Cyber Hygiene The Big Picture © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.

Slides:



Advertisements
Similar presentations
Possible Threats To Data. Objectives To understand: Types of threats Importance of security Preventative and remedial actions Personal safety This will.
Advertisements

Know the Client Own the Problem Share the Solution The 2005 Case for Information Technology Security October 14, 2004.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Physical and Cyber Attacks1. 2 Inspirational Quote Country in which there are precipitous cliffs with torrents running between, deep natural hollows,
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Cyber Crime Carloe Distor CCS1D. Agenda  Introduction & History  Cyber Criminals  Types of Cyber Crime  Cyber Crime in Pakistan  Protect Computers.
Computer Security Dylan, Robert, Matanel, Jordan.
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
Keeping Data Safe Revision Summer How many ways can data be lost? Start a list… Physical Loss or Corruption of data Accidental or Deliberate Unauthorised.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Telenet for Business Mobile & Security? Brice Mees Security Services Operations Manager.
Online Child Safety Cyril Voisin Chief Cloud and Security Advisor Microsoft Gulf.
Protecting ICT Systems
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
2015 Risky Business Week Welcome to the 2015 Risky Business Week presentation regarding disaster recovery Risky Business Week.
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
Lecture Materials for the John Wiley & Sons book: Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions October 7, 2015 DRAFT1.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
STAY SAFE!! Don’t fall for the same old tricks !!.
Cyber Security & Fraud – The impact on small businesses.
Files are at risk from loss if your computer breaks or if you get a virus. Files can also become corrupted. Solutions: Make regular back ups of files Use.
Big Data Bijan Barikbin Denisa Teme Matthew Joseph.
Mehdi Ghayoumi Kent State University Computer Science Department Summer 2015 Exposition on Cyber Infrastructure and Big Data.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
PREPARED BY: SHOUA VANG ABHINAV JUWA CHASE PAUL EASy Security Project Anonymous vs HBGary Inc.
Android Mobile Security Krystal Salerno. Introductions.
Computer Security! By Tiffy O’Connell Viruses Backup Hackers.
A few notes. First - What is the Cloud ? * Any number of blogs / articles and definitions * Accessing information services and software over the internet.
Virus hacking Stuxnet Backups. Computer SecurityComputer Security Catch it, kill it, bin it.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
 Introduction to Computing  Computer Programming  Terrorisom.
Internet Safety Presentation by Diahn Hess. Overview Internet Safety Private and personal information Meeting people online Safe interactions Cyberbullying.
Social Engineering © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Friday, October 23, Jacqueline Harris, CPM®, CCIM® Director of Training & Administration Digital Realty Jacqueline Harris, CPM®, CCIM® Director.
Protecting Your Identity © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Software for Cyber Hygiene © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Communications & Networks National 4 & 5 Computing Science.
Society & Computers PowerPoint
Ed Tech Audit Case Study Pete Reilly. Process Meetings with the Superintendent Extended meetings with the technology coordinator Meeting with each administrator.
Mobile Security By Jenish Jariwala. What is Mobile Security?  Mobile Security is the protection of smartphones, tablets, laptops and other portable computing.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
MIS323 – Business Telecommunications Chapter 10 Security.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
Windows Administration How to protect your computer.
Digital Footprints Cyberbullying Passwords The Digital Community Staying Safe Online
Part One Progress Check. Was your result as good as you hoped? The ‘multiple choice’ questions are OK if you know your stuff But the ‘longer’ questions.
Fraud and the internet Sandra Peaston Assistant Director, Insight Cifas, The UK’s Fraud Prevention Service.
10 things you can do today to reduce your security risk.
Philip J. Beyer, Information Security Officer John P. Skaarup, Sr. Security Engineer Texas Education Agency Information Security.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
CHAPTER 4 Information Security.
Dos of Technology Use Follow the directions of the adult in charge.
Risk of the Internet At Home
Computer-Based Processing: Developing an Audit Assessment Approach
Security Essentials for Small Businesses
Encryption and Hacking
Unit 4 IT Security Kerris Davies.
Protect Your Ecommerce Site From Hacking and Fraud
Security week 1 Introductions Class website Syllabus review
Policies and Procedures to Protect you, your Office and your Data
Cybersecurity at WAJ What is it? Are we at risk?.
Presentation transcript:

Cyber Hygiene The Big Picture © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering

Protect your public persona Protect your private information Protect devices and software Protect the economy and infrastructure Why Focus on Cyber Hygiene?

Five Areas of Readiness ActionDescription IdentifyWhat's at risk? Data, devices, … ProtectHow do you prevent a problem? DetectHow do you identify a problem? RespondHow do you contain a problem? RecoverHow do you get back to normal?

How to Handle It Document Report Do not escalate Cyberbullying How to Think About It The Internet is not anonymous. Picture the person! Keep it human.

Cyber security jobs are projected to expand 5-fold in next few years Cyber attacks are now a common military weapon, targeting businesses Cyber espionage costs U.S. $400b/yr High Demand in Cybersecurity Jobs

Don't get too personal online Protect passwords Use a firewall and anti-virus software Use only well-reviewed software Do not visit pornographic and hacking sites Backup your data; loss is inevitable General Security

Backup your data; loss is inevitable Regularly schedule time to backup data from servers, portable storage, and your devices Protect from physical loss Protect Your Data