Presentation is loading. Please wait.

Presentation is loading. Please wait.

Mgt 240 Lecture Computing at ND: Security and Network September 9, 2004.

Similar presentations


Presentation on theme: "Mgt 240 Lecture Computing at ND: Security and Network September 9, 2004."— Presentation transcript:

1 Mgt 240 Lecture Computing at ND: Security and Network September 9, 2004

2 Homeworks Homework One Homework One Grades posted on course web site Grades posted on course web site Why I asked you to do this Why I asked you to do this Differences between RAM and hard drive Differences between RAM and hard drive Why processor speed matters Why processor speed matters OIT recommendations OIT recommendations Identical homeworks Identical homeworks Homework Two Homework Two Due tomorrow at 5pm Due tomorrow at 5pm Dropbox problems Dropbox problems Help session tonight 7-9pm in L050 – Andy Grau Help session tonight 7-9pm in L050 – Andy Grau Homework Three Homework Three Posted on course web site and other usual places Posted on course web site and other usual places Involves using Excel security features Involves using Excel security features More complicated than first two More complicated than first two Don’t start on it too late! Don’t start on it too late!

3 Today’s Lecture Excel Security Excel Security ND Computing: Security ND Computing: Security ND Computing: Network ND Computing: Network Guest Speaker: Dewitt Latimer, Deputy CIO, CTO, Assistant VP and Assistant Provost Guest Speaker: Dewitt Latimer, Deputy CIO, CTO, Assistant VP and Assistant Provost

4 Security and Excel

5 Security Threats to Excel Unauthorized person/s are able to Unauthorized person/s are able to See content of workbook See content of workbook Change content of workbook Change content of workbook Excel macros can contain viruses Excel macros can contain viruses Excel macros can contain viruses Excel macros can contain viruses

6 Security Best Practices for Excel Protect workbook contents Protect workbook contents Lock cells, ranges Lock cells, ranges Password protect workbook Password protect workbook Set workbook as read only Set workbook as read only Privacy Privacy Encrypt workbook Encrypt workbook Authenticate workbook Authenticate workbook Digitally sign workbook Digitally sign workbook

7 Security Options in Excel HWSales2.xls HWSales2.xls HWSales2.xls Protection – Under Tools menu Protection – Under Tools menu All cells are locked by default but often worksheets aren’t protected All cells are locked by default but often worksheets aren’t protected Protecting your workbook activates cell locking Protecting your workbook activates cell locking Prevents modifications to locked cells Prevents modifications to locked cells If you want some cells to be unlocked, you need to specify that before you protect the worksheet If you want some cells to be unlocked, you need to specify that before you protect the worksheet

8 Security Options in Excel Workbook security settings - Under Options in Tools menu Workbook security settings - Under Options in Tools menu Encrypt entire work book Encrypt entire work book Need to specify Need to specify Encryption algorithm Encryption algorithm Password to decrypt and open Password to decrypt and open Password required to modify shared workbook Password required to modify shared workbook Set shared workbook as read only Set shared workbook as read only Digitally sign workbook and/or macros in it to authenticate author Digitally sign workbook and/or macros in it to authenticate author Digitally sign Digitally sign Remove personal information from file on save (won’t show up when someone clicks on file properties) Remove personal information from file on save (won’t show up when someone clicks on file properties)

9 Security Best Practices for Excel Protection against viruses and other malicious access to workbook Protection against viruses and other malicious access to workbook Download critical updates for Microsoft Office Download critical updates for Microsoft Office Download critical updates for Microsoft Office Download critical updates for Microsoft Office Sign up for email-based security updates from Microsoft Sign up for email-based security updates from Microsoft Sign up for email-based security updates from Microsoft Sign up for email-based security updates from Microsoft Make sure you have anti-virus software and it is up-to- date Make sure you have anti-virus software and it is up-to- date Set macro security settings to high or medium Set macro security settings to high or medium Clear the Trust all installed add-ins and templates check box Clear the Trust all installed add-ins and templates check box Use digital signatures Use digital signatures Maintain a list of trusted macro publishers Maintain a list of trusted macro publishers

10 Security Options in Excel Security settings for macro execution Security settings for macro execution Very High – only macros installed in trusted locations are allowed to run Very High – only macros installed in trusted locations are allowed to run High – only signed macros from trusted sources allowed to run High – only signed macros from trusted sources allowed to run Medium – You choose whether to run potentially unsafe macros Medium – You choose whether to run potentially unsafe macros Low – You are not protected from unsafe macros. Use only if you have virus protection software installed or you are sure that the documents you open are safe Low – You are not protected from unsafe macros. Use only if you have virus protection software installed or you are sure that the documents you open are safe

11 ND Computing Security OIT Computing Security web page OIT Computing Security web page OIT Computing Security web page OIT Computing Security web page Who’s in charge of your computer video Who’s in charge of your computer video

12 12-Step Guide to Safer Computing Step 1 When not using your computer, disconnect it from the Internet. Connected, your computer is open to intrusions by hackers who can access your files, bank account information and personal details, or may use your machine as a “zombie” to launch Denial of Service (DOS) attacks against Internet Service Providers or Web sites, shutting them down.

13 12-Step Guide to Safer Computing Step 1 (cont.) Step 1 (cont.) Lock out your Windows 2000/XP workstation any time you walk away from your machine. Press CTRL, ALT, DELETE Click Lock Computer

14 12-Step Guide to Safer Computing Step 2 Use updated anti-virus and personal firewall software Use updated anti-virus and personal firewall software Firewalls ensure no outside users can access confidential or private data. They also filter inbound and outbound traffic and alert you to attempted intrusions. Activate Windows XP firewall by following the instructions at: http://www.microsoft.com/security/protect/ http://www.microsoft.com/security/protect/

15 12-Step Guide to Safer Computing Step 2 (cont.) Step 2 (cont.) Check for the latest viruses and security information weekly by visiting the OIT web site.OIT web site Update your anti-virus software daily or set it so it will update automatically.

16 12-Step Guide to Safer Computing Step 3 Make sure your operating system and application software are current. Download software patches for your Windows or Macintosh systems at http://v5.windowsupdate.microsoft.com and http://www.apple.com/support/downloads/, respectively. http://v5.windowsupdate.microsoft.com http://www.apple.com/support/downloads/

17 12-Step Guide to Safer Computing Step 3 (cont.) Step 3 (cont.) Install critical MS Office software patches twice a month by visiting: http://office.microsoft.com/productupdates http://office.microsoft.com/productupdates Remove/do not install unnecessary programs and/or services.

18 12-Step Guide to Safer Computing Step 4 Use strong passwords more than eight characters long that include both alpha and numeric elements. Passwords should be completely random. Do not use words from the dictionary or numbers similar to your address, phone number or birth date. If you must use a familiar word or number to remember your password, rearrange it, invert it or combine it with another word or number. If your cat’s name is Fluffy and you live on Pine Street, spell the words backward and combine them: Fluffy becomes “yffulf” and Pine, “enip,” making your new password, “yffulfenip.” For added security, throw your favorite number in: “1yffulfenip3,” “yffulf13enip” or “yffulfenip13.” Use as many characters as the program for which the password is needed permits.

19 12-Step Guide to Safer Computing Step 5 Never write your password down or post it on your monitor – someone may find it! If you must write it down, never leave it unattended. Do not share passwords. Step 6 Change your password regularly (monthly).

20 12-Step Guide to Safer Computing Step 7 Files for sharing need password protection. You must always understand what you are downloading Many files found on peer-to-peer sharing programs contain Trojans (malicious programs contained inside seemingly harmless data) or Spyware (a program that can go undetected on your system and gather personal information to transmit over the Internet).

21 12-Step Guide to Safer Computing Step 8 If you discard or trade in your computer, make sure you reformat your hard drive first, ridding it of all sensitive information. Step 9 When ordering products online and using your credit card, use only secure Web sites of reputable online merchants. A padlock on your status bar means the site is secure.

22 12-Step Guide to Safer Computing Step 10 Do not e-mail your social security or social insurance number to anybody. Step 11 E-mails announcing you have won a prize or credit card e-applications are suspicious. If you are truly intrigued, ask to be mailed a hard copy of the e-mail or form. Be wary of all email attachments, even from those you know. Unless you have had prior notification, do not open email attachments you are not expecting. Step 12 Back up critical files and programs. That way, extra copies will be available to you in case of a disaster. Back up your files often.

23 ND Network Guest Speaker: Dewitt Latimer, Deputy CIO, CTO, Assistant VP and Assistant Provost

24 Assigned Reading Read chapters 4 (pp. 136-147, 167-169) and 9 (346-360) in text Read chapters 4 (pp. 136-147, 167-169) and 9 (346-360) in text Following are questions that you should be sure you can answer based on your understanding of the text Following are questions that you should be sure you can answer based on your understanding of the text Why are telecommunications systems increasingly critical to businesses? Why are telecommunications systems increasingly critical to businesses? What is a telecommunications medium? What is a telecommunications medium? What is the most widely available wired media type? What is the most widely available wired media type? What is the fastest wired media type? What is the fastest wired media type? How does a modem work? How does a modem work? How much do DSL and cable modems improve upon the speed of modems using standard phone service? How much do DSL and cable modems improve upon the speed of modems using standard phone service? What is the difference between decentralized and distributed processing? What is the difference between decentralized and distributed processing? What is client/server architecture and why is it particularly suitable for businesses today? What is client/server architecture and why is it particularly suitable for businesses today? What is the function of a network operating system? What is the function of a network operating system? What is the role of a communications protocol? What is the role of a communications protocol? What is the communications protocol used as the foundation of the internet? What is the communications protocol used as the foundation of the internet? What is the communications protocol used to support most wireless local area networks? What is the communications protocol used to support most wireless local area networks? What is a cookie? What is a cookie? Why is cryptography critical to the success of e-business? Why is cryptography critical to the success of e-business? What is the purpose of a digital signature? What is the purpose of a digital signature? What can consumers do to protect themselves against identity theft? What can consumers do to protect themselves against identity theft? How can you avoid viruses and worms on your pc? How can you avoid viruses and worms on your pc? How can biometrics be incorporated into security systems? How can biometrics be incorporated into security systems? How does antivirus software work? How does antivirus software work? What is an intrusion detection system? What is an intrusion detection system? What are the four steps organizations can take to prevent internet-based crime? What are the four steps organizations can take to prevent internet-based crime?


Download ppt "Mgt 240 Lecture Computing at ND: Security and Network September 9, 2004."

Similar presentations


Ads by Google