OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875

Similar documents
Don t Fall Victim to Cybercrime:

How to stay safe online

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Infocomm Sec rity is incomplete without U Be aware,

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

5 Simple Ways To Avoid Getting An Avalanche of Spam

Computer Security Maintenance Information and Self-Check Activities

Malware & Botnets. Botnets

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

Network Security and the Small Business

BE SAFE ONLINE: Lesson Plan

Alexander Nikov. 9. Information Assurance and Security, Protecting Information Resources. Learning Objectives. You re on Facebook? Watch Out!

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

Internet Safety & Awareness. Dan Tomlinson 02/23/2013

F-Secure Anti-Virus for Mac 2015

Top tips for improved network security

Your Guide to Security

Keeping you and your computer safe in the digital world.

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Identity Theft Protection

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics

Practical guide for secure Christmas shopping. Navid

Computer Viruses: How to Avoid Infection

Ohio University Computer Services Center October, 2004 Spyware, Adware, and Virus Guide

INTERNET & COMPUTER SECURITY March 20, Scoville Library. ccayne@biblio.org

Open an attachment and bring down your network?

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Cyber Security. Maintaining Your Identity on the Net

Early 1990s Steve Case and AOL

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

What Spammers Don t Want You To Know About Permanently Blocking Their Vicious s

Cybersecurity Best Practices

Learn to protect yourself from Identity Theft. First National Bank can help.

Deter, Detect, Defend

SAFE ONLINE BANKING. Online Banking, Data Security You. Your Partnership for Safe Online Banking

Protection from Fraud and Identity Theft

Information Security. Louis Morgan, CISSP Information Security Officer

National Cyber Security Month 2015: Daily Security Awareness Tips

Is your data secure?

Fighting spam in Australia. A consumer guide

October Is National Cyber Security Awareness Month!

Statistical Analysis of Internet Security Threats. Daniel G. James

Why is a strong password important?

Information Security Training 2012

FAKE ANTIVIRUS MALWARE This information has come from - a very useful resource if you are having computer issues.

10 Quick Tips to Mobile Security

Cyber Security Awareness

and Security. U3A Radlett Computer Group Meeting 6-Oct-2014 V1.1

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

COSC 472 Network Security

Frequently Asked Questions

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

1. Any requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

Recognizing Spam. IT Computer Technical Support Newsletter

4. Identify the security measures provided by Microsoft Office Access. 5. Identify the methods for securing a DBMS on the Web.

STOP. THINK. CONNECT. Online Safety Quiz

9. Information Assurance and Security, Protecting Information Resources. Janeela Maraj. Tutorial 9 21/11/2014 INFO 1500

Saheel KHOYRATTY. Partner Technology Advisor

Cyber Security Awareness

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

What's the difference between spyware and a virus? What is Scareware?

NC DPH: Computer Security Basic Awareness Training

3 day Workshop on Cyber Security & Ethical Hacking

DON T BE FOOLED BY SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam FREE GUIDE. December 2014 Oliver James Enterprise

TELE 301 Network Management. Lecture 18: Network Security

ONLINE IDENTITY THEFT KEEP YOURSELF SAFE FROM BESTPRACTICES WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR WHAT DO YOU NEED TO DO IF YOU SUSPECT YOUR

Information Security Field Guide to Identifying Phishing and Scams

Sample Employee Network and Internet Usage and Monitoring Policy

Customer Awareness for Security and Fraud Prevention

Online Cash Manager Security Guide

ANDRA ZAHARIA MARCOM MANAGER

F-Secure Anti-Virus for Mac. User's Guide

Cyber Security Awareness. Internet Safety Intro.

SENIORS ONLINE SECURITY

The data which you put into our systems is yours, and we believe it should stay that way. We think that means three key things.

TMCEC CYBER SECURITY TRAINING

Retail/Consumer Client. Internet Banking Awareness and Education Program

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

PC Security and Maintenance

The Ministry of Information & Communication Technology MICT


Protecting your business from fraud

California State University, Chico. Information Security Incident Management Plan

The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015.

NOS for IT User and Application Specialist. IT Security (ESKITU04) November 2014 V1.0

2016 Digital Safety Class UNDERSTAND YOUR RISKS AND STAY TOTALLY SECURE JESSE ROBERTSON, TECH 4 LIFE

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

Security and Protection in Real-Time

Chapter 15: Computer Security and Privacy

7 Cs of WEB design - Customer Interface

100% Malware-Free A Guaranteed Approach

Almost 400 million people 1 fall victim to cybercrime every year.

Guideline for Prevention of Spyware and other Potentially Unwanted Software

Internet threats: steps to security for your small business

Desktop and Laptop Security Policy

DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

What you need to know to keep your computer safe on the Internet

Transcription:

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875

Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft, caused accidentally or otherwise. Information may be accessed or stored in devices like telephones, fax machines, and computers. Cyber Security Pertains to the protection of data and systems that are connected to the Internet. Cyber security calls for steps to prevent, detect, and defend against potential information theft attacks. Confidentiality Pertains to protecting private and sensitive information from falling into the hands of the unauthorized. Poor Information Security Can result in identity theft that can occur due to loss of personal information.

Security Exploits Security threats come from many sources. By identifying and responding appropriately to potential attacks, you can protect yourself against unauthorized access to your information. Pharming Is a fraudulent website that contains copies of pages from a legitimate website, to capture confidential information from users. Users tend to end up on the bogus site on their own and are not suspicious because the page looks similar to the original site. Spoofing Is impersonating something else in order to trick your target into doing something that they may not ordinarily do. Phishing Example: A spoofed email can appear to come from an online bank that is asking you to confirm information that can then be used for fraudulent actions. Is an attack wherein the sender tries to trick the target into giving up sensitive information, such as financial information. These internet messages should be IGNORED and you should NEVER click on any of the links provided.

Identifying Security Measures DO NOT send personal information over public Wi-Fi. Wireless networks can be easily intercepted and you are better off using your carriers 3G or 4G. DO create strong passwords. It is always a good idea to use a combination of capital and lower case letters and numbers when creating a password. And while it can be annoying, creating different passwords for each of your accounts gives you the added safety that if one of your accounts are breached, the hacker will not be able to get into all of them. NEVER send out ANY personal information over email. Emails can easily be hacked and you do not want to make it any easier for someone to find more information about you.

Maintaining File Security In some security attacks, files on your hard drive can be corrupted or deleted and that is why protecting your files from catastrophes is important. If you have backed up your files, you can recover them without having to re-create them. Data backup Is a type of information protection scheme that enables you to store copies of critical files and folders for safekeeping. Regular backups provide safety of information. Data restoration Is a type of information protection scheme that enables you to recover stored copies of critical files and folders. A restore protects you against loss of data due to a security disaster. File sharing Involves making files or data available to members on a network. You can control access to your files by limiting the users. By allowing only authorized users to access the content, it protects it from being altered.

Maintaining File Security File transfer Is the process of copying files from one computer to another on a network, including the Internet. With the implementation of security measures, you can prevent unauthorized people from downloading files. File encryption Is a type of file protection that disguises the data within a file or message so that the specific information included within the file or message cannot be read or understood by an unauthorized user. A key can be used to encode the data, so neither the file nor the key can be read by anyone who does not have access. File decryption Is a type of file protection that decodes the data within an encrypted file. Decryption goes hand in hand with encryption, and the tool that was used to encrypt the data will be needed, along with the key to decrypt the data.

Guarding Against Attacks In the cyber world, many of the security breaches occur with email attachments. By defending yourself and your organization against these types of attacks, you can protect your system. Malware Performs actions that cause damage to data contained on a system, or prevents the system from being used in its normal way. Virus Computer programs that can attach to files and replicate themselves, often without your knowledge. Virus Hoax An email message that warns of a fake virus threat and urges the recipient to forward the message to everyone he knows. Example: An email might warn you of a new virus and tell you to spread the word to your friends and give a link to a dangerous website.

Guarding Against Attacks Spam Is a type of email message that is unsolicited and unwanted. Most spam includes at least one link to redirect the user to a different website, which may or may not be a legitimate commercial site. Trojans Are malicious programs that masquerade themselves as harmless applications and purposefully do things that the user does not expect Hacking Is a process of illegally accessing other people's computer systems for destroying or disrupting normal activity

Virus Protection Virus Protection Software Is a type of computer program that enables you to identify and remove malware from a computer. In some instances, the virus protection software might be able to repair damage done by a malicious piece of code. Virus Definition Updates Are files that identify and deal with known malware that was discovered after the initial installation of virus protection software. Virus definition files need to be updated constantly to include protection against newly discovered threats. Virus Scans Are activities that use the software engine and virus definition files to check a computer for the presence of malware. You can also manually force the virus protection software to scan for viruses at any time or set up an automated time. Email Filter Is a software application that categorizes email according to specified rules or instructions. Filters can sort incoming mail into different folders that are set up, including the folder that holds deleted items.

Block Spyware Spyware is a malicious software designed to intercept or take control of a computer s operation without consent. Spyware gains information about the user and silently tracks its surfing behavior to create a marketing profile. When you have spyware on your computer, you will see pop-up advertisements, even when you are not surfing the Internet. You will also observe other odd behavior such as slow downs and crashes. Using anti-spyware programs such as popup blockers and adjusting security settings can help in counteracting the increasing cases of spyware.

Any Questions? Feel free to contact the Training & Technology Solutions: Office: I-214 Ext: 74875 Email: Training@qc.cuny.edu Facebook: www.facebook.com/qc.training Tumblr: http://qc-tech.tumblr.com/