SlideShare a Scribd company logo
1 of 18
COMPUTER SECURITY
Internet / Network Security
Data Security
Today's Discussions
 Overview of Computer and Internet
Security
 What is Computer and Internet Security
 Who Should be Concerned
 Why Should I Care
 General Computer Security Tips
 Securing Mobile Devices and Social
Networks
 Mobile Devices – Risks
 How are Location Sharing Technologies
used
 Risks of Location Sharing Technologies
What is Computer and Internet
Security
 Protecting computers, information, and
services from unauthorized access,
change or destruction.
 Internet security extends this concept to
systems that are connected to the
Internet
 Browsing the Internet
 Electronic Commerce
 Social Networking
 Emailing
Who Should be concerned
 Anyone who uses
 Computers
 Mobile Devices
 The Internet
 Email
 Social Networks
Why Should I Care?
 Infections from viruses, spyware, or malware
 Virus - Program designed to infect your computer, replicates itself ,
and usually causes lost or corrupt data
 Spyware is a type of malicious code that tracks your habits on the
internet without you knowing it; usually collects personal information
 Phishing, Hoaxes, Malware, Scams and Spam
 The most prevalent and persistent threats to your security come to
you in your Inbox. They come by different names and may even
appear legitimate and even supposedly from people you may know.
 They all have this in common: they are designed to get you to click
on an item like an attachment, link or picture.
 Broken device
 Devices that do not work when needed or as expected.
 Privacy and personal security concerns
 Preventing private, personal, or sensitive information from being
disclosed
Basic Approaches to Security
 Use anti-virus and anti-spyware
Software
 Detects and removes viruses and
spyware
 from your computer
 Must be kept up to date
 Install security patches
 Enable Firewalls
 Protects computers by preventing
unauthorized access
Basic Approaches to Security
 Use strong passwords to protect
computers
 Be cautious about downloading free
software or files from untrusted sites
 Most prevalent threats to your security
come to you in your Inbox; are all
designed to get you to click on an item
like an attachment, link or picture.
 If you click, you could launch harmful
programs or be directed to a harmful
web site.
Basic Approaches to Security
 Think before you click on links
 Most threats are targeted in hopes that you will click on
a
 harmful link, attachment, picture, video or icon in an
email or web page
 Stop: Do not automatically click on Internet links until
you have confidence in them.
 Think: Look at the actual address for the links in
question
 For instance if the link indicates “Click Here” be sure to
hover your mouse pointer over the link and investigate
before you proceed.
 Click: Only after you are confident that the site is safe.
Security for Mobile Devices and
Social Networks
 Mobile devices are easy to lose or steal
 Can carry large amount of data
 If stolen, an unsecured Smartphone grants
access
 to your private information: email
correspondence, address books, and any
unsecured documents. Often unprotected
 Data may be “sniffed” during unprotected
wireless communications
Mobile Devices - Risks
 Mobile Devices have become the
devices of choice for communicating
and connecting to the Internet
 SmartPhones
 Tablets
 Laptop Computers
 Social Networks
 Twitter, Facebook, Google +,
Pinterest, Instagram, Linkidin
Mobile Devices - Risks
 Location Sharing
 Location-aware applications deliver online
content to users
 based on their physical location.
 Technologies employ GPS, cell phone
infrastructure or wireless access points to
identify where cell phones or laptops are
located and users can share that information
with location-aware applications.
Mobile Devices - How are
Location
Sharing Technologies used?
 Apps might provide you with
information on nearby restaurants,
notify you of traffic jams, or let your
friends in a social network know where
you are, prompting increased social
connectivity.
Risks of Location Sharing
Technologies
 Makes users “human homing
beacons”
 Increases the chances of being
stalked
 May reveal when you are home or
away
Security Guidelines for Location
Sharing Technologies
 Most apps offer privacy controls –
enable them
 Some privacy controls are not always
easy to access
 Defaults may be too open
 Know what applications you have and
research privacy controls
 Disable GPS capabilities and
geotagging features
Security Guidelines Mobile
Devices
 Enable auto-lock
 Enable password protection
 Keep the phone OS and apps up-to-
date
 Enable remote wipe feature where
possible
 Avoid connecting to public wireless
network when possible.
Security Guidelines - Social
Networks
 Security Guidelines
 Before you post, ask the following:
 Will this post/picture cause a problem
for me?
 Would I say this in front of my mother?
 Limit the number of people that see it
 Share public information with the
public
 Share inner thoughts and personal
feelings with close friends
Security Guidelines - Social
Networks
 Limit your visibility on services
 Do not Friend or Connect with people
that you have not met in person or
know well
 Limit your check-in information to
friends only
 Never check in at your home, school,
work
 A mayorship is a public “office”
Security Guidelines - Social
Networks
 Avoid public lists for a location
 Review posts you are tagged in
 Turn off geo location data in photos
 Turn off “find my face” in photos and
videos
 Disable location data for tweets
 Delete old location data too

More Related Content

What's hot

What's hot (20)

Information security awareness, middle management
Information security awareness, middle managementInformation security awareness, middle management
Information security awareness, middle management
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness Program
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
Basics of Information System Security
Basics of Information System SecurityBasics of Information System Security
Basics of Information System Security
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Overview of Information Security & Privacy
Overview of Information Security & PrivacyOverview of Information Security & Privacy
Overview of Information Security & Privacy
 
cybersecurity
cybersecuritycybersecurity
cybersecurity
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
Information Security
Information SecurityInformation Security
Information Security
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 

Viewers also liked

[Challenge:Future] Liberty conservation and development association: My Drea...
[Challenge:Future] Liberty conservation and  development association: My Drea...[Challenge:Future] Liberty conservation and  development association: My Drea...
[Challenge:Future] Liberty conservation and development association: My Drea...
Challenge:Future
 
ITIL_ServiceStrategy
ITIL_ServiceStrategyITIL_ServiceStrategy
ITIL_ServiceStrategy
Kumar Gaurav
 

Viewers also liked (16)

[Challenge:Future] Liberty conservation and development association: My Drea...
[Challenge:Future] Liberty conservation and  development association: My Drea...[Challenge:Future] Liberty conservation and  development association: My Drea...
[Challenge:Future] Liberty conservation and development association: My Drea...
 
Itaquera e a festa das cerejeiras um estudo sobre hibridismo cultural e proce...
Itaquera e a festa das cerejeiras um estudo sobre hibridismo cultural e proce...Itaquera e a festa das cerejeiras um estudo sobre hibridismo cultural e proce...
Itaquera e a festa das cerejeiras um estudo sobre hibridismo cultural e proce...
 
daniel_ellis6
daniel_ellis6daniel_ellis6
daniel_ellis6
 
スタートアップのためのリアルなブランド戦略 先生:山口 義宏・菅原 敬
スタートアップのためのリアルなブランド戦略 先生:山口 義宏・菅原 敬スタートアップのためのリアルなブランド戦略 先生:山口 義宏・菅原 敬
スタートアップのためのリアルなブランド戦略 先生:山口 義宏・菅原 敬
 
ITIL_ServiceStrategy
ITIL_ServiceStrategyITIL_ServiceStrategy
ITIL_ServiceStrategy
 
Riots research paper
Riots research paperRiots research paper
Riots research paper
 
Robin dargavel cswip 3.2.2 (july '16 to june '21)
Robin dargavel cswip 3.2.2 (july '16 to june '21) Robin dargavel cswip 3.2.2 (july '16 to june '21)
Robin dargavel cswip 3.2.2 (july '16 to june '21)
 
Andalusien-Rundreise mit Opernreisen.com
Andalusien-Rundreise mit Opernreisen.comAndalusien-Rundreise mit Opernreisen.com
Andalusien-Rundreise mit Opernreisen.com
 
Though leadership brand management
Though leadership brand managementThough leadership brand management
Though leadership brand management
 
Telas - trabalhos d´aprés - 8ºA
Telas - trabalhos d´aprés - 8ºATelas - trabalhos d´aprés - 8ºA
Telas - trabalhos d´aprés - 8ºA
 
Chris manlift cert.
Chris manlift cert.Chris manlift cert.
Chris manlift cert.
 
Ember コミュニティとわたし
Ember コミュニティとわたしEmber コミュニティとわたし
Ember コミュニティとわたし
 
Anglo enem sábado
Anglo enem   sábadoAnglo enem   sábado
Anglo enem sábado
 
Materialismo histórico
Materialismo histórico Materialismo histórico
Materialismo histórico
 
English work nokas e nono
English work  nokas e nonoEnglish work  nokas e nono
English work nokas e nono
 
Panitikang lansangan
Panitikang lansanganPanitikang lansangan
Panitikang lansangan
 

Similar to IT Security

Promote Education Internet Security
Promote Education Internet SecurityPromote Education Internet Security
Promote Education Internet Security
Zoaib Mirza
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
sheenau
 

Similar to IT Security (20)

Module 5: Safety
Module 5: SafetyModule 5: Safety
Module 5: Safety
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Promote Education Internet Security
Promote Education Internet SecurityPromote Education Internet Security
Promote Education Internet Security
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
 
Securityguide
SecurityguideSecurityguide
Securityguide
 
CYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWCYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEW
 
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureSmartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
 
Computer security
Computer securityComputer security
Computer security
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
 
What is malware
What is malwareWhat is malware
What is malware
 
End user security awareness
End user security awarenessEnd user security awareness
End user security awareness
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protection
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

IT Security

  • 1. COMPUTER SECURITY Internet / Network Security Data Security
  • 2. Today's Discussions  Overview of Computer and Internet Security  What is Computer and Internet Security  Who Should be Concerned  Why Should I Care  General Computer Security Tips  Securing Mobile Devices and Social Networks  Mobile Devices – Risks  How are Location Sharing Technologies used  Risks of Location Sharing Technologies
  • 3. What is Computer and Internet Security  Protecting computers, information, and services from unauthorized access, change or destruction.  Internet security extends this concept to systems that are connected to the Internet  Browsing the Internet  Electronic Commerce  Social Networking  Emailing
  • 4. Who Should be concerned  Anyone who uses  Computers  Mobile Devices  The Internet  Email  Social Networks
  • 5. Why Should I Care?  Infections from viruses, spyware, or malware  Virus - Program designed to infect your computer, replicates itself , and usually causes lost or corrupt data  Spyware is a type of malicious code that tracks your habits on the internet without you knowing it; usually collects personal information  Phishing, Hoaxes, Malware, Scams and Spam  The most prevalent and persistent threats to your security come to you in your Inbox. They come by different names and may even appear legitimate and even supposedly from people you may know.  They all have this in common: they are designed to get you to click on an item like an attachment, link or picture.  Broken device  Devices that do not work when needed or as expected.  Privacy and personal security concerns  Preventing private, personal, or sensitive information from being disclosed
  • 6. Basic Approaches to Security  Use anti-virus and anti-spyware Software  Detects and removes viruses and spyware  from your computer  Must be kept up to date  Install security patches  Enable Firewalls  Protects computers by preventing unauthorized access
  • 7. Basic Approaches to Security  Use strong passwords to protect computers  Be cautious about downloading free software or files from untrusted sites  Most prevalent threats to your security come to you in your Inbox; are all designed to get you to click on an item like an attachment, link or picture.  If you click, you could launch harmful programs or be directed to a harmful web site.
  • 8. Basic Approaches to Security  Think before you click on links  Most threats are targeted in hopes that you will click on a  harmful link, attachment, picture, video or icon in an email or web page  Stop: Do not automatically click on Internet links until you have confidence in them.  Think: Look at the actual address for the links in question  For instance if the link indicates “Click Here” be sure to hover your mouse pointer over the link and investigate before you proceed.  Click: Only after you are confident that the site is safe.
  • 9. Security for Mobile Devices and Social Networks  Mobile devices are easy to lose or steal  Can carry large amount of data  If stolen, an unsecured Smartphone grants access  to your private information: email correspondence, address books, and any unsecured documents. Often unprotected  Data may be “sniffed” during unprotected wireless communications
  • 10. Mobile Devices - Risks  Mobile Devices have become the devices of choice for communicating and connecting to the Internet  SmartPhones  Tablets  Laptop Computers  Social Networks  Twitter, Facebook, Google +, Pinterest, Instagram, Linkidin
  • 11. Mobile Devices - Risks  Location Sharing  Location-aware applications deliver online content to users  based on their physical location.  Technologies employ GPS, cell phone infrastructure or wireless access points to identify where cell phones or laptops are located and users can share that information with location-aware applications.
  • 12. Mobile Devices - How are Location Sharing Technologies used?  Apps might provide you with information on nearby restaurants, notify you of traffic jams, or let your friends in a social network know where you are, prompting increased social connectivity.
  • 13. Risks of Location Sharing Technologies  Makes users “human homing beacons”  Increases the chances of being stalked  May reveal when you are home or away
  • 14. Security Guidelines for Location Sharing Technologies  Most apps offer privacy controls – enable them  Some privacy controls are not always easy to access  Defaults may be too open  Know what applications you have and research privacy controls  Disable GPS capabilities and geotagging features
  • 15. Security Guidelines Mobile Devices  Enable auto-lock  Enable password protection  Keep the phone OS and apps up-to- date  Enable remote wipe feature where possible  Avoid connecting to public wireless network when possible.
  • 16. Security Guidelines - Social Networks  Security Guidelines  Before you post, ask the following:  Will this post/picture cause a problem for me?  Would I say this in front of my mother?  Limit the number of people that see it  Share public information with the public  Share inner thoughts and personal feelings with close friends
  • 17. Security Guidelines - Social Networks  Limit your visibility on services  Do not Friend or Connect with people that you have not met in person or know well  Limit your check-in information to friends only  Never check in at your home, school, work  A mayorship is a public “office”
  • 18. Security Guidelines - Social Networks  Avoid public lists for a location  Review posts you are tagged in  Turn off geo location data in photos  Turn off “find my face” in photos and videos  Disable location data for tweets  Delete old location data too