Software for Cyber Hygiene © 2014 Project Lead The Way, Inc.Computer Science and Software...

7
Software for Cyber Hygiene © 2014 Project Lead The Way, Inc. Computer Science and Software Engineering

Transcript of Software for Cyber Hygiene © 2014 Project Lead The Way, Inc.Computer Science and Software...

Page 1: Software for Cyber Hygiene © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.

Software for Cyber Hygiene

© 2014 Project Lead The Way, Inc.Computer Science and Software Engineering

Page 2: Software for Cyber Hygiene © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.

• Evaluate Security Settings• Avoid Java, Flash, ActiveX• Update to current versions of

browser, plug-ins, operating system

Beware: Vulnerable Software

Page 3: Software for Cyber Hygiene © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.

• Antivirus programs search for signatures of known malware. Signatures are bit sequences known to be part of the malware such as text or executable code

• Scan regularly• Update definitions regularly

Use Antivirus Programs

Page 4: Software for Cyber Hygiene © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.

• A firewall screens packets based on source and destination addresses and ports

• White list ports you are using• Deny other traffic• Can be software running on a

gateway computer or router or software running on your computer

Use a Firewall

Page 5: Software for Cyber Hygiene © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.

• On mobile devices, use cellular data instead of public WiFi for email, banking, etc.

• Disconnect from the Internet when not in use

Public WiFi

Page 6: Software for Cyber Hygiene © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.

• Download software directly from source

• Check reviews• Hesitate and read aloud for user

access control windows

Downloading Software

Page 7: Software for Cyber Hygiene © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.

• Can transmit malware across systems–Use email to cross systems rather

than USB–Do not open an unknown USB

drive• Public USB ports can steal data;

electrical outlets with your own USB charger are more secure

• Use passwords for sensitive data• Label externally with your name

USB drives