100 likes | 333 Views
NSF Security Awareness Training for general users. 19 September 2009. Purpose of Security.
E N D
NSF Security Awareness Trainingfor general users 19 September 2009
Purpose of Security • “The purpose of [security awareness training] is to focus attentionon security, creating sensitivity to the threats and vulnerabilities of computer systems and recognition of the need to protect data, information and systems.” [my emphasis added] • Source: http://www.units.muohio.edu/mcs/information_security/sec_aware/index.shtml
Threats to Information Systems • Misuse of information systems by users • Stolen equipment (laptops, PDAs) • Malware • Botnets • Compromised USB drives and other mobile devices • Computer viruses • Email worms, network worms
What can you do to minimize threats to information systems? • Create a strong password because they are one of the most common methods hackers use to gain access to systems. • Use a minimum of 8 characters and a combination of at least 3 of the following: capital letters, lower case letters, numbers and/or special characters. • No proper names or words from the dictionary. • Do NOT ever write down or share a password. • Examples • Gr3en EGg$ @NdH@m! • !IhtFGfbt$ • Quote: “A weak password is the product of a weak mind.”
What can you do to minimize threats to information systems? • Email threats • Do not open or reply to SPAM emails. • Do not open attachments from people you do not know. • Do not forward chain emails. • Do not respond to emails asking for personal information or click on unknown links. • Anti-virus/anti-spyware • Have anti-virus software on every computer • UPDATE it regularly – turn on automatic updates • Avast and AVG are free anti-virus software • Use anti-spyware programs like spybot
What can you do to minimize threats to information systems? • Recognize signs of invasion • Such signs include • Slow performance • Unknown files • Disk drive runs all the time • Files disappear from directories • What to do when you notice an invasion • Contact system administrator • Don’t panic • Do not restart computer or remove from network
What can you do to minimize threats to information systems? • Physical security • Lock office doors and lock computer (Windows key+L) or (Ctrl+Alt+Del) • Use password controlled screensaver • Keep monitor and keyboards turned away from common access areas (to minimize shoulder surfing and onlookers) • Handle sensitive data properly (lock drawers, keep sensitive data covered)
Scenarios based quiz • If you leave your computer to grab some coffee, what combination of keys should you hit to secure your system? • Alt+F4 • Fn+Alt • Windows key+L • Ctrl+Backspace
Scenarios based quiz • If you notice your computer running slowly and files disappearing, what should you do? • Call 911 • Restart the computer • Notify IT staff or system administrators • Remove hard drive
Sources • http://irtsectraining.nih.gov/Default.aspx • http://webtutorials.ucsd.edu/csecforOP/index.html • http://www.units.muohio.edu/mcs/information_security/sec_aware/index.shtml