1 / 10

Instructional Technology & Design Office itd@support.lis.illinois.edu 217-244-4903 or 800-377-1892

Instructional Technology & Design Office itd@support.lis.illinois.edu 217-244-4903 or 800-377-1892. Digital Security Basics. Presented by Mark Baldwin & Brianna Walker. Objectives. Gain an acquaintance with some of the basic terms and concepts related to personal web security

verda
Download Presentation

Instructional Technology & Design Office itd@support.lis.illinois.edu 217-244-4903 or 800-377-1892

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Instructional Technology & Design Office itd@support.lis.illinois.edu 217-244-4903 or 800-377-1892 Digital Security Basics Presented by Mark Baldwin & Brianna Walker

  2. Objectives • Gain an acquaintance with some of the basic terms and concepts related to personal web security • Gain an acquaintance with some of the most common, easy-to-use security tools

  3. Agenda • Malware • Types and how to defend against • Phishing • Tips for secure web browsing • Passwords • Extensions/add-ons • Backups

  4. Malware • Some common types: • Viruses • Worms • Adware • Spyware • Trojans • Reasons behind an attack: • Gather information • Take control of a computer or network • Crash/break a computer or network • For fun (or the “lulz”)

  5. Malware Protection • Most important for Windows users (although mobile devices are beginning to be targeted more frequently) • There can be only one • Many great free options: • Microsoft Security Essentials • AVG • Avast • Install updates as they come • Run it automatically, on a schedule if possible

  6. Phishing • What is it? • From Wikipedia: “the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.” • Can include phone/IM scams also (sometimes known as vishing or smishing) • Be careful—investigate any site or individual that asks you for your password.

  7. Secure Web Browsing: Passwords • Strong Passwords: • Don’t use dictionary words, pets’ names, birthdays • Include caps, lowercase, numbers, and symbols • Change often • Avoid having your browser save your password • Use different passwords for different sites • Protect all devices that connect to the internet • Use a password manager (e.g. LastPass, KeyPass, 1Password)

  8. Secure Web Browsing: Extensions • Browser add-ons/extensions: • HTTPS Everywhere • AdBlock • Ghostery • Be wary about, or avoid altogether, conducting sensitive business on public Wi-Fi (anything involving a financial transaction, for example)

  9. Backups • If you encrypt them, make sure you don't lose the password (e.g. iOS devices) • Physical • Hard drive (internal or external) • DVD/CD • Flashdrive • Cloud • Dropbox, Google Drive • Crashplan

  10. Further Resources • Bookmark the following URL to review the some of the resources mentioned in this workshop at your leisure: http://urli.st/vo8 • Note that ITD and the GSLIS Help Desk does notofficially support or endorse any of the software listed—use your best judgment! • Questions? • Thanks for coming!

More Related