Information Security 101 Richard Davis, Rob Laltrello.

Slides:



Advertisements
Similar presentations
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Advertisements

Protect Yourself Against Phishing. The good news: The number of US adult victims of identity fraud decreased from 9.3 million in 2005, to 8.4 million.
Jason Rich CIS  The purpose of this project is to inform the audience about the act of phishing. Phishing is when fake websites are created.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Threats to I.T Internet security By Cameron Mundy.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Reliability & Desirability of Data
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
IT security By Tilly Gerlack.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Information Security Sharon Welna Information Security Officer.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Cybersecurity Test Review Introduction to Digital Technology.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Technical Implementation: Security Risks
Internet Safety.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Viruses & Destructive Programs
Edexcel GCSE Cyber security threats Computer Science 1CP1
An Introduction to Phishing and Viruses
Done by… Hanoof Al-Khaldi Information Assurance
IT Security  .
Unit 4 IT Security.
Social Engineering Charniece Craven COSC 316.
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
Lesson 3 Safe Computing.
I S P S loss Prevention.
Phishing is a form of social engineering that attempts to steal sensitive information.
Unit 4 IT Security.
Protect Your Computer Against Harmful Attacks!
Staying Austin College
Lesson 2- Protecting Yourself Online
Cybersecurity Awareness
Call AVG Antivirus Support | Fix Your PC
Information Technology Services Education and Awareness Team
Robert Leonard Information Security Manager Hamilton
Protecting Your Identity:
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Unit 4 IT Security Kerris Davies.
How to keep the bad guys out and your data safe
Internet Safety – Social Media
Social Engineering Humans are often the weakest point in security
Information Technology Services Education and Awareness Team
What is Phishing? Pronounced “Fishing”
Lesson 2- Protecting Yourself Online
Security in mobile technologies
G061 - Network Security.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Information Security 101 Richard Davis, Rob Laltrello

What is Information Security? Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction. Why should I care? State and Federal Laws Georgia Highlands College Policy Protecting the college’s image Clean-up costs (both in time and money) Team ghc: working to win

Team ghc: working to win Some Common Terms Phishing ... is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, accounts numbers or passwords by posing as legitimate websites or entities requesting this information. Shoulder Surfing ... is the process of obtaining security credentials or other data as it is being entered by watching or recording the physical entry of the data either behind, next-to or in view of the victim. Spyware ... is hidden software that obtains data, or other information from a persons computer without notification or without the user’s consent. Malware ... is software that is designed to infiltrate and destroy or damage either data or other components of a computer system. Social Engineering ... is the process of getting someone to divulge personal or secret information through use of lies, misguided trust, apparent authority or other forms of deception. Team ghc: working to win

Team ghc: working to win Online Banking Always keep your credentials to yourself. Ensure you login only by visiting your bank’s website. Email is not a method used by banks to request personal info. Avoid using publicly available computers for your online banking. Trust your instincts. If something looks wrong it probably is. Always run and keep your anti-x software up to date. Team ghc: working to win

Team ghc: working to win Social Media Keep your statuses simple and never divulge your physical location. Monitor who can see your social networking information. Choose strong passwords to prevent someone accessing your social networking account. Avoid divulging highly personal information such as your address – even in configuration or informational pages. If you click on a link, make sure the website address that opens is the same as the link you clicked on. Always remain anonymous when entering open or “free-for-all” chat rooms and similar gatherings. Team ghc: working to win

Passwords / Passphrases Information about you should never be in your password. If your password can be looked-up in a dictionary, it is too weak. Don’t write passwords down. Change passwords on a regular basis. No website/bank/store will send you email asking you to reply with your password or username. Do not reply to such requests. Team ghc: working to win

Passwords / Passphrases Continued … Team ghc: working to win

Team ghc: working to win Email Replying to spam or junk-mail only serves to inform the sender you are reading it and that the account is being checked. Avoid sending confidential files, passwords, credit-card numbers or ANY other confidential data in email. Be cautious when opening links from email messages. Make sure the link address is what actually opens in the browser. Ensure all emails are scanned for viruses and other possible malware, phishing or spyware threats. When you use reply-all, make sure everyone on the recipient list needs to know what you have to say. Team ghc: working to win

Team ghc: working to win Email Continued … Connections to public and/or public-service Wi-Fi or other networks should be treated as non-secure. Ensure you have a firewall, and other protection software running. Shoulder Surfing is when someone watches you type your password or credentials on your laptop from behind, to the side or with zoom lenses. Always take care when entering this information in a public area. Do not leave your laptop unattended. Apart from theft you may find key loggers or other spyware software very quickly installed. Keep removable storage, memory cards, memory sticks and other small data storage devices safe. Team ghc: working to win

Team ghc: working to win Mobile Use Connections to public and/or public-service Wi-Fi or other networks should be treated as non-secure. Ensure you have a firewall and other protection software running. Email messages urging you take action with lots of warnings, time-limits and grammar or spelling mistakes should be treated as possible threats. Team ghc: working to win

Questions / Discussion Team ghc: working to win