Securing the Human. Presented by Thomas Nee, Computer Coordinator Town of Hanover, Massachusetts hanover-ma.gov/information-technology October is Cyber.

Slides:



Advertisements
Similar presentations
Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Advertisements

By Hiranmayi Pai Neeraj Jain
#10 Useful Reports Election Eligibility February
7 Effective Habits when using the Internet Philip O’Kane 1.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Facebook Security and Privacy Issues Brian Allen Network Security Analyst Washington University December 2, 2010 Alumni House.
Computer Maintenance & Safety Spring Internet Safety Keeping your computer safe What is a computer virus? A computer program that can copy itself.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
How to avoid Viruses and Malware on your Computer Use a firewall Using a firewall is like locking the front door to your house—it helps keep intruders.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
Free Software Alternatives: Avast! Anti-virus
INFORMATION SECURITY AWARENESS PRESENTED BY KAMRON NELSON AND ROYCE WILKERSON.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Security. Physical security Protection from fire/water Protection from dust and extremes of temperature.
Quiz Review.
Norman SecureSurf Protect your users when surfing the Internet.
Securing Your Home Computer Presenter: Donnie Green Date: February 11, 2009 National Aeronautics and Space Administration
Windows Update Jonathan Scott. What is Windows Update? Windows Update is an online program on the Microsoft Website that updates your computer. You can.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Security for Seniors SeniorNet Help Desk
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computer Safety Workshop Presented by Roy Coleman April 14, 2015 © 2015 Roy Coleman.
Safe Internet Use Mark Wheatley CSI Onsite
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Learning In A Techno World How Safe is Your Cyberspace?
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
Web Browser Security Prepared By Mohammed EL-Batta Mohammed Soubih Supervised By Eng. Eman alajrami Explain Date 10. may University of Palestine.
Backing up, Updates, and New Installs… Oh My!. How often do you hear… “Everybody needs to make sure and back up their files.” But what does that really.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Fostering worldwide interoperabilityGeneva, July 2009 How to counter web-based attacks on the Internet in Korea Heung Youl YOUM Chairman of Korea.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
C OMPUTER V IRUSES Julia White. W HAT ARE COMPUTER VIRUSES ? Computer viruses are small software programs that are designed to spread from one computer.
Computer viruses The effects of a virus are…  Slow loadings  Crashing  Not having control over the computer  Deleting documents.
 Introduction to Computing  Computer Programming  Terrorisom.
Small Business Security Keith Slagle April 24, 2007.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
What is Spam? d min.
This Guide is going to be about how to  attach files  create a signature  send to multiple recipients with using ‘Cc’ and ‘Bcc’  change the priority.
Software for Cyber Hygiene © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Cybersecurity Test Review Introduction to Digital Technology.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
Vulnerabilities in Operating Systems Michael Gaydeski COSC December 2008.
Securing the Human. Presented by Thomas Nee, Computer Coordinator Town of Hanover, Massachusetts hanover-ma.gov/information-technology October is Cyber.
For more information on Rouge, visit:
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
Download and install add-in Download and install office windows components from the following link Click Here.
And Off-Season Storage
Joseph J. Malone Security for Seniors Joseph J. Malone
Three steps to prevent Malware infection
ISYM 540 Current Topics in Information System Management
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
And Off-Season Storage
Click Here. Webroot Antivirus Technical Support UK Fix and support for all technical problems related computer security. Remove all online harmful threats.
Norton technical support Norton.com/Setup | Norton Setup and Install with Product Key Norton Antvirus Activation For protection against.
Risk of the Internet At Home
Information Security Session October 24, 2005
Staying safe on the internet

Presentation transcript:

Securing the Human

Presented by Thomas Nee, Computer Coordinator Town of Hanover, Massachusetts hanover-ma.gov/information-technology October is Cyber Security Awareness Month!

The Internet o Knowledge Is Power. o The Internet is the most powerful tool in human history. o Use it! Wisely! o Don’t be assimilated into a BotNet.

Security Threats o 3 New Malware Versions Released Every Second! o Zero-Day Threats o Known, Unpatched Vulnerabilities o Unapplied Security Patches

Protection Against Security Threats o Anti-Virus Updated Daily (Security Gateway and Computers). o Operating System Updated Monthly. o Other Security Patches Less Often o Long, Complex, Frequently-Changed Passwords.

Updates  Microsoft Update (Windows Update if Microsoft Office not installed)  Adobe Reader  Adobe Flash  Java (manual updates by administrator)

Reject Optional Add-Ons Uncheck!

Good Habit: Slow Down o Hover over links. o Press and hold link on a smartphone. o Do NOT click unless you know where the link goes. o Visit mainstream sites only.

Domains At A Glance o Destination determined Right-To-Left between “ and next “/” o Examples: (Goes to Iran!) (could be hosted in US or elsewhere) o See List of Country Codes: en.wikipedia.org/wiki/List_of_Internet_top- level_domains#Country_code_top-level_domains

Attack Vectors o Surfing; Drive-By Downloads. o Spam, Spam, Spam. o Infected computers and programs on network. o Flash Drives

o Phishing – generic, widely distributed spam. o Spear-Phishing – personal information included. Do not succumb to emotion! o Use browser bookmarks/favorites whenever possible instead of links in messages. o Slow Down. Use caution opening attachments.

Recommended Options o McAfee’s SiteAdvisor Browser Toolbar o Norton’s SafeWeb Website (save as Favorite/Bookmark) o Norton’s Browser Toolbar (packaged with Norton Identity Safe)