1 / 11

Introduction to IT Security and Desktop PC Protection

Introduction to IT Security and Desktop PC Protection. Speaker: Stone Miu. Agenda. WHY WE ARE HERE? SECURE YOUR DESKTOP PC INTERNET SECURITY PROTECTION HOW TO IDENTIFY AND HANDLE FAKE EMAIL AND WEBSITE INTERNET SECURITY PROTECTION INTELLECTUAL PROPERTY RIGHTS FOR SOFTWARE AND INFORMATION

spiro
Télécharger la présentation

Introduction to IT Security and Desktop PC Protection

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Introduction to IT Security and Desktop PC Protection Speaker: Stone Miu

  2. Agenda • WHY WE ARE HERE? • SECURE YOUR DESKTOP PC • INTERNET SECURITY PROTECTION • HOW TO IDENTIFY AND HANDLE FAKE EMAIL AND WEBSITE • INTERNET SECURITY PROTECTION • INTELLECTUAL PROPERTY RIGHTS FOR SOFTWARE AND INFORMATION • PHYSICAL SECURITY

  3. WHY WE ARE HERE? • What is Information Security? CIA Model • Confidentiality • Integrity • Availability • Importance of Information Security • How to Achieve a Satisfied Level of Information Security? • Roles and Responsibilities • Policy and Guidelines in HKUST

  4. SECURE YOUR DESKTOP PC • Password Protection • How to create secure Passwords? • Importance of Changing Passwords frequently • Data Security -> LOGOFF when you are away from your PCs • Basic Security Settings of a PC e.g. firewall DEMO • Software firewall • Hardware firewall • How to Avoid from Virus Attacks? E.g. Anti-Virus Program DEMO • How can Antivirus Software Protect your Computer? • How to Install Antivirus Software and Virus Signature Update in HKUST? • Backup and Restore • The Importance of Backup and Recovery • Steps for Backup & Recovery • Protections of Data/ Files e.g. file encryption • Windows Update

  5. INTERNET SECURITY PROTECTION • Security Settings of a Web Browser Demo • Attentions Needed when Surfing Web Pages • Software Update Management e.g. Adobe pdf, Java, Thunderbird, Firefox, etc • Cookies • Closing Saved Password • Pop-up Blocker • How to determine the website is safe to browse? • http://google.com/safebrowsing/diagnostic?site= • hpHosts • Norton Safe Web • Unmasked Parasites • AVG LinkScanner • AVG's free Mobilation Android app • Lookout Mobile Security

  6. HOW TO IDENTIFY AND HANDLE FAKE EMAIL AND WEBSITE • What is Scam Email? • How to Handle Scam Email? • What is Email Spoofing / Phishing? • How to Handle Email Spoofing / Phishing? • Preventive Measures • Detective Measures • Responsive Measures • What is Digital Signature & how it is used in HKUST?

  7. INTELLECTUAL PROPERTY RIGHTS FOR SOFTWARE AND INFORMATION • Freeware • Shareware • Liteware

  8. INCIDENT HANDLING PROCEDURES • Basic Concept of Incident Handling E.g. Task Manager • Common Incident Handling • Handling Procedure of Security Incidents • Loophole Warning

  9. PHYSICAL SECURITY • Clear Screen Protection • Protection of External Device • Disposal of Computer Equipment • Delete and Format Commands • Overwriting • Degaussing • Physical Destruction

  10. Useful Links • Change User Account Password • http://itsc.ust.hk/services/general-it-services/user-account-management/change-user-account-password/ • Security Tips for Email • http://itsc.ust.hk/services/general-it-services/communication-collaboration/email/security-tips-for-emails/ • Get Ready for Signed Email in HKUST • http://itsc.ust.hk/services/it-infrastructure/hkust-ca-certificates/get-ready-for-signed-email/ • HKUST PKI • http://itsc.ust.hk/services/it-infrastructure/hkust-ca-certificates/ • HKUST • http://www.ust.hk/ • Information Technology Services Center (ITSC) • http://itsc.ust.hk/ • ITSC Policies and Guidelines • http://itsc.ust.hk/it-policies-guidelines/ • ITSC A-Z Guide • http://itsc.ust.hk/a-z/ • IT Security Web Site • http://itsc.ust.hk/services/it-security/campus/ • IT Security Guidelines • http://itsc.ust.hk/it-policies-guidelines/information-technology-security-guidelines/ • Anti-Virus In Campus • http://itsc.ust.hk/services/it-security/anti-virus-in-campus/ • http://itsc.ust.hk/services/it-security/anti-virus-in-campus/virus-definition-update/ • How to Protect Your Computer? • http://itsc.ust.hk/services/it-security/security-awareness/protecting-your-computer/ • Guidelines and Tips on Using USB Drive • http://itsc.ust.hk/services/it-security/campus/usb-drive/ • How to Dispose your hard disk securely? • http://itsc.ust.hk/services/it-security/campus/dispose-harddisk/ • Be Aware of Fake mail • http://itsc.ust.hk/beware-of-fake-mail-20130718/ • Phishing Sample Emails • http://itsc.ust.hk/services/general-it-services/communication-collaboration/email/phishing-samples/ • Java Security Alert • http://itsc.ust.hk/java-security-alert/ • Windows 7 • http://itsc.ust.hk/services/general-it-services/procurement-licensing/windows7/ • Windows XP • http://www.ust.hk/itsc/windowsxp/

  11. Q & A

More Related