HDSB Security Awareness Training. Introduction Good security standards follow the 90/10 rule: 10% of security safeguards are technical. 90% of security.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

How to protect yourself, your computer, and others on the internet
Thank you to IT Training at Indiana University Computer Malware.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
SPYWARE Presented by The State Security Office November 17, 2004.
SECURITY CHECK Protecting Your System and Yourself Source:
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Johnson Logistics Solutions Office of Systems and Information Technology.
Computer Basics Rabie A. Ramadan, PhD 6. Viruses, Worms, Zombies, and others 2.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
NCS welcome all participants on behalf of Quick Heal Anti Virus and Fortinet Firewall solution.
Security for Internet Every Day Use Standard Security Practices and New Threats.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Security Advice Georgie Pepper Campsmount Acadamy.
Threats and ways you can protect your computer. There are a number of security risks that computer users face, some include; Trojans Conficker worms Key.
Threats to I.T Internet security By Cameron Mundy.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
IT Security for Users By Matthew Moody.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
Year 9 Autumn Assessment Computer system/Information security-Planning, Communicating, Information. By Louis Smith-Lassey 9k 9Y1.
PROTECTION ON THE INTERNET NADIA SNOW VIRUS Is a file made to do harm or criminal activity there are many types: -worms -Trojan horse -Spyware How they.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
According to netiquette simply refers to our behavior the internet.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Security System Ability of a system to protect information and system resources with respect to confidentiality and integrity.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Computer Security Hacking, Phishing, Passwords Kausalya S. And Sushil Mujumdar (CCCF) 04 - Aug - 15.
Computer Security! By Tiffy O’Connell Viruses Backup Hackers.
We are here to help you… Fight something like this Brownies !
Malware & Phishing By: mackenzie olson. Internet fraudsters send out spam, pop-ups, appealing websites, and desirable downloads.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
What is Spam? d min.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Internet safety By Suman Nazir
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Woodland Hills School District Computer Network Acceptable Use Policy.
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
Cybersecurity Test Review Introduction to Digital Technology.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Protect Your Computer Against Harmful Attacks!
Risk of the Internet At Home
BCT 2.00 Analyze Technology Issues
Computer Basics Rabie A. Ramadan, PhD 6.
Computer Security By: Muhammed Anwar.
Presentation transcript:

HDSB Security Awareness Training

Introduction Good security standards follow the 90/10 rule: 10% of security safeguards are technical. 90% of security safeguards rely on the computer user (each of us) to be effective! What good is a state of the art security system if you leave the front door open?

Viruses, Worms, and Trojan Horses A common misconception about computer viruses is that they are created by bored, anti- social nerds living in their parents’ basement and are crying out for attention.

Viruses, Worms, and Trojan Horses In reality, viruses are a multi-billion dollar industry. Virus writers consist of individual and teams of expert programmers spanning the globe looking for ways to make money by exploiting computer users and networks. U.S. consumers lose over $3 billion a year. The annual cost of viruses on all levels is believed to be over $50 billion!

Viruses, Worms, and Trojan Horses It is not in the best interest of virus writers to destroy your data or crash you computer. They want your personal information, banking passwords, and credit card numbers. They also want to be able to take control of your computer to add to their botnets – huge networks of infected computers used for a variety of illegal or nefarious purposes.

How They Get You! Virus – This is normally a file that must be opened to infect your computer Worm – A virus that infects a computer over a network. Computer firewalls help prevent these. Trojan Horse – A working program that has an imbedded virus in its inner workings. Social Engineering – An , website, or program designed to trick you into taking some kind of action (such as giving up personal information).

Don’t be in DENIAL! People have been heard saying that they don’t care if they get a virus because they don’t use their computers for banking or shopping. Innocent users have been arrested by authorities because their computers were taken over by a virus and used to break into banking systems, send millions of SPAM s, or distribute child pornography! Why use their computers to do these things when they can use YOURS!

How You Can Protect Yourself Anti-Virus Software – Install and update regularly (Beware of viruses masquerading as real anti-virus software!)

Strong Passwords Strong Passwords – Long passwords are better than complex passwords and easier to remember. Add non alpha-numeric characters for stronger passwords. Top 20 Most Common Passwords would take the best password cracking programs trillion centuries to break would take the same program seconds to break! Beware! Viruses steal good passwords too!

Keeping Software Up to Date Software Updates – Windows, Macs, and nearly all software needs to be updated on a regular basis. Many computers are infected via older versions of Java, Acrobat, and Flash.

If You Think You Have a Virus STOP whatever you are doing! Many viruses log every keystroke! If possible, disconnect from the internet (unplug the network cable). If possible, run anti-virus software and report it to technology staff. From a non-infected computer, change all of your passwords ASAP!

Review A hacked computer can be used to? (select all that apply) a)Send spam and phishing s. b)Harvest and sell addresses and passwords. c)Infect other systems. d)Access restricted or personal information on your computer or other systems that you have access to. e)Generate large volumes of traffic, slowing down the entire system. f)Illegally distribute music, movies and software. g)Record keystrokes and steal your passwords, clean out your bank accounts, distribute child pornography. h)All of the above