INFORMATION SECURITY STUDENT GUIDE. There is only one true way to secure a computer. 1.Cut off all the cables, bury the computer in concrete 2.Put the.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Let’s Talk About Cyber Security
Thank you to IT Training at Indiana University Computer Malware.
POSSIBLE THREATS TO DATA
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Downloading + Viruses. Downloading Modems (56K) V.90 DSL (digital subscriber line) Cable Modem Satellite.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
COMPUTER TERMS PART 2. NETWORK When you have two or more computers connected to each other, you have a network. The purpose of a network is to enable.
Security Advice Georgie Pepper Campsmount Acadamy.
Viruses & Destructive Programs
1.0 Computer Lab Regulations 1.1 Computer Lab Rules 1.2 User 1.3 Equipment 1.4 Data and User Security.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Aaron Cauchi Nurse Informatics
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
D IGITAL C ITIZENSHIP. Definition: The informal rules of behavior to be followed when using the Internet N ETIQUETTE.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Hacker Zombie Computer Reflectors Target.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Introductory Communications Objectives  To gain an overview of: Modems and digital telephone lines Analogue to digital conversion and digital to analogue.
IT Security for Users By Matthew Moody.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
1.1 System Performance Security Module 1 Version 5.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Employee Guidelines for Acceptable Use of Technology Resources.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
What is and How Does it Work?  Electronic mail ( ) is the most popular use of the Internet. It is a fast and inexpensive way of sending messages.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Year 10 ICT. What is it about?  This module sets out essential concepts and skills relating to the ability to understand main concepts underlying the.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Computer Security Keeping you and your computer safe in the digital world.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Viruses & Destructive Programs
Managing Windows Security
Malware and Computer Maintenance
IT Security  .
Protect Your Computer Against Harmful Attacks!
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
Computer Security.
Unit 4 IT Security Kerris Davies.
How to keep the bad guys out and your data safe
What is keystroke logging?
Presentation transcript:

INFORMATION SECURITY STUDENT GUIDE

There is only one true way to secure a computer. 1.Cut off all the cables, bury the computer in concrete 2.Put the concrete block in a safe. 3.Then put the safe in the deepest part of the ocean, 4.and even then there is 1% chance someone can steal your data.

COMMON WAYS HACKERS BREACH SECURITY

1. STEALING PASSWORDS COMMON WAYS HACKERS BREACH SECURITY

People who use the same password on multiple accounts, especially when some of those accounts are on public Internet sites with little to no security. People who write their passwords down and store them in obvious places. The continued use of insecure protocols that transfer passwords in clear text, such as those used for Web surfing, e- mail, chat, file transfer, etc. The threat of software and hardware keystroke loggers. The problem of shoulder surfing or video surveillance. 1. STEALING PASSWORDS

2.TROJAN HORSES COMMON WAYS HACKERS BREACH SECURITY

Trojan virus fix can be difficult at times because of the sneaky way that Trojan horse viruses attach themselves to your computer. They usually mask themselves as either adware or spyware files, and are difficult for most general virus scan and repair products to locate and remove. 1.Random files open 2.You are experiencing slow computer problems 3.You are being sent to websites you did not want to visit 4.Your current homepage was just changed to an adult site (or an unwanted one) 5.Annoying pop ups and toolbars are all appearing 6.Mouse cursor has a trail or has the right and left button functions reversed 7.Navigation buttons disappear on your PC 8.Computer reboots or shuts down on its own 9.Alt + Control + Delete is not responding 10.Your computer’s internet is moving extremely slowly Symptoms;

3- WIRELESS ATTACKS COMMON WAYS HACKERS BREACH SECURITY

ACTIVATE YOUR FIREWALL SETTINGS ON YOUR LAPTOPS Wireless networks have the appeal of freedom from wires - the ability to be mobile within your office while maintaining network connectivity. Wireless networks are inexpensive to deploy and easy to install. Unfortunately, the true cost of wireless networking is not apparent until security is considered. It is often the case that the time, effort, and expense required to secure wireless networks is significantly more than deploying a traditional wired network.

File Transfer: USE SFTP program ( Secure File Transfer Protocol) when you attempt to transfer files between two computers on the internet. USE SSH Program ( secure shell): When you attempt to connect to a remote computer on the internet

1.This is no safe !!! 2.Do not include important info in 3.Think twice when you want to open an attachment. 4.Do not disclose information to people you meet online or post on social networking sites!! KEEP IN MIND

Do not disclose your private information to people you meet online or post on social networking sites!!

Be Prepared: GET SAFE ON LINE Test your security skills FREE

YOUR RESPONSIBILITIES 1.Never share a password with another person. 2.Never attempt to discover or use another individual's password or network ID. 3.Never attempt to circumvent data protection schemes or uncover security loopholes. 4.Never attempt to monitor another user's data communications, or attempt to read, copy, change, delete or transmit another's user files or software. 5.Never attempt to gain unauthorized access to remote computers. 6.Always protect data media (diskettes, Flash drives, DVDs, etc.) by securing them immediately after use. 7.Always back-up data regularly. 8.Properly log out of sessions.

YOUR RESPONSIBILITIES 1.Never send or forward unsolicited including chain mail. 2.Do not open or execute attachments which appear suspect. 3.Attachments are a popular way of distributing viruses. 4.Never use your account for personal business purposes. 5.Never send harassing, annoying, threatening, defamatory, offensive or fraudulent messages or images to others. 6.Always think before sending , especially if angry or upset. E- mail is difficult to retrieve at best and is never retrievable if already opened by the receiving party. 7.Always remember that when the confidentiality of a message is critical, there is no substitute for face-to-face communication.

YOUR RESPONSIBILITIES Be Aware of the university information security policy

WHERE TO GET HELP Campus Help Desk Websites National Centers of Academic Excellence in Information Assurance Education (an NSA designation) with the PASSHE system East Stroudsburg University Indiana University of Pennsylvania West Chester University Books: Is It Safe?, Michael Miller Blown to Bits, Abelson, Ledeen, & Lewis