HDSB Security Awareness Training

12
HDSB Security Awareness Training

description

HDSB Security Awareness Training. Introduction. Good security standards follow the 90/10 rule: 10% of security safeguards are technical. 90% of security safeguards rely on the computer user (each of us) to be effective!. - PowerPoint PPT Presentation

Transcript of HDSB Security Awareness Training

Page 1: HDSB Security Awareness Training

HDSB Security Awareness Training

Page 2: HDSB Security Awareness Training

Introduction• Good security standards follow the 90/10 rule:

• 10% of security safeguards are technical.

• 90% of security safeguards rely on the computer user (each of us) to be effective!

What good is a state of the art security system if you

leave the front door open?

Page 3: HDSB Security Awareness Training

Viruses, Worms, and Trojan Horses

• A common misconception about computer viruses is that they are created by bored, anti-social nerds living in their parents’ basement and are crying out for attention.

Page 4: HDSB Security Awareness Training

Viruses, Worms, and Trojan Horses

• In reality, viruses are a multi-billion dollar industry. Virus writers consist of individual and teams of expert programmers spanning the globe looking for ways to make money by exploiting computer users and networks.

• U.S. consumers lose over $3 billion a year.

• The annual cost of viruses on all levels is believed to be over $50 billion!

Page 5: HDSB Security Awareness Training

Viruses, Worms, and Trojan Horses

• It is not in the best interest of virus writers to destroy your data or crash you computer. They want your personal information, banking passwords, and credit card numbers. They also want to be able to take control of your computer to add to their botnets – huge networks of infected computers used for a variety of illegal or nefarious purposes.

Page 6: HDSB Security Awareness Training

How They Get You!• Virus – This is normally a file that must be

opened to infect your computer

• Worm – A virus that infects a computer over a network. Computer firewalls help prevent these.

• Trojan Horse – A working program that has an imbedded virus in its inner workings.

• Social Engineering – An email, website, or program designed to trick you into taking some kind of action (such as giving up personal information).

Page 7: HDSB Security Awareness Training

Don’t be in DENIAL!• People have been heard saying that they don’t

care if they get a virus because they don’t use their computers for banking or shopping.

• Innocent users have been arrested by authorities because their computers were taken over by a virus and used to break into banking systems, send millions of SPAM emails, or distribute child pornography!

• Why use their computers to do these things when they can use YOURS!

Page 8: HDSB Security Awareness Training

How You Can Protect Yourself• Anti-Virus Software – Install and update

regularly (Beware of viruses masquerading as real anti-virus software!)

Page 9: HDSB Security Awareness Training

Strong Passwords• Strong Passwords – Long passwords are better

than complex passwords and easier to remember. Add non alpha-numeric characters for stronger passwords. Top 20 Most Common Passwords

@Rex.is.a.good.dog@ would take the best password cracking programs 14.67 trillion centuries to break. 123456 would take the same program 0.0000000111 seconds to break!

Beware! Viruses steal good passwords too!

Page 10: HDSB Security Awareness Training

Keeping Software Up to Date• Software Updates – Windows, Macs, and

nearly all software needs to be updated on a regular basis. Many computers are infected via older versions of Java, Acrobat, and Flash.

Page 11: HDSB Security Awareness Training

If You Think You Have a Virus• STOP whatever you are doing! Many viruses

log every keystroke!

• If possible, disconnect from the internet (unplug the network cable).

• If possible, run anti-virus software and report it to technology staff.

• From a non-infected computer, change all of your passwords ASAP!

Page 12: HDSB Security Awareness Training

ReviewA hacked computer can be used to? (select all that apply)

a) Send spam and phishing emails.

b) Harvest and sell email addresses and passwords.

c) Infect other systems.

d) Access restricted or personal information on your computer or other systems that you have access to.

e) Generate large volumes of traffic, slowing down the entire system.

f) Illegally distribute music, movies and software.

g) Record keystrokes and steal your passwords, clean out your bank accounts, distribute child pornography.

h) All of the above