Marlon R Clarke, Ph. D., CISSP, CISM Director Network Operations and Services, NSU 10-17-2013



Similar documents
Malware & Botnets. Botnets

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential

10 Quick Tips to Mobile Security

National Cyber Security Month 2015: Daily Security Awareness Tips

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

Why you need. McAfee. Multi Acess PARTNER SERVICES

How to Use Windows Firewall With User Account Control (UAC)

General Security Best Practices

PREVENTING HIGH-TECH IDENTITY THEFT

Learn to protect yourself from Identity Theft. First National Bank can help.

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

ecommercial SAT ecommercial Security Awareness Training Version 3.0

Everyone s online, but not everyone s secure. It s up to you to make sure that your family is.

Business Internet Banking / Cash Management Fraud Prevention Best Practices

Business ebanking Fraud Prevention Best Practices

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

F-Secure Anti-Virus for Mac 2015

Appendix A. 1 Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Safe Practices for Online Banking

Introduction to Cyber Security

Tips for Banking Online Safely

2009 Antispyware Coalition Public Workshop

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

BE SAFE ONLINE: Lesson Plan

Protect yourself online

ONE Mail Direct for Mobile Devices

Network Security and the Small Business

High Speed Internet - User Guide. Welcome to. your world.

OPSEC and Safe Social Networking

Preparing Your Personal Computer to Connect to the VPN

MOBILE MARKETING. A guide to how you can market your business to mobile phone users. 2 April 2012 Version 1.0

Your Digital Dollars Online & Mobile Banking

Cyber Security Awareness

Report on Consumer Behaviors and Perceptions of Mobile Security. Presented by NQ Mobile & NCSA January 25, 2012

Cyber Security. Securing Your Mobile and Online Banking Transactions

& INTERNET FRAUD

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

October Is National Cyber Security Awareness Month!

Protecting your business from fraud

What are the common online dangers?

STOP. THINK. CONNECT. Online Safety Quiz

Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May TrustInAds.org. Keeping people safe from bad online ads

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

1. Any requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

NQ Mobile Security Frequently Asked Questions (FAQs) for Android

Internet basics 2.3 Protecting your computer

Basic Security Considerations for and Web Browsing

F-Secure Anti-Virus for Mac. User's Guide

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household

Best Practices Guide to Electronic Banking

Cyber Security Awareness

GUIDE TO KEEPING YOUR SOCIAL MEDIA ACCOUNTS SECURE

Retail/Consumer Client. Internet Banking Awareness and Education Program

Defense Media Activity Guide To Keeping Your Social Media Accounts Secure

Network Security. Demo: Web browser

How to stay safe online

Cyber Security Beginners Guide to Firewalls A Non-Technical Guide

MOBILE BANKING. Why should I use Mobile Banking?

Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1. Awareness of BYOD Security Concerns. Benjamin Tillett-Wakeley. East Carolina University

Dr. David Turahi Director for IT&IMS - MOICT Uganda

Get Started Guide - PC Tools Internet Security

BLACKJACKING: SECURITY THREATS TO BLACKBERRY DEVICES, PDAS, AND CELL PHONES IN THE ENTERPRISE

2015 MDRT Annual Meeting e Handout Material. What is Your Smartphone Leaking?

DIGITAL LIFE E-GUIDE How to Protect your Smartphone

Why is a strong password important?

Saheel KHOYRATTY. Partner Technology Advisor

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Introduction to Computer Security

The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015.

Infocomm Sec rity is incomplete without U Be aware,

Internet threats: steps to security for your small business

Internet Security Priorities. Benenson Strategy Group and American Viewpoint December 20, 2013

Computer Security Awareness at Home. Presented By Gavin Worden

ANTITERRORISM AWARENESS FOR SOCIAL NETWORKING

Cyber Security: Beginners Guide to Firewalls

2012 NCSA / McAfee Online Safety Survey

INFOCOMM SEC RITY. is INCOMPLETE WITHOUT. Be aware, responsible. secure!

Computer Viruses: How to Avoid Infection

Perception and knowledge of IT threats: the consumer s point of view

Transcription:

Marlon R Clarke, Ph. D., CISSP, CISM Director Network Operations and Services, NSU 10-17-2013 Todays Discussion Overview of Computer and Internet Security What is Computer and Internet Security Who Should be Concerned Why Should I Care General Computer Security Tips Securing Mobile Devices and Social Networks Mobile Devices Risks How are Location Sharing Technologies used Risks of Location Sharing Technologies Examples of Location Sharing Technologies 1

What is Computer and Internet Security Computer Security Protecting computers, information, and services from unauthorized access, change or destruction. Internet security extends this concept to systems that are connected to the Internet Browsing the Internet Electronic Commerce Social Networking Emailing Marlon R Clarke, Ph. D., CISSP, CISM Director Network Operations and Services, NSU 10-17-2013 2

Todays Discussion Overview of Computer and Internet Security What is Computer and Internet Security Who Should be Concerned Why Should I Care General Computer Security Tips Securing Mobile Devices and Social Networks Mobile Devices Risks How are Location Sharing Technologies used Risks of Location Sharing Technologies Examples of Location Sharing Technologies What is Computer and Internet Security Computer Security Protecting computers, information, and services from unauthorized access, change or destruction. Internet security extends this concept to systems that are connected to the Internet Browsing the Internet Electronic Commerce Social Networking Emailing 3

Who Should be concerned Anyone who uses Computers Mobile Devices The Internet Email Social Networks Why Should I Care? Infections from viruses, spyware, or malware Virus - Program designed to infect your computer, replicates itself, and usually causes lost or corrupt data Spyware is a type of malicious code that tracks your habits on the internet without you knowing it; usually collects personal information 4

Why Should I Care.. Cont d Phishing, Hoaxes, Malware, Scams and Spam The most prevalent and persistent threats to your security come to you in your Inbox. They come by different names and may even appear legitimate and even supposedly from people you may know. They all have this in common: they are designed to get you to click on an item like an attachment, link or picture. Why Should I Care.. Cont d Broken device Devices that do not work when needed or as expected. Privacy and personal security concerns Preventing private, personal, or sensitive information from being disclosed 5

Basic Approaches to Security Use anti-virus and anti-spyware Software Detects and removes viruses and spyware from your computer Must be kept up to date Install security patches Enable Firewalls Protects computers by preventing unauthorized access Basic Approaches to Security Use strong passwords to protect computers Be cautious about downloading free software or files from untrusted sites Most prevalent threats to your security come to you in your Inbox; are all designed to get you to click on an item like an attachment, link or picture. If you click, you could launch harmful programs or be directed to a harmful web site. 6

Basic Approaches to Security Think before you click on links Most threats are targeted in hopes that you will click on a harmful link, attachment, picture, video or icon in an email or web page Stop: Do not automatically click on Internet links until you have confidence in them. Think: Look at the actual address for the links in question. For instance if the link indicates Click Here be sure to hover your mouse pointer over the link and investigate before you proceed. Click: Only after you are confident that the site is safe. Security for Mobile Devices and Social Networks Mobile Devices have become the devices of choice for communicating and connecting to the Internet Smartphones Tablets Laptop Computers Social Networks Foursquare, Google Latitude, Twitter Facebook, Google + Pinterest, Gowalla 7

Mobile Devices - Risks Mobile devices are easy to lose or steal Can carry large amount of data If stolen, an unsecured Smartphone grants access to your private information: email correspondence, address books, and any unsecured documents. Often unprotected Data may be sniffed during unprotected wireless communications Mobile Devices - Risks Location Sharing Location-aware applications deliver online content to users based on their physical location. Technologies employ GPS, cell phone infrastructure or wireless access points to identify where cell phones or laptops are located and users can share that information with location-aware applications. 8

Mobile Devices - How are Location Sharing Technologies used? Apps might provide you with information on nearby restaurants, notify you of traffic jams, or let your friends in a social network know where you are, prompting increased social connectivity. Risks of Location Sharing Technologies Makes users human homing beacons Increases the chances of being stalked May reveal when you are home or away 9

Examples of Location-Sharing Technologies GPS Geo-tagging of photos Location details added to photographs Facebook places Allows users to "share where you are with your friends, see where your friends are and discover new places around you. Blip Blackberry application updates location every 15 minutes. Google Latitude Allows you to see where your friends are and what they doing Security Guidelines for Location Sharing Technologies Most apps offer privacy controls enable them Some privacy controls are not always easy to access Defaults may be too open Know what applications you have and research privacy controls Disable GPS capabilities and geotagging features 10

Security Guidelines - Mobile Devices Enable auto-lock Enable password protection Keep the phone OS and apps up-to-date Enable remote wipe feature where possible Avoid connecting to public wireless network when possible. Security Guidelines - Social Networks Security Guidelines Before you post, ask the following: Will this post/picture cause a problem for me? Would I say this in front of my mother? Limit the number of people that see it Share public information with the public Share inner thoughts and personal feelings with close friends 11

Security Guidelines - Social Networks Limit your visibility on services Do not Friend or Connect with people that you have not met in person or know well Limit your check-in information to friends only Never check in at your home, school, work A mayorship is a public office Security Guidelines - Social Networks Avoid public lists for a location Review posts you are tagged in Turn off geo location data in photos Turn off find my face in photos and videos Disable location data for tweets Delete old location data too 12

Stay Safe Think before you click and try to be mysterious when online 13