Protecting Your Information Valuables in “Cyberspace” Charlie Russell Rappahannock Rotary Club May 30, 2012.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

How to protect yourself, your computer, and others on the internet
Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Thank you to IT Training at Indiana University Computer Malware.
POSSIBLE THREATS TO DATA
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
SPYWARE Presented by The State Security Office November 17, 2004.
SECURITY CHECK Protecting Your System and Yourself Source:
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
TAX-AIDE Computer Security Chris Hughes Chairman NTC 1 NLT Meeting Aug 2014.
Breaking Trust On The Internet
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Tips and Techniques: How to Protect Yourself and Others Better Jeanne Smythe February 20, 2004.
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
P.E.O. Salt Lake City Reciprocity Meeting Keeping Safe Using Technology April 8, 2010 Presented by Rebecca Conant (Y) P.E.O. Salt Lake City Reciprocity.
Viruses & Destructive Programs
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
eScan Total Security Suite with Cloud Security
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Video Following is a video of what can happen if you don’t update your security settings! security.
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 2-2 VIRUSES & DESTRUCTIVE PROGRAMS.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
By Daniel Carroll and Jarred Givens. The internet has helped further many fields and forms of technology, including: Internet Advancements Cell Phones.
Have Fun, Be Safe Strategies for Internet and Social Media Safety.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
ESCCO Data Security Training David Dixon September 2014.
Stay Safe & Secure Online. Outline Passwords Everyday Security Security Physical Security Protecting Personal Information.
Staying Safe Online Keep your Information Secure.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
 Physical protection and Simple measures  Passwords  Firewalls  Anti-Virus, Spyware and Malware  Web browsers   Patches  Wireless  Encryption.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
© All Rights Reserved What is a computer virus? A computer virus is a piece of software or programming code.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Computer viruses The effects of a virus are…  Slow loadings  Crashing  Not having control over the computer  Deleting documents.
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
Malware & Phishing By: mackenzie olson. Internet fraudsters send out spam, pop-ups, appealing websites, and desirable downloads.
INTERNET: The Good, The Bad and The Ugly
Internet Security and Your Computer Welcome to Boot Camp.
What is Spam? d min.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Bailey Ryan.
By Liam Wright Manga comic group Japan SAFETY on your computer.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Chapter 6 Application Hardening
TECHNOLOGY GUIDE THREE
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Protect Your Computer Against Harmful Attacks!
Computer Security.
Online Computer Security Tips For Parents
Presentation transcript:

Protecting Your Information Valuables in “Cyberspace” Charlie Russell Rappahannock Rotary Club May 30, 2012

Today’s Headlines Cellphone Spamming can be curtailed... Stolen Laptop Exposes Boston Hospital Patient Data

 What’s the Most Important Information you hold?  Banking Data? (account numbers)  Mortgage information? (balance)  Healthcare and medical data? (prescriptions)  Other Financial information? (401k, loans, insurance)  How to Determine Value  What information do you use each day?  What data could you least do without?  Could it be replicated from another source? What’s an Information Asset

 People make money from other’s people’s data (Credit, healthcare, financial)  The Web is worldwide and wild – it was not designed to be secure  Some terms you should understand:  “Phishing” – form of social engineering  s with attachments -.exe files  “Cookies” – ‘welcome back, Mr. Jones’  “Spam” – uneeded s  “Virus” – malware or spurious code  Criminal s (e.g. Nigerian newsletters)  Who can you trust? (Hint: it’s you)  Social Media Use  Linked In  Facebook  Instant Messaging (Google Talk, etc.) The “CyberSpace” Problem

 Use Personal firewalls:  Inside your provider’s environment (e.g. Verizon, Comcast, etc.)  Within your home network  Use Antivirus, antispam, anti ‘adware’ tools  Wireless protection at home and ‘on the go’  Password Protection  Use natural, easy to recall and use, but unique  Use versions (e.g )  Employ some reasoning behind your selection Some Protection Methods

 Computer runs slow, seems to take hours to load simple software or messages  Increase in numbers of unknown messages from unfamiliar accounts  Your ‘junk’ mail file seems to fill up rapidly  Friends say they’ve received mail from your account that you didn’t originate  A password that worked last week no longer works  Requests for account updates arrive from previously unnamed sources Problem Symptoms

 Don’ts: - Host critical data on computers used by students or ‘gamers’ in the family - Visit unknown or unsecure websites (gambling, pornography)  Do: - Make backup copies each month of your complete data files (memory is cheap) - Store a copy of Operating System startup files (MS Windows, Vista, MS Version 7 or XP) on another media (USB or ‘flash’ drives) then lock it up - Protect your wireless: use only WPA2 encryption or better - Employ encryption for key critical files that you transfer to others (e.g. PGP or MS) Some “Cyber” Do’s & Don’ts

Otherwise You’ll Be Fine!