Cse 1010e

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 13

Basic Security Awareness

5/12/2019
Why do I need to learn about computer
security ?
Isn’t this just an IT problem ?

Everyone who uses a computer needs to understand


how to keep his or her computer and data secure.
5/12/2019
1. Use cryptic passwords that can’t
be easily guessed and protect your
passwords- don’t write them down
and don’t share them!
1. Never use easy-to-guess passwords.

2. To protect you from malicious software that may be lurking on a public PC, scan
the machine with portable antivirus software and carry your own office apps, IM
clients and secure file transfer tools.

3. Passwords managers allow you to securely store all of your passwords in one
encrypted location that no one can access without logging in. All you have to do is
remember your master password to unblock your password manager and get
your passwords.

5/12/2019
2. Minimize storage of
sensitive information. 1. Delete sensitive information whenever
you can. Keep it off of your workstation,
laptop computer, and other electronic
devices if at all possible.

2. Don't keep sensitive information or your


only copy of critical data, projects, files,
etc. on portable or mobile devices (such
as laptop computers, tablets, phones,
memory sticks, CDs/DVDs, etc.) unless
they are properly protected. These items
are extra vulnerable to theft or loss.

5/12/2019
3. Beware of scams. 1. Phishing scams- used to drain their victims’
bank accounts. They send an email that seems
like it came from the bank- content warns you
about identity theft and asks you to verify your
account information the email will warn you that
if you do not send back your information; your
account will be terminated.

2. Requests for verification codes- If you are asked


to provide a code sent to your cell phone via text
or phone call, this is a scam.

3. Requests for personal or financial information-


Do not provide your bank account number or
social security number to unknown sources.
First verify it is a trusted source and then only
provide this information sparingly.

5/12/2019
4. Only use trusted, secure web pages when entering personal or
4. Protect information sensitive information online. Don't log in to web sites or online
applications unless the login page is secure.
when using the Look for https (not http) in the URL to indicate that there is a secure
connection.
Internet and email. 5. Be especially careful about what you do over wireless.
Information and passwords sent via standard, unencrypted wireless
1. Use neuroma for secure wireless on campus. are especially easy for hackers to intercept (most public access
Use the Campus virtual private network (VPN) wireless is unencrypted).
when connecting to public wireless, like in a
coffee shop. 6. Check your wireless preferences/settings to make sure your
devices aren’t set up to auto-connect to any wireless network they
2. Don't send restricted data via email, text or detect. Auto-connecting to unknown networks could put your device
instant message (IM). These are not generally and data at risk.
secure methods of communication.
3. Be extremely careful with file sharing
software. File sharing opens your computer to
the risk of malicious files and attackers. Also,
if you share copyrighted files, you risk being
disconnected from the campus network, as
well as serious legal consequences.

5/12/2019
5. Make sure your computer is protected with
anti-virus and all necessary security "patches"
and updates, and that you know what you need
to do, if anything, to keep them current.

1. Shut down or restart your computer


at least weekly -- and whenever
your programs tell you to in order
to install updates. This helps to
make sure software and security
updates are properly installed.

2. If you get an antivirus alert that


there is malware on your computer,
contact the ITS Support Center
(info below) for assistance.
5/12/2019
6. Secure laptop computers and
mobile devices at all times.
1. Disable booting from CD or USB- to ensure that
Lock them up or carry them no one can override your settings, password-
with you. protect the BIOS so that no more changes can be
made to it without entering the password.

2. Encrypt your hard drive- you can encrypt an


entire drive using BitLocker, an encryption
utility included with some versions of windows
vista, Windows 7 and Windows 8. A free, open
source alternative is True Crypt, which also
works with Windows XP, Linux.

3. Use a virtual private network (VPN)- If you


don’t have access to a company VPN, you can
use one from service provider such as stream
Via or Strong VPN. This ensures your data is
encrypted and protected from other users of the
public local network.

5/12/2019
7. Shut down, lock, log off or put your pc and other devices to
sleep before leaving them unguarded, and make sure they
require a secure password to start up or to wake-up.
1. Lock your screen

2. For a PC use - <ctrl><alt><delete> or


<Windows><L>

3. For MAC - Configure screensaver with your


password and Create a shortcut to activate
screensaver

4. Use a password to start up or wake-up your


computer.

5. Set your pc and portable device to automatically


lock
5/12/2019when they are not being used.
8. Don’t install unknown
or unsolicited programs
1. As a general rule do not download or install
on your computer. unknown programs or files from unknown sources.

2. These can place computer viruses or even open a


"back door" giving others access to your computer
without your knowledge.

3. If you want to install any software in your system


get licensed version and install it in your computer.

4. Use trusted websites for downloading the Software’s

5. Always keep anti-virus software running on your


system during the installation of software in your
system to find any malicious codes or viruses
present in the software

5/12/2019
9. Back-up your data.
1. Make backups a regular task, ideally at least
once a day.
2. Backup data to removable media such as
portable hard drives, CDs, DVDs, or a USB
memory stick.
3. Store backup media safely and separately from
the equipment. Remember, your data is valuable.
So don’t keep your backups in the same physical
location as your computer.
4. How effective would you be if your email, word
processing documents, excel spreadsheets and
contact database were wiped out ?
5. How many hours would it take to rebuild that
information from scratch?
6. So, having duplicate copies of your important
data saved in a removable media keeps it safe in
case anything goes wrong with your computer.
5/12/2019
10. Physically secure
your area and data before
leaving your computer 1. Password-protect : Make sure that you have
to enter a password to log in to your Laptop
unattended or PC.

2. Always prepare backup of important


information and store it in a separate location
in order to avoid losing all of the information

3. Use alarms or locks to protect or secure your


laptop or PC.

4. To secure the data of your Laptop use firewall


to filter the unwanted traffic, install and
update anti-virus software for scanning the
viruses, worms… etc. encrypt your data by
using encryption algorithms.
5/12/2019
PRESENTED BY

LUCHMEE DEVI GOORJHUN (1510992)

VEETASHA SEEGOOLAM (1512378)

YOOVATEE LALLMON

SUNANDINEE CHENGEE

AMEERAH

5/12/2019

You might also like