Software for Cyber Hygiene © 2014 Project Lead The Way, Inc.Computer Science and Software...
-
Upload
griffin-fleming -
Category
Documents
-
view
213 -
download
1
Transcript of Software for Cyber Hygiene © 2014 Project Lead The Way, Inc.Computer Science and Software...
![Page 1: Software for Cyber Hygiene © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.](https://reader035.fdocuments.us/reader035/viewer/2022070414/5697c00d1a28abf838cc9652/html5/thumbnails/1.jpg)
Software for Cyber Hygiene
© 2014 Project Lead The Way, Inc.Computer Science and Software Engineering
![Page 2: Software for Cyber Hygiene © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.](https://reader035.fdocuments.us/reader035/viewer/2022070414/5697c00d1a28abf838cc9652/html5/thumbnails/2.jpg)
• Evaluate Security Settings• Avoid Java, Flash, ActiveX• Update to current versions of
browser, plug-ins, operating system
Beware: Vulnerable Software
![Page 3: Software for Cyber Hygiene © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.](https://reader035.fdocuments.us/reader035/viewer/2022070414/5697c00d1a28abf838cc9652/html5/thumbnails/3.jpg)
• Antivirus programs search for signatures of known malware. Signatures are bit sequences known to be part of the malware such as text or executable code
• Scan regularly• Update definitions regularly
Use Antivirus Programs
![Page 4: Software for Cyber Hygiene © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.](https://reader035.fdocuments.us/reader035/viewer/2022070414/5697c00d1a28abf838cc9652/html5/thumbnails/4.jpg)
• A firewall screens packets based on source and destination addresses and ports
• White list ports you are using• Deny other traffic• Can be software running on a
gateway computer or router or software running on your computer
Use a Firewall
![Page 5: Software for Cyber Hygiene © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.](https://reader035.fdocuments.us/reader035/viewer/2022070414/5697c00d1a28abf838cc9652/html5/thumbnails/5.jpg)
• On mobile devices, use cellular data instead of public WiFi for email, banking, etc.
• Disconnect from the Internet when not in use
Public WiFi
![Page 6: Software for Cyber Hygiene © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.](https://reader035.fdocuments.us/reader035/viewer/2022070414/5697c00d1a28abf838cc9652/html5/thumbnails/6.jpg)
• Download software directly from source
• Check reviews• Hesitate and read aloud for user
access control windows
Downloading Software
![Page 7: Software for Cyber Hygiene © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.](https://reader035.fdocuments.us/reader035/viewer/2022070414/5697c00d1a28abf838cc9652/html5/thumbnails/7.jpg)
• Can transmit malware across systems–Use email to cross systems rather
than USB–Do not open an unknown USB
drive• Public USB ports can steal data;
electrical outlets with your own USB charger are more secure
• Use passwords for sensitive data• Label externally with your name
USB drives