290 likes | 920 Views
Safe Computing Practices. Outline. Objective Safe Computing Defined Safe Computing Methods Summary List of References. Objective. To provide familiarity with the concept of safe computing and some of the methods employed. Safe Computing Definition.
E N D
Outline • Objective • Safe Computing Defined • Safe Computing Methods • Summary • List of References
Objective • To provide familiarity with the concept of safe computing and some of the methods employed.
Safe Computing Definition • Common practices and procedures to improve the chances of avoiding information security problems. • Following these suggestions will reduce the probability that you will become infected, have your system broken into, have important information stolen, lose critical information, etc.
Safe Computing Methods • Keep your operating system and application programs patched • Install, use and update anti-virus and anti-spyware software • Use a strong password • When using public facilities, be sure to log out of applications • Use two or more email accounts • Use one for family/friends • Another for other uses; can be changed if/when start to receive spam • Be cautious when reading email with attachments and downloading files from untrusted locations • Don’t open unexpected attachments http://www.claymania.com/safe-hex.html http://safecomputing.uchicago.edu/practices/
Safe Computing Methods • Be very careful with any private data • Social Security Numbers, Account Numbers, Passwords, etc. • Don’t put personal information on web sites • Watch out for phishing or social engineering scams • Install and use a firewall • Back up your system frequently • Avoid filesharing programs • Log in as User not Administrator • Log out and use a screen saver password • Disable Java, JavaScript, VBScript and ActiveX if possible http://www.claymania.com/safe-hex.html http://safecomputing.uchicago.edu/practices/
Safe Computing Methods • Be careful when shopping on-line • Look for a secure connection • Know who you are buying from • Be careful what you post on social networking sites • Data on the Internet can last forever • Personal information is harvested from places like Facebook • Review the privacy policy
Summary • We have introduced the concept of safe computing for information systems and described some of the methods employed.
List of References • http://en.wikipedia.org/wiki/Physical_security • http://safecomputing.uchicago.edu/practices/ • http://www.cert.org/homeusers/HomeComputerSecurity/ • http://www.microsoft.com/protect/default.mspx • http://www.techspot.com/tweaks/windows_security/ • http://www.nsa.gov/snac/support/I33-011R-2006.pdf • http://www.internetsecurityguide.com/ • http://www.itsecurity.com/features/20-minute-guide-pc-security-021307/
List of References • http://www.schneier.com/blog/archives/2004/12/safe_personal_c.html • http://users.iafrica.com/c/cq/cquirke/safe2000.htm • http://us.trendmicro.com/us/threats/home-user/preventing-intrusions/safe-computing-guide/Windows-xp/index.html CyberPatriot wants to thank and acknowledge the CyberWatch program which developed the original version of these slides and who has graciously allowed their use for training in this competition.