1 / 27

Internet and Computer security

Internet and Computer security . Cheryl Granto | Information Security Manager, UFIT Information Security Scott Schreiner | Information Security Analyst, UFIT Information Security. Introduction. Who we are Information Security Office What we do

hutchinsr
Download Presentation

Internet and Computer security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Internet and Computer security Cheryl Granto | Information Security Manager, UFIT Information Security Scott Schreiner | Information Security Analyst, UFIT Information Security

  2. Introduction • Who we are • Information Security Office • What we do • Risk Assessments and Security Evaluations • Intrusion Detection • Penetration Testing • Vulnerability Management • Incident Response and Digital Forensics • Why we do what we do

  3. Agenda • Mobile Device Security • Laptop/Desktop Security • Passwords • Web Surfing Safety • Email Security • Physical Security • How to report an incident

  4. Mobile Device Security Tips • Install updates • Use a strong passcode • Lock your device and set a quick timeout • Install remote location tracking (find my iPhone) • Only download trusted apps • Disable geotagging

  5. Mobile Device Security Tips • Be cautious on unsecured networks • Back up your data • Turn off Bluetooth • Enable encryption of device and memory card • Maintain physical control of your device

  6. Laptop/Desktop Security • Firewalls • Virus Protection • Windows: • Microsoft Security Essentials • Mac Users: • Avast, ClamXAV, Sophos AV https://security.ufl.edu/learn-information-security/protect-yourself/virus-spyware/firewalls/personal-firewalls/ https://security.ufl.edu/learn-information-security/protect-yourself/virus-spyware/virus-protection/

  7. Laptop/Desktop Security • Spyware Protection • Full Disk Encryption • Windows BitLocker • Encrypt USB drives https://security.ufl.edu/learn-information-security/protect-yourself/virus-spyware/free-anti-spyware-tools/ https://security.ufl.edu/learn-information-security/mobile-device-security/microsoft-windows/bitlocker-encryption/

  8. Updates and Alerts • System updates • Turn on Automatic updates • Update Applications: • Adobe Flash • Java • Internet browsers • Subscribe to alerts: • https://www.us-cert.gov/ncas

  9. Sample Alert

  10. Password Management

  11. Tips for creating passwords • All new passwords created must be at least eight characters long • New passwords may not exceed 48 characters in length • Passwords cannot be the same as your GatorLink user name • Passwords less than 18 characters long: • Cannot contain any word or string found in UF’s dictionary • Must contain at least three of the four elements: Uppercase letters, Lowercase letters, Numbers, Punctuation/special characters

  12. Password Development Everybody Hates IT!

  13. Let’ s Practice Together • 1st – Make a choice • Pass-phrase • Regular

  14. Let’ s Practice Together Pass-phrase Rules: 18-48 characters No Spaces or backslash ‘\’

  15. Let’ s Practice Together Regular Rules: No Dictionary Words No Spaces Must contain at least 3 special characters

  16. Practice makes perfect passwords…. Pass-Phrase IgotmyMastersdegreein97! IenteredDropafterIsawthenewpasswordstandard. ITSecurityisoursharedresponsibility! Regular IgmMdi1997! IeDaIstnps. ITSiosr!

  17. Password Tips • Regular passwords • No names, pets, or easily guessed information • Avoid complete words • Never give your password to anyone • Never store your password in plain text

  18. Password Tips • Use unique password for each login • Password managers can help • LastPass - https://lastpass.com • 1Password - https://agilebits.com/onepassword • KeePass - http://keepass.info https://security.ufl.edu/learn-information-security/protect-yourself/data/passwords/

  19. Web Surfing Safety • Ensure site encryption: • Ensure that characters are masked:

  20. Web Surfing Safety • Watch out for shoulder surfing • Avoid questionable sites • Only download from sites you trust • Type or google URLs rather than using email links • Secure your social media what control what you share

  21. Email Security • Be wary of Phishing • Check for fake links or web addresses • Don’t click links in email • Never give out account or personal information • Don’t open files from unknown sources • UF Computing Helpdesk at (352)392-HELP and abuse@ufl.edu https://security.ufl.edu/learn-information-security/protect-yourself/email/id-theft-scams/phishing-email/

  22. Phishing example

  23. Phishing example

  24. Physical Security • Maintain possession of your device • Label your device (stickers or contact info) • Lock devices in trunk of car obscured from view • If lost, use remote tracking (find my iPhone)

  25. How to report an incident • Reporting an Incident to the UF Security Team • Email: ufirt@ufl.edu • Phone: 352-273-1344 • Phishing scams or email abuse targeting University of Florida faculty, staff, or students should be reported to abuse@ufl.edu https://security.ufl.edu/about-us/report-an-incident/

  26. Summary • Mobile Device Security • Laptop/Desktop Security • Passwords • Web Surfing Safety • Email Security • Physical Security • How to report an incident

  27. Contact information Web Site: Email: https://security.ufl.edu/ security@ufl.edu Cheryl Lyn Granto, CISSP Information Security Manager Office (352) 273-3359 Cherylgranto@ufl.edu Scott Schreiner Information Security Analyst Office (352) 273-8497 scottschreiner@ufl.edu

More Related