information security student guide

17
INFORMATION SECURITY INFORMATION SECURITY STUDENT GUIDE STUDENT GUIDE

Upload: max

Post on 07-Jan-2016

30 views

Category:

Documents


1 download

DESCRIPTION

Information Security Student Guide. There is only one true way to secure a computer. Cut off all the cables, bury the computer in concrete Put the concrete block in a safe. Then put the safe in the deepest part of the ocean, and even then there is 1% chance someone can steal your data. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Information Security Student Guide

INFORMATION SECURITYINFORMATION SECURITYSTUDENT GUIDESTUDENT GUIDE

Page 2: Information Security Student Guide

There is only one true way to secure a computer.

1.Cut off all the cables, bury the computer in concrete

2.Put the concrete block in a safe.

3.Then put the safe in the deepest part of the ocean,

4.and even then there is 1% chance someone can steal your data.

Page 3: Information Security Student Guide

COMMON WAYS HACKERS BREACH COMMON WAYS HACKERS BREACH SECURITYSECURITY

Page 4: Information Security Student Guide

1. STEALING PASSWORDS1. STEALING PASSWORDS

COMMON WAYS HACKERS BREACH COMMON WAYS HACKERS BREACH SECURITYSECURITY

Page 5: Information Security Student Guide

• People who use the same password on multiple accounts, especially when some of those accounts are on public Internet sites with little to no security.

• People who write their passwords down and store them in obvious places.

• The continued use of insecure protocols that transfer passwords in clear text, such as those used for Web surfing, e-mail, chat, file transfer, etc.

• The threat of software and hardware keystroke loggers.

• The problem of shoulder surfing or video surveillance.

1. STEALING PASSWORDS1. STEALING PASSWORDS

Page 6: Information Security Student Guide

2.TROJAN HORSES2.TROJAN HORSES

COMMON WAYS HACKERS BREACH COMMON WAYS HACKERS BREACH SECURITYSECURITY

Page 7: Information Security Student Guide

Trojan virus fix can be difficult at times because of the sneaky way that Trojan horse viruses attach themselves to your computer.

They usually mask themselves as either adware or spyware files, and are difficult for most general virus scan and repair products to locate and remove.

1. Random files open 2. You are experiencing slow computer problems 3. You are being sent to websites you did not want to visit 4. Your current homepage was just changed to an adult site (or an

unwanted one) 5. Annoying pop ups and toolbars are all appearing 6. Mouse cursor has a trail or has the right and left button functions

reversed 7. Navigation buttons disappear on your PC 8. Computer reboots or shuts down on its own 9. Alt + Control + Delete is not responding 10.Your computer’s internet is moving extremely slowly

Symptoms;

Page 8: Information Security Student Guide

3- WIRELESS ATTACKS3- WIRELESS ATTACKS

COMMON WAYS HACKERS BREACH COMMON WAYS HACKERS BREACH SECURITYSECURITY

Page 9: Information Security Student Guide

ACTIVATE YOUR FIREWALL SETTINGS ON ACTIVATE YOUR FIREWALL SETTINGS ON YOUR LAPTOPS YOUR LAPTOPS

Wireless networks have the appeal of freedom from wires - the ability to be mobile within your office while maintaining network connectivity. Wireless networks are inexpensive to deploy and easy to install.

Unfortunately, the true cost of wireless networking is not apparent until security is considered.

It is often the case that the time, effort, and expense required to secure wireless networks is significantly more than deployinga traditional wired network.

Page 10: Information Security Student Guide

File Transfer:

USE SFTP program ( Secure File Transfer Protocol) when you attempt to transfer files between two computers on the internet.

USE SSH Program ( secure shell):

When you attempt to connect to a remote computer on the internet

Page 11: Information Security Student Guide

1. This is no safe email !!!

2. Do not include important info in email

3. Think twice when you want to open an email attachment.

4. Do not disclose information to people you meet online or post on social networking sites!!

KEEP IN MINDKEEP IN MIND

Page 12: Information Security Student Guide

Do not disclose your private information to people you meet online or post on social networking sites!!

Page 13: Information Security Student Guide

Be Prepared:

GET SAFE ON LINE

Test your security skills FREE

http://www.getsafeonline.org/

Page 14: Information Security Student Guide

YOUR RESPONSIBILITIESYOUR RESPONSIBILITIES1. Never share a password with another person.

2. Never attempt to discover or use another individual's password or network ID.

3. Never attempt to circumvent data protection schemes or uncover security loopholes.

4. Never attempt to monitor another user's data communications, or attempt to read, copy, change, delete or transmit another's user files or software.

5. Never attempt to gain unauthorized access to remote computers.

6. Always protect data media (diskettes, Flash drives, DVDs, etc.) by securing them immediately after use.

7. Always back-up data regularly.

8. Properly log out of sessions.

Page 15: Information Security Student Guide

YOUR RESPONSIBILITIESYOUR RESPONSIBILITIES

1. Never send or forward unsolicited email including chain mail.

2. Do not open or execute attachments which appear suspect.

3. Attachments are a popular way of distributing viruses.

4. Never use your account for personal business purposes.

5. Never send harassing, annoying, threatening, defamatory, offensive or fraudulent messages or images to others.

6. Always think before sending e-mail, especially if angry or upset. E-mail is difficult to retrieve at best and is never retrievable if already opened by the receiving party.

7. Always remember that when the confidentiality of a message is critical, there is no substitute for face-to-face communication.

Page 16: Information Security Student Guide

YOUR RESPONSIBILITIESYOUR RESPONSIBILITIES

Be Aware of the university information security policy

http://www.wcupa.edu/infoservices/

Page 17: Information Security Student Guide

WHERE TO GET HELPWHERE TO GET HELP

Campus Help Desk

Websiteswww.wcupa.edu/sacthttp://www.getsafeonline.org/http://www.computerworld.com/securitytopics/security

National Centers of Academic Excellence in Information Assurance Education (an NSA designation) with the PASSHE system

East Stroudsburg University

Indiana University of Pennsylvania

West Chester UniversityBooks:

Is It Safe?, Michael MillerBlown to Bits, Abelson, Ledeen, & Lewis