securing the human n.
Download
Skip this Video
Download Presentation
Securing the Human

Loading in 2 Seconds...

play fullscreen
1 / 16

Securing the Human - PowerPoint PPT Presentation


  • 186 Views
  • Uploaded on

Securing the Human. Presented by Thomas Nee, Computer Coordinator Town of Hanover, Massachusetts. hanover-ma.gov/information-technology October is Cyber Security Awareness Month!. The Internet. Knowledge Is Power. The Internet is the most powerful tool in human history. Use it! Wisely!

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Securing the Human' - katy


Download Now An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
presented by thomas nee computer coordinator town of hanover massachusetts

Presented byThomas Nee, Computer CoordinatorTown of Hanover, Massachusetts

hanover-ma.gov/information-technology

October is Cyber Security Awareness Month!

the internet
The Internet
  • Knowledge Is Power.
  • The Internet is the most powerful tool in human history.
  • Use it! Wisely!
  • Don’t be assimilated into a BotNet.
security threats
Security Threats
  • 3 New Malware Versions Released Every Second!
  • Zero-Day Threats
  • Known, Unpatched Vulnerabilities
  • Unapplied Security Patches
protection against security threats
Protection AgainstSecurity Threats
  • Anti-Virus Updated Daily (Security Gateway and Computers).
  • Operating System Updated Monthly.
  • Other Security Patches Less Often
  • Long, Complex, Frequently-Changed Passwords.
updates
Updates
  • Microsoft Update (Windows Update if Microsoft Office not installed)
  • Adobe Reader
  • Adobe Flash
  • Java (manual updates by administrator)
good habit slow down
Good Habit: Slow Down
  • Hover over links.
  • Press and hold link on a smartphone.
  • Do NOT click unless you know where the link goes.
  • Visit mainstream sites only.
domains at a glance
Domains At A Glance
  • Destination determined Right-To-Left between “http://” and next “/”
  • Examples:

http://support.microsoft.com/index.html

http://microsoft.com.z.ir/index.html (Goes to Iran!)

http://www.amazon.co.uk/ (could be hosted in US or elsewhere)

  • See List of Country Codes:

http://en.wikipedia.org/wiki/List_of_Internet_top-level_domains#Country_code_top-level_domains

attack vectors
Attack Vectors
  • Surfing; Drive-By Downloads.
  • Spam, Spam, Spam.
  • Infected computers and programs on network.
  • Flash Drives
email
Email
  • Phishing – generic, widely distributed spam.
  • Spear-Phishing – personal information included. Do not succumb to emotion!
  • Use browser bookmarks/favorites whenever possible instead of links in email messages.
  • Slow Down. Use caution opening attachments.
recommended options
Recommended Options
  • McAfee’s SiteAdvisor Browser Toolbar

http://www.siteadvisor.com/

  • Norton’sSafeWeb Website (save as Favorite/Bookmark)

http://safeweb.norton.com

  • Norton’s Browser Toolbar (packaged with Norton Identity Safe)
ad