Your SlideShare is downloading. ×
0
Security Week PowerPoint Presentation
Security Week PowerPoint Presentation
Security Week PowerPoint Presentation
Security Week PowerPoint Presentation
Security Week PowerPoint Presentation
Security Week PowerPoint Presentation
Security Week PowerPoint Presentation
Security Week PowerPoint Presentation
Security Week PowerPoint Presentation
Security Week PowerPoint Presentation
Security Week PowerPoint Presentation
Security Week PowerPoint Presentation
Security Week PowerPoint Presentation
Security Week PowerPoint Presentation
Security Week PowerPoint Presentation
Security Week PowerPoint Presentation
Security Week PowerPoint Presentation
Security Week PowerPoint Presentation
Security Week PowerPoint Presentation
Security Week PowerPoint Presentation
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Security Week PowerPoint Presentation

634

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
634
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
11
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • 1) If hackers figure out the password, more than one account is in jeopardy 2) Hackers can find this type of information easily 3) Hackers are crafty at cracking passwords that are common or are recognisably words in any language 4) A strong password should have at least 8 characters- 14 is even better 5) This example speaks for itself 6) So does this example 7) Login name and blank space are too obvious 8) Changing your password will keep hackers on their toes
  • Use same security measures at home as you would at work. It’s better safe than sorry.
  • When traveling ensure your PDA is securely packed. Don’t keep your PDA in coat pockets where thieves can easily access it. Strong passwords are the next line of defence. Removable storage cards are not only a security measure they enable you to run more programs and save more data. Learn how to encrypt your files and remember to use this software on a regular basis to maintain a high level of security for your PDA There are programs available which can prevent access to specified programs or even lock a PDA up if there have been too many failed attempts to access your PDA programs or the PDA operating system itself. Whenever you use make use of a wireless network with your PDA you must be sure to enable all safety protocols and ensure that you are using a secure wireless connection. Whenever you aren't using your wireless connections make sure you disable the software (such as Bluetooth and Wi-Fi) so that no unauthorized connections are made to your PDA. In crowded areas such as airports, train stations and bus terminals you never know who may be seeking out devices to wirelessly connect to and make attempts to corrupt or steal data. Using programs to monitor and detect activity on your PDA can let you know if someone is attempting to access programs on your PDA or have made changes to the data on your PDA. Always make sure you open only attachments which are from contacts that you know. Set up email on your PDA to properly filter spam and not open any executable files you may receive by email.
  • Transcript

    • 1. Security Week Presented By: Technology Learning Centre
    • 2. Passwords <ul><li>Never share your passwords </li></ul><ul><li>Information Services will never ask for a password. </li></ul><ul><li>Don’t use same password on all accounts </li></ul><ul><li>Avoid personal information in passwords i.e.: birthday, Mother’s maiden name. </li></ul><ul><li>Avoid common names (i.e.: “password” & “God” – these are the most used) or words in any language dictionary </li></ul><ul><li>Strong passwords should be 8 characters in length, combine letters, numbers and symbols </li></ul>
    • 3. Passwords <ul><li>Think of a sentence you will remember, if you can’t have spaces in a password, make an anagram. For example: Elvis died August 16 1977 = Eda161977 </li></ul><ul><li>Avoid sequences and repeated characters i.e.: 12345678 or aabbccdd </li></ul><ul><li>Avoid login name as a password, or leaving a ‘blank space’ in password box </li></ul><ul><li>Change passwords often (i.e.: every term) </li></ul>
    • 4. Phishing <ul><li>You can do the following to help protect yourself from phishing scams: </li></ul><ul><li>Don't click links in e-mail messages. Type addresses directly into your browser or use your personal bookmarks. </li></ul><ul><li>Check the site's security certificate before you enter personal or financial information into a Web site. </li></ul><ul><li>Don't enter personal or financial information into pop-up windows. </li></ul>
    • 5. [Windows] + [L] Always remember to lock your workstation whenever you leave your desk.
    • 6. Click [Windows] + [L]
    • 7. When your workstation is locked your screen will look like this:
    • 8. To Unlock Workstation <ul><li>1. Hit [Ctrl] + [Alt] + [Delete] </li></ul><ul><li>2. Enter your Novell Username and Password </li></ul>
    • 9. GroupWise <ul><li>When using the Proxy tool it is possible to see sensitive information </li></ul><ul><li>such as: </li></ul><ul><li>Folder structure and names of folders </li></ul><ul><li>Appointments (i.e.: Interviewees) </li></ul><ul><li>Unread messages </li></ul><ul><li>To protected protect data, select an existing item and then click Actions > Mark Private, or you can select the item & then press [F8]. </li></ul>
    • 10. Public Terminals <ul><li>Don't save your login information – &quot;log off” button where possible </li></ul><ul><li>Many programs (especially instant messenger programs) include automatic login features that will save your user name and password. Disable this option so no one can log in as you. </li></ul><ul><li>Don't leave the computer unattended with sensitive information on the screen. </li></ul><ul><li>Watch for over-the-shoulder snoops </li></ul><ul><li>Avoid typing sensitive information such as your credit card number or any other financial into a public computer.. </li></ul>
    • 11. How to Delete Temporary Internet Files and History <ul><li>When you finish your use of a public computer, you should delete all the temporary files and your Internet history: </li></ul><ul><li>1. In Internet Explorer, click Tools, and then click Internet Options. </li></ul><ul><li>2. On the General tab, under Temporary Internet files, click Delete Files, and then click Delete Cookies. </li></ul><ul><li>3. Under History, click Clear History. </li></ul>
    • 12. How to Disable Password Storing Feature <ul><li>Web browsers such as Internet Explorer keep a record of your passwords and every page you visit, even after you’ve closed them and logged out. To disable the feature that stores passwords: </li></ul><ul><li>1. In Internet Explorer, click Tools, and then click Internet Options. </li></ul><ul><li>2. Click the Content tab, and then click AutoComplete. </li></ul><ul><li>3. Click to clear both check boxes having to do with passwords </li></ul>
    • 13. NetStorage <ul><li>The NetStorage interface allows you to access your netware file storage from a web browser no matter where you are located without the installation of any software. </li></ul><ul><li>This Network drive is backed-up and is accessible anywhere via internet. https://netstorage.cc.uregina.ca </li></ul><ul><li>For enhanced security and to protect your privacy, it is always best to close your browser after logging out of NetStorage. </li></ul><ul><li>Remember to delete your downloaded working copy off the desktop . </li></ul>
    • 14. To watch the NetStorage video, please click. It may take a moment to begin.
    • 15. Home Computers <ul><li>Use an internet firewall (Check with your internet provider) </li></ul><ul><li>Keep all software updated </li></ul><ul><li>Use anti-virus and anti-spyware software </li></ul><ul><li>Download Sophos: </li></ul><ul><li>U of R home page>Faculty & Staff>Computing Services>Under the Top Ten Items of Interest block click #4.Downloads>Sophos Anitvirus for Windows </li></ul><ul><li>Be careful when opening email attachments </li></ul><ul><li>Back-up your computer </li></ul><ul><li>On XP: All programs>Accessories>Systems Tools>Backup>Follow the Wizard </li></ul><ul><li>Use strong passwords and change them often </li></ul>
    • 16. Personal Digital Assistants <ul><li>Know where your PDA is at all times. For example: Don’t keep your PDA in front pockets where it can be easily stolen. </li></ul><ul><li>Protect your PDA by locking it with a strong password </li></ul><ul><li>Use removable storage cards to prevent the loss of data in case your PDA is stolen. Keep removable storage media in a separate location from your PDA when not in use while traveling </li></ul><ul><li> </li></ul>
    • 17. Personal Digital Assistants <ul><li>Ensure you are using a secure wireless connection </li></ul><ul><li>Try to avoid connecting in public “Hot Spots” ie: coffee shops, airports </li></ul><ul><li>Do not have auto-connect activated. This will enable you to connect to any wireless network whether you want to or not – Always manually connect. </li></ul><ul><li>Only open attachments from known contacts </li></ul>
    • 18. Wireless Networks <ul><li>Encrypt all information transmitted through your access point (router) </li></ul><ul><li>The U of R has a secure access point </li></ul><ul><li>Avoid transmitting critical & financial information over the internet. </li></ul><ul><li>Keep wireless disabled when not in use </li></ul>
    • 19. For More Information <ul><li>Please refer to the Safe Computing manual on the Technology Learning Centre website: </li></ul>http://uregina.ca/training/Other/Safe_Computing.doc
    • 20. We’re Here to Help <ul><li>585-4685 </li></ul><ul><li>Email: [email_address] </li></ul><ul><li>Webpage: http://www.uregina.ca/compserv/ITSC </li></ul><ul><li>OR </li></ul><ul><li>Technology Learning Centre </li></ul><ul><li>Email: [email_address] </li></ul><ul><li>Webpage: http://www.uregina.ca/training </li></ul>

    ×