Appendix A Cyber Security 1 Copyright 2012, Oracle and/or its affiliates. All rights
Overview This lesson covers the following topics: Define cyber security. List the risks of cyber security. Identify actions you can take to protect yourself from cyber attacks. 2 Copyright 2012, Oracle and/or its affiliates. All rights
Our Reliance on Technology In today's world, everything in our community relies on technology. Our medical prescriptions and procedures are typically managed in an online database. All communications are stored and processed through online social networks and email. Most commerce is now transacted as e-commerce, or online commerce. Grids are used to manage our electricity use. 3 Copyright 2012, Oracle and/or its affiliates. All rights
What is Cyber Security? What would happen if these systems that we heavily rely on failed? Cyber security is the initiative to protect computer and web-based (internet-based) information. Part of cyber security is taking actions to identify when a system is attacked, protect the system from attacks, and respond to attacks. 4 Copyright 2012, Oracle and/or its affiliates. All rights
Risks to Cyber Security Some risks to computer and web-based systems are: Someone stealing financial or personal information from your computer. Viruses that can erase a system. Hackers destroying or altering the files in your system. Someone taking over your online profile and altering the data or using it in a malicious way. 5 Copyright 2012, Oracle and/or its affiliates. All rights
Steps to Minimize Security Risks The following steps can help you understand what cyber security risks are, and teach you how to protect yourself from them. The following slides detail some things you can do to minimize the risk of a cyber attack. 6 Copyright 2012, Oracle and/or its affiliates. All rights
Protect Your Password When choosing a password: Do not use passwords based on personal information that can be easily accessed or guessed. Use both lowercase and capital letters. Use a combination of letters, numbers, and special characters. Use a different password for each system you use. Do not use the same one for multiple systems. 7 Copyright 2012, Oracle and/or its affiliates. All rights
Strategies to Protect Your Password Strategies to protect your password: Store it in a different location from the system it is used for. Don't share it with anyone. When using a computer in a public place such as the library, ensure you log out before you leave. 8 Copyright 2012, Oracle and/or its affiliates. All rights
Computer Safety People can gain access to your computer either by physically accessing it, or by remotely accessing it if it is connected to a network. Use these strategies to make unauthorized access more difficult: Ensure that you password-lock your computer when you are away from it. Disconnect from the internet when you are not using it (to avoid attacks or viruses). Review your computer's security settings. Back up your data. a 9 Copyright 2012, Oracle and/or its affiliates. All rights
Data Safety Ways to protect the data on your computer, system or network: Update software and anti-virus software regularly. Use anti-virus software and a firewall. Use passwords and encryption for files that you feel are confidential. Deletion isn't enough: Dispose of sensitive information correctly. Search online for ways to properly dispose of information on your computer or systems you use. 10 Copyright 2012, Oracle and/or its affiliates. All rights
Social Network Safety A social network is an online site that allows people to connect who have existing or new friendships, romantic relationships, shared interests, or business relationships. These sites allow you to publish personal information to share with the public or with your specified networks. Examples: Facebook MySpace LinkedIn Twitter 11 Copyright 2012, Oracle and/or its affiliates. All rights
Cyber Attackers and Social Networks Cyber attackers are drawn to these sites because of the sheer number of people who use them, and because users publish personal information on them. As you use these sites, be aware of security risks that you need to protect yourself from. For example: An attacker may infiltrate the site with a virus that shares information about you in your networks without your knowledge. Someone e may contact you in an attempt to steal personal information about you. 12 Copyright 2012, Oracle and/or its affiliates. All rights
How to Protect Yourself in Social Networks Ways to protect yourself in online social networks: Keep software and anti-virus software up to date at all times. Be cautious about connecting to and meeting with strangers as you would in the real-world. Restrict the information that you share online to specified networks. Review the settings that the site offers and adjust them accordingly. Do not post something online that you would not want the public to access. 13 Copyright 2012, Oracle and/or its affiliates. All rights
Electronic Device Security Electronic devices such as mobile phones and tablets are susceptible to cyber attacks. Not only could your device be physically stolen, it could also be infected with a virus if it accesses the internet or a network. 14 Copyright 2012, Oracle and/or its affiliates. All rights
Protecting Electronic Devices Ways to protect yourself: Use passwords and set all devices to auto-lock and password-protect protect when they are not in use. Encrypt sensitive files if possible. Disable remote connections when not in use, such as Bluetooth technology. Do not leave devices unattended. 15 Copyright 2012, Oracle and/or its affiliates. All rights
Wireless Network Security It is possible for cyber attackers to intercept your wireless network if it is not protected. Ways to protect your wireless network: Create a strong, unique password. Install a firewall as well as anti-virus software. Only allow people p to use your network that you know and trust. Turn off network file sharing on your computer when not in use. 16 Copyright 2012, Oracle and/or its affiliates. All rights
Copyrights and Permissions Copyright infringement is the distribution or use of information without permission from the owner of the information. Copyright infringement is a serious issue as it relates to the internet, and can avoid in legal trouble for offenders. 17 Copyright 2012, Oracle and/or its affiliates. All rights
Copyright Infringement Examples Examples of copyright infringement include: Stealing an image from a company's website and using it without permission. Illegally downloading or distributing music. Copying software and illegally distributing it to others (also known as pirating ). Copying and using proprietary source code without permission. 18 Copyright 2012, Oracle and/or its affiliates. All rights
Avoiding Copyright Infringement To avoid copyright infringement: Review the website or source's permissions, often published in their Terms of Use, to determine if and how you can use the information. Contact the author of the information and ask for permission. 19 Copyright 2012, Oracle and/or its affiliates. All rights
Summary In this lesson, you should have learned how to: Define cyber security. List the risks of cyber security. Identify actions you can take to protect yourself from cyber attacks. 20 Copyright 2012, Oracle and/or its affiliates. All rights
Practice The exercises for this lesson cover the following topics: Identifying cyber security risks. Listing different kinds of systems you use that t may be at risk. Creating a plan to avoid cyber attacks. 21 Copyright 2012, Oracle and/or its affiliates. All rights