For further information computersecurity.wlu.ca

Slides:



Advertisements
Similar presentations
Smartphone and Mobile Device Security IT Communication Liaisons Meeting October 11, 2012 Theresa Semmens, CITSO.
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
The Cain Tool Presented by: Sagar Chivate CS 685F.
Mr C Johnston ICT Teacher
Part 2 of Evil Lurking in Websites Data Security at the University of Wisconsin Oshkosh.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Data Security Issues in IR Eileen Driscoll Institutional Planning and Research Cornell University
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
DVG-N5402SP.
Copyright © 2013 FingerTec Worldwide Sdn.Bhd. All rights reserved.
Kirkwood Scan to Set Up. Scan to Set up 1. Click on Start, Settings, Printers to get this screen.
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
Joel Garmon, Director, Information Security Mike Rollins, Security Architect Jeff Teague, Security Analyst, Senior 1
Windows Tutorial 9 Maintaining Hardware and Software
TAX-AIDE Network Router Setup Network Printer Setups July SMT/TCS Training - Dallas1.
September 2007 General Security Basics Your Responsibilities for Safe Computing.
Security for Seniors SeniorNet Help Desk
P6 - CONFIGURE THE SOFTWARE. CONFIGURE SOFTWARE Most software can be configured to suit an individual user, for example by changing the appearance of.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Technology Coordinators Training. Confidential Copyright © 2007 Pearson Education, Inc. and/or one or more of its direct or indirect affiliates. All rights.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Laptops, Notebooks, & Tablets, Oh My! Kathleen Hamby M.S. CBPA Governors State University.
Tutorial 11 Installing, Updating, and Configuring Software
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
Connecting to USF Network for Web Site SSH Secure Shell is the FTP program you will use to download your http files onto the USF server. To get the SSH.
Chapter 3.  Help you understand different types of servers commonly found on a network including: ◦ File Server ◦ Application Server ◦ Mail Server ◦
Home Media Network Hard Drive Training for Update to 2.0 By Erik Collett Revised for Firmware Update.
Troubleshooting Windows Vista Security Chapter 4.
Network Management Tool Amy Auburger. 2 Product Overview Made by Ipswitch Affordable alternative to expensive & complicated Network Management Systems.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Information Security Awareness Training. Why Information Security? Information is a valuable asset for all kinds of business More and more information.
Specialist communication channel. Sarah-Jane king.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Stuff By Zach and Turtle To designate a default printer, choose Start > Control Panel > Printers and Faxes. Right-click the printer, and then.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Computer Security Status Update FOCUS Meeting, 28 March 2002 Denise Heagerty, CERN Computer Security Officer.
NetTech Solutions Protecting the Computer Lesson 10.
How to use WS_FTP A Step by Step Guide to File Transfer.
IS493 INFORMATION SECURITY TUTORIAL # 1 (S ) ASHRAF YOUSSEF.
An Introduction to E-Commerce Security By Graham Mead.
Computer Security By Duncan Hall.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Cybersecurity Test Review Introduction to Digital Technology.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Windows XP John Morano. Logging into Windows XP XP is a secure operating system – users must log into their own workstation XP is a secure operating system.
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 11 Network Security.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Computer Security Sample security policy Dr Alexei Vernitski.
Page PearsonAccess™ Technology Training Online Test Configuration.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
NETWORK SECURITY LAB 1170 REHAB ALFALLAJ CT1406. Introduction There are a number of technologies that exist for the sole purpose of ensuring that the.
Information Technology Security Office of the Vice President for Information Technology New Employee Orientation II.
IT Security Awareness Day October 19, 2016
Joseph J. Malone Security for Seniors Joseph J. Malone
Chapter 7. Identifying Assets and Activities to Be Protected
Security Awareness: Asking the Right Questions to Protect Information
OWASP CONSUMER TOP TEN SAFE WEB HABITS
Business Risks of Insecure Networks
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Staying Austin College
Connecting Remotely Winter 2014.
Securing Windows 7 Lesson 10.
Presentation transcript:

For further information computersecurity.wlu.ca

Laurier Security Guidelines Wireless networks Internet Browsing Firewall Rules Desktop Configuration Encryption of mobile devices

Desktop Configuration Virus software installed and up to date Personal Firewall Configured Automatic Software Updates Configured Screensaver Lockout Configured

System Preference--Sharing

Click Start in Firewall Tab

Choose Software Update in System Preferences, check Check for updates: and choose Daily from the drop box next to it, check Download important updates in the background box

Require services such as ssh, ftp, SQL be open to the Internet Constant Internet scanning of ports such as ssh for brute force password attacks and vulnerabilities in SQL software ITS offers port and vulnerability scan service Send name and IP number of server to

Screensaver Lockout Protects your computer while it is not attended Requires a password and a timeout period

Right click on Desktop, choose Properties from the drop down menu

In Display Properties window, click on Screen Saver tab, check On resume, password protect, and choose the proper wait time, click OK

In Mac OS X, choose Desktop & Screen Saver from System Preferences, choose proper screen saver and start time

In Mac OS X, choose Security from System Preferences, check Require password to wake this computer from sleep or screen saver box

Encryption for Mobile Devices laptops, usb drives easily lost or stolen

Date: 10/31/2007 Ferris State University is alerting applicants that their personal information was stored on a laptop stolen from a recruiter's car. The laptop contained the names, address, dates of birth, telephone numbers, address and academic information on 18, and 2008 applicants. According to university officials, the information on the laptops is protected by two levels of user identification and passwords so the risk of identity theft is low. However, the university wants to make sure students are aware of the risks and what steps they can take to protect themselves. Toward this end, the university has created a web site as well as a phone line to help answer questions and provide information.

Date: 10/17/2007 The University of Cincinnati is alerting students after a flash drive containing student data, including names and Social Security numbers, was stolen. The drive, containing information on more than 7,000 graduate and undergraduate students, was stolen from the desk of an employee. According to university officials, there has been no evidence that the information has been misused. The university has sent letters to all affected students and has also alerted the three major credit bureaus.

Confidential information on mobile devices must be protected Login passwords and file passwords help but are not enough True security for confidential information requires that the information be encrypted TrueCrypt

For further information computersecurity.wlu.ca