+ All Categories
Home > Technology > Computer Security

Computer Security

Date post: 15-Jan-2015
Category:
Upload: cristian-mihai
View: 4,032 times
Download: 1 times
Share this document with a friend
Description:
Computer Security Awareness Training
Popular Tags:
30
Good Computer Security Practices Basic Security Awareness
Transcript
Page 1: Computer Security

Good Computer Security Practices

Basic Security Awareness

Page 2: Computer Security

Overview

What is Information and Computer Security?

“Top 10 List” of Good Computer Security Practices

Protecting Restricted Data

Reporting Security Incidents

Additional Resources

Page 3: Computer Security

What is Information and

Computer Security?

Page 4: Computer Security

… the protection of computing systems and the data that they store or access.

Desktop computers Confidential data

Laptop computers Restricted data

Servers Personal information

Blackberries Archives

Flash drives Databases

Page 5: Computer Security

Isn’t this just an IT Problem?

Why do I need to learn about computer security?

Everyone who uses a computer needs to understand how to keep his or her computer and data secure.

Page 6: Computer Security

• 10% of security safeguards are technical

• 90% of security safeguards rely on us – the user - to adhere to good computing practices

Good security practices follow the “90/10” rule

Page 7: Computer Security

• Embarrassment to yourself and/or the University• Having to recreate lost data• Identity theft• Data corruption or destruction• Loss of patient, employee, and public trust• Costly reporting requirements and penalties• Disciplinary action (up to expulsion or termination)• Unavailability of vital data

What are the consequences of security violations?

Page 8: Computer Security

“Top Ten List”

Good Computer Security Practices

Page 9: Computer Security

1. Don’t keep restricted dataon portable devices.

2. Back-up your data.• Make backups a regular task, ideally at least once a day.

• Backup data to removable media such as portable hard drives, CDs, DVDs, or a USB memory stick.

• Store backup media safely and separately from the equipment. Remember, your data is valuable… don’t keep your backups in the same physical location as your computer!

Page 10: Computer Security

Data Backups

• How effective would you be if your email, word processing documents, excel spreadsheets and contact database were wiped out?

• How many hours would it take to rebuild that information from scratch?

Page 11: Computer Security

3. Use cryptic passwords that can’t be easily guessed and protect your passwords - don’t write them down and don’t share them!

Page 12: Computer Security

4. Make sure your computer has anti-virus, anti-spyware and firewall protection as well as all necessary security patches.

5. Don’t install unknown or unsolicited programs on your computer.

“I’ll just keep finding new ways to break in!”

Page 13: Computer Security

6. Practice safe e-mailing

• Don’t open, forward, or reply to suspicious e-mails

• Don’t open e-mail attachments or click on website addresses

• Delete spam

• Use secure e-mail system to send confidential information

Page 14: Computer Security

You receive an e-mail with an attachment from “IT Security” stating that you need to open the attachment. What should you do?

a) Follow the instructionsb) Open the e-mail attachmentc) Reply and say “take me off this list”d) Delete the message e) Contact Customer Support

Page 15: Computer Security

You receive an e-mail with an attachment from “IT Security” stating that you need to open the attachment. What should you do?

a) Follow the instructions

b) Open the e-mail attachment

c) Reply and say “take me off this list”

d) Delete the message

e) Contact Customer Support

d) Delete the e-mail message!

e) Contact Customer Support for further instructions – but do not open, reply to, or forward any suspicious e-mails!

Page 16: Computer Security

Your sister sends you an e-mail at school with a screen saver attachment. What should you do?

a) Download itb) Forward the message c) Call a tech-savvy friend to help install itd) Delete the message

Page 17: Computer Security

Your sister sends you an e-mail at school with a screen saver attachment. What should you do?

a) Download itb) Forward the message to a friendc) Call a tech-savvy friend to help install itd) Delete the message

d) Delete it! Never put unknown or unsolicited programs or software on your computer. Screen savers may contain viruses.

Page 18: Computer Security

7. Practice safe Internet use ~

• Accessing any site on the internet could be tracked back to your name and location.

• Accessing sites with questionable content often results in spam or release of viruses.

• And it bears repeating…Don’t download unknown or unsolicited programs!

Page 19: Computer Security

8. & 9. Physically secure your area and data when unattended ~

• Secure your files and portable equipment - including memory sticks.

• Secure laptop computers with a lockdown cable.

• Never share your ID badge, access codes, cards, or key devices (e.g. Axiom card)

Page 20: Computer Security

10. Lock your screen

• For a PC ~<ctrl> <alt> <delete> <enter> OR<> <L>

• For a Mac ~Configure screensaver with your password

Create a shortcut to activate screensaver

• Use a password to start up or wake-up your computer.

Page 21: Computer Security

Which workstation security safeguards are YOU responsible for following and/or protecting?

a) User IDb) Passwordc) Log-off programsd) Lock up office or work area (doors, windows)e) All of the above

Page 22: Computer Security

Which workstation security safeguards are YOU responsible for following and/or protecting?

a) User IDb) Passwordc) Log-off programsd) Lock-up office or work area (doors, windows)e) All of the above

ALL OF THE ABOVE!

Page 23: Computer Security

The mouse on your computer screen starts to move around on its own and click on things on your desktop. What do you do?

a) Show a faculty member or other studentsb) Unplug network cablec) Unplug your moused) Report the incident to whomever supports your computere) Turn your computer offf) Run anti-virus softwareg) All of the above

Page 24: Computer Security

The mouse on your computer screen starts to move around on its own and click on things on Your desktop. What do you do?

This is a security incident!

Immediately report the problem to whomever supports your computer.

Since it is possible that someone is controlling the computer remotely, it is best if you can unplug the network cable until you can get help.

Page 25: Computer Security

What can an attacker do to yourcomputer?

a) Hide programs that launch attacks

b) Generate large volumes of unwanted traffic, slowing down the entire system

c) Distribute illegal software from your computer

d) Access restricted information (e.g. identity theft)

e) Record all of your keystrokes and get your passwords

Page 26: Computer Security

What can an attacker do to your computer?

a) Hide programs that launch attacks b) Generate large volumes of unwanted traffic, slowing down the entire systemc) Distribute illegal software from your computer d) Access restricted information (e.g. identity theft)e) Record all of your keystrokes and get your passwords

ALL OF THE ABOVE!A compromised computer can be used for all kinds of surprising things.

Page 28: Computer Security

Restricted data includes, but is not limited to:

•Name or first initial and last name •Health or medical information•Social security numbers•Ethnicity or gender•Date of birth•Financial information (credit card number,

bank account number)•Proprietary data and copyrighted

information•Student records•Information subject to a non-disclosure

agreement

Page 29: Computer Security

Managing Restricted Data

• Know where this data is stored.

• Destroy restricted data which is no longer needed ~

shred or otherwise destroy restricted data before throwing it away

erase/degauss information before disposing of or re-using drives

• Protect restricted data that you keep ~

back-up your data regularly

Page 30: Computer Security

Reporting SecurityIncidents


Recommended