Presentation is loading. Please wait.

Presentation is loading. Please wait.

Information Security 101 Richard Davis, Rob Laltrello.

Similar presentations


Presentation on theme: "Information Security 101 Richard Davis, Rob Laltrello."— Presentation transcript:

1 Information Security 101 Richard Davis, Rob Laltrello

2 What is Information Security?
Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction. Why should I care? State and Federal Laws Georgia Highlands College Policy Protecting the college’s image Clean-up costs (both in time and money) Team ghc: working to win

3 Team ghc: working to win
Some Common Terms Phishing ... is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, accounts numbers or passwords by posing as legitimate websites or entities requesting this information. Shoulder Surfing ... is the process of obtaining security credentials or other data as it is being entered by watching or recording the physical entry of the data either behind, next-to or in view of the victim. Spyware ... is hidden software that obtains data, or other information from a persons computer without notification or without the user’s consent. Malware ... is software that is designed to infiltrate and destroy or damage either data or other components of a computer system. Social Engineering ... is the process of getting someone to divulge personal or secret information through use of lies, misguided trust, apparent authority or other forms of deception. Team ghc: working to win

4 Team ghc: working to win
Online Banking Always keep your credentials to yourself. Ensure you login only by visiting your bank’s website. is not a method used by banks to request personal info. Avoid using publicly available computers for your online banking. Trust your instincts. If something looks wrong it probably is. Always run and keep your anti-x software up to date. Team ghc: working to win

5 Team ghc: working to win
Social Media Keep your statuses simple and never divulge your physical location. Monitor who can see your social networking information. Choose strong passwords to prevent someone accessing your social networking account. Avoid divulging highly personal information such as your address – even in configuration or informational pages. If you click on a link, make sure the website address that opens is the same as the link you clicked on. Always remain anonymous when entering open or “free-for-all” chat rooms and similar gatherings. Team ghc: working to win

6 Passwords / Passphrases
Information about you should never be in your password. If your password can be looked-up in a dictionary, it is too weak. Don’t write passwords down. Change passwords on a regular basis. No website/bank/store will send you asking you to reply with your password or username. Do not reply to such requests. Team ghc: working to win

7 Passwords / Passphrases Continued …
Team ghc: working to win

8 Team ghc: working to win
Replying to spam or junk-mail only serves to inform the sender you are reading it and that the account is being checked. Avoid sending confidential files, passwords, credit-card numbers or ANY other confidential data in . Be cautious when opening links from messages. Make sure the link address is what actually opens in the browser. Ensure all s are scanned for viruses and other possible malware, phishing or spyware threats. When you use reply-all, make sure everyone on the recipient list needs to know what you have to say. Team ghc: working to win

9 Team ghc: working to win
Continued … Connections to public and/or public-service Wi-Fi or other networks should be treated as non-secure. Ensure you have a firewall, and other protection software running. Shoulder Surfing is when someone watches you type your password or credentials on your laptop from behind, to the side or with zoom lenses. Always take care when entering this information in a public area. Do not leave your laptop unattended. Apart from theft you may find key loggers or other spyware software very quickly installed. Keep removable storage, memory cards, memory sticks and other small data storage devices safe. Team ghc: working to win

10 Team ghc: working to win
Mobile Use Connections to public and/or public-service Wi-Fi or other networks should be treated as non-secure. Ensure you have a firewall and other protection software running. messages urging you take action with lots of warnings, time-limits and grammar or spelling mistakes should be treated as possible threats. Team ghc: working to win

11 Questions / Discussion
Team ghc: working to win


Download ppt "Information Security 101 Richard Davis, Rob Laltrello."

Similar presentations


Ads by Google