320 likes | 688 Views
Cyber Security Awareness Day. October 17, 2013. Welcome. Dr. Amanda Lee Vice President of Instructional Services. Session 1 Are You Protected?. Mark Grover & Garrett Baltezegar CFCC Instructors. Why are we here?. Awareness
E N D
Cyber Security Awareness Day October 17, 2013
Welcome Dr. Amanda Lee Vice President of Instructional Services
Session 1Are You Protected? Mark Grover & Garrett Baltezegar CFCC Instructors
Why are we here? • Awareness • Definition: a. Knowledge or perception of a situation or fact b. Concern about and well-informed interest in a particular situation or development • Knowledge • Resources:www.cfcc.edu/cybersecurity
Topics • Terminology • Passwords • Malware • Wireless • How do I protect myself?
Topics • Terminology • Passwords • Malware • Wireless • How do I protect myself?
Terminology • Threat • An event or object that may defeat security resulting in a loss. • Vulnerability • A weakness that allows a threat to bypass security • Malware • Any program intended to cause harm. • Virus • Performs annoying or destructive activities – requires user intervention to activate.
Terminology • Worm • Takes advantage of vulnerabilities to enter a computer – does NOT require user interaction to spread. • Trojan • Program advertised to do one thing but does something else. • Hacker • A person that illegally breaks into, or attempts to break into, a computer system. • Phishing • Emails that attempt to trick users into surrendering private information or visit malicious websites.
Topics • Terminology • Passwords • Malware • Wireless • How do I protect myself?
Passwords Weak Passwords: • Found in Dictionary • Too Short • Contain Personal Information • Reused multiple times • Not Changed
Passwords • Which password is better? • Xp4!e% • Thisisaverylongpassword • Length ALWAYS trumps complexity • http://howsecureismypassword.net
Passwords • Any password that can be memorized is a weak password. • Solution? Use a PASSPHRASE • NEVER share your password with anyone.
Topics • Terminology • Passwords • Malware • Wireless • How do I protect myself?
Malware • Can you recognize Malware? • Can you recognize a Phishing attack? • Demonstration
Topics • Terminology • Passwords • Malware • Wireless • How do I protect myself?
Wireless • Routers • Use STRONG passwords to lock down the device • Disable Remote Management • Use STRONG wireless security options • Use WPA2 instead of WEP • Bluetooth • Turn OFF if not actively in use
Topics • Terminology • Passwords • Malware • Wireless • How do I protect myself?
How do I protect myself? • Keep your Operating System up to date • Install and update your AntiVirus solution • Install and update a Malware scanning solution • Recognize Phishing Scams • Use STRONG Passwords • Backup Important files
Session 2Topics in Information Security Zachary Mitcham Chief Information Security Officer University of North Carolina Wilmington
Cyber Security Awareness Day October 17, 2013