Presentation is loading. Please wait.

Presentation is loading. Please wait.

INFORMATION SECURITY STUDENT GUIDE. There is only one true way to secure a computer. 1.Cut off all the cables, bury the computer in concrete 2.Put the.

Similar presentations


Presentation on theme: "INFORMATION SECURITY STUDENT GUIDE. There is only one true way to secure a computer. 1.Cut off all the cables, bury the computer in concrete 2.Put the."— Presentation transcript:

1 INFORMATION SECURITY STUDENT GUIDE

2 There is only one true way to secure a computer. 1.Cut off all the cables, bury the computer in concrete 2.Put the concrete block in a safe. 3.Then put the safe in the deepest part of the ocean, 4.and even then there is 1% chance someone can steal your data.

3 COMMON WAYS HACKERS BREACH SECURITY

4 1. STEALING PASSWORDS COMMON WAYS HACKERS BREACH SECURITY

5 People who use the same password on multiple accounts, especially when some of those accounts are on public Internet sites with little to no security. People who write their passwords down and store them in obvious places. The continued use of insecure protocols that transfer passwords in clear text, such as those used for Web surfing, e- mail, chat, file transfer, etc. The threat of software and hardware keystroke loggers. The problem of shoulder surfing or video surveillance. 1. STEALING PASSWORDS

6 2.TROJAN HORSES COMMON WAYS HACKERS BREACH SECURITY

7 Trojan virus fix can be difficult at times because of the sneaky way that Trojan horse viruses attach themselves to your computer. They usually mask themselves as either adware or spyware files, and are difficult for most general virus scan and repair products to locate and remove. 1.Random files open 2.You are experiencing slow computer problems 3.You are being sent to websites you did not want to visit 4.Your current homepage was just changed to an adult site (or an unwanted one) 5.Annoying pop ups and toolbars are all appearing 6.Mouse cursor has a trail or has the right and left button functions reversed 7.Navigation buttons disappear on your PC 8.Computer reboots or shuts down on its own 9.Alt + Control + Delete is not responding 10.Your computer’s internet is moving extremely slowly Symptoms;

8 3- WIRELESS ATTACKS COMMON WAYS HACKERS BREACH SECURITY

9 ACTIVATE YOUR FIREWALL SETTINGS ON YOUR LAPTOPS Wireless networks have the appeal of freedom from wires - the ability to be mobile within your office while maintaining network connectivity. Wireless networks are inexpensive to deploy and easy to install. Unfortunately, the true cost of wireless networking is not apparent until security is considered. It is often the case that the time, effort, and expense required to secure wireless networks is significantly more than deploying a traditional wired network.

10 File Transfer: USE SFTP program ( Secure File Transfer Protocol) when you attempt to transfer files between two computers on the internet. USE SSH Program ( secure shell): When you attempt to connect to a remote computer on the internet

11 1.This is no safe email !!! 2.Do not include important info in email 3.Think twice when you want to open an email attachment. 4.Do not disclose information to people you meet online or post on social networking sites!! KEEP IN MIND

12 Do not disclose your private information to people you meet online or post on social networking sites!!

13 Be Prepared: GET SAFE ON LINE Test your security skills FREE http://www.getsafeonline.org/

14 YOUR RESPONSIBILITIES 1.Never share a password with another person. 2.Never attempt to discover or use another individual's password or network ID. 3.Never attempt to circumvent data protection schemes or uncover security loopholes. 4.Never attempt to monitor another user's data communications, or attempt to read, copy, change, delete or transmit another's user files or software. 5.Never attempt to gain unauthorized access to remote computers. 6.Always protect data media (diskettes, Flash drives, DVDs, etc.) by securing them immediately after use. 7.Always back-up data regularly. 8.Properly log out of sessions.

15 YOUR RESPONSIBILITIES 1.Never send or forward unsolicited email including chain mail. 2.Do not open or execute attachments which appear suspect. 3.Attachments are a popular way of distributing viruses. 4.Never use your account for personal business purposes. 5.Never send harassing, annoying, threatening, defamatory, offensive or fraudulent messages or images to others. 6.Always think before sending e-mail, especially if angry or upset. E- mail is difficult to retrieve at best and is never retrievable if already opened by the receiving party. 7.Always remember that when the confidentiality of a message is critical, there is no substitute for face-to-face communication.

16 YOUR RESPONSIBILITIES Be Aware of the university information security policy http://www.wcupa.edu/infoservices/

17 WHERE TO GET HELP Campus Help Desk Websites www.wcupa.edu/sact http://www.getsafeonline.org/ http://www.computerworld.com/securitytopics/security National Centers of Academic Excellence in Information Assurance Education (an NSA designation) with the PASSHE system East Stroudsburg University Indiana University of Pennsylvania West Chester University Books: Is It Safe?, Michael Miller Blown to Bits, Abelson, Ledeen, & Lewis


Download ppt "INFORMATION SECURITY STUDENT GUIDE. There is only one true way to secure a computer. 1.Cut off all the cables, bury the computer in concrete 2.Put the."

Similar presentations


Ads by Google