Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Security Awareness 9 10 04 V4 Wireless Connections


Published on

Wireless Connections

Published in: Education, Technology, Business
  • Be the first to comment

  • Be the first to like this

Security Awareness 9 10 04 V4 Wireless Connections

  1. 1. Many public places offer free wireless connections (WiFi). The convenience of WiFi can also be abused to illegally monitor and steal your data.<br />Sensitive Information & Wireless Connections<br />
  2. 2. Financial data& Wireless Connections<br />Section: Sensitive Information & Wireless<br />If you bank online or check your credit card statement on the Web, be sure to use a wired connection or encryption. <br />
  3. 3. Is the information safely transferred?<br />Section: Sensitive Information & Wireless<br />Safe transfer of Sensitive Information may be indicated by a number of items.<br /><ul><li>A lock on the website indicates that encryption will be used in transfer
  4. 4. Website addresses that start with https</li></ul><br />
  5. 5. Off-campus access to campus network<br />Section: Sensitive Information & Wireless<br />If you are off-campus and you need to connect to campus, use VPN software to establish a secure and encrypted data connection to campus.<br />
  6. 6. Off-campus access to campus network<br />Section: Sensitive Information & Wireless<br />Download the Cisco VPN software program available from <br />Any UNC-Chapel Hill affiliate with an Onyen may use this program. <br />Problems or Questions? Contact (919.962.HELP) or your departmental IT staff for assistance on downloading and installing any software from the ITS Shareware site. <br />
  7. 7. Learning Point # 4<br />Section: Sensitive Information & Wireless<br />You stop by Starbucks and realize that you need to email an urgent report to your supervisor. Even though you have your laptop with you, it is better to wait until you are in your office to send an email to your supervisor. Right?<br />Right!Wi-Fi hotspots, such as wireless connections in coffeehouses, are a common location for criminals to sniff wireless traffic. If you must use a wireless connection to connect to campus, use encryption provided by VPN software. <br />
  8. 8. Learning Point # 5<br />Section: Sensitive Information & Wireless<br />You check your gmail messages in the library, but since there is no other user in the terminal area, you do not need to log out of your account. Right?<br />Wrong! Many public access terminals do not have lock-out times and subsequent users can retrieve your personal information cached on Web sites. Logging out of Web sites is the only way to ensure that your login credentials can not be accessed by other users. <br />