Remote Access. What is the Remote Access Domain? remote access: the ability for an organization’s users to access its non-public computing resources from.

Slides:



Advertisements
Similar presentations
Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
Advertisements

Tiffany Phillips CIS What is a Social Networking Website? Social networking websites function like an online community of internet users. Depending.
Northside I.S.D. Acceptable Use Policy
Developed by Technology Services 1:1 Laptop Initiative
Smartphone and Mobile Device Security IT Communication Liaisons Meeting October 11, 2012 Theresa Semmens, CITSO.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Internet Security PA Turnpike Commission. Internet Security Practices, rule #1: Be distrustful when using the Internet!
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
By: Fesetan, Cindy L.. Contents Instant Messaging How Instant Messaging Work Instant Messaging Program Types of Instant Messaging Advantages & Disadvantages.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Introduction Our Topic: Mobile Security Why is mobile security important?
Methods of communication
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
JMU GenCyber Boot Camp Summer, Cyberspace Risks and Defenses Facebook Snapchat P2P filesharing Apps Craigslist Scams JMU GenCyber Boot Camp© 2015.
Stay Safe & Secure Online. Outline Passwords Everyday Security Security Physical Security Protecting Personal Information.
1.1 System Performance Security Module 1 Version 5.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
TECHNOLOGY USE AGREEMENT FOR STUDENTS GRADES 3-8 This presentation was created to help students understand the district’s Technology Use Agreement before.
LPM – Unit 1 L 4 Socialising on the internet. How do you keep in contact with your friends and family? List all of the different types of technology.
Standards and Protocols Slide show for WiFi Characteristics of a wireless local network. It was named after a group of people who invented. The.
For Wi-Fi The is internationally describing characteristics of a wireless local network. It was named after a group of people who invented.
Online Communication 1 & Ubiquitous Computing. Online Communication *The red circles show the position of the keyframes on the timeline. 1. Explain what.
Technology Social Media Unit 1. What is Social Media? Social media is the interaction among people in which they create, share or exchange information.
Convenience product security Collin Busch. What is a convenience product? A convenience product is a device or application that makes your life easier.
Top 15 Online Tools Cliff Hutto Columbus State University.
IT tools to communicate By Suleman Kalam. Podcast What is Podcasts? A podcasts is a downloadable media file which can be downloaded into many electronic.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
MobileSecurity Vulnerability Assessment Tools for the Enterprise Mobile Security Vulnerability Assessment Tools for the Enterprise Integrating Mobile/BYOD.
What are ____ 1 ______? Rules of behavior that you should follow when using computers and the Internet for the rest of your life Plank Jr. High – Tech.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Social Networking Practices. Information Security Purpose is to protect your information’s Confidentiality Integrity Availability.
Information Security Everyday Best Practices Lock your workstation when you walk away – Hit Ctrl + Alt + Delete Store your passwords securely and don’t.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Goals Be able to identify the parts of a URL Determine the safeness of a link Know the best places to find the info you need Know how to deal with toolbars.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
Tech Tuesday: Facebook 101 People’s Resource Center January 26, 2016.
Android and IOS Permissions Why are they here and what do they want from me?
“Doing the Right thing online” Online Safety. Socializing Communicating Creating Playing Exploring Learning.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Appendix A: Designing an Acceptable Use Policy. Overview Analyzing Risks That Users Introduce Designing Security for Computer Use.
Whats Out? What’s In? What’s New?
How to stay safe using the internet & App’s
Digital Citizenship Grades 4-6
How to stay safe using the internet and app’s?
Information Security.
Call AVG Antivirus Support | Fix Your PC
Information Technology Services Education and Awareness Team
AUP Full Internet Access
CYBERSAFETY & Personal information
BTEC level 3 Learning Aim D.
Information Technology Services Education and Awareness Team
Online Safety; Privacy and Sharing
Online Safety; Privacy and Sharing
Presentation transcript:

Remote Access

What is the Remote Access Domain? remote access: the ability for an organization’s users to access its non-public computing resources from external locations other than the organization’s facilities

Dangers of Remote Access EPIDEMIC!Peeping Toms!

Rule #1 NEVER share logon credentials with anyone.

Rule #2 Use strong and memorable passwords. –

Rule #3 Do not use public devices. – Library workstations – Kiosks – Web cafes STARBUCKS

Rule #4 Do not use personal devices. – If use of personal device is necessary, no copying.

Rule #5 Use only company for remote business.

Rule #6 Implement anti-virus and anti-spyware. – Run them continuously. – Update them.

Rule #7 Ensure you are only connected to one network at a time. No split-tunneling or dual homing. BAD

Rule #8 Only use “administrator” profile to update profile or make system changes.

Cloud computing What is it? What are and aren’t safe practices?

Wireless technology standard for exchanging data over short distances using short-wavelength radio transmissions. – Disable when not being used – Use a PIN that is at least 8 characters long combining numbers and letters if possible

Infrared connection (IrDA) Infrared technology allows computing devices to communicate via short-range wireless signals. – Turn off when not using – Requires line of site, don’t use in crowded area around a lot of people – To keep secure, do in a private area in close range (4 to 20 “ apart)

Near Field Communication (NFC)

NFC uses Radio Frequency Identification Technology to transmit information over very short distances (centimeters or less) Turn off when not using feature Don’t use tags that aren’t secured Don’t exchange info with individuals you don’t trust Look at phone to see what actions the tag prompts. Is there anything suspicious?

Quick Response (QR) Codes Use a QR scanner that shows the URL and asks if you want to go there. Don’t give out personal information or login credentials to any sites you’re directed to. Look out for suspicious QR Codes like ones on stickers stuck over original QR codes.

Cell Phone Basics Phones, tablets, etc. 1.Only download applications from sites you trust and only after checking each apps’ rating and reading the user reviews to make sure it is widely used and respected. 2. Set a password on your phone 3.Watch for suspicious links 4.Be careful what you do at unsecured WiFi hotspots or don’t use at all. 5.Keep spyware from watching you * *

Cell Phone Spyware No good way to be 100% sure phone is not compromised Factory reset done by provider should in theory remove any spyware (also lose all files, photos, etc. stored on the phone). Anti Spyware apps do exist not certain how effective they are. Generally requires physical contact with target phone to install. Could also get in through SMS messages and Bluetooth connections. May notice strange sounds, background noise, decrease in battery life, phone being warm when it hasn’t been used, phone “lighting up for no reason.

Social Networking

Examples of Social Networking Platforms Blogs, micro blogs Wikis Photo and video sharing, podcasts Virtual worlds, exp. WOW Social news, web conferencing, and webcasting Facebook, Twitter, Foursquare, Youtube, Yahoo groups, etc.

What is Social Networking? Means of interaction among people in which they create, share, and exchange information and ideas in virtual communities and networks Depend on mobile and web-based applications to create a platform in which user content can be shared Communication between organizations, communities and individuals

Social Networking Guidelines Do not post discriminatory, harassing, or threating messages or images Do not post anything that would embarrass you or the company and thereby affect the company’s reputation Do not share confidential material, trade secrets, or proprietary information Respect copyright, fair use, and disclosure laws

Social Networking Guidelines Make sure when posting information that you use a disclaimer that the ideas are your own and are in no way affiliated with the company Restrict social networking to personal time and not during company time Do not share personal information about employees, vendors, or clients

Risks of Social Networking Malicious applications can compromise network security The company reputation could be in jeopardy Once information is public the more vulnerable you become Exploitation Data leaks Impersonation

Sources secure/ secure/ rocking-it.html rocking-it.html secure/ secure/ qr-codes qr-codes or-loved-one-for-installing-spyware-on-your-phone/ or-loved-one-for-installing-spyware-on-your-phone/

Sources Continued or-loved-one-for-installing-spyware-on-your-phone/ or-loved-one-for-installing-spyware-on-your-phone/ your-cell-phone/#axzz2NARjbfRN your-cell-phone/#axzz2NARjbfRN secure/ secure/ rocking-it.html rocking-it.html

Sources Continued NIST Special Publication Columbia University Remote Access Acceptable Usage Policy access.aspx access.aspx