1 / 12

HDSB Security Awareness Training

HDSB Security Awareness Training. Introduction. Good security standards follow the 90/10 rule: 10% of security safeguards are technical. 90% of security safeguards rely on the computer user (each of us) to be effective!.

reba
Download Presentation

HDSB Security Awareness Training

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. HDSB Security Awareness Training

  2. Introduction • Good security standards follow the 90/10 rule: • 10% of security safeguards are technical. • 90% of security safeguards rely on the computer user (each of us) to be effective! What good is a state of the art security system if you leave the front door open?

  3. Viruses, Worms, and Trojan Horses • A common misconception about computer viruses is that they are created by bored, anti-social nerds living in their parents’ basement and are crying out for attention.

  4. Viruses, Worms, and Trojan Horses • In reality, viruses are a multi-billion dollar industry. Virus writers consist of individual and teams of expert programmers spanning the globe looking for ways to make money by exploiting computer users and networks. • U.S. consumers lose over $3 billion a year. • The annual cost of viruses on all levels is believed to be over $50 billion! =

  5. Viruses, Worms, and Trojan Horses • It is not in the best interest of virus writers to destroy your data or crash you computer. They want your personal information, banking passwords, and credit card numbers. They also want to be able to take control of your computer to add to their botnets – huge networks of infected computers used for a variety of illegal or nefarious purposes.

  6. How They Get You! • Virus – This is normally a file that must be opened to infect your computer • Worm – A virus that infects a computer over a network. Computer firewalls help prevent these. • Trojan Horse – A working program that has an imbedded virus in its inner workings. • Social Engineering – An email, website, or program designed to trick you into taking some kind of action (such as giving up personal information).

  7. Don’t be in DENIAL! • People have been heard saying that they don’t care if they get a virus because they don’t use their computers for banking or shopping. • Innocent users have been arrested by authorities because their computers were taken over by a virus and used to break into banking systems, send millions of SPAM emails, or distribute child pornography! • Why use their computers to do these things when they can use YOURS!

  8. How You Can Protect Yourself • Anti-Virus Software – Install and update regularly (Beware of viruses masquerading as real anti-virus software!)

  9. Strong Passwords • Strong Passwords – Long passwords are better than complex passwords and easier to remember. Add non alpha-numeric characters for stronger passwords. Top 20 Most Common Passwords @Rex.is.a.good.dog@ would take the best password cracking programs 14.67 trillion centuries to break. 123456 would take the same program 0.0000000111 seconds to break! Beware! Viruses steal good passwords too!

  10. Keeping Software Up to Date • Software Updates – Windows, Macs, and nearly all software needs to be updated on a regular basis. Many computers are infected via older versions of Java, Acrobat, and Flash.

  11. If You Think You Have a Virus • STOP whatever you are doing! Many viruses log every keystroke! • If possible, disconnect from the internet (unplug the network cable). • If possible, run anti-virus softwareand report it to technology staff. • From a non-infected computer, change all of your passwords ASAP!

  12. Review A hacked computer can be used to? (select all that apply) • Send spam and phishing emails. • Harvest and sell email addresses and passwords. • Infect other systems. • Access restricted or personal information on your computer or other systems that you have access to. • Generate large volumes of traffic, slowing down the entire system. • Illegally distribute music, movies and software. • Record keystrokes and steal your passwords, clean out your bank accounts, distribute child pornography. • All of the above

More Related