1 / 32

FLORIDA COMPUTER CRIME CENTER

demi
Télécharger la présentation

FLORIDA COMPUTER CRIME CENTER

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


    2. FC3 was established within FDLE in 1998. FC3 was established within FDLE in 1998.

    12. As a part of its ongoing commitment to educate the citizens and businesses of Florida, Secure Florida has developed a seminar entitled C-SAFE: Cyber-Security Awareness for Everyone. The seminar gives citizens and small businesses insights on the dangers of the Internet, while providing valuable lessons on securing their computers against the many pitfalls that they could face. It is the responsibility of every citizen to do their part in promoting the nations cyber-safety. We are only as vulnerable to these threats as we allow ourselves to be. As a part of its ongoing commitment to educate the citizens and businesses of Florida, Secure Florida has developed a seminar entitled C-SAFE: Cyber-Security Awareness for Everyone. The seminar gives citizens and small businesses insights on the dangers of the Internet, while providing valuable lessons on securing their computers against the many pitfalls that they could face. It is the responsibility of every citizen to do their part in promoting the nations cyber-safety. We are only as vulnerable to these threats as we allow ourselves to be.

    15. The FIPC is a partnership of the State Technology Office, the Florida Division of Emergency Management, the National Guard Information Assurance Team, and the Florida Department of Law Enforcement. The FIPC is a partnership of the State Technology Office, the Florida Division of Emergency Management, the National Guard Information Assurance Team, and the Florida Department of Law Enforcement.

    20. Analysis & Warning Working with CyberTrust, the State Technology Office, the Florida Division of Emergency Management, and the Florida National Guard, the FIPC has developed a central analysis and dissemination center to provide dependable information regarding potential cyber threats. The FIPC monitors and analyzes international news, Department of Defense public news releases, and cyber alerts from other sources, and then disseminates this information through the Secure Florida website. The FIPC has a contract with CyberTrust to continuously track Internet activity and malicious code coming from underground hacking groups. Analysis & Warning Working with CyberTrust, the State Technology Office, the Florida Division of Emergency Management, and the Florida National Guard, the FIPC has developed a central analysis and dissemination center to provide dependable information regarding potential cyber threats. The FIPC monitors and analyzes international news, Department of Defense public news releases, and cyber alerts from other sources, and then disseminates this information through the Secure Florida website. The FIPC has a contract with CyberTrust to continuously track Internet activity and malicious code coming from underground hacking groups.

    22. You will want to hide either this slide or the next one. Use this one for a brief discussion; use the next for a more detailed discussion NOTE: Some of the screen shots should be hidden; there are too many to discuss them all.You will want to hide either this slide or the next one. Use this one for a brief discussion; use the next for a more detailed discussion NOTE: Some of the screen shots should be hidden; there are too many to discuss them all.

    23. Click the mouse to highlight one area after another. Mission Statement already discussed National Threat Level links to the Florida Emergency Management page Domestic Security/Myflorida these link to the Regional Domestic Security Task Forces public website, and MyFlorida.com Events Calendar here we can show cyber security related events, including a map to the location Windows/Mac Updates click these to see the latest updates fro your PC or Mac Survey a brief survey about cyber security practices; voting takes you to a page of results and other surveys Current Security Issues These news stories are posted by the site administration staff; they come from several cyber news sites, as well as personal experience from experts working in the cyber security field. News these are automatic feeds, updated several times each day, in the areas of Computer Security News and Online Legal Issues Menus There are three ways of finding information on secureflorida.org. First, you can look for information by user type, by clicking on Citizen, Business, or Government Issues; well see one of those pages in a minute. Second, you can look for information by topic, by clicking on one of the menu items on the left. As we shall see in a minute, each of these items has sub headings of individual sub-topics. Search Third, you can search on a word or a phrase, and you will see a list of all the news stories and webpages that have that word or phrase in them. Member Center this is where you click to register to receive our cyber alerts. Click the mouse to highlight one area after another. Mission Statement already discussed National Threat Level links to the Florida Emergency Management page Domestic Security/Myflorida these link to the Regional Domestic Security Task Forces public website, and MyFlorida.com Events Calendar here we can show cyber security related events, including a map to the location Windows/Mac Updates click these to see the latest updates fro your PC or Mac Survey a brief survey about cyber security practices; voting takes you to a page of results and other surveys Current Security Issues These news stories are posted by the site administration staff; they come from several cyber news sites, as well as personal experience from experts working in the cyber security field. News these are automatic feeds, updated several times each day, in the areas of Computer Security News and Online Legal Issues Menus There are three ways of finding information on secureflorida.org. First, you can look for information by user type, by clicking on Citizen, Business, or Government Issues; well see one of those pages in a minute. Second, you can look for information by topic, by clicking on one of the menu items on the left. As we shall see in a minute, each of these items has sub headings of individual sub-topics. Search Third, you can search on a word or a phrase, and you will see a list of all the news stories and webpages that have that word or phrase in them. Member Center this is where you click to register to receive our cyber alerts.

    24. Clicking this button will allow you to register This is also the page where you can sign in if you have already registered. Clicking this button will allow you to register This is also the page where you can sign in if you have already registered.

    25. These are our partners in the Secure Florida InitiativeThese are our partners in the Secure Florida Initiative

    26. This slide shows the types of subjects that are available if you click on one of the Issues links in the page header. Such as <click mouse> Protecting Children Online <click mouse> E-Mail Safety <click mouse> Identity Theft This slide shows the types of subjects that are available if you click on one of the Issues links in the page header. Such as <click mouse> Protecting Children Online <click mouse> E-Mail Safety <click mouse> Identity Theft

    27. <click> This page demonstrates the types of subjects available under the Business Continuity menu item <click> (The quote) This is why businesses have to be concerned with the security of their networks and systems.<click> This page demonstrates the types of subjects available under the Business Continuity menu item <click> (The quote) This is why businesses have to be concerned with the security of their networks and systems.

    29. We give information on reporting a computer crime, including link to all the law enforcement agencies in Florida, and in the country. <click mouse> We give information on reporting a computer crime, including link to all the law enforcement agencies in Florida, and in the country. <click mouse>

    30. We have links to several related sites, including: National Infrastructure Protection Center InfraGard Federal Computer Incident Response Center Computer Security Institute Internet Storm Center We have links to several related sites, including: National Infrastructure Protection Center InfraGard Federal Computer Incident Response Center Computer Security Institute Internet Storm Center

    31. <click mouse> Use anti-virus software One of the easiest, and the most important ways to help ensure your security is to use anti-virus software. Set the program up so that it has real-time monitoring of your activities, and be sure that you update the virus definitions frequently. Many anti-virus programs allow you to update your software for free, by making new versions available for download. <click mouse> Install hardware and software firewalls It is important that your business or home network be housed behind a hardware firewall, particularly when using a high speed connection. It is also important to install personal firewall software to block any content that the hardware may miss. Many people who use high-speed Internet connections (DSL, cable modem, T1, etc) do not realize that they are online, and vulnerable, every minute that their computer is turned on. <click mouse> Create strong passwords A strong password is one that has at least 8 characters including letters, numbers, and other non-alphanumeric characters. Make it a combination of uppercase and lowercase letters, and do not make it a standard word. Password thieves use dictionary programs that test every word in the dictionary to see if they can find your password. <click mouse> Establish a back-up schedule for important data By creating and maintaining a set schedule for backing up your data, you can be prepared for any unfortunate breach that could occur despite your best efforts to remain secure. Remember, dont store your back up tapes or disks in in the same place that you have your computer. If a fire destroys your building, you dont want to have both your current data and your back up destroyed. <click mouse> Maintain up-to-date security patches It is important to carefully review and install software patches as soon as they become available. This will help to reduce the amount of time that you are vulnerable to an attack. <click mouse> Use password protected screen savers To help ensure that you are the only one with access to your data, you should use a screen saver that activates when your computer is inactive for a few moments and requires a password to return to the desktop. These can even be important at home if there are other people who share your home with you. <click mouse> Check the security settings in your e-mail client and web browser In your e-mail client (such as Outlook, Eudora, etc) you should use content filter settings to block unwanted e-mail. You can also set your Web Browser to block cookies and unwanted JavaScript. Most of the viruses that are disseminated through a web browser use JavaScript. <click mouse> Use safe e-mail and download practices Most computer viruses spread through e-mail or direct downloading to your computer. With this in mind, you should think carefully about everything that you download. One way to protect yourself is to never open mail from someone you dont know. In addition, this practice has the added benefit of helping to keep down the amount of spam you get. Many spammers send e-mail using every address they can create. When you open spam, you can be sending a message back to the sender that your e-mail address is valid. Some people will pay a lot of money for lists of valid e-mail addresses. <click mouse> Increase your awareness of Internet security Become aware of the dangers surrounding you on the Internet. You can do this through formal training, or simply keeping up with the latest Internet news and alerts. A good way is frequent visits to secureflorida.org! <click mouse> Establish policies and rules for information security Policies or Rules should be established in your business or agency and even in your home providing guidelines for secure computer use. <click mouse> Use several methods dont rely on just one. There is only one way of getting a 100% guarantee computer security never turn it on! <click mouse> Information on all of these topics can be found at secureflorida.org. <click> <click mouse> Use anti-virus software One of the easiest, and the most important ways to help ensure your security is to use anti-virus software. Set the program up so that it has real-time monitoring of your activities, and be sure that you update the virus definitions frequently. Many anti-virus programs allow you to update your software for free, by making new versions available for download. <click mouse> Install hardware and software firewalls It is important that your business or home network be housed behind a hardware firewall, particularly when using a high speed connection. It is also important to install personal firewall software to block any content that the hardware may miss. Many people who use high-speed Internet connections (DSL, cable modem, T1, etc) do not realize that they are online, and vulnerable, every minute that their computer is turned on. <click mouse> Create strong passwords A strong password is one that has at least 8 characters including letters, numbers, and other non-alphanumeric characters. Make it a combination of uppercase and lowercase letters, and do not make it a standard word. Password thieves use dictionary programs that test every word in the dictionary to see if they can find your password. <click mouse> Establish a back-up schedule for important data By creating and maintaining a set schedule for backing up your data, you can be prepared for any unfortunate breach that could occur despite your best efforts to remain secure. Remember, dont store your back up tapes or disks in in the same place that you have your computer. If a fire destroys your building, you dont want to have both your current data and your back up destroyed. <click mouse> Maintain up-to-date security patches It is important to carefully review and install software patches as soon as they become available. This will help to reduce the amount of time that you are vulnerable to an attack. <click mouse> Use password protected screen savers To help ensure that you are the only one with access to your data, you should use a screen saver that activates when your computer is inactive for a few moments and requires a password to return to the desktop. These can even be important at home if there are other people who share your home with you. <click mouse> Check the security settings in your e-mail client and web browser In your e-mail client (such as Outlook, Eudora, etc) you should use content filter settings to block unwanted e-mail. You can also set your Web Browser to block cookies and unwanted JavaScript. Most of the viruses that are disseminated through a web browser use JavaScript. <click mouse> Use safe e-mail and download practices Most computer viruses spread through e-mail or direct downloading to your computer. With this in mind, you should think carefully about everything that you download. One way to protect yourself is to never open mail from someone you dont know. In addition, this practice has the added benefit of helping to keep down the amount of spam you get. Many spammers send e-mail using every address they can create. When you open spam, you can be sending a message back to the sender that your e-mail address is valid. Some people will pay a lot of money for lists of valid e-mail addresses. <click mouse> Increase your awareness of Internet security Become aware of the dangers surrounding you on the Internet. You can do this through formal training, or simply keeping up with the latest Internet news and alerts. A good way is frequent visits to secureflorida.org! <click mouse> Establish policies and rules for information security Policies or Rules should be established in your business or agency and even in your home providing guidelines for secure computer use. <click mouse> Use several methods dont rely on just one. There is only one way of getting a 100% guarantee computer security never turn it on! <click mouse> Information on all of these topics can be found at secureflorida.org. <click>

    33. Florida Computer Crime Center

More Related