Computer Security Beyond the Serpentine Walls - PowerPoint PPT Presentation

1 / 20
About This Presentation
Title:

Computer Security Beyond the Serpentine Walls

Description:

Set security settings in browser to 'medium-high' or 'high' ... Encryption Guidance - http://www.itc.virginia.edu/security/mobile/encryption.html ... – PowerPoint PPT presentation

Number of Views:43
Avg rating:3.0/5.0
Slides: 21
Provided by: shirle1
Category:

less

Transcript and Presenter's Notes

Title: Computer Security Beyond the Serpentine Walls


1
Computer Security Beyond the Serpentine Walls
  • New Horizons Conference
  • May 23rd, 2007
  • Shirley Payne Marty Peterman
  • UVa IT Security and Policy Office

2
Agenda
  • Vulnerabilities and Risks
  • Tips and tools before you go
  • Device Requirements on the road
  • Checklist
  • QA throughout

3
Serious Security Vulnerabilities
  • Out of date software
  • Lack of effective anti-virus and anti-spyware
    software
  • Weak security settings on browsers
  • Weak passwords
  • Software firewalls not activated

4
Serious Security Vulnerabilities - continued
  • Unencrypted sensitive data
  • Use of unsecured wireless
  • Use of improperly maintained public computers
  • Unattended mobile devices and electronic media

5
Risk of Exploited Vulnerabilities Can Vary With
Location
  • University provides
  • More Secure Network that prevents certain
    attacks
  • Automatically updated software
  • Encrypted wireless network (cavalier
    jefferson)
  • Encrypted wired connection to email, home
    directory, and other services

6
Contrast to.
7
Or...
8
Vulnerabilities Increase the Risk of
  • Mobile devices being stolen
  • Computer being rendered unusable by virus or
    worm
  • Private data being captured by stealth,
    keylogging software
  • Sensitive data being copied, modified or deleted
    by or exposed to unauthorized individual

9
Risk To Sensitive Data Is Huge!
  • A total of 1.9 billion reported compromised
    records from 1980-2006¹
  • Trend is toward
  • More sophisticated criminal attacks
  • Increasing of incidents where motive is exploit
    of personal data for profit
  • However, there are many steps individuals can
    take to prevent such attacks

¹Source Phil Howard Kris Erickson, University
of Washington study, March 12, 2007
10
Before You Go, Secure Your System
  • Configure operating system, browser, word
    processing and other software to automatically
    update.
  • Obtain free anti-virus and anti-spyware software
    for office and home computers. Configure for
    automatic update and regular device scans.
  • Set security settings in browser to medium-high
    or high

11
Before You Go, Secure Your System - continued
  • Properly configure the firewall
  • Use strong passwords
  • Tips for securing systems - http//www.itc.virgini
    a.edu/security/device-requirements.html

12
Before You Go, Secure Your Data
  • Delete or de-identify non-essential sensitive
    data
  • Common sense tips - http//www.itc.virginia.edu/se
    curity/
  • Examples of legally protected data
    -http//www.itc.virginia.edu/security/
  • Tool - Spider will search for hard drive data
    appearing to be SSNs or credit card s -
    https//www.itc.virginia.edu/security/identityfind
    er

13
Before You Go, Secure Your Data - continued
  • Encrypt sensitive data that cannot be removed
  • Encryption Guidance - http//www.itc.virginia.edu/
    security/mobile/encryption.html
  • Create data backup and store in safe place

14
Before You Go, Prep for Secure Remote Access
  • Install UVA-Anywhere to enable
  • Remote use of the Home Directory Service
  • Access to UVa-licensed online databases, news
    resources, and software
  • Encrypted data transmission
  • Access to UVa Email server without
    reconfiguration
  • Tips and tool - http//www.itc.virginia.edu/networ
    k/vpn/

15
Off You Go!
16
When On The Road,
  • Be wireless wary. Prevent unintentional
    connections to untrustworthy wireless networks
  • Disable file and print sharing
  • Device Requirements - http//www.itc.virginia.edu/
    security/

17
When On The Road,
  • Never key passwords or other sensitive
    information into public computers that may not be
    properly secured. Hidden software that captures
    every keystroke may be installed.
  • Keep mobile devices and electronic media with you
    at all times or under lock and key
  • Call UVa if you suspect or know your password or
    sensitive data have been stolen or otherwise
    compromised

18
Checklist
  • Software up to date
  • Anti-virus and anti-spyware software installed
  • Strong security settings on browser
  • Strong passwords
  • Software firewall activated

19
Checklist - continued
  • Sensitive data purged or encrypted
  • Data backup stored in safe
  • Got UVa-Anywhere
  • Choosing wireless networks carefully
  • Steering clear of improperly maintained public
    computers
  • Watching mobile devices and electronic media like
    a hawk

20
IT Security and Policy Office it-spo_at_virginia.edu
Write a Comment
User Comments (0)
About PowerShow.com