Protecting Information. Who We Are We are working on our Information Assurance MBA This is part of our curriculum; to present on information security.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
SECURITY CHECK Protecting Your System and Yourself Source:
  Cyberbullying can be as simple as continuing to send e- mail or text harassing someone who has said they want no further contact with the sender.
Malicious Attacks By Chris Berg-Jones, Ethan Ungchusri, and Angela Wang.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Malicious Attacks Angela Ku Adeline Li Jiyoung You Selena Yuen.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Threats to I.T Internet security By Cameron Mundy.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
DIGITAL CITIZENSHIP DIGITAL CITIZENSHIP By: Erica Lewis ED 505.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
November 10,  Acceptable use  Internet Filtering  Social Web (MySpace, Facebook, etc.)  Cyberbullying  Plagiarism  Phishing.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
This Is A PowerPoint Presentation On Computer Viruses. This Presentation Will Show You What Can Be Done To Deal With The Viruses. Mr Owen 10C.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
ITC Summer I Table of Contents Glossary of terms Glossary of terms Safety Tips Quiz Credits Standards Multimedia Connections Multimedia.

About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
INTERNET: The Good, The Bad and The Ugly
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
What is Spam? d min.
Security Risks Viruses, worms, Trojans Hacking Spyware, phishing Keylogging Online fraud Identity theft DOS (Denial of Service attacks.
By Liam Wright Manga comic group Japan SAFETY on your computer.
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
Internet safety By Kenan.  Viruses are written by malicious programmers who wish to cause problems for other computer users.  The primary source of.
This Guide is going to be about how to  attach files  create a signature  send to multiple recipients with using ‘Cc’ and ‘Bcc’  change the priority.
October is National CyberSecurity Awareness Month OIT and IT providers across campus are launching an awareness campaign to provide tips and resources.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Internet safety By Suman Nazir
Threats to IT security Jordan pilcher. phishing Phishing is when companies or people from other people who think they can get away with scamming you for.
Computer crimes.
INTRODUCTION & QUESTIONS.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
5 different ways to get tricked on the internet. 1. Viruses A virus is a computer malware program that copies it’s files to the computer. This may allow.
DoS Attacks Phishing Keylogging Computer Laws/Acts.
Malicious Attacks By: Jamie Woznicki Rahul-Anaadi Kurl Alexander Kaufmann Curtis Songer Daniel Cardenas Rivero.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Computer Security Keeping you and your computer safe in the digital world.
Important Information Provided by Information Technology Center
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
Unit 4 IT Security.
Lesson 3 Safe Computing.
Lesson 2- Protecting Yourself Online
Internet Safety Vocabulary
Computer Security.
Lesson 2- Protecting Yourself Online
Presentation transcript:

Protecting Information

Who We Are We are working on our Information Assurance MBA This is part of our curriculum; to present on information security as part of an outreach program to educate younger people in the community

Overview Passwords tips Phishing Keeping your computer safe

Passwords Question: –What percentage of students, grades 7-12, share their passwords with someone else? According to a study by Wired Safety.org, 66% of students, grades 7-12, said they shared their password with someone else.

Password – Safety Tips Use different passwords Use strong passwords Do not reveal to others Try not to write down passwords Do not type passwords on computers that you do not control Never provide passwords over or in response to an request

Passwords Are Great, but… While the use of different and strong passwords are great, they still may not be enough. July 2012 – Yahoo hacked –450,000 passwords posted online For increased security, the following can be used in addition to passwords: –Fingerprint reader –Retina Scanner –Voice recognition

Phishing Attack Phishing: the act of attempting to acquire information such as usernames, passwords, and credit card details or any sensitive information by portraying a trustworthy entity in an electronic communication.

Recent Phishing Attack NBC News reported, at the beginning of this year, a 14-person gang of cyber- criminals tricked an elderly woman into sending her bank account information by sending fake s from her bank. They stole her life savings of $1.6 million dollars.

Recognizing Phishing Attacks Unknown/questionable sender Sense of urgency Questionable subject line Beware or links in Threats to shut down your account

Phishing Example

Keeping Your Computer Safe Computer Virus: a program that spreads by first infecting files or the system areas of a computer or network router's hard drive and then making copies of itself. Summer Good Solutions? –Anti-virus software –Self-awareness

Anti-Virus Software What is anti-virus software? –Protective software designed to defend your computer against malicious attacks, such as viruses. Popular anti-virus software –Norton –McAfee –Bitdefender –Avast

Online Searching Fact Most Dangerous Celebrity to Search in 2012?? According to CBS News, Emma Watson was named McAfee's 2012 most dangerous celebrity to search for online. Searching for Emma Watson pictures and downloads had a 12.6% chance of landing on a website that poses online threats

Conclusion We live in a digital world that is becoming more reliant on the internet and everything that comes along with it each and every day. Without the knowledge of security threats and safe practices against these threats, our digital world is more dangerous and at risk.

Questions