Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.

Slides:



Advertisements
Similar presentations
Helping our customers keep their computers safe.  Using your pet’s, business, family, friend’s names  Using number or letter sequences (0123, abcd)
Advertisements

How to keep your kids safe online
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
10 Essential Security Measures PA Turnpike Commission.
Online banking Using the internet for your banking.
Securing Your Home Computer Presenter: Donnie Green Date: February 11, 2009 National Aeronautics and Space Administration
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.
SACHIN DEDHIA Cyber Crime Investigator Cert. Ethical Hacker(USA)
PAGE 1 Company Proprietary and Confidential Internet Safety and Security Presented January 13, 2014.
Stay Safe & Secure Online. Outline Passwords Everyday Security Security Physical Security Protecting Personal Information.
Staying Safe Online Keep your Information Secure.
IT security By Tilly Gerlack.
 Physical protection and Simple measures  Passwords  Firewalls  Anti-Virus, Spyware and Malware  Web browsers   Patches  Wireless  Encryption.
Malicious Attack Corporate Awareness and Walk through Date 29 September 2011.
1. Self Awareness You should only access your accounts and private informations from a safe location (only at home as necessary if at all possible) where.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
WIRELESS NETWORKS AT HOME Presentation 9 th December 2004 Simon G Fraser.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
Specialist communication channel. Sarah-Jane king.
How to be Safe Online. Online Access How many of you go online? What are your favorite things to do online? Who accesses the Internet from their smart.
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
David Abarca, Instructor Del Mar College Computer Corner Wireless Network Access Control.
INTERNET SAFETY FOR KIDS
Internet Security and Your Computer Welcome to Boot Camp.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Home Computer Security Sponsored by NASA HQ ITCD Special Projects Training Presented by your Computer Training Center.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Awareness raising session for Parents and Carers June Todd Awareness raising session for Parents and Carers June Todd.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Social Networking Practices. Information Security Purpose is to protect your information’s Confidentiality Integrity Availability.
Information Security Everyday Best Practices Lock your workstation when you walk away – Hit Ctrl + Alt + Delete Store your passwords securely and don’t.
Computer Security & Backups LO: Understanding the need for computer security and typical ways to ensure that a system is secure. Learning Outcome : Define.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Brianne Stewart.   A wireless network is any computer network that is not connected with a cable  Many homes use this type of internet access  Less.
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Cyber Security: Today’s Threats and Mitigations Jonathan Homer, Cyber Security Analyst Idaho National Laboratory.
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Internet Safety.
Unit 4 IT Security.
TECHNOLOGY GUIDE THREE
Home Computer Security
Information Security 101 Richard Davis, Rob Laltrello.
Staying Austin College
Things To Avoid: 1-Never your password to anyone.
Information Technology Services Education and Awareness Team
Lesson 2: Epic Security Considerations
Chapter 3: Protecting Your Data and Privacy
Information Technology Services Education and Awareness Team
Presentation transcript:

Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.

Copyright © 2008 AusCERT 2 Choosing Strong Passwords Do: –Choose passwords at least 8 characters in length –Use upper/lower case characters as well as numbers and symbols –Keep them in a safe place, if you must write them down  Don’t: –Use dictionary words –Stick them to your monitor with a post-it note –Use easily guessable words (e.g. phone number) –Ever tell anyone your password –Re-use the same password for important systems

Copyright © 2008 AusCERT 3 Passphrases If there is no limit on a password length, use a pass-phrase. e.g. “Europe is beautiful this time of year.” 36 characters and easy to remember  All dictionary words with no special characters If you have to pick a smaller password, just use the first letter and swap some characters: “E1bTtof7.”

Copyright © 2008 AusCERT 4 Safe computing practices Apply software updates –To your operating system and –All other programs you have installed and –Any other devices (Routers, Phones, PDAs) –Ideally automatically Run as a non-privileged user (ie. not with ‘Administrator’ access) when surfing the web, reading or for computer based activities that do not require an Internet connection

Copyright © 2008 AusCERT 5 Security software Essential: A personal firewall Anti-virus that is kept up to date Highly Desirable: Anti-spam filter Anti-spyware

Copyright © 2008 AusCERT 6 security  Do not open attachments if you don’t know the sender  Do not open messages that seem out of character for a sender you do know Be careful about clicking on links in s and instant messages Turn off preview pane and view in plain text

Copyright © 2008 AusCERT 7 Online transactions Always type in the address of the website you want to transact with - never follow a link in . Make sure you use a strong password (as described) for online services you care about (such as banking)  Don’t purchase items from websites you are unsure of - check the credentials of the business first and confirm that you are indeed looking at their website. Check the status of your online transactional accounts regularly and contact your transaction service provider immediately in the event of any problems.  Do not use ‘shared’ PCs you don’t control for online transactional services

Copyright © 2008 AusCERT 8 Family Safe online Make sure you know what sites your children are visiting online. Ensure that your children get your approval before downloading programs. Educate your kids not to provide ANY personal information to people they meet online - not even their name. Monitor your kids interactions with people online - the people they are talking to may not be who they appear to be. Consider installing parental lock software, or better still consider placing the computer in a shared space (such as the living room).

Copyright © 2008 AusCERT 9 For broadband users Highly Desirable: Use a hardware modem-router which gives the computer or home network private addresses

Copyright © 2008 AusCERT 10 Wireless security On your computer: –Turn off your wireless adaptor when not in use On your access point: –Enable encryption: WEP is weak (but better than nothing) and WPA2 is stronger. –Allow only a set of MAC addresses –Don’t broadcast your SSID

Copyright © 2008 AusCERT 11 Additional Information For additional information on security, look at: –Protecting your computer from malicious code –national.auscert.org.au – – – – – –