1 / 14

CS101

Learn how to secure your computer, network interactions, yourself, and your data to mitigate security risks. Follow guidelines on securing information sent over networks, protecting against social engineering, and safeguarding data outside your control.

huynh
Download Presentation

CS101

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CS101 Security

  2. Network = Security Risks • The majority of the bad things that can be done deliberately to you or your computer happen when you are connected to a network

  3. 4 Areas To Secure • 1) Your Computer • 2) Your Network Interaction • 3) Yourself • 4) Your Data Elsewhere

  4. SecuringYourComputer(Do the Security Steps)

  5. Safe computing tips • Number One Best Security Method: Move away from the herd by using less popular software to access network functions • Go do all the security steps from the Security Lecture from the beginning of the semester.

  6. SecuringYourNetworkInteraction

  7. What can happen to me when using a network? • Information you send out on a network can be intercepted • Hacked Sites • Lots of other bad things • etc

  8. How can I secure the information I send out on a network? • Make sure your connection to the network is secure • Make sure that any important information you send out on a network is in encrypted form (scrambled) before it is sent • Consider a VPN (but make sure it is a good one.) • Treat any unencrypted information transmitted as if it was on a postcard • Change your DNS to Google or Open DNS • Use anti-phishing software • Never open or click on any item you are not 100% sure of • Bookmark all web sites you need to access securely • Use virtual operating system to access network.

  9. SecuringYourself

  10. How can I be a security risk? • You do not do all the other security items listed in this PowerPoint • Practice bad password practices • Fall for human engineering attacks

  11. How can I protect myself from social engineering? • Treat any request for information as suspicious and either ignore or verify request via an independent method • Treat any offer that sounds to good to be true as suspicious • Use good password practices or consider a password manager. • Use anti-phishing software.

  12. SecuringYourData Elsewhere

  13. What can happen to the information you no longer control? Once information is contained outside of your direct control you must protect yourself from it being used in inappropriate ways such as identity theft

  14. How do I protect information I do not control? • You can’t • You can stop them from doing anything with the information • Freeze your credit at all 3 credit reporting agencies and/or add an identity protection service that helps with the cleanup. • How To Freeze Your Credit Report at Each Credit Bureau • Subscribe to a monitoring service.

More Related