand the most common types of fraud and how to identify them. > What to do if you uncover fraudulent activity or suspect you are a victim of fraud.
Amy wants to use her email to view some photos her friend Sandy sent, from her vacation to Washington DC.
E-mail Attachments Hi, I m Sarah. I m going to show you how to download files people send to you in emails, and how to send your own files to other people using your email. We ll follow along with Amy,
Online Systems at COTR. Learn about COTRs Online Systems, how to log into them, activate your accounts and set up your passwords.
2015 Online Systems at COTR Learn about COTRs Online Systems, how to log into them, activate your accounts and set up your passwords. Table of Contents Online Systems at COTR... 2 Logging into Online Systems
OCT Training & Technology Solutions [email protected] (718) 997-4875
OCT Training & Technology Solutions [email protected] (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,
High Speed Internet - User Guide. Welcome to. your world.
High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a
STOP. THINK. CONNECT. Online Safety Quiz
STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.
A Guide to Information Technology Security in Trinity College Dublin
A Guide to Information Technology Security in Trinity College Dublin Produced by The IT Security Officer & Training and Publications 2003 Web Address: www.tcd.ie/itsecurity Email: [email protected] 1 2
Fraud Prevention Tips
Fraud Prevention Tips The best defense against fraud or identity theft is a proactive approach. Here are a few steps you can take to help protect yourself. Protect your identity Copy the front and back
Frequently Asked Questions (FAQ)
Your personal information and account security is important to us. This product employs a Secure Sign On process that includes layers of protection at time of product log in to mitigate risk, and thwart
E-MAIL FILTERING FAQ
V8.3 E-MAIL FILTERING FAQ COLTON.COM Why? Why are we switching from Postini? The Postini product and service was acquired by Google in 2007. In 2011 Google announced it would discontinue Postini. Replacement:
Introduction. Tips for Email Success. Email 101 Email Etiquette and Safety. Page 1
Email 101 Email Etiquette and Safety Introduction Page 1 Like any form of online communication, it's important to practice good etiquette and safety when using email. Etiquette is a set of rules and guidelines
Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data
Avoiding Malware in Your Dental Practice 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice Like most small business owners, you must protect your dental practice s computer
INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. [email protected]
INTERNET & COMPUTER SECURITY March 20, 2010 Scoville Library [email protected] Internet: Computer Password strength Phishing Malware Email scams Identity Theft Viruses Windows updates Browser updates Backup
INTRODUCTION TO EMAIL: & BASICS
University of North Carolina at Chapel Hill Libraries Chapel Hill Public Library Carrboro Branch Library Carrboro Cybrary Durham Public Library INTRODUCTION TO EMAIL: & BASICS Getting Started Page 02 Prerequisites
Setting up a Personal Email Account
Setting up a Personal Email Account Having a personal email account is vital to accessing many services on the internet. Many sites, both useful and not so useful require you to make an account with them
Protecting Yourself from Identity Theft
Protecting Yourself from Identity Theft Identity theft is everywhere. In fact, according to a 2013 report by Javelin Research, there is one incident of identity fraud every two seconds. While we cannot
Introduction to Webmail. Apache County Library District April 2011
Introduction to Webmail Apache County Library District April 2011 1 Review of terms we will be using in this tutorial: Single-click: This refers to a single click of the left mouse button. If you hold
Purchase College Barracuda Anti-Spam Firewall User s Guide
Purchase College Barracuda Anti-Spam Firewall User s Guide What is a Barracuda Anti-Spam Firewall? Computing and Telecommunications Services (CTS) has implemented a new Barracuda Anti-Spam Firewall to
Quarantined Messages 5 What are quarantined messages? 5 What username and password do I use to access my quarantined messages? 5
Contents Paul Bunyan Net Email Filter 1 What is the Paul Bunyan Net Email Filter? 1 How do I get to the Email Filter? 1 How do I release a message from the Email Filter? 1 How do I delete messages listed
Infocomm Sec rity is incomplete without U Be aware,
Infocomm Sec rity is incomplete without U Be aware, responsible secure! HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD [ 2 ] FASTEN
The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015.
The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015. By completing this module and the quiz, you will receive credit for CW 170, which is required
Okay, good. He's gonna release the computers for you and allow you to log into NSLDS.
Welcome to the NSLDS hands-on session. My name is Larry Parker. I'm from the Department of Education NSLDS. Today, I have with me a whole host of folks, so we're gonna make sure that if you have any questions
Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data
Avoiding Malware in Your Dental Practice 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice Like most small business owners, you must protect your dental practice s computer
Secure Email FAQs for External Stakeholders
Secure Email FAQs for External Stakeholders Ver: 07 November 2012 What is secure email and why am I getting encrypted emails from the IPCC? Why do I have to register to open a Registered Envelope? What
Using the City of Stamford / Stamford Public Schools. Web Email System
Using the City of Stamford / Stamford Public Schools Web Email System Open the Login Screen: Go to the following site: www.stamfordct.gov/mail and choose the login link. The login screen will look like
Frequently asked questions.
Frequently asked questions. What is Bath Online? Bath Online is the online savings service from Bath Building Society that provides you with 24-hour access to view your existing savings accounts and the
Identity Theft Protection
Identity Theft Protection Learning Objectives Discuss the aspects of identity theft Discuss the signs of recognizing when your identify has been stolen Understand the steps to take to reclaim your identity
Protect yourself online
Protect yourself online Advice from Nottinghamshire Police s Pre Crime Unit Get daily updates: www.nottinghamshire.police.uk www.twitter.com/nottspolice www.facebook.com/nottspolice www.youtube.com/nottinghampolice
Single Sign-On (SSO) for Applications
Single Sign-On (SSO) for Applications User Guide October 2008 1 Contents Introduction... 3 Overview... 3 Extra Information... 3 1. Registering for an SSO Account... 4 SSO Registration... 4 2. Configuring
E-mail Encryption Recipient Guidelines
E-mail Encryption Recipient Guidelines Canadian Western Bank Group Human Resources Department November 1, 2013 This reference guide was developed for training and reference use only. Any discrepancies
Configuring, Customizing, and Troubleshooting Outlook Express
3 Configuring, Customizing, and Troubleshooting Outlook Express............................................... Terms you ll need to understand: Outlook Express Newsgroups Address book Email Preview pane
Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
2001 2014 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks are hereby acknowledged. Microsoft and Windows are either registered
2. _General Help and Technical Support
1. _Welcome Welcome to Business Internet Banking. Our online service is available 06:00 AM ET 12:00 AM (Midnight) ET, seven days a week, so you and your employees can manage your business banking accounts
Intercepting your mail. They can complete change of address forms and receive mail that s intended for you.
At SunTrust, we re committed to protecting your accounts and identity. That s why we ve created this Identity Theft Guide. This guide provides information about online fraud and identity theft, as well
User Manual for e-banking Services for Business Clients
User Manual for e-banking Services for Business Clients Page 1 of 51 Introduction to e-banking user manual Dear users, This e-banking User Manual will guide you on a step by step basis, on how to use and
Malware & Botnets. Botnets
- 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online
DON T BE FOOLED BY EMAIL SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam E-Mail FREE GUIDE. December 2014 Oliver James Enterprise
Provided by: December 2014 Oliver James Enterprise DON T BE FOOLED BY EMAIL SPAM FREE GUIDE 1 This guide will teach you: How to spot fraudulent and spam e-mails How spammers obtain your email address How
Safe Practices for Online Banking
November 2012 Follow these guidelines to help protect your information while banking online. At First Entertainment Credit Union, our goal is to provide you with the best all around banking experience.
Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts
A Guide to Protecting Your Identity and Accounts As part of SunTrust s commitment to protecting your accounts and identity, we ve created the Online Fraud & Identity Theft Guide, which provides information
Internet Banking. Keeping things simple. That s what we do.
Internet Banking Keeping things simple. That s what we do. Heartland Internet Banking Heartland s Internet Banking service is a fast and convenient way to keep up-to-date with, and manage your accounts
Basic E- mail Skills. Google s Gmail. www.netliteracy.org
Email it s convenient, free and easy. Today, it is the most rapidly growing means of communication. This is a basic introduction to email and we use a conversational non- technical style to explain how
1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.
Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone who can potentially harm your good name and financial well-being. Identity theft
For assistance with your computer, software or router we have supplied the following information: Tech Support 1-855-546-5000, press 1
For assistance with your computer, software or router we have supplied the following information: Tech Support 1-855-546-5000, press 1 Talk America Services Customer Service 1-855-546-5000, press 3 TALK
Outlook Data File navigate to the PST file that you want to open, select it and choose OK. The file will now appear as a folder in Outlook.
Migrate Archived Outlook Items Outlook includes archiving functionality that is used to free up space on the mail server by moving older items from the mail server to PST files stored on your computer
Protection from Fraud and Identity Theft
Table of Contents Protection from Fraud & Identity Theft... 1 Simple Steps to Secure Your Devices... 1 Setting Up Your Computer and/or Mobile Device... 2 Adding Security Software... 2 Internet Safety Tips...
BE SAFE ONLINE: Lesson Plan
BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take
It is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes.
Virus What is a virus? It is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It can also be defined as a set of codes written to cause
PROTECT YOUR COMPUTER AND YOUR PRIVACY!
PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That
Cyber Security. Maintaining Your Identity on the Net
Cyber Security Maintaining Your Identity on the Net Why Cyber Security? There are three points of failure in any secure network: Technology (hardware and software) Technology Support (ITS) End Users (USD
Money and shopping 8.1 Online banking. Beginner s guide to. Wider interests
Wider interests Use this document with the glossary Beginner s guide to Money and shopping 8.1 Online banking This activity will help you register to bank online and get you started with your online banking
Email Start to Finish: Set up a New Account or Use Your Own
Better Technology, Onsite and Personal Connecting NIOGA s Communities www.btopexpress.org [Type www.nioga.org Email Start to Finish: Set up a New Account or Use Your Own Overview: Set up a free email account
eprism Email Security Suite
FAQ V8.3 eprism Email Security Suite 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks
National Cyber Security Month 2015: Daily Security Awareness Tips
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
Email and Security. U3A Radlett Computer Group Meeting 6-Oct-2014 V1.1
Email and Security U3A Radlett Computer Group Meeting 6-Oct-2014 V1.1 Agenda Introduction Email Security Q&A Introduction Gary Harding email:- [email protected] Spent more than 40 years working in the
mycampus Portal Student Email ASU Network Software Student Edition ASU IT Services 082212
mycampus Portal Student Email ASU Network Software Student Edition ASU IT Services 082212 YOUR STUDENT ACCOUNT AND EMAIL INFORMATION Are you admitted to ASU? If so, congratulations! You have an ASU account!
IIT MOBILEPRINT. Mobileprint Workflow
IIT MOBILEPRINT Mobileprint integrates with existing OTS printing system to enable user to print documents, images and email messages using email client or a web capable devices. This include smartphones,
Internet basics 2.3 Protecting your computer
Basics Use this document with the glossary Beginner s guide to Internet basics 2.3 Protecting your computer How can I protect my computer? This activity will show you how to protect your computer from
10 Things You Need to Know About Internet Security
INFORMATION SECURITY 10 Things You Need to Know About Internet Security Presented by: Steven Blanc IT Security Officer, Bowdoin College Internet Security Versus Internet Safety Security: We must secure
When registering on a jobsite, first ensure that the site is reputable and has a physical address and landline phone number.
Job searching online has become the most popular method of finding employment. Searching for the type of job you want is fast and easy, and you can see new jobs as soon as employers / agencies post them.
Connecting to LUA s webmail
Connecting to LUA s webmail Effective immediately, the Company has enhanced employee remote access to email (Outlook). By utilizing almost any browser you will have access to your Company e-mail as well
NATIONAL CYBER SECURITY AWARENESS MONTH
NATIONAL CYBER SECURITY AWARENESS MONTH Tip 1: Security is everyone s responsibility. Develop an awareness framework that challenges, educates and empowers your customers and employees to be part of the
BARRACUDA SPAM FIREWALL FAQ
BARRACUDA SPAM FIREWALL FAQ Feb. 25, 2004 1. What is the Barracuda SPAM Firewall? 2. Where are my quarantined emails stored? How do I login? 3. What if I forgot my password? 4. How do I change the password?
Brazosport College VPN Connection Installation and Setup Instructions. Draft 2 March 24, 2005
Brazosport College VPN Connection Installation and Setup Instructions Draft 2 March 24, 2005 Introduction This is an initial draft of these instructions. These instructions have been tested by the IT department
Why is a strong password important?
Internet Security Why is a strong password important? Identity theft motives: To gain access to resources For the challenge/fun Personal reasons Theft methods Brute forcing and other script hacking methods
Member FAQ. General Information: Security:
General Information: Security: Why did you change Robins Federal Online Banking? Great question! We listened to an overwhelming response from you, our members that we needed to make these changes. We are
Email Basics. For more information on the Library and programs, visit www.bcpls.org BCPLS 08/10/2010 PEMA
Email Basics Email, short for Electronic Mail, consists of messages which are sent and received using the Internet. There are many different email services available that allow you to create an email account
Professional Ethics for Computer Science
Professional Ethics for Computer Science Chapter 4: Privacy Jie Gao Computer Science Department Stony Brook University Privacy Issues Internet privacy consists of privacy over the media of the Internet:
Don t Fall Victim to Cybercrime:
Don t Fall Victim to Cybercrime: Best Practices to Safeguard Your Business Agenda Cybercrime Overview Corporate Account Takeover Computer Hacking, Phishing, Malware Breach Statistics Internet Security
Google Apps Migration
Academic Technology Services Google Apps Migration Getting Started 1 Table of Contents How to Use This Guide... 4 How to Get Help... 4 Login to Google Apps:... 5 Import Data from Microsoft Outlook:...
suntrust.com 800.SUNTRUST
suntrust.com 800.SUNTRUST SunTrust Bank is an Equal Housing Lender. Member FDIC. 2010 SunTrust Banks, Inc., SunTrust, Live Solid. Bank Solid., SunTrust Rewards, and Signature Advantage Checking, are federally
How to Recognize Phishing Emails Targeting the University of Mary
How to Recognize Phishing Emails Targeting the University of Mary For the past several years, University of Mary has been targeted by phishing emails. It is important that you recognize these scams so
Online Security Information. Tips for staying safe online
Online Security Information ProCredit Bank is committed to protecting the integrity of your transactions and bank account details. ProCredit Bank therefore uses the latest security software and procedures
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,
