Presentation is loading. Please wait.

Presentation is loading. Please wait.

Internet Security PA Turnpike Commission. Internet Security Practices, rule #1: Be distrustful when using the Internet!

Similar presentations


Presentation on theme: "Internet Security PA Turnpike Commission. Internet Security Practices, rule #1: Be distrustful when using the Internet!"— Presentation transcript:

1 Internet Security PA Turnpike Commission

2 Internet Security Practices, rule #1: Be distrustful when using the Internet!

3 The Internet can be a hazardous place. Any computer is vulnerable, especially if up to date security software is not installed on the computer.

4 How many attacks to PTC computers take place every day? Thousands of attacks take place every minute. They are usually uncoordinated, automated attacks but they are attacks nevertheless. An unprotected computer can become infected or compromised within a few seconds after it is connected to the Internet.

5 A compromised computer is not just a hazard to you. It’s a hazard to: PTC computers. PTC information. Employee information. Customer information. And potentially anyone on the Internet.

6 Examples: “Malware” is harmful software, usually installed without your knowledge. Here is one example of what malware can do if gets on your computer: The malware reads email addresses on your computer… Sends its own malicious emails using those addresses… And the emails look like they were sent from the people whose addresses you have on your computer. “Spyware” (a type of malware) can slow computer processing down, hijack web browsers, spy on key strokes and cripple computers. It is usually downloaded via the Internet without the user’s knowledge while you are using the web.

7 Internet Cautions: Remember: The Internet is not private. Don’t provide personal, sensitive or confidential information to Internet sites, surveys or forms unless you are using a trusted, secure web page. At a minimum, look for “https” in the URL and check for the little padlock that appears in the corner on most browser windows to indicate that there is a secure connection. Just opening a malicious web page can infect a poorly protected computer. Make sure you know where you’re going before clicking on a link. Instead of clicking on a link, look up the company and go to their website independently.

8 Internet Cautions: Beware of scams, even on well-known sites such as ebay. Be certain not to put sensitive information in locations that are accessible from the Internet. Even unlinked web pages can be found by search engines.

9 Responsible Use of the Internet: DO Use The Internet: To aid in the performance of your assigned job responsibilities. To support official PTC activities. In compliance with corporate policy. To improve your work-related skills and access information that will make you a more effective employee. DON’T Use The Internet: To transmit sensitive PTC information unless it has been appropriately secured, i.e. encrypted. For conducting personal for-profit transactions, or to operate a personal business. To participate or promote any activity that is prohibited by local, state, or federal law. To download software unless this activity is in compliance with PTC Policy Letter No. 8.5, Licensed Software Use. To exchange or download audio or video files. To access, receive or transmit threatening, obscene, or harassing materials including comments based on race, national origin, sex, sexual orientation, age, disability, religion, or political beliefs, or any other materials that a reasonable individual may find personally offensive or inappropriate. To access resources, including broadcasting services such as Internet radio, which may disrupt or monopolize PTC computer system resources.

10 Copyrighted information The PTC is committed to following copyright law. Copying, downloading, using, or sharing copyrighted materials must be with the permission of the copyright owner or in accordance with fair use laws, and must be in compliance with PTC Policy Letter 8.5, Licensed Software Use. Exchanging or downloading audio or video files is prohibited. We are liable for copyright violations.

11 The different modules of this tutorial will: Discuss the risks to your computer and the data it contains. Provide some guidelines for avoiding risks. Suggest some practical and easy solutions. Please review these modules at your convenience.


Download ppt "Internet Security PA Turnpike Commission. Internet Security Practices, rule #1: Be distrustful when using the Internet!"

Similar presentations


Ads by Google