1 / 21

Cyber Security Awareness Day

Cyber Security Awareness Day. October 17, 2013. Welcome. Dr. Amanda Lee Vice President of Instructional Services. Session 1 Are You Protected?. Mark Grover & Garrett Baltezegar CFCC Instructors. Why are we here?. Awareness

caitir
Télécharger la présentation

Cyber Security Awareness Day

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyber Security Awareness Day October 17, 2013

  2. Welcome Dr. Amanda Lee Vice President of Instructional Services

  3. Session 1Are You Protected? Mark Grover & Garrett Baltezegar CFCC Instructors

  4. Why are we here? • Awareness • Definition: a. Knowledge or perception of a situation or fact b. Concern about and well-informed interest in a particular situation or development • Knowledge • Resources:www.cfcc.edu/cybersecurity

  5. Topics • Terminology • Passwords • Malware • Wireless • How do I protect myself?

  6. Topics • Terminology • Passwords • Malware • Wireless • How do I protect myself?

  7. Terminology • Threat • An event or object that may defeat security resulting in a loss. • Vulnerability • A weakness that allows a threat to bypass security • Malware • Any program intended to cause harm. • Virus • Performs annoying or destructive activities – requires user intervention to activate.

  8. Terminology • Worm • Takes advantage of vulnerabilities to enter a computer – does NOT require user interaction to spread. • Trojan • Program advertised to do one thing but does something else. • Hacker • A person that illegally breaks into, or attempts to break into, a computer system. • Phishing • Emails that attempt to trick users into surrendering private information or visit malicious websites.

  9. Topics • Terminology • Passwords • Malware • Wireless • How do I protect myself?

  10. Passwords Weak Passwords: • Found in Dictionary • Too Short • Contain Personal Information • Reused multiple times • Not Changed

  11. Passwords • Which password is better? • Xp4!e% • Thisisaverylongpassword • Length ALWAYS trumps complexity • http://howsecureismypassword.net

  12. Passwords • Any password that can be memorized is a weak password. • Solution? Use a PASSPHRASE • NEVER share your password with anyone.

  13. Topics • Terminology • Passwords • Malware • Wireless • How do I protect myself?

  14. Malware • Can you recognize Malware? • Can you recognize a Phishing attack? • Demonstration

  15. Topics • Terminology • Passwords • Malware • Wireless • How do I protect myself?

  16. Wireless • Routers • Use STRONG passwords to lock down the device • Disable Remote Management • Use STRONG wireless security options • Use WPA2 instead of WEP • Bluetooth • Turn OFF if not actively in use

  17. Topics • Terminology • Passwords • Malware • Wireless • How do I protect myself?

  18. How do I protect myself? • Keep your Operating System up to date • Install and update your AntiVirus solution • Install and update a Malware scanning solution • Recognize Phishing Scams • Use STRONG Passwords • Backup Important files

  19. Session 2Topics in Information Security Zachary Mitcham Chief Information Security Officer University of North Carolina Wilmington

  20. Cyber Security Awareness Day October 17, 2013

More Related