1 / 17

Information Security Student Guide

Information Security Student Guide. There is only one true way to secure a computer. Cut off all the cables, bury the computer in concrete Put the concrete block in a safe. Then put the safe in the deepest part of the ocean, and even then there is 1% chance someone can steal your data.

max
Download Presentation

Information Security Student Guide

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Information SecurityStudent Guide

  2. There is only one true way to secure a computer. Cut off all the cables, bury the computer in concrete Put the concrete block in a safe. Then put the safe in the deepest part of the ocean, and even then there is 1% chance someone can steal your data.

  3. Common Ways Hackers Breach Security

  4. Common Ways Hackers Breach Security 1. Stealing Passwords

  5. • People who use the same password on multiple accounts, especially when some of those accounts are on public Internet sites with little to no security. • People who write their passwords down and store them in obvious places. • The continued use of insecure protocols that transfer passwords in clear text, such as those used for Web surfing, e-mail, chat, file transfer, etc. • The threat of software and hardware keystroke loggers. • The problem of shoulder surfing or video surveillance. 1. Stealing Passwords

  6. Common Ways Hackers Breach Security 2.Trojan Horses

  7. Trojan virus fix can be difficult at times because of the sneaky way that Trojan horse viruses attach themselves to your computer. They usually mask themselves as either adware or spyware files, and are difficult for most general virus scan and repair products to locate and remove. Symptoms; Random files open You are experiencing slow computer problems You are being sent to websites you did not want to visit Your current homepage was just changed to an adult site (or an unwanted one) Annoying pop ups and toolbars are all appearing Mouse cursor has a trail or has the right and left button functions reversed Navigation buttons disappear on your PC Computer reboots or shuts down on its own Alt + Control + Delete is not responding Your computer’s internet is moving extremely slowly

  8. Common Ways Hackers Breach Security 3- Wireless Attacks

  9. Wireless networks have the appeal of freedom from wires - the ability to be mobile within your office while maintaining network connectivity. Wireless networks are inexpensive to deploy and easy to install. Unfortunately, the true cost of wireless networking is not apparent until security is considered. It is often the case that the time, effort, and expense required to secure wireless networks is significantly more than deploying a traditional wired network. Activate your Firewall Settings on your Laptops

  10. File Transfer: USE SFTP program ( Secure File Transfer Protocol) when you attempt to transfer files between two computers on the internet. USE SSH Program ( secure shell): When you attempt to connect to a remote computer on the internet

  11. KEEP in Mind This is no safe email !!! Do not include important info in email Think twice when you want to open an email attachment. Do not disclose information to people you meet online or post on social networking sites!!

  12. Do not disclose your private information to people you meet online or post on social networking sites!!

  13. Be Prepared: GET SAFE ON LINE Test your security skills FREE http://www.getsafeonline.org/

  14. Your Responsibilities • Never share a password with another person. • Never attempt to discover or use another individual's password or network ID. • Never attempt to circumvent data protection schemes or uncover security loopholes. • Never attempt to monitor another user's data communications, or attempt to read, copy, change, delete or transmit another's user files or software. • Never attempt to gain unauthorized access to remote computers. • Always protect data media (diskettes, Flash drives, DVDs, etc.) by securing them immediately after use. • Always back-up data regularly. • Properly log out of sessions.

  15. Your Responsibilities • Never send or forward unsolicited email including chain mail. • Do not open or execute attachments which appear suspect. • Attachments are a popular way of distributing viruses. • Never use your account for personal business purposes. • Never send harassing, annoying, threatening, defamatory, offensive or fraudulent messages or images to others. • Always think before sending e-mail, especially if angry or upset. E-mail is difficult to retrieve at best and is never retrievable if already opened by the receiving party. • Always remember that when the confidentiality of a message is critical, there is no substitute for face-to-face communication.

  16. Your Responsibilities Be Aware of the university information security policy http://www.wcupa.edu/infoservices/

  17. Where To get HELP • Campus Help Desk • Websites • www.wcupa.edu/sact • http://www.getsafeonline.org/ • http://www.computerworld.com/securitytopics/security • National Centers of Academic Excellence in Information Assurance Education (an NSA designation) with the PASSHE system • East Stroudsburg University • Indiana University of Pennsylvania • West Chester University • Books: • Is It Safe?, Michael Miller • Blown to Bits, Abelson, Ledeen, & Lewis

More Related