Mgt 240 Lecture Computing at ND: Security and Network September 9, 2004.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Microsoft ® Office 2007 Training Security II: Turn off the Message Bar and run code safely P J Human Resources Pte Ltd presents:
Let’s Talk About Cyber Security
Windows XP Tutorial Securing Windows. Introduction This presentation will guide you through basic security principles for Windows XP.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
How to avoid Viruses and Malware on your Computer Use a firewall Using a firewall is like locking the front door to your house—it helps keep intruders.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Mgt 240 Lecture Computing at ND: Network and Security January 25, 2005.
Mgt 240 Lecture Exam Review February 1, Homework Three Due Friday 2/4 at 5pm Due Friday 2/4 at 5pm Any questions? Any questions? Posted on course.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Protect Your Computer from Viruses and Other Threats! 1. Use antivirus software. 2. Run Windows updates. 3. Use a strong password. 4. Only install reputable.
INFORMATION SECURITY STUDENT GUIDE. There is only one true way to secure a computer. 1.Cut off all the cables, bury the computer in concrete 2.Put the.
Microsoft ® Office 2003 Training Series Security Features in Microsoft Office Oklahoma Dept. of Corrections Employee Services - Training presents:
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Using Windows Firewall and Windows Defender
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Staying Safe Online Keep your Information Secure.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Microsoft ® Office 2007 Training Security II: Turn off the Message Bar and run code safely presents:
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Malicious Attack Corporate Awareness and Walk through Date 29 September 2011.
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Types of Electronic Infection
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
How to protect your computer By: Emily, Jackie and Kathleen.
UNIT 6: SECURITY MEASURES IN WORD PROCESSORS. Functions of Word Processing Software Preparing written forms of communications for clients, other lawyers,
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
Society & Computers PowerPoint
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Computer Security Keeping you and your computer safe in the digital world.
UNIT 6: SECURITY MEASURES IN WORD PROCESSORS. Functions of Word Processing Software Preparing written forms of communications for clients, other lawyers,
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Managing Windows Security
Lesson 3 Safe Computing.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
HOW DO I KEEP MY COMPUTER SAFE?
King Saud University- College OF Applied Studies
Epic Introduction Basics
King Saud University- College OF Applied Studies
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Mgt 240 Lecture Computing at ND: Security and Network September 9, 2004

Homeworks Homework One Homework One Grades posted on course web site Grades posted on course web site Why I asked you to do this Why I asked you to do this Differences between RAM and hard drive Differences between RAM and hard drive Why processor speed matters Why processor speed matters OIT recommendations OIT recommendations Identical homeworks Identical homeworks Homework Two Homework Two Due tomorrow at 5pm Due tomorrow at 5pm Dropbox problems Dropbox problems Help session tonight 7-9pm in L050 – Andy Grau Help session tonight 7-9pm in L050 – Andy Grau Homework Three Homework Three Posted on course web site and other usual places Posted on course web site and other usual places Involves using Excel security features Involves using Excel security features More complicated than first two More complicated than first two Don’t start on it too late! Don’t start on it too late!

Today’s Lecture Excel Security Excel Security ND Computing: Security ND Computing: Security ND Computing: Network ND Computing: Network Guest Speaker: Dewitt Latimer, Deputy CIO, CTO, Assistant VP and Assistant Provost Guest Speaker: Dewitt Latimer, Deputy CIO, CTO, Assistant VP and Assistant Provost

Security and Excel

Security Threats to Excel Unauthorized person/s are able to Unauthorized person/s are able to See content of workbook See content of workbook Change content of workbook Change content of workbook Excel macros can contain viruses Excel macros can contain viruses Excel macros can contain viruses Excel macros can contain viruses

Security Best Practices for Excel Protect workbook contents Protect workbook contents Lock cells, ranges Lock cells, ranges Password protect workbook Password protect workbook Set workbook as read only Set workbook as read only Privacy Privacy Encrypt workbook Encrypt workbook Authenticate workbook Authenticate workbook Digitally sign workbook Digitally sign workbook

Security Options in Excel HWSales2.xls HWSales2.xls HWSales2.xls Protection – Under Tools menu Protection – Under Tools menu All cells are locked by default but often worksheets aren’t protected All cells are locked by default but often worksheets aren’t protected Protecting your workbook activates cell locking Protecting your workbook activates cell locking Prevents modifications to locked cells Prevents modifications to locked cells If you want some cells to be unlocked, you need to specify that before you protect the worksheet If you want some cells to be unlocked, you need to specify that before you protect the worksheet

Security Options in Excel Workbook security settings - Under Options in Tools menu Workbook security settings - Under Options in Tools menu Encrypt entire work book Encrypt entire work book Need to specify Need to specify Encryption algorithm Encryption algorithm Password to decrypt and open Password to decrypt and open Password required to modify shared workbook Password required to modify shared workbook Set shared workbook as read only Set shared workbook as read only Digitally sign workbook and/or macros in it to authenticate author Digitally sign workbook and/or macros in it to authenticate author Digitally sign Digitally sign Remove personal information from file on save (won’t show up when someone clicks on file properties) Remove personal information from file on save (won’t show up when someone clicks on file properties)

Security Best Practices for Excel Protection against viruses and other malicious access to workbook Protection against viruses and other malicious access to workbook Download critical updates for Microsoft Office Download critical updates for Microsoft Office Download critical updates for Microsoft Office Download critical updates for Microsoft Office Sign up for -based security updates from Microsoft Sign up for -based security updates from Microsoft Sign up for -based security updates from Microsoft Sign up for -based security updates from Microsoft Make sure you have anti-virus software and it is up-to- date Make sure you have anti-virus software and it is up-to- date Set macro security settings to high or medium Set macro security settings to high or medium Clear the Trust all installed add-ins and templates check box Clear the Trust all installed add-ins and templates check box Use digital signatures Use digital signatures Maintain a list of trusted macro publishers Maintain a list of trusted macro publishers

Security Options in Excel Security settings for macro execution Security settings for macro execution Very High – only macros installed in trusted locations are allowed to run Very High – only macros installed in trusted locations are allowed to run High – only signed macros from trusted sources allowed to run High – only signed macros from trusted sources allowed to run Medium – You choose whether to run potentially unsafe macros Medium – You choose whether to run potentially unsafe macros Low – You are not protected from unsafe macros. Use only if you have virus protection software installed or you are sure that the documents you open are safe Low – You are not protected from unsafe macros. Use only if you have virus protection software installed or you are sure that the documents you open are safe

ND Computing Security OIT Computing Security web page OIT Computing Security web page OIT Computing Security web page OIT Computing Security web page Who’s in charge of your computer video Who’s in charge of your computer video

12-Step Guide to Safer Computing Step 1 When not using your computer, disconnect it from the Internet. Connected, your computer is open to intrusions by hackers who can access your files, bank account information and personal details, or may use your machine as a “zombie” to launch Denial of Service (DOS) attacks against Internet Service Providers or Web sites, shutting them down.

12-Step Guide to Safer Computing Step 1 (cont.) Step 1 (cont.) Lock out your Windows 2000/XP workstation any time you walk away from your machine. Press CTRL, ALT, DELETE Click Lock Computer

12-Step Guide to Safer Computing Step 2 Use updated anti-virus and personal firewall software Use updated anti-virus and personal firewall software Firewalls ensure no outside users can access confidential or private data. They also filter inbound and outbound traffic and alert you to attempted intrusions. Activate Windows XP firewall by following the instructions at:

12-Step Guide to Safer Computing Step 2 (cont.) Step 2 (cont.) Check for the latest viruses and security information weekly by visiting the OIT web site.OIT web site Update your anti-virus software daily or set it so it will update automatically.

12-Step Guide to Safer Computing Step 3 Make sure your operating system and application software are current. Download software patches for your Windows or Macintosh systems at and respectively.

12-Step Guide to Safer Computing Step 3 (cont.) Step 3 (cont.) Install critical MS Office software patches twice a month by visiting: Remove/do not install unnecessary programs and/or services.

12-Step Guide to Safer Computing Step 4 Use strong passwords more than eight characters long that include both alpha and numeric elements. Passwords should be completely random. Do not use words from the dictionary or numbers similar to your address, phone number or birth date. If you must use a familiar word or number to remember your password, rearrange it, invert it or combine it with another word or number. If your cat’s name is Fluffy and you live on Pine Street, spell the words backward and combine them: Fluffy becomes “yffulf” and Pine, “enip,” making your new password, “yffulfenip.” For added security, throw your favorite number in: “1yffulfenip3,” “yffulf13enip” or “yffulfenip13.” Use as many characters as the program for which the password is needed permits.

12-Step Guide to Safer Computing Step 5 Never write your password down or post it on your monitor – someone may find it! If you must write it down, never leave it unattended. Do not share passwords. Step 6 Change your password regularly (monthly).

12-Step Guide to Safer Computing Step 7 Files for sharing need password protection. You must always understand what you are downloading Many files found on peer-to-peer sharing programs contain Trojans (malicious programs contained inside seemingly harmless data) or Spyware (a program that can go undetected on your system and gather personal information to transmit over the Internet).

12-Step Guide to Safer Computing Step 8 If you discard or trade in your computer, make sure you reformat your hard drive first, ridding it of all sensitive information. Step 9 When ordering products online and using your credit card, use only secure Web sites of reputable online merchants. A padlock on your status bar means the site is secure.

12-Step Guide to Safer Computing Step 10 Do not your social security or social insurance number to anybody. Step 11 s announcing you have won a prize or credit card e-applications are suspicious. If you are truly intrigued, ask to be mailed a hard copy of the or form. Be wary of all attachments, even from those you know. Unless you have had prior notification, do not open attachments you are not expecting. Step 12 Back up critical files and programs. That way, extra copies will be available to you in case of a disaster. Back up your files often.

ND Network Guest Speaker: Dewitt Latimer, Deputy CIO, CTO, Assistant VP and Assistant Provost

Assigned Reading Read chapters 4 (pp , ) and 9 ( ) in text Read chapters 4 (pp , ) and 9 ( ) in text Following are questions that you should be sure you can answer based on your understanding of the text Following are questions that you should be sure you can answer based on your understanding of the text Why are telecommunications systems increasingly critical to businesses? Why are telecommunications systems increasingly critical to businesses? What is a telecommunications medium? What is a telecommunications medium? What is the most widely available wired media type? What is the most widely available wired media type? What is the fastest wired media type? What is the fastest wired media type? How does a modem work? How does a modem work? How much do DSL and cable modems improve upon the speed of modems using standard phone service? How much do DSL and cable modems improve upon the speed of modems using standard phone service? What is the difference between decentralized and distributed processing? What is the difference between decentralized and distributed processing? What is client/server architecture and why is it particularly suitable for businesses today? What is client/server architecture and why is it particularly suitable for businesses today? What is the function of a network operating system? What is the function of a network operating system? What is the role of a communications protocol? What is the role of a communications protocol? What is the communications protocol used as the foundation of the internet? What is the communications protocol used as the foundation of the internet? What is the communications protocol used to support most wireless local area networks? What is the communications protocol used to support most wireless local area networks? What is a cookie? What is a cookie? Why is cryptography critical to the success of e-business? Why is cryptography critical to the success of e-business? What is the purpose of a digital signature? What is the purpose of a digital signature? What can consumers do to protect themselves against identity theft? What can consumers do to protect themselves against identity theft? How can you avoid viruses and worms on your pc? How can you avoid viruses and worms on your pc? How can biometrics be incorporated into security systems? How can biometrics be incorporated into security systems? How does antivirus software work? How does antivirus software work? What is an intrusion detection system? What is an intrusion detection system? What are the four steps organizations can take to prevent internet-based crime? What are the four steps organizations can take to prevent internet-based crime?