Appendix A. 1 Copyright 2012, Oracle and/or its affiliates. All rights reserved.



Similar documents
1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

Safe Practices for Online Banking

Marlon R Clarke, Ph. D., CISSP, CISM Director Network Operations and Services, NSU

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO p f

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015.

Cyber Security Best Practices

PHI- Protected Health Information

National Cyber Security Month 2015: Daily Security Awareness Tips

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics

Cyber Security: Beginners Guide to Firewalls

How to stay safe online

Introduction to Cyber Security

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

PREVENTING HIGH-TECH IDENTITY THEFT

Hot Topics in IT Security PREP#28 May 1, David Woska, Ph.D. OCIO Security

CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere.

References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household

Information Security. Louis Morgan, CISSP Information Security Officer

STOP. THINK. CONNECT. Online Safety Quiz

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

Cyber Security Beginners Guide to Firewalls A Non-Technical Guide

A Guide to Information Technology Security in Trinity College Dublin

ENISA s ten security awareness good practices July 09

High Speed Internet - User Guide. Welcome to. your world.

Information Security. Annual Education Information Security Mission Health System, Inc.


PREP Course #25: Hot Topics in Cyber Security and Database Security. Presented by: Joe Baskin Manager, Information Security, OCIO

Social Network Security. Frank K. F. Chow Vice-Chairperson Professional Information Security Association (PISA)

Cyber Self Assessment

IT Security DO s and DON Ts

BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12. Employee Computer Use Agreement. Terms and Conditions

BSHSI Security Awareness Training

Subject: Computers & Electronic Records. Responsible Party: Part C Coordinator

Cyber Security Awareness. Internet Safety Intro.

Multi-Factor Authentication (FMA) A new security feature for Home Banking. Frequently Asked Questions 8/17/2006

Information Security Guide for Students

WORTHING COLLEGE STUDENT IT SECURITY POLICY. October 2014

Malware & Botnets. Botnets

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

Secure Your Information and Communication Technology Devices

Learn to protect yourself from Identity Theft. First National Bank can help.

CLEAR LAKE BANK & TRUST COMPANY Internet Banking Customer Awareness & Education Program For Businesses

Sibford School Student Computer Acceptable Use Policy

Tips for Banking Online Safely

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions

COB 302 Management Information System (Lesson 8)

INTERNET & COMPUTER SECURITY March 20, Scoville Library. ccayne@biblio.org

A Small Business Approach to Big Business Cyber Security. Brent Bettis, CISSP 23 September, 2014

ICTN Enterprise Database Security Issues and Solutions

Information Security Awareness Training Gramm-Leach-Bliley Act (GLB Act)

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

Cyber Security. Securing Your Mobile and Online Banking Transactions

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

How-To Guide: Cyber Security. Content Provided by

TECHNOLOGY ACCEPTABLE USE POLICY

Desktop and Laptop Security Policy

How To Protect Your Information From Being Hacked By A Hacker

How To Secure An Rsa Authentication Agent

Computer Security Self-Test: Questions & Scenarios

Common Cyber Threats. Common cyber threats include:

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

ecommercial SAT ecommercial Security Awareness Training Version 3.0

Customer Awareness for Security and Fraud Prevention

What are the common online dangers?

Dulwich College ICT Acceptable Use Policy

Acceptable Use of ICT Policy For Staff

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

Information Security

The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance

Data Access Request Service

Introduction to WSU

10 best practice suggestions for common smartphone threats

Summary Electronic Information Security Policy

Infocomm Sec rity is incomplete without U Be aware,

ONE Mail Direct for Mobile Devices

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Information Security Code of Conduct

Transcription:

Appendix A Cyber Security 1 Copyright 2012, Oracle and/or its affiliates. All rights

Overview This lesson covers the following topics: Define cyber security. List the risks of cyber security. Identify actions you can take to protect yourself from cyber attacks. 2 Copyright 2012, Oracle and/or its affiliates. All rights

Our Reliance on Technology In today's world, everything in our community relies on technology. Our medical prescriptions and procedures are typically managed in an online database. All communications are stored and processed through online social networks and email. Most commerce is now transacted as e-commerce, or online commerce. Grids are used to manage our electricity use. 3 Copyright 2012, Oracle and/or its affiliates. All rights

What is Cyber Security? What would happen if these systems that we heavily rely on failed? Cyber security is the initiative to protect computer and web-based (internet-based) information. Part of cyber security is taking actions to identify when a system is attacked, protect the system from attacks, and respond to attacks. 4 Copyright 2012, Oracle and/or its affiliates. All rights

Risks to Cyber Security Some risks to computer and web-based systems are: Someone stealing financial or personal information from your computer. Viruses that can erase a system. Hackers destroying or altering the files in your system. Someone taking over your online profile and altering the data or using it in a malicious way. 5 Copyright 2012, Oracle and/or its affiliates. All rights

Steps to Minimize Security Risks The following steps can help you understand what cyber security risks are, and teach you how to protect yourself from them. The following slides detail some things you can do to minimize the risk of a cyber attack. 6 Copyright 2012, Oracle and/or its affiliates. All rights

Protect Your Password When choosing a password: Do not use passwords based on personal information that can be easily accessed or guessed. Use both lowercase and capital letters. Use a combination of letters, numbers, and special characters. Use a different password for each system you use. Do not use the same one for multiple systems. 7 Copyright 2012, Oracle and/or its affiliates. All rights

Strategies to Protect Your Password Strategies to protect your password: Store it in a different location from the system it is used for. Don't share it with anyone. When using a computer in a public place such as the library, ensure you log out before you leave. 8 Copyright 2012, Oracle and/or its affiliates. All rights

Computer Safety People can gain access to your computer either by physically accessing it, or by remotely accessing it if it is connected to a network. Use these strategies to make unauthorized access more difficult: Ensure that you password-lock your computer when you are away from it. Disconnect from the internet when you are not using it (to avoid attacks or viruses). Review your computer's security settings. Back up your data. a 9 Copyright 2012, Oracle and/or its affiliates. All rights

Data Safety Ways to protect the data on your computer, system or network: Update software and anti-virus software regularly. Use anti-virus software and a firewall. Use passwords and encryption for files that you feel are confidential. Deletion isn't enough: Dispose of sensitive information correctly. Search online for ways to properly dispose of information on your computer or systems you use. 10 Copyright 2012, Oracle and/or its affiliates. All rights

Social Network Safety A social network is an online site that allows people to connect who have existing or new friendships, romantic relationships, shared interests, or business relationships. These sites allow you to publish personal information to share with the public or with your specified networks. Examples: Facebook MySpace LinkedIn Twitter 11 Copyright 2012, Oracle and/or its affiliates. All rights

Cyber Attackers and Social Networks Cyber attackers are drawn to these sites because of the sheer number of people who use them, and because users publish personal information on them. As you use these sites, be aware of security risks that you need to protect yourself from. For example: An attacker may infiltrate the site with a virus that shares information about you in your networks without your knowledge. Someone e may contact you in an attempt to steal personal information about you. 12 Copyright 2012, Oracle and/or its affiliates. All rights

How to Protect Yourself in Social Networks Ways to protect yourself in online social networks: Keep software and anti-virus software up to date at all times. Be cautious about connecting to and meeting with strangers as you would in the real-world. Restrict the information that you share online to specified networks. Review the settings that the site offers and adjust them accordingly. Do not post something online that you would not want the public to access. 13 Copyright 2012, Oracle and/or its affiliates. All rights

Electronic Device Security Electronic devices such as mobile phones and tablets are susceptible to cyber attacks. Not only could your device be physically stolen, it could also be infected with a virus if it accesses the internet or a network. 14 Copyright 2012, Oracle and/or its affiliates. All rights

Protecting Electronic Devices Ways to protect yourself: Use passwords and set all devices to auto-lock and password-protect protect when they are not in use. Encrypt sensitive files if possible. Disable remote connections when not in use, such as Bluetooth technology. Do not leave devices unattended. 15 Copyright 2012, Oracle and/or its affiliates. All rights

Wireless Network Security It is possible for cyber attackers to intercept your wireless network if it is not protected. Ways to protect your wireless network: Create a strong, unique password. Install a firewall as well as anti-virus software. Only allow people p to use your network that you know and trust. Turn off network file sharing on your computer when not in use. 16 Copyright 2012, Oracle and/or its affiliates. All rights

Copyrights and Permissions Copyright infringement is the distribution or use of information without permission from the owner of the information. Copyright infringement is a serious issue as it relates to the internet, and can avoid in legal trouble for offenders. 17 Copyright 2012, Oracle and/or its affiliates. All rights

Copyright Infringement Examples Examples of copyright infringement include: Stealing an image from a company's website and using it without permission. Illegally downloading or distributing music. Copying software and illegally distributing it to others (also known as pirating ). Copying and using proprietary source code without permission. 18 Copyright 2012, Oracle and/or its affiliates. All rights

Avoiding Copyright Infringement To avoid copyright infringement: Review the website or source's permissions, often published in their Terms of Use, to determine if and how you can use the information. Contact the author of the information and ask for permission. 19 Copyright 2012, Oracle and/or its affiliates. All rights

Summary In this lesson, you should have learned how to: Define cyber security. List the risks of cyber security. Identify actions you can take to protect yourself from cyber attacks. 20 Copyright 2012, Oracle and/or its affiliates. All rights

Practice The exercises for this lesson cover the following topics: Identifying cyber security risks. Listing different kinds of systems you use that t may be at risk. Creating a plan to avoid cyber attacks. 21 Copyright 2012, Oracle and/or its affiliates. All rights