Software for Cyber Hygiene © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.

Slides:



Advertisements
Similar presentations
Cyber-Safety Instructors: Connie Hutchison & Christopher McCoy.
Advertisements

 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Day anti-virus anti-virus 1 detecting a malicious file malware, detection, hiding, removing.
For further information computersecurity.wlu.ca
1 MIS 2000 Class 22 System Security Update: Winter 2015.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
LittleOrange Internet Security an Endpoint Security Appliance.
Chapter 10 Periodic Maintenance. Synopsis Daily Tasks Weekly Tasks Monthly Tasks What to do every year.
Payment Card Industry (PCI) Data Security Standard
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
eScan Total Security Suite with Cloud Security
Basic Computer Security Sankardas Roy Department of Computing and Information Sciences Kansas State University.
Computer Security Fundamentals by Chuck Easttom Chapter 9: Computer Security Software.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
Keeping your computer current and trouble free Aaron Robertson.
Tutorial 11 Installing, Updating, and Configuring Software
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
Learning In A Techno World How Safe is Your Cyberspace?
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
CTSP TRAINING Router 101 And Networking Basics. You Don’t Need Internet Access to Run or Connect your devices to an Ethernet switch or Router Enable DHCP.
Securing the Human. Presented by Thomas Nee, Computer Coordinator Town of Hanover, Massachusetts hanover-ma.gov/information-technology October is Cyber.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Spyware, Viruses and Malware What the fuss is all about.
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 5 1 Downloading and Storing Data Using FTP and Other Services to Transfer and.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
Types of Electronic Infection
Protecting Students on the School Computer Network Enfield High School.
Malware & Phishing By: mackenzie olson. Internet fraudsters send out spam, pop-ups, appealing websites, and desirable downloads.
PHISHING & MALWARE By Bailey Hoover September 2, 2010.
Internet Security and Your Computer Welcome to Boot Camp.
Convenience product security Collin Busch. What is a convenience product? A convenience product is a device or application that makes your life easier.
Protecting Your Computer By: Victoria Tuttle. There’s never enough you can do to protect your computer.
Social Engineering © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
FIREWALLS What Is A Firewall? A computer firewall protects networked computers from intentional hostile intrusion that could compromise confidentiality.
science/internet-intro
NETWORK SECURITY Definitions and Preventions Toby Wilson.
How to Mitigate Stay Safe. Patching Patches Software ‘fixes’ for vulnerabilities in operating systems and applications Why Patch Keep your system secure.
Cybersecurity Test Review Introduction to Digital Technology.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Securing the Human. Presented by Thomas Nee, Computer Coordinator Town of Hanover, Massachusetts hanover-ma.gov/information-technology October is Cyber.
Virus Removal Support Services. H OW TO K EEP Y OUR C OMPUTER F REE F ROM V IRUS T HREAT ? Virus can attack your PC any time without any.
VIRUSES & ANTI- VIRU-SES. WHAT IS A COMPUTER VIRUS? A computer virus is a small software program that spreads from one computer to another computer and.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Which is better Avast Free Edition or Avast Pro Version?
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
OWASP CONSUMER TOP TEN SAFE WEB HABITS
Call AVG Antivirus Support | Fix Your PC
Malware, Phishing and Network Policies
Information Security Session October 24, 2005
Topic 5: Communication and the Internet
Firewall.
IP Addresses & Ports IP Addresses – identify a device on a network

Mcafee.com/activate
Presentation transcript:

Software for Cyber Hygiene © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering

Evaluate Security Settings Avoid Java, Flash, ActiveX Update to current versions of browser, plug-ins, operating system Beware: Vulnerable Software

Antivirus programs search for signatures of known malware. Signatures are bit sequences known to be part of the malware such as text or executable code Scan regularly Update definitions regularly Use Antivirus Programs

A firewall screens packets based on source and destination addresses and ports White list ports you are using Deny other traffic Can be software running on a gateway computer or router or software running on your computer Use a Firewall

On mobile devices, use cellular data instead of public WiFi for , banking, etc. Disconnect from the Internet when not in use Public WiFi

Download software directly from source Check reviews Hesitate and read aloud for user access control windows Downloading Software

Can transmit malware across systems –Use to cross systems rather than USB –Do not open an unknown USB drive Public USB ports can steal data; electrical outlets with your own USB charger are more secure Use passwords for sensitive data Label externally with your name USB drives