SlideShare a Scribd company logo
1 of 17
Commission on Information and Communications Technology
Cyber SecurityCyber Security
iSchools Project Team
HUMAN CAPITAL DEVELOPMENT GROUP
iSchools - CILC for Teachers 2
Internet
• Positive: venue where people get
together to communicate, exchange
information, entertain, transact
business, and understand how the
world operates.
• Negative: playground of crooked
individuals and ruthless firms who take
advantage of the freedom it maintains
as well as its many weaknesses.
iSchools - CILC for Teachers 3
Privacy?
• E-mail is completely insecure.
• Each e-mail you send results in at least 3 or 4 copies
being stored on different computers.
• You can take measures to protect your e-mail.
iSchools - CILC for Teachers 4
Cyber Security
Unfortunately, there's no 100%
guarantee that even with the best
precautions some of these things won't
happen to you, but there are steps you
can take to minimize the chances.
BE RESPONSIBLE CYBER-CITIZENS!
BE CYBER-SMART!
iSchools - CILC for Teachers 5
Cyber Security
• protecting digital information by
preventing, detecting, and responding
to attacks
• recognize the risks and become
familiar with terminology associated
with them
iSchools - CILC for Teachers 6
Security Settings
• High, Medium, Low
• Trust sites vs.
Restricted sites
• Internet & LAN
content
• Firewall
• Filters
iSchools - CILC for Teachers 7
Malicious Individuals
• Hacker, attacker, or intruder
–exploit weaknesses in software and
computer systems for their own gain
–intentions: sometimes benign and
motivated solely by curiosity
–actions: typically in violation of the
intended use of the systems they are
exploiting
iSchools - CILC for Teachers 8
Malware
• designed “to wreak havoc on personal
computers and networks” by attaching to
programs (“hosts”) and spreading from one
program or storage device to another
• ranging from silly pranks to data destruction/
theft
iSchools - CILC for Teachers 9
Malware
• Virus: attaches to various files and executes
(infects the computer) when the host programs are
run (or an email attachment is opened or a
particular web page is visited)
• Worm: propagates without user intervention via
email, web sites, or network-based software, clogs
the system via numerous reproductions
• Logic Bomb: lies dormant until triggered by a
certain event
• Trojan Horse: unsuspicous delivery program of
malware
iSchools - CILC for Teachers 10
Spyware & Key Logger
• Spyware (also called sneakware or
stealthware) - software that comes hidden in
free downloadable software
– tracks your online movements
– mines the information stored on your computer
– uses your computer’s CPU and storage, slows it
down
• Key logger, or key trapper, software, -a
program, when installed on a computer,
records every keystroke and mouse click.
iSchools - CILC for Teachers 11
Spyware
• record keystrokes and steal private
information for advertisers, hackers, and
cyberthieves
– Cookie - a small record deposited on your hard disk by a
Web site containing information about you and your Web
activities.
– Adware - software to generate ads that installs itself on
your computer when you download some other (usually
free ) program from the Web.
• Earthlink (ISP) study: average computer harbors 26
spyware programs
iSchools - CILC for Teachers 12
Myths
• Anti-virus software and firewalls are 100% effective.
• Once software is installed on your computer, you do
not have to worry about it anymore.
• There is nothing important on your machine, so you
do not need to protect it.
• Attackers only target people with money.
• When computers slow down, it means that they are
old and should be replaced.
iSchools - CILC for Teachers 13
Tips
1. Perform basic computer maintenance
– firewall, data encryption, regular update of security patches
– regularly run anti-virus and anti-spyware software
1. Don't open files from strangers/ unreliable sites
– E-mail and IM
– verify first
1. Help fight spam and online scams
– use filters
– be wary of phishing
– check for secure pages (lock icon), server authentication,
and message integrity
– review the privacy policies of websites before entering
information
iSchools - CILC for Teachers 14
Tips
4. learn how to protect yourself from adware/spyware
– Regularly run anti-spyware software
– read license agreements of freeware against attached
spyware
4. take precautions when you go wireless
– convenient but with security risks
4. password-protect your computer—and lock it
– as first line of defense
4. back up your work
iSchools - CILC for Teachers 15
Safeguard your passwords!
• Guidelines from Learn the Net.com:
1.Although passwords should be easily
remembered, do not use passwords that refer
to easily obtainable personal information,
such as your name, address, phone number,
or birthday.
2.Avoid using common words.
3.Passwords should be at least six
alphanumeric characters – meaning, combine
upper and lower case letters, numbers, and
symbols, e.g. 2fjm0x@Ic. NOTE: Passwords
are case-sensitive.
iSchools - CILC for Teachers 16
Safeguard your passwords!
• Guidelines from Learn the Net.com:
4.Ideally, use a different password for each
service you register with. For sensitive
accounts, such as financial services, change
your passwords frequently.
5.Never ever disclose your password/s. Don’t
have your computer “remember your
password”.
Commission on Information and Communications Technology
www.us-cert.gov/cas/tips/ST04-001.html
(US-CERT: US Computer Emergency Readiness Team)
www.microsoft.com/athome/security/children/backtoschool.mspx
www,learnthenet.com

More Related Content

What's hot

Security Awareness 9 10 09 V4 Best Prac
Security Awareness 9 10 09 V4 Best PracSecurity Awareness 9 10 09 V4 Best Prac
Security Awareness 9 10 09 V4 Best PracMegan Bell
 
Internet Safety_Trinity (ELD&ULD)
Internet Safety_Trinity (ELD&ULD)Internet Safety_Trinity (ELD&ULD)
Internet Safety_Trinity (ELD&ULD)MMHoward
 
Online reputation
Online reputationOnline reputation
Online reputationesl2m
 
Anthony Merseal - Steps to Keep Your Computer Virus Free
Anthony Merseal - Steps to Keep Your Computer Virus Free Anthony Merseal - Steps to Keep Your Computer Virus Free
Anthony Merseal - Steps to Keep Your Computer Virus Free Anthony Merseal
 
Safe Internet Banking Cyber Security
Safe  Internet Banking Cyber SecuritySafe  Internet Banking Cyber Security
Safe Internet Banking Cyber SecurityKushantha Gunawardana
 
Cyber crime awareness
Cyber crime awarenessCyber crime awareness
Cyber crime awarenessArjun Chetry
 
A dozen dangerous myths about computer viruses
A dozen dangerous myths about computer virusesA dozen dangerous myths about computer viruses
A dozen dangerous myths about computer virusesUltraUploader
 
Cyber attacks during COVID-19 Era
Cyber attacks during COVID-19 EraCyber attacks during COVID-19 Era
Cyber attacks during COVID-19 EraPranav Kumar
 
Crontab Cyber Security session 3
Crontab Cyber Security session 3Crontab Cyber Security session 3
Crontab Cyber Security session 3gpioa
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usagetushki92
 

What's hot (19)

Cyber security
Cyber securityCyber security
Cyber security
 
001 ho basic computer
001 ho basic computer001 ho basic computer
001 ho basic computer
 
Security Awareness 9 10 09 V4 Best Prac
Security Awareness 9 10 09 V4 Best PracSecurity Awareness 9 10 09 V4 Best Prac
Security Awareness 9 10 09 V4 Best Prac
 
Internet Safety_Trinity (ELD&ULD)
Internet Safety_Trinity (ELD&ULD)Internet Safety_Trinity (ELD&ULD)
Internet Safety_Trinity (ELD&ULD)
 
Parent ed is_mh
Parent ed is_mhParent ed is_mh
Parent ed is_mh
 
IT Security DOs and DON'Ts
IT Security DOs and DON'TsIT Security DOs and DON'Ts
IT Security DOs and DON'Ts
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Anthony Merseal - Steps to Keep Your Computer Virus Free
Anthony Merseal - Steps to Keep Your Computer Virus Free Anthony Merseal - Steps to Keep Your Computer Virus Free
Anthony Merseal - Steps to Keep Your Computer Virus Free
 
Safe Internet Banking Cyber Security
Safe  Internet Banking Cyber SecuritySafe  Internet Banking Cyber Security
Safe Internet Banking Cyber Security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Pc security and_safety
Pc security and_safetyPc security and_safety
Pc security and_safety
 
Week 4 grade_4
Week 4 grade_4Week 4 grade_4
Week 4 grade_4
 
Cyber crime awareness
Cyber crime awarenessCyber crime awareness
Cyber crime awareness
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
ACESnWS cyber security tips
ACESnWS cyber security tipsACESnWS cyber security tips
ACESnWS cyber security tips
 
A dozen dangerous myths about computer viruses
A dozen dangerous myths about computer virusesA dozen dangerous myths about computer viruses
A dozen dangerous myths about computer viruses
 
Cyber attacks during COVID-19 Era
Cyber attacks during COVID-19 EraCyber attacks during COVID-19 Era
Cyber attacks during COVID-19 Era
 
Crontab Cyber Security session 3
Crontab Cyber Security session 3Crontab Cyber Security session 3
Crontab Cyber Security session 3
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usage
 

Similar to Cyber Security

6 Cyber Security Introduction - sec101-idtheft .pptx
6 Cyber Security Introduction - sec101-idtheft .pptx6 Cyber Security Introduction - sec101-idtheft .pptx
6 Cyber Security Introduction - sec101-idtheft .pptxDevenderDahiya9
 
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A  ....Salwan public schoolDev Abhijet Gagan Chaitanya VII-A  ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public schoolDevku45
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamJoelGautham
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)Cyber Security Infotech
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppWeSecureApp
 
Internet security
Internet securityInternet security
Internet securityrfukunaga
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptxUmaraZahidLecturer
 
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffComputer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffNicholas Davis
 
Module2_General_Security
Module2_General_SecurityModule2_General_Security
Module2_General_SecurityDulcey Whyte
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...David Menken
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety Sadaf Walliyani
 

Similar to Cyber Security (20)

6 Cyber Security Introduction - sec101-idtheft .pptx
6 Cyber Security Introduction - sec101-idtheft .pptx6 Cyber Security Introduction - sec101-idtheft .pptx
6 Cyber Security Introduction - sec101-idtheft .pptx
 
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A  ....Salwan public schoolDev Abhijet Gagan Chaitanya VII-A  ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
 
Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety
 
Module 5: Safety
Module 5: SafetyModule 5: Safety
Module 5: Safety
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 
Internet security
Internet securityInternet security
Internet security
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffComputer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
Module2_General_Security
Module2_General_SecurityModule2_General_Security
Module2_General_Security
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
 
IS100 Week 11
IS100 Week 11IS100 Week 11
IS100 Week 11
 
Security issues ethics in education chapter 8
Security issues ethics in education chapter 8Security issues ethics in education chapter 8
Security issues ethics in education chapter 8
 
cyber_security
cyber_securitycyber_security
cyber_security
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 

More from WonderingAriana (20)

Presentation
PresentationPresentation
Presentation
 
Practical biometrics
Practical biometricsPractical biometrics
Practical biometrics
 
Uses of Internet
Uses of InternetUses of Internet
Uses of Internet
 
Uses of Internet
Uses of InternetUses of Internet
Uses of Internet
 
Inset 2014 TLE
Inset 2014 TLEInset 2014 TLE
Inset 2014 TLE
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 
Tips in Powerpoint Presentation
Tips in Powerpoint PresentationTips in Powerpoint Presentation
Tips in Powerpoint Presentation
 
Uses of Powerpoint
Uses of PowerpointUses of Powerpoint
Uses of Powerpoint
 
Quick reference card
Quick reference cardQuick reference card
Quick reference card
 
Ms office ppt_2010_views
Ms office ppt_2010_viewsMs office ppt_2010_views
Ms office ppt_2010_views
 
L1 introenparts
L1 introenpartsL1 introenparts
L1 introenparts
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Objects and effects
Objects and effectsObjects and effects
Objects and effects
 
Picture effects
Picture effectsPicture effects
Picture effects
 
Animation effects
Animation effectsAnimation effects
Animation effects
 
Inserting Audio
Inserting AudioInserting Audio
Inserting Audio
 
Picture Effects
Picture EffectsPicture Effects
Picture Effects
 
Picture Effects
Picture EffectsPicture Effects
Picture Effects
 
Modifying Objects
Modifying ObjectsModifying Objects
Modifying Objects
 
Slide Layout
Slide LayoutSlide Layout
Slide Layout
 

Recently uploaded

How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 

Recently uploaded (20)

How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 

Cyber Security

  • 1. Commission on Information and Communications Technology Cyber SecurityCyber Security iSchools Project Team HUMAN CAPITAL DEVELOPMENT GROUP
  • 2. iSchools - CILC for Teachers 2 Internet • Positive: venue where people get together to communicate, exchange information, entertain, transact business, and understand how the world operates. • Negative: playground of crooked individuals and ruthless firms who take advantage of the freedom it maintains as well as its many weaknesses.
  • 3. iSchools - CILC for Teachers 3 Privacy? • E-mail is completely insecure. • Each e-mail you send results in at least 3 or 4 copies being stored on different computers. • You can take measures to protect your e-mail.
  • 4. iSchools - CILC for Teachers 4 Cyber Security Unfortunately, there's no 100% guarantee that even with the best precautions some of these things won't happen to you, but there are steps you can take to minimize the chances. BE RESPONSIBLE CYBER-CITIZENS! BE CYBER-SMART!
  • 5. iSchools - CILC for Teachers 5 Cyber Security • protecting digital information by preventing, detecting, and responding to attacks • recognize the risks and become familiar with terminology associated with them
  • 6. iSchools - CILC for Teachers 6 Security Settings • High, Medium, Low • Trust sites vs. Restricted sites • Internet & LAN content • Firewall • Filters
  • 7. iSchools - CILC for Teachers 7 Malicious Individuals • Hacker, attacker, or intruder –exploit weaknesses in software and computer systems for their own gain –intentions: sometimes benign and motivated solely by curiosity –actions: typically in violation of the intended use of the systems they are exploiting
  • 8. iSchools - CILC for Teachers 8 Malware • designed “to wreak havoc on personal computers and networks” by attaching to programs (“hosts”) and spreading from one program or storage device to another • ranging from silly pranks to data destruction/ theft
  • 9. iSchools - CILC for Teachers 9 Malware • Virus: attaches to various files and executes (infects the computer) when the host programs are run (or an email attachment is opened or a particular web page is visited) • Worm: propagates without user intervention via email, web sites, or network-based software, clogs the system via numerous reproductions • Logic Bomb: lies dormant until triggered by a certain event • Trojan Horse: unsuspicous delivery program of malware
  • 10. iSchools - CILC for Teachers 10 Spyware & Key Logger • Spyware (also called sneakware or stealthware) - software that comes hidden in free downloadable software – tracks your online movements – mines the information stored on your computer – uses your computer’s CPU and storage, slows it down • Key logger, or key trapper, software, -a program, when installed on a computer, records every keystroke and mouse click.
  • 11. iSchools - CILC for Teachers 11 Spyware • record keystrokes and steal private information for advertisers, hackers, and cyberthieves – Cookie - a small record deposited on your hard disk by a Web site containing information about you and your Web activities. – Adware - software to generate ads that installs itself on your computer when you download some other (usually free ) program from the Web. • Earthlink (ISP) study: average computer harbors 26 spyware programs
  • 12. iSchools - CILC for Teachers 12 Myths • Anti-virus software and firewalls are 100% effective. • Once software is installed on your computer, you do not have to worry about it anymore. • There is nothing important on your machine, so you do not need to protect it. • Attackers only target people with money. • When computers slow down, it means that they are old and should be replaced.
  • 13. iSchools - CILC for Teachers 13 Tips 1. Perform basic computer maintenance – firewall, data encryption, regular update of security patches – regularly run anti-virus and anti-spyware software 1. Don't open files from strangers/ unreliable sites – E-mail and IM – verify first 1. Help fight spam and online scams – use filters – be wary of phishing – check for secure pages (lock icon), server authentication, and message integrity – review the privacy policies of websites before entering information
  • 14. iSchools - CILC for Teachers 14 Tips 4. learn how to protect yourself from adware/spyware – Regularly run anti-spyware software – read license agreements of freeware against attached spyware 4. take precautions when you go wireless – convenient but with security risks 4. password-protect your computer—and lock it – as first line of defense 4. back up your work
  • 15. iSchools - CILC for Teachers 15 Safeguard your passwords! • Guidelines from Learn the Net.com: 1.Although passwords should be easily remembered, do not use passwords that refer to easily obtainable personal information, such as your name, address, phone number, or birthday. 2.Avoid using common words. 3.Passwords should be at least six alphanumeric characters – meaning, combine upper and lower case letters, numbers, and symbols, e.g. 2fjm0x@Ic. NOTE: Passwords are case-sensitive.
  • 16. iSchools - CILC for Teachers 16 Safeguard your passwords! • Guidelines from Learn the Net.com: 4.Ideally, use a different password for each service you register with. For sensitive accounts, such as financial services, change your passwords frequently. 5.Never ever disclose your password/s. Don’t have your computer “remember your password”.
  • 17. Commission on Information and Communications Technology www.us-cert.gov/cas/tips/ST04-001.html (US-CERT: US Computer Emergency Readiness Team) www.microsoft.com/athome/security/children/backtoschool.mspx www,learnthenet.com

Editor's Notes

  1. viruses erasing your entire system, someone breaking into your system and altering files, someone using your computer to attack others, or someone stealing your credit card information and making unauthorized purchases.