Annual Safety & Security Briefing - 9/22/04 Teresa Downey – SLAC Computer Security Group & SCS Applications Group.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
7 Effective Habits when using the Internet Philip O’Kane 1.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
What is identity theft, and how can you protect yourself from it?
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Phishing and Pharming New Identity Theft Threats Presentation by Jason Guthrie.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
ONLINE SAFETY Online safety Money Works: Level 1 Topic 3.
1 I ntegrated S ite S ecurity for G rids © Members of the ISSeG Collaboration, 2008 See: ISS e G Computer Security: Advice for computer.
SLAC Computer Security Annual Safety and Security Briefing 10/11/2007 Teresa Downey.
Windows Security Larry MacPhee Why Security Matters Public nuisance Loss of productivity –The cost of spam!The cost of spam! Loss of data.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Viruses and Spyware. What is a Virus? A virus can be defined as a computer program that can reproduce by changing other programs to include a copy of.
Teach a man (person) to Phish Recognizing scams, spams and other personal security attacks July 17 th, 2013 High Tea at IT, Summer, 2013.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.
Quiz Review.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Security Issues: Phishing, Pharming, and Spam
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Online Safety Workshop Stephanie Rojas, IMG Krystle Donnelly, IMG Cyndi Backstrom, UNLV OIT.
Protect Your Computer from Viruses and Other Threats! 1. Use antivirus software. 2. Run Windows updates. 3. Use a strong password. 4. Only install reputable.
Security 101 Harper P. Johnson Information Technology Services Director of Information Security.
Safe Internet Use Mark Wheatley CSI Onsite
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
IT security By Tilly Gerlack.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Web Spoofing Steve Newell Mike Falcon Computer Security CIS 4360.
Computer Security Hacking, Phishing, Passwords Kausalya S. And Sushil Mujumdar (CCCF) 04 - Aug - 15.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
How to Read Outlook . Make sure the computer is on.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Internet Security and Your Computer Welcome to Boot Camp.
And more……. ‘Leadership and communication are inseparable. You can’t have one without the other.’ ---Claude I. Taylor.
What is Spam? d min.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Managing Money Workshop The National Autistic Society AGM
GUIDE TO INTERNET SAFETY A VISUAL WALKTHROUGH TO SAFE INTERNET BROWSING.
Identity Theft: Protect Yourself Ronald J. Leach.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
For more information on Rouge, visit:
Three steps to prevent Malware infection
Phishing, identity theft, and more
Class Name: Online Safety & Privacy Basics
I S P S loss Prevention.
Home Computer Security
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Network Security: DNS Spoofing, SQL Injection, ARP Poisoning
Computer Security.
Presentation transcript:

Annual Safety & Security Briefing - 9/22/04 Teresa Downey – SLAC Computer Security Group & SCS Applications Group

Computer Security Contact Info   (650) 926-HELP (SCS Helpdesk) Leave “critical” message if after work hours, assuming the issue _is_ critical Computer Security Staff: Robert Cowles  Security Group Manager  x4965 Gary Buhrmaster  x2294 John Halperin  x2257 Teresa Downey  x2903

Topics for Today  Phishing  SLAC Virus Protection  Computer Patching

Phishing  Spoofed s – forged From: address  Usually paired with fraudulent websites  Trying to get personal financial info or accounts/passwords, etc. “identity theft”  Several SLAC personnel have reported these  They are usually tagged as [SPAM:###  Don’t reply to them or click in them

Recent Phishing URL is a fake Hover mouse over URL to see the real destination

Recent Phishing Here is the real destination

Don’t Take the Bait You are giving away your personal information

Forged FDIC Official-looking, threatening This slide shows you forged URL and the real one

Fake FDIC Website Most people would not realize this is not the real FDIC.gov website They exploited a flaw in the browser accomplish this redirection

Real FDIC Website THIS is the real FDIC.gov website!

With Virus Attached A way to get people to download virus and infect their own machine Patches are not sent via !

SLAC Virus Protection SLAC GatewayExchange Server Scan for Virus & Remove Executables

Bypassing SLAC Servers You need to scan all your s and attachments!

Computer Patching  Automated Patching Strongly Encouraged Windows Systems in Active Directory Linux & Solaris Systems running Taylor  Home User Patching Tools Linux: run an auto-patching tool (e.g. up2date for RedHat) – unsure? Ask Mac OS X: use Software Update tool Windows: see next 2 slides

Windows Update Website Choose Express or Custom Install Let it scan Take all Critical Updates

Office Update Website Press Check for Updates Let it scan and take all Critical Updates

What is the Most Important Component of SLAC Computer Security?

YOU!  Don’t fall for phishing scams  Don’t reply to or click in unwanted s  Remember vendors do not patches  Use SLAC servers or scan the s and attachments yourself  Keep your systems patched  The web is a dangerous place too. Think before you click.