http://security.rit.edu digital self defense how well do you know information security? how well do...

27
http:// security.rit.edu Digital Self Defense How well do YOU know Information Security?

Upload: oliver-parks

Post on 23-Dec-2015

221 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Http://security.rit.edu Digital Self Defense How well do YOU know Information Security? How well do YOU know Information Security?

http://security.rit.eduhttp://security.rit.edu

Digital Self Defense Digital Self Defense

How well do YOU know Information Security?

How well do YOU know Information Security?

Page 2: Http://security.rit.edu Digital Self Defense How well do YOU know Information Security? How well do YOU know Information Security?

http://security.rit.eduhttp://security.rit.edu

Copyright and ReuseCopyright and Reuse

The Digital Self Defense logo is the property of the Rochester Institute of Technology and is licensed under the Creative Commons Attribution-NonCommercial-NoDerivs License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-nd/2.0/ or send a letter to Creative Commons, 559 Nathan Abbott Way, Stanford, California 94305, USA. To request permission for other purposes, contact [email protected].

The course materials are the property of the Rochester Institute of Technology and are licensed under the Creative Commons Attribution-NonCommercial-ShareAlike License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-sa/2.0/ or send a letter to Creative Commons, 559 Nathan Abbott Way, Stanford, California 94305, USA. To request permission for other purposes, contact [email protected].

Page 3: Http://security.rit.edu Digital Self Defense How well do YOU know Information Security? How well do YOU know Information Security?

http://security.rit.eduhttp://security.rit.edu

VulnerabilitiesVulnerabilities

On average, how long will it take for an unpatched computer to be compromised once it is connected to the Internet?

A. Weeks

B. Days

C. Hours

D. Minutes

On average, how long will it take for an unpatched computer to be compromised once it is connected to the Internet?

A. Weeks

B. Days

C. Hours

D. Minutes

Page 4: Http://security.rit.edu Digital Self Defense How well do YOU know Information Security? How well do YOU know Information Security?

http://security.rit.eduhttp://security.rit.edu

VulnerabilitiesVulnerabilities

Answer: D - Minutes

On average, it only takes minutes for an unpatched computer to be compromised after it is connected to the Internet!

Answer: D - Minutes

On average, it only takes minutes for an unpatched computer to be compromised after it is connected to the Internet!

Page 5: Http://security.rit.edu Digital Self Defense How well do YOU know Information Security? How well do YOU know Information Security?

http://security.rit.eduhttp://security.rit.edu

Anti-VirusAnti-Virus

How often should your Anti-Virus definitions be updated?

A. Monthly

B. Once per Week

C. Once per Day

D. Once per Hour

How often should your Anti-Virus definitions be updated?

A. Monthly

B. Once per Week

C. Once per Day

D. Once per Hour

Page 6: Http://security.rit.edu Digital Self Defense How well do YOU know Information Security? How well do YOU know Information Security?

http://security.rit.eduhttp://security.rit.edu

PatchesPatches

Answer: C – Every Day

New viruses are being found so quickly that McAfee AntiVirus releases updated definitions every business day. Keep up with the definitions to stay protected!

Answer: C – Every Day

New viruses are being found so quickly that McAfee AntiVirus releases updated definitions every business day. Keep up with the definitions to stay protected!

Page 7: Http://security.rit.edu Digital Self Defense How well do YOU know Information Security? How well do YOU know Information Security?

http://security.rit.eduhttp://security.rit.edu

FirewallsFirewalls

Why should you use a firewall?A. To prevent against worm

infectionsB. To prevent attackers from

accessing your computerC. To block spyware from sending

your personal data over the Internet

D. All of the above

Why should you use a firewall?A. To prevent against worm

infectionsB. To prevent attackers from

accessing your computerC. To block spyware from sending

your personal data over the Internet

D. All of the above

Page 8: Http://security.rit.edu Digital Self Defense How well do YOU know Information Security? How well do YOU know Information Security?

http://security.rit.eduhttp://security.rit.edu

FirewallsFirewalls

Answer: D – All of the above

A firewall acts like a gateway between you and the Internet, allowing some types of traffic in and out while stopping others. This could stop worms, hackers and spyware from sending data to or from your computer.

Answer: D – All of the above

A firewall acts like a gateway between you and the Internet, allowing some types of traffic in and out while stopping others. This could stop worms, hackers and spyware from sending data to or from your computer.

Page 9: Http://security.rit.edu Digital Self Defense How well do YOU know Information Security? How well do YOU know Information Security?

http://security.rit.eduhttp://security.rit.edu

Digital Self Defense 101Digital Self Defense 101

Take a Digital Self Defense Lesson!Sessions are scheduled throughout the year. Visit http://security.rit.edu for details.

Take a Digital Self Defense Lesson!Sessions are scheduled throughout the year. Visit http://security.rit.edu for details.

Page 10: Http://security.rit.edu Digital Self Defense How well do YOU know Information Security? How well do YOU know Information Security?

http://security.rit.eduhttp://security.rit.edu

Password StandardPassword Standard

Which statement below is FALSE? Your RIT password must…

A. Be at least 8 characters long

B. Contain both UPPER and lower case letters and at least one number

C. Not contain your username

D. Be used for all your passwords, including online banking.

Which statement below is FALSE? Your RIT password must…

A. Be at least 8 characters long

B. Contain both UPPER and lower case letters and at least one number

C. Not contain your username

D. Be used for all your passwords, including online banking.

Page 11: Http://security.rit.edu Digital Self Defense How well do YOU know Information Security? How well do YOU know Information Security?

http://security.rit.eduhttp://security.rit.edu

Password StandardPassword Standard

Answer: D – Be used for all your passwords, including online banking.

FALSE! Never use your RIT network password for online banking and other web sites! While it’s difficult to memorize multiple passwords, it makes it harder for attackers to gain access to your accounts.

Answer: D – Be used for all your passwords, including online banking.

FALSE! Never use your RIT network password for online banking and other web sites! While it’s difficult to memorize multiple passwords, it makes it harder for attackers to gain access to your accounts.

Page 12: Http://security.rit.edu Digital Self Defense How well do YOU know Information Security? How well do YOU know Information Security?

http://security.rit.eduhttp://security.rit.edu

Desktop StandardDesktop Standard

Which of the following is not required by the RIT desktop standard?

A. Use of Internet Explorer as your web browser

B. Up-to-date patches

C. Antivirus software

D. Anti-spyware

Which of the following is not required by the RIT desktop standard?

A. Use of Internet Explorer as your web browser

B. Up-to-date patches

C. Antivirus software

D. Anti-spyware

Page 13: Http://security.rit.edu Digital Self Defense How well do YOU know Information Security? How well do YOU know Information Security?

http://security.rit.eduhttp://security.rit.edu

Desktop StandardDesktop Standard

Answer: A – Use of Internet Explorer as your web browser

You are not required to use Internet Explorer by the Desktop Standard. You are required to keep patches up to date, use antivirus, and anti-spyware.

Answer: A – Use of Internet Explorer as your web browser

You are not required to use Internet Explorer by the Desktop Standard. You are required to keep patches up to date, use antivirus, and anti-spyware.

Page 14: Http://security.rit.edu Digital Self Defense How well do YOU know Information Security? How well do YOU know Information Security?

http://security.rit.eduhttp://security.rit.edu

MacintoshMacintosh

Have Macintosh computers ever been attacked at RIT?

A. Yes

B. No

Have Macintosh computers ever been attacked at RIT?

A. Yes

B. No

Page 15: Http://security.rit.edu Digital Self Defense How well do YOU know Information Security? How well do YOU know Information Security?

http://security.rit.eduhttp://security.rit.edu

MacintoshMacintosh

Answer: A - Yes

Macintosh computers have been attacked at RIT within the last year. We expect Macintosh computers to be targeted more frequently in the coming months as they become more popular.

Answer: A - Yes

Macintosh computers have been attacked at RIT within the last year. We expect Macintosh computers to be targeted more frequently in the coming months as they become more popular.

Page 16: Http://security.rit.edu Digital Self Defense How well do YOU know Information Security? How well do YOU know Information Security?

http://security.rit.eduhttp://security.rit.edu

SpywareSpyware

According to the National Cyber Security Alliance, what percentage of home computers are infected with spyware?

A. 30%B. 10%C. 80%D. 60%

According to the National Cyber Security Alliance, what percentage of home computers are infected with spyware?

A. 30%B. 10%C. 80%D. 60%

Page 17: Http://security.rit.edu Digital Self Defense How well do YOU know Information Security? How well do YOU know Information Security?

http://security.rit.eduhttp://security.rit.edu

SpywareSpyware

Answer: C – 80%

According to the National Cyber Security Alliance, 80% percent of home computers are infected with spyware.

Answer: C – 80%

According to the National Cyber Security Alliance, 80% percent of home computers are infected with spyware.

Page 18: Http://security.rit.edu Digital Self Defense How well do YOU know Information Security? How well do YOU know Information Security?

http://security.rit.eduhttp://security.rit.edu

SpywareSpyware

Which of the following methods does spyware use to install itself on an end user's computer?

A. Bundling with free peer-to-peer file sharing programs

B. Exploiting web browser vulnerabilities

C. Viruses and worms

D. All of the above

Which of the following methods does spyware use to install itself on an end user's computer?

A. Bundling with free peer-to-peer file sharing programs

B. Exploiting web browser vulnerabilities

C. Viruses and worms

D. All of the above

Page 19: Http://security.rit.edu Digital Self Defense How well do YOU know Information Security? How well do YOU know Information Security?

http://security.rit.eduhttp://security.rit.edu

SpywareSpyware

Answer: D – All of the above

It should come as no surprise that spyware installs itself on end user computers through all of the methods listed.

Answer: D – All of the above

It should come as no surprise that spyware installs itself on end user computers through all of the methods listed.

Page 20: Http://security.rit.edu Digital Self Defense How well do YOU know Information Security? How well do YOU know Information Security?

http://security.rit.eduhttp://security.rit.edu

Digital Self Defense 101Digital Self Defense 101

Come see why over 300 of your colleagues have attended DSD 101.Visit http://security.rit.edu for details.

Come see why over 300 of your colleagues have attended DSD 101.Visit http://security.rit.edu for details.

Page 21: Http://security.rit.edu Digital Self Defense How well do YOU know Information Security? How well do YOU know Information Security?

http://security.rit.eduhttp://security.rit.edu

Phishing and Other ScamsPhishing and Other Scams

How many Katrina-related websites were there as of September 14, 2005?

A. 20

B. 500

C. 1000

D. 4000

How many Katrina-related websites were there as of September 14, 2005?

A. 20

B. 500

C. 1000

D. 4000

Page 22: Http://security.rit.edu Digital Self Defense How well do YOU know Information Security? How well do YOU know Information Security?

http://security.rit.eduhttp://security.rit.edu

Phishing and Other ScamsPhishing and Other Scams

Answer: D – 4000

According to the FBI, there were more than 4000 Katrina-related websites as of September 14, 2005.

Answer: D – 4000

According to the FBI, there were more than 4000 Katrina-related websites as of September 14, 2005.

Page 23: Http://security.rit.edu Digital Self Defense How well do YOU know Information Security? How well do YOU know Information Security?

http://security.rit.eduhttp://security.rit.edu

Phishing and Other ScamsPhishing and Other Scams

According to the FBI, how many of the Katrina-related websites are believed to be scams?

A. 10%

B. 30%

C. 60%

D. 90%

According to the FBI, how many of the Katrina-related websites are believed to be scams?

A. 10%

B. 30%

C. 60%

D. 90%

Page 24: Http://security.rit.edu Digital Self Defense How well do YOU know Information Security? How well do YOU know Information Security?

http://security.rit.eduhttp://security.rit.edu

Phishing and Other ScamsPhishing and Other Scams

Answer: C – 60%

The FBI expects as many as 60% of the Katrina-related websites to be scams.

Answer: C – 60%

The FBI expects as many as 60% of the Katrina-related websites to be scams.

Page 25: Http://security.rit.edu Digital Self Defense How well do YOU know Information Security? How well do YOU know Information Security?

http://security.rit.eduhttp://security.rit.edu

Phishing and Other ScamsPhishing and Other Scams

Which of these statements are correct about Phishing?

A. It increased from 14 attempts in August 2003 to over 4.5 million in November 2004

B. It does not affect Macintosh usersC. It is not a problem for users on the RIT

networkD. It is an outdoor recreational activity in

Phinland

Which of these statements are correct about Phishing?

A. It increased from 14 attempts in August 2003 to over 4.5 million in November 2004

B. It does not affect Macintosh usersC. It is not a problem for users on the RIT

networkD. It is an outdoor recreational activity in

Phinland

Page 26: Http://security.rit.edu Digital Self Defense How well do YOU know Information Security? How well do YOU know Information Security?

http://security.rit.eduhttp://security.rit.edu

Phishing and Other ScamsPhishing and Other Scams

Answer: A – Rise in Phishing

Phishing is increasing dramatically and may affect users of any type of computer on any network. Its object is to trick users into revealing personal information they wouldn’t normally reveal.

Answer: A – Rise in Phishing

Phishing is increasing dramatically and may affect users of any type of computer on any network. Its object is to trick users into revealing personal information they wouldn’t normally reveal.

Page 27: Http://security.rit.edu Digital Self Defense How well do YOU know Information Security? How well do YOU know Information Security?

http://security.rit.eduhttp://security.rit.edu

New this Fall!New this Fall!

Digital Self Defense 102 training for Windows users. You’ll learn how to:

– Download patches and enable Auto-Update– Create limited user accounts– Use antivirus (McAfee) – Use a firewall (Windows and ZoneAlarm)– Use anti-spyware (Spybot and Microsoft)

Digital Self Defense 102 training for Windows users. You’ll learn how to:

– Download patches and enable Auto-Update– Create limited user accounts– Use antivirus (McAfee) – Use a firewall (Windows and ZoneAlarm)– Use anti-spyware (Spybot and Microsoft)