Cyber Security - PowerPoint PPT Presentation

1 / 17
About This Presentation
Title:

Cyber Security

Description:

BE RESPONSIBLE CYBER-CITIZENS! BE CYBER-SMART! Cyber Security ... sites, or network-based software, clogs the system via numerous reproductions ... – PowerPoint PPT presentation

Number of Views:76
Avg rating:3.0/5.0
Slides: 18
Provided by: eskwelaWi
Category:

less

Transcript and Presenter's Notes

Title: Cyber Security


1
Cyber Security
  • Project Team
  • HUMAN CAPITAL DEVELOPMENT GROUP

2
Internet
  • Positive venue where people get together to
    communicate, exchange information, entertain,
    transact business, and understand how the world
    operates.
  • Negative playground of crooked individuals and
    ruthless firms who take advantage of the freedom
    it maintains as well as its many weaknesses.

3
Privacy?
  • E-mail is completely insecure.
  • Each e-mail you send results in at least 3 or 4
    copies being stored on different computers.
  • You can take measures to protect your e-mail.

4
Cyber Security
  • Unfortunately, there's no 100 guarantee that
    even with the best precautions some of these
    things won't happen to you, but there are steps
    you can take to minimize the chances.
  • BE RESPONSIBLE CYBER-CITIZENS!
  • BE CYBER-SMART!

5
Cyber Security
  • protecting digital information by preventing,
    detecting, and responding to attacks
  • recognize the risks and become familiar with
    terminology associated with them

6
Security Settings
  • High, Medium, Low
  • Trust sites vs. Restricted sites
  • Internet LAN content
  • Firewall
  • Filters

7
Malicious Individuals
  • Hacker, attacker, or intruder
  • exploit weaknesses in software and computer
    systems for their own gain
  • intentions sometimes benign and motivated solely
    by curiosity
  • actions typically in violation of the intended
    use of the systems they are exploiting

8
Malware
  • designed to wreak havoc on personal computers
    and networks by attaching to programs (hosts)
    and spreading from one program or storage device
    to another
  • ranging from silly pranks to data destruction/
    theft

9
Malware
  • Virus attaches to various files and executes
    (infects the computer) when the host programs are
    run (or an email attachment is opened or a
    particular web page is visited)
  • Worm propagates without user intervention via
    email, web sites, or network-based software,
    clogs the system via numerous reproductions
  • Logic Bomb lies dormant until triggered by a
    certain event
  • Trojan Horse unsuspicous delivery program of
    malware

10
Spyware Key Logger
  • Spyware (also called sneakware or stealthware) -
    software that comes hidden in free downloadable
    software
  • tracks your online movements
  • mines the information stored on your computer
  • uses your computers CPU and storage, slows it
    down
  • Key logger, or key trapper, software, -a program,
    when installed on a computer, records every
    keystroke and mouse click.

11
Spyware
  • record keystrokes and steal private information
    for advertisers, hackers, and cyberthieves
  • Cookie - a small record deposited on your hard
    disk by a Web site containing information about
    you and your Web activities.
  • Adware - software to generate ads that installs
    itself on your computer when you download some
    other (usually free ) program from the Web.
  • Earthlink (ISP) study average computer harbors
    26 spyware programs

12
Myths
  • Anti-virus software and firewalls are 100
    effective.
  • Once software is installed on your computer, you
    do not have to worry about it anymore.
  • There is nothing important on your machine, so
    you do not need to protect it.
  • Attackers only target people with money.
  • When computers slow down, it means that they are
    old and should be replaced.

13
Tips
  • Perform basic computer maintenance
  • firewall, data encryption, regular update of
    security patches
  • regularly run anti-virus and anti-spyware
    software
  • Don't open files from strangers/ unreliable sites
  • E-mail and IM
  • verify first
  • Help fight spam and online scams
  • use filters
  • be wary of phishing
  • check for secure pages (lock icon), server
    authentication, and message integrity
  • review the privacy policies of websites before
    entering information

14
Tips
  • learn how to protect yourself from adware/spyware
  • Regularly run anti-spyware software
  • read license agreements of freeware against
    attached spyware
  • take precautions when you go wireless
  • convenient but with security risks
  • password-protect your computerand lock it
  • as first line of defense
  • back up your work

15
Safeguard your passwords!
  • Guidelines from Learn the Net.com
  • Although passwords should be easily remembered,
    do not use passwords that refer to easily
    obtainable personal information, such as your
    name, address, phone number, or birthday.
  • Avoid using common words.
  • Passwords should be at least six alphanumeric
    characters meaning, combine upper and lower
    case letters, numbers, and symbols, e.g.
    2fjm0x_at_Ic. NOTE Passwords are case-sensitive.

16
Safeguard your passwords!
  • Guidelines from Learn the Net.com
  • Ideally, use a different password for each
    service you register with. For sensitive
    accounts, such as financial services, change your
    passwords frequently.
  • Never ever disclose your password/s. Dont have
    your computer remember your password.

17
  • www.us-cert.gov/cas/tips/ST04-001.html
  • (US-CERT US Computer Emergency Readiness Team)
  • www.microsoft.com/athome/security/children/backtos
    chool.mspx
  • www,learnthenet.com
Write a Comment
User Comments (0)
About PowerShow.com