Internet Security PA Turnpike Commission. Internet Security Practices, rule #1: Be distrustful when using the Internet!

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Northside I.S.D. Acceptable Use Policy
Let’s Talk About Cyber Security
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
UT Wing Civil Air Patrol. Objective Identify network and cyber vulnerabilities and mitigations Social Media/Metadata/Exfil data MITM Attacks Malware Social.
Uintah School District Acceptable Use for Computer and Network Access.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
1 I ntegrated S ite S ecurity for G rids © Members of the ISSeG Collaboration, 2008 See: ISS e G Computer Security: Advice for computer.
Social Engineering PA Turnpike Commission. “Social Engineering is the practice of obtaining confidential information by manipulation of legitimate users”
VISD Acceptable Use Policy
Security Awareness Training PA Turnpike Commission.
INTERNET and CODE OF CONDUCT
10 Essential Security Measures PA Turnpike Commission.
How It Applies In A Virtual World
Threats to I.T Internet security By Cameron Mundy.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Protecting Sensitive Information PA Turnpike Commission.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
Cyber Crimes.
JMU GenCyber Boot Camp Summer, Cyberspace Risks and Defenses Facebook Snapchat P2P filesharing Apps Craigslist Scams JMU GenCyber Boot Camp© 2015.
IT Security for Users By Matthew Moody.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Electronic Use Policies.   Social Media  Internet.
Staying Safe Online Keep your Information Secure.
Lions? And Tigers? And Bears? Oh my!. In The Wizard of Oz, Dorothy, Tinman and Scarecrow were frightened of what may be out there as they traveled the.
Reliability & Desirability of Data
Section 6 Theory Software Copyright, Viruses and Hacking.
Web Browser Security Prepared By Mohammed EL-Batta Mohammed Soubih Supervised By Eng. Eman alajrami Explain Date 10. may University of Palestine.
Internet and Computer Rules If you want to use the computers you need to follow the rules.
IT security By Tilly Gerlack.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
Technology in the Bellingham School District. Bellingham School District Network §Connectivity §Communication §Research Practice Responsible Use.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Year 9 Autumn Assessment Computer system/Information security-Planning, Communicating, Information. By Louis Smith-Lassey 9k 9Y1.
Technology Lab Rules, Procedures, Acceptable Use Policy Review Kindergarten-Second Grade This PowerPoint is meant to be used as a quick review! Students.
Digital Citizenship Project By Lacy Brown. Netiquette Netiquette is etiquette for the internet. Netiquette is etiquette for the internet. You should be.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Introduction to Computer Security PA Turnpike Commission.
Information Security Training for People who Supervise Computer Users.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Computer Security By Duncan Hall.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Setting up Suitable for: Beginner.
Understanding the dangers of living online.  Personal networking (Facebook, MySpace, etc.)  Research information  Download music  Gaming  Instant.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
INTERNET SAFETY, NETIQUETTE, AND COPYRIGHT LAWS By Alex Pagliaro.
Computer Security Keeping you and your computer safe in the digital world.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Computer Technology Internet, ethics, and . EthicsInternetMisc.Internet
InformatiOn Technology Services
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Hacking Computer crime and cyber security.
Internet Safety & Acceptable Use Standards
Phishing is a form of social engineering that attempts to steal sensitive information.
Cybersecurity Awareness
Risk of the Internet At Home
Cyberspace Risks and Defenses
Acceptable Use Policy Grace Lowe.
Lesson 2: Epic Security Considerations
InformatiOn Technology Services
Presentation transcript:

Internet Security PA Turnpike Commission

Internet Security Practices, rule #1: Be distrustful when using the Internet!

The Internet can be a hazardous place. Any computer is vulnerable, especially if up to date security software is not installed on the computer.

How many attacks to PTC computers take place every day? Thousands of attacks take place every minute. They are usually uncoordinated, automated attacks but they are attacks nevertheless. An unprotected computer can become infected or compromised within a few seconds after it is connected to the Internet.

A compromised computer is not just a hazard to you. It’s a hazard to: PTC computers. PTC information. Employee information. Customer information. And potentially anyone on the Internet.

Examples: “Malware” is harmful software, usually installed without your knowledge. Here is one example of what malware can do if gets on your computer: The malware reads addresses on your computer… Sends its own malicious s using those addresses… And the s look like they were sent from the people whose addresses you have on your computer. “Spyware” (a type of malware) can slow computer processing down, hijack web browsers, spy on key strokes and cripple computers. It is usually downloaded via the Internet without the user’s knowledge while you are using the web.

Internet Cautions: Remember: The Internet is not private. Don’t provide personal, sensitive or confidential information to Internet sites, surveys or forms unless you are using a trusted, secure web page. At a minimum, look for “https” in the URL and check for the little padlock that appears in the corner on most browser windows to indicate that there is a secure connection. Just opening a malicious web page can infect a poorly protected computer. Make sure you know where you’re going before clicking on a link. Instead of clicking on a link, look up the company and go to their website independently.

Internet Cautions: Beware of scams, even on well-known sites such as ebay. Be certain not to put sensitive information in locations that are accessible from the Internet. Even unlinked web pages can be found by search engines.

Responsible Use of the Internet: DO Use The Internet: To aid in the performance of your assigned job responsibilities. To support official PTC activities. In compliance with corporate policy. To improve your work-related skills and access information that will make you a more effective employee. DON’T Use The Internet: To transmit sensitive PTC information unless it has been appropriately secured, i.e. encrypted. For conducting personal for-profit transactions, or to operate a personal business. To participate or promote any activity that is prohibited by local, state, or federal law. To download software unless this activity is in compliance with PTC Policy Letter No. 8.5, Licensed Software Use. To exchange or download audio or video files. To access, receive or transmit threatening, obscene, or harassing materials including comments based on race, national origin, sex, sexual orientation, age, disability, religion, or political beliefs, or any other materials that a reasonable individual may find personally offensive or inappropriate. To access resources, including broadcasting services such as Internet radio, which may disrupt or monopolize PTC computer system resources.

Copyrighted information The PTC is committed to following copyright law. Copying, downloading, using, or sharing copyrighted materials must be with the permission of the copyright owner or in accordance with fair use laws, and must be in compliance with PTC Policy Letter 8.5, Licensed Software Use. Exchanging or downloading audio or video files is prohibited. We are liable for copyright violations.

The different modules of this tutorial will: Discuss the risks to your computer and the data it contains. Provide some guidelines for avoiding risks. Suggest some practical and easy solutions. Please review these modules at your convenience.