1 / 14

Securing your Computer, Network, Yourself, and Data Elsewhere

Learn how to protect yourself from security risks in various areas such as your computer, network interaction, personal behavior, and data stored outside your control.

bombard
Download Presentation

Securing your Computer, Network, Yourself, and Data Elsewhere

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CS101 Security

  2. Network = Security Risks • The majority of the bad things that can be done deliberately to you or your computer happen when you are connected to a network

  3. 4 Areas To Secure • 1) Your Computer • 2) Your Network Interaction • 3) Yourself • 4) Your Data Elsewhere

  4. 1 ) SecuringYourComputer(Do the Security Steps)

  5. Safe computing tips • Number One Best Security Method: Move away from the herd by: • Do the security steps and get your layers of protection • Add Virtual Box and Ubuntu and/or Mint • Using less popular software to access network functions

  6. SecuringYourNetworkInteraction

  7. What can happen to me when using a network? • Information you send out on a network can be intercepted • Hacked Sites • Lots of other bad things • etc

  8. How can I secure the information I send out on a network? • Make sure your connection to the network is secure • Make sure that any important information you send out on a network is in encrypted form (scrambled) before it is sent (use Tor web browser) • Consider a VPN (but make sure it is a good one.) • Treat any unencrypted information transmitted as if it was on a postcard • Change your DNS to Google or Open DNS • Use Firefox for its ‘DNS to https’ capabilities. • Never open or click on any item you are not 100% sure of • Bookmark all web sites you need to access securely

  9. SecuringYourself

  10. How can I be a security risk? • You do not do all the other security items listed in this PowerPoint • Practice bad password practices • Fall for human engineering attacks

  11. How can I protect myself from social engineering? • Treat any request for information as suspicious and either ignore or verify request via an independent method • Treat any offer that sounds to good to be true as suspicious • Use good password practices or consider a password manager. • Use anti-phishing software.

  12. SecuringYourData Elsewhere

  13. What can happen to the information you no longer control? Once information is contained outside of your direct control you must protect yourself from it being used in inappropriate ways such as identity theft

  14. How do I protect information I do not control? • You can’t • You can stop them from doing anything with the information • Freeze your credit at all 3 credit reporting agencies and/or add an identity protection service that helps with the cleanup. You Can Now Freeze Your Credit for Free — Here’s Why You Should Do It • Subscribe to a monitoring service.

More Related