Chapter 3: Protecting Your Data and Privacy

Slides:



Advertisements
Similar presentations
®® Microsoft Windows 7 for Power Users Tutorial 7 Enhancing Your Computers Security.
Advertisements

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
10 Things You Can do to Secure Your PC Presented by Peter Nowak OIS Client Services Manager.
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Security Awareness: Applying Practical Security in Your World
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
DVG-N5402SP.
PASSWORD MANAGER Why you need one 1. WHAT IS A PASSWORD MANAGER? A modern Password Manager is a browser extension (Chrome, Internet Explorer, Firefox,
Internet Security In the 21st Century Presented by Daniel Mills.
Securing Your Home Computer Presenter: Donnie Green Date: February 11, 2009 National Aeronautics and Space Administration
New Data Regulation Law 201 CMR TJX Video.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
1.1 System Performance Security Module 1 Version 5.
Protecting Your Information Assets
 Physical protection and Simple measures  Passwords  Firewalls  Anti-Virus, Spyware and Malware  Web browsers   Patches  Wireless  Encryption.
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
Computer Security Preventing and Detecting Unauthorized Use of Your Computer.
Explain the purpose of an operating system
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
PLUG IT IN SIX Protecting Your Information Assets.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
INTERNET SAFETY FOR KIDS
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
Internet use 2. How internet used in business and learning? s Cloud computing Video conferencing.
Policies and Security for Internet Access
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
Cyber Security: Today’s Threats and Mitigations Jonathan Homer, Cyber Security Analyst Idaho National Laboratory.
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
Computer Security Keeping you and your computer safe in the digital world.
Internet Identity Management Learning Outcomes Students will manage their web identity and presence according to e-safety, security, and privacy best practices.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
DISCOVERING COMPUTERS 2018 Digital Technology, Data, and Devices
IT Security Awareness Day October 19, 2016
DATA SECURITY FOR MEDICAL RESEARCH
Hotspot Shield Protect Your Online Identity
Instructor Materials Chapter 6 Building a Home Network
Chapter One: Mastering the Basics of Security
TECHNOLOGY GUIDE THREE
MICROSOFT OUTLOOK and Outlook service Provider
OWASP CONSUMER TOP TEN SAFE WEB HABITS
Chapter 11: It’s a Network
Home Computer Security
Things To Avoid: 1-Never your password to anyone.
Lesson #8 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer.
Information Technology Services Education and Awareness Team
Cybersecurity Strategy
Design Unit 26 Design a small or home office network
Digital $$ Quiz Test your knowledge.
Protecting Your Information Assets
2.4 Cyber-Safety.
Web Servers / Deployment
Connecting Remotely Winter 2014.
Internet.
Information Technology Services Education and Awareness Team
Cybersecurity and Cyberhygiene
G061 - Network Security.
Luís Filipe Roque February 19th , 2019.
Preparing for the Windows 8. 1 MCSA Module 6: Securing Windows 8
Presentation transcript:

Chapter 3: Protecting Your Data and Privacy Instructor Materials Introduction to Cybersecurity v2.1 Cisco Networking Academy Program Introduction to Cybersecurity v2.1 Chapter 3: Protecting Your Data and Privacy

Chapter 3: Protecting Your Data and Privacy Introduction to Cybersecurity v2.1 Planning Guide Cisco Networking Academy Program Introduction to Cybersecurity v2.1 Chapter 3: Protecting Your Data and Privacy

Chapter 3: Protecting Your Data and Privacy Introduction to Cybersecurity v2.1 Cisco Networking Academy Program Introduction to Cybersecurity v2.1 Chapter 3: Protecting Your Data and Privacy

Chapter 3 - Sections & Objectives 3.1 Protecting Your Data Explain how to protect devices from threats. Explain how to protect your devices and network. Describe safe procedures for data maintenance. 3.2 Safeguarding Your Online Privacy Explain how to safeguard your privacy. Describe strong authentication methods. Describe safe online behaviors. Cisco Networking Academy Program Introduction to Cybersecurity v2.1 Chapter 3: Protecting Your Data and Privacy 10

3.1 Protecting Your Data 3 – Protecting Your Data and Privacy

Protecting Your Devices and Network Protecting Your Computing Devices Keep the Firewall On Prevent unauthorized access to your data or computing devices Keep the firewall up to date Use Antivirus and Antispyware Only download software from trusted websites Keep the software up to date Manage Your Operating System and Browser Set the security settings at medium or higher Update your computer’s operating system and browser Download and install the latest software patches and security updates Protect All Your Devices Password protect Encrypt the data Only store necessary information IoT devices 3.1 – Protecting Your Data 3.1.1 – Protecting Your Devices and Network 3.1.1.1 – Protect Your Computing Devices

Protecting Your Devices and Network Use Wireless Networks Safely Home Wireless Network Change the pre-set SSID and default administrative password on your Wi-Fi router. Disable SSID broadcast Use WPA2 encryption feature Be aware of WPA2 protocol security flaw – KRACK Allows intruder to break the encryption between wireless router and clients Use caution when using public Wi-Fi hotspots Avoid accessing or sending sensitive information Use of VPN tunnel can prevent eavesdropping Turn off Bluetooth when not in use 3.1 – Protecting Your Data 3.1.1 – Protecting Your Devices and Network 3.1.1.2 – Use Wireless Networks Safely

Protecting Your Devices and Network Use Unique Passwords for Each Online Account Prevents criminals from accessing all your online accounts using one stolen credentials Use password managers to help with remembering passwords Tips for choosing a good password: Do not use dictionary words or names in any languages Do not use common misspellings of dictionary words Do not use computer names or account names If possible use special characters, such as ! @ # $ % ^ & * ( ) Use a password with ten or more characters 3.1 – Protecting Your Data 3.1.1 – Protecting Your Devices and Network 3.1.1.3 – Use Unique Passwords for Each Online Accounts

Protecting Your Devices and Network Use Passphrase Rather Than a Password Tips in choosing a good passphrase: Choose a meaningful statement to you Add special characters, such as ! @ # $ % ^ & * ( ) The longer the better Avoid common or famous statements, for example, lyrics from a popular song Summary of the new NIST guidelines: 8 characters minimum in length, but no more than 64 characters No common, easily guessed passwords, such as password, abc123 No composition rules, such as having to include lowercase and uppercase letters and numbers No knowledge-based authentication, such as information from shared secret questions, marketing data, transaction history Improve typing accuracy by allowing the user to see the password while typing All printing characters and spaces are allowed No password hints No periodical or arbitrary password expiration 3.1 – Protecting Your Data 3.1.1 – Protecting Your Devices and Network 3.1.1.4 – Use Passphrase Rather Than a Password

Protecting Your Devices and Network Lab – Create and Store Strong Passwords 3.1 – Protecting Your Data 3.1.1 – Protecting Your Devices and Network 3.1.1.5 – Lab – Create and Store Strong Passwords

Data Maintenance Encrypt Your Data Encrypted data can only be read with the secret key or password Prevent unauthorized users from reading the content What is Encryption? process of converting the information into a form where an unauthorized party cannot read it 3.1 – Protecting Your Data 3.1.2 – Data Maintenance 3.1.2.1 – Encrypt Your Data

Data Maintenance Back up Your Data Prevent the loss of irreplaceable data Need additional storage location for the data Copy the data to the backup location regularly and automatically Local Backup NAS, external hard drive, CDs/DVDs, thumb drives, or tapes Total control and responsible for the cost and maintenance Cloud Storage Service, such as AWS Access to backup as long as you have access to your account may need to be more selective about the data being backed up 3.1 – Protecting Your Data 3.1.2 – Data Maintenance 3.1.2.2 – Back up Your Data

Data Maintenance Lab – Back up Data to External Storage 3.1 – Protecting Your Data 3.1.2 – Data Maintenance 3.1.2.3 – Lab – Back up Data to External Storage

Data Maintenance Deleting Your Data Permanently Use available tools to delete permanently: SDelete and Secure Empty Trash, for example Destroy the storage device to ensure that the data is unrecoverable Delete the online versions 3.1 – Protecting Your Data 3.1.2 – Data Maintenance 3.1.2.4 – Deleting Your Data Permanently

Data Maintenance Lab – Who Owns Your Data 3.1 – Protecting Your Data 3.1.2 – Data Maintenance 3.1.2.5 – Lab – Who Owns Your Data

3.2 Safeguarding Your Online Privacy 3 – Protecting Your Data and Privacy 3.2 – Safeguarding Your Online Privacy

Strong Authentication Two Factor Authentication Popular online services use two factor authentication Need Username / password or PIN and a second token for access: Physical object - credit card, ATM card, phone, or fob Biometric scan - fingerprint, palm print, as well as facial or voice recognition 3.2 – Safeguarding Your Online Privacy 3.2.1 – Strong Authentication 3.2.1.1 – Two Factor Authentication

Strong Authentication OAuth 2.0 An open standard protocol that allows an end user’s credentials to access third party applications without exposing the user’s password Act as the middle man to decide whether to allow end users access to third party applications. 3.2 – Safeguarding Your Online Privacy 3.2.1 – Strong Authentication 3.2.1.2 – OAuth 2.0

Sharing Too Much Information? Do Not Share Too Much on Social Media Share as little information as possible on social media Do not share information such as: Birth date Email address Phone number Check your social media settings 3.2 – Safeguarding Your Online Privacy 3.2.2 – Sharing Too Much Information? 3.2.2.1 – Do Not Share Too Much on Social Media

Sharing Too Much Information Email and Web Browser Privacy Email is like sending a postcard. Copies of the email can be read by anyone with access. The email is passed among different servers Use the private browsing mode can prevent other from gathering information about your online activities. Private mode on popular browser Microsoft Internet Explorer: InPrivate Google Chrome: Incognito Mozilla Firefox: Private tab / private window Safari: Private: Private browsing 3.2 – Safeguarding Your Online Privacy 3.2.2 – Sharing Too Much Information? 3.2.2.2 – Email and Web Browser Privacy

Sharing Too Much Information Sharing Too Much Information? Lab – Discover Your Own Risky Online Behavior 3.2 – Safeguarding Your Online Privacy 3.2.2 – Sharing Too Much Information? 3.2.2.3 – Lab – Discover Your Risky Online Behavior

3.3 Chapter Summary 3 – Protecting Your Data and Privacy 3.3 - Summary

Protecting Your Data and Privacy Summary Explain how to protect your devices and network from threats. Describe safe procedures for data maintenance. Explain how to safeguard your privacy by using strong authentication methods and practicing safe online behaviors. 3 – Protecting Your Data and Privacy 3.3 - Summary