SlideShare a Scribd company logo
1 of 24
Good Computer Security Practices
Basic Security Awareness
April 28, 2015
CSIRT/Rwanda
Overview
What is Information and Computer Security?
“Top 10 List” of Good Computer Security Practices
What is Information and
Computer Security?
… the protection of computing systems and the data that they
store or access.
Desktop computers Confidential data
Laptop computers Restricted data
Servers Personal information
Smartphones Archives
Pen drives Databases
Isn’t this just an IT Problem?
Why do I need to learn about
computer security?
Everyone who uses a computer needs to
understand how to keep his or her computer and
data secure.
• 10% of security safeguards are technical
• 90% of security safeguards rely on us – the
user - to adhere to good computing practices
Good security practices follow the
“90/10” rule
• Embarrassment to yourself and/or the Institution
• Having to recreate lost data
• Identity theft
• Data corruption or destruction
• Loss of patient, employee, and public trust
• Costly reporting requirements and penalties
• Disciplinary action (up to expulsion or termination)
• Unavailability of vital data
What are the consequences of
security violations?
“Top Ten List”
Good Computer Security Practices
1. Don’t keep restricted data
on portable devices.
2. Back-up your data.
• Make backups a regular task, ideally at least
once a day.
• Backup data to removable media such as
portable hard drives, CDs, DVDs, or a USB
memory stick.
• Store backup media safely and separately
from the equipment. Remember, your data
is valuable… don’t keep your backups in the
same physical location as your computer!
Data Backups (… continued)
• How effective would you be if your email, word processing
documents, excel spreadsheets and contact database were
wiped out?
• How many hours would it take to rebuild that information
from scratch?
3. Use cryptic passwords that can’t be easily
guessed and protect your passwords - don’t
write them down and don’t share them!
4. Make sure your computer has anti-virus, anti-
spyware and firewall protection as well as all
necessary security patches.
5. Don’t install unknown or unsolicited programs on
your computer.
“I’ll just keep finding new ways to break in!”
6. Practice safe e-mailing ~
• Don’t open, forward, or reply to suspicious e-mails
• Don’t open e-mail attachments or click on website addresses
• Delete spam
• Encrypt confidential emails using various methods
7. Practice safe Internet use ~
• Accessing any site on the internet could be tracked
back to your name and location.
• Accessing sites with questionable content often
results in spam or release of viruses.
• And it bears repeating…
Don’t download unknown
or unsolicited programs!
8. & 9. Physically secure your area and data when unattended ~
• Secure your files and portable equipment - including memory
sticks.
• Secure laptop computers with a lockdown cable.
• Never share your ID badge, access codes, cards, or key devices
(e.g. Axiom card)
10. Lock your screen
• For a PC ~
<ctrl> <alt> <delete> <enter> OR
<> <L>
• For a Mac ~
Configure screensaver with your
password Create a shortcut to activate
screensaver
• Use a password to start up or wake-up your
computer.
Which workstation security
safeguards are YOU responsible
for following and/or protecting?
a) User ID
b) Password
c) Log-off programs
d) Lock up office or work area (doors, windows)
e) All of the above
Which workstation security
safeguards are YOU responsible
for following and/or protecting?
a) User ID
b) Password
c) Log-off programs
d) Lock up office or work area (doors, windows)
e) All of the above
The mouse on your computer screen starts to move
around on its own and click on things on your desktop.
What do you do?
a) Show a faculty member or other students
b) Unplug network cable
c) Unplug your mouse
d) Report the incident to the SOC or System administrator
e) Turn your computer off
f) Run anti-virus software
g) All of the above
The mouse on your computer screen starts to move
around on its own and click on things on your desktop.
What do you do?
This is a security incident!
Immediately report the problem to whomever supports your computer, and
to CSIRT if the incident occurs while you are on duty and working on Public
institution
Since it is possible that someone is controlling the computer remotely, it is
best if you can unplug the network cable until you can get help.
What can an attacker do to your
computer?
a) Hide programs that launch attacks
b) Generate large volumes of unwanted traffic, slowing down the entire system
c) Distribute illegal software from your computer
d) Access restricted information (e.g. identity theft)
e) Record all of your keystrokes and get your passwords
A compromised computer can be used for all kinds of surprising things.
Other Good practices
Managing Restricted Data
• Know where data is stored.
• Destroy restricted data which
is no longer needed ~
Protect restricted data that you keep ~
back-up your data regularly
Restricted data includes:
• People personal information
• Health or medical information
• Social security numbers
• Date of birth
• Financial information (credit card
number, bank account number)
• Proprietary data and copyrighted
information
• Student records
• Information subject to a non-disclosure
agreement
Reporting Security Incidents
Immediately report anything unusual, suspected security incidents, or
breaches to whomever supports your computer, or CSIRT if it involves
a government institution.
CSIRT Customer Support:
Dial 4045
Loss or theft of any computing device with sensitive information MUST be reported immediately to
the Natioanl Police.
Thank you & God Bless You
Presented by Erick N GASANA
EC-council ECSA, CEH, CHFI certified

More Related Content

What's hot

Unauthorized access and use
Unauthorized access and useUnauthorized access and use
Unauthorized access and use
chrispaul8676
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
Atlantic Training, LLC.
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security
Ana Meskovska
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
Fred Beck MBA, CPA
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
Sadaf Walliyani
 

What's hot (20)

Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
Computer security
Computer securityComputer security
Computer security
 
Unauthorized access and use
Unauthorized access and useUnauthorized access and use
Unauthorized access and use
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security
 
Safety and security of data student work
Safety and security of data student workSafety and security of data student work
Safety and security of data student work
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Computer , Internet and physical security.
Computer , Internet and physical security.Computer , Internet and physical security.
Computer , Internet and physical security.
 
Threats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - ShimnaThreats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - Shimna
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
Securityawareness
SecurityawarenessSecurityawareness
Securityawareness
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information Security
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network Security
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Itsa end user 2013
Itsa end user 2013Itsa end user 2013
Itsa end user 2013
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
 
Information security
Information securityInformation security
Information security
 

Viewers also liked

MCSE Server Inftrastructure - MS
MCSE Server Inftrastructure - MSMCSE Server Inftrastructure - MS
MCSE Server Inftrastructure - MS
Lubabalo Manzi
 
AND GLOBAL Catelouge
AND GLOBAL CatelougeAND GLOBAL Catelouge
AND GLOBAL Catelouge
NILESH SAVLA
 
Sesion 6 resiliencia
Sesion 6 resilienciaSesion 6 resiliencia
Sesion 6 resiliencia
LNolbert
 

Viewers also liked (17)

Comp
CompComp
Comp
 
MCSE Server Inftrastructure - MS
MCSE Server Inftrastructure - MSMCSE Server Inftrastructure - MS
MCSE Server Inftrastructure - MS
 
Curso responsable de calidad
Curso responsable de calidadCurso responsable de calidad
Curso responsable de calidad
 
Rubbens cubomatic bakwanden nl-en-fr
Rubbens cubomatic bakwanden nl-en-fr Rubbens cubomatic bakwanden nl-en-fr
Rubbens cubomatic bakwanden nl-en-fr
 
Do Prolargentsize sex pills work?
Do Prolargentsize sex pills work?Do Prolargentsize sex pills work?
Do Prolargentsize sex pills work?
 
Texto 4 historia (corregido)
Texto 4 historia (corregido)Texto 4 historia (corregido)
Texto 4 historia (corregido)
 
창발 업사이클링 14115340 전선영
창발 업사이클링 14115340 전선영창발 업사이클링 14115340 전선영
창발 업사이클링 14115340 전선영
 
Html
HtmlHtml
Html
 
Boletín 121002
Boletín 121002Boletín 121002
Boletín 121002
 
Bridging-the-gap-Final-Web
Bridging-the-gap-Final-WebBridging-the-gap-Final-Web
Bridging-the-gap-Final-Web
 
Documentación del Sistemas de Gestión de la Calidad
Documentación del Sistemas de Gestión de la Calidad Documentación del Sistemas de Gestión de la Calidad
Documentación del Sistemas de Gestión de la Calidad
 
AND GLOBAL Catelouge
AND GLOBAL CatelougeAND GLOBAL Catelouge
AND GLOBAL Catelouge
 
Strategic Content Framework
Strategic Content FrameworkStrategic Content Framework
Strategic Content Framework
 
Proyecto de vida segundo
Proyecto de vida segundoProyecto de vida segundo
Proyecto de vida segundo
 
Date security introduction
Date security   introductionDate security   introduction
Date security introduction
 
Th true milk presentation
Th true milk presentationTh true milk presentation
Th true milk presentation
 
Sesion 6 resiliencia
Sesion 6 resilienciaSesion 6 resiliencia
Sesion 6 resiliencia
 

Similar to Basic_computerHygiene

itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
MansoorAhmed57263
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
Randy Bowman
 
6 Cyber Security Introduction - sec101-idtheft .pptx
6 Cyber Security Introduction - sec101-idtheft .pptx6 Cyber Security Introduction - sec101-idtheft .pptx
6 Cyber Security Introduction - sec101-idtheft .pptx
DevenderDahiya9
 
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11
mrmwood
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecurity
learnt
 

Similar to Basic_computerHygiene (20)

IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
 
Internet
InternetInternet
Internet
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Security and the Service Desk
Security and the Service DeskSecurity and the Service Desk
Security and the Service Desk
 
6 Cyber Security Introduction - sec101-idtheft .pptx
6 Cyber Security Introduction - sec101-idtheft .pptx6 Cyber Security Introduction - sec101-idtheft .pptx
6 Cyber Security Introduction - sec101-idtheft .pptx
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businesses
 
Types of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security ThreatsTypes of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security Threats
 
CyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdfCyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdf
 
it-security.ppt
it-security.pptit-security.ppt
it-security.ppt
 
IS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and PrivacyIS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and Privacy
 
Computer security
Computer securityComputer security
Computer security
 
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11
 
Baking Security into the Company Culture (2017)
Baking Security into the Company Culture (2017) Baking Security into the Company Culture (2017)
Baking Security into the Company Culture (2017)
 
Security in the enterprise - Why You Need It
Security in the enterprise - Why You Need ItSecurity in the enterprise - Why You Need It
Security in the enterprise - Why You Need It
 
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecurity
 

Basic_computerHygiene

  • 1. Good Computer Security Practices Basic Security Awareness April 28, 2015 CSIRT/Rwanda
  • 2. Overview What is Information and Computer Security? “Top 10 List” of Good Computer Security Practices What is Information and Computer Security?
  • 3. … the protection of computing systems and the data that they store or access. Desktop computers Confidential data Laptop computers Restricted data Servers Personal information Smartphones Archives Pen drives Databases
  • 4. Isn’t this just an IT Problem? Why do I need to learn about computer security? Everyone who uses a computer needs to understand how to keep his or her computer and data secure.
  • 5. • 10% of security safeguards are technical • 90% of security safeguards rely on us – the user - to adhere to good computing practices Good security practices follow the “90/10” rule
  • 6. • Embarrassment to yourself and/or the Institution • Having to recreate lost data • Identity theft • Data corruption or destruction • Loss of patient, employee, and public trust • Costly reporting requirements and penalties • Disciplinary action (up to expulsion or termination) • Unavailability of vital data What are the consequences of security violations?
  • 7.
  • 8. “Top Ten List” Good Computer Security Practices
  • 9. 1. Don’t keep restricted data on portable devices. 2. Back-up your data. • Make backups a regular task, ideally at least once a day. • Backup data to removable media such as portable hard drives, CDs, DVDs, or a USB memory stick. • Store backup media safely and separately from the equipment. Remember, your data is valuable… don’t keep your backups in the same physical location as your computer!
  • 10. Data Backups (… continued) • How effective would you be if your email, word processing documents, excel spreadsheets and contact database were wiped out? • How many hours would it take to rebuild that information from scratch?
  • 11. 3. Use cryptic passwords that can’t be easily guessed and protect your passwords - don’t write them down and don’t share them!
  • 12. 4. Make sure your computer has anti-virus, anti- spyware and firewall protection as well as all necessary security patches. 5. Don’t install unknown or unsolicited programs on your computer. “I’ll just keep finding new ways to break in!”
  • 13. 6. Practice safe e-mailing ~ • Don’t open, forward, or reply to suspicious e-mails • Don’t open e-mail attachments or click on website addresses • Delete spam • Encrypt confidential emails using various methods
  • 14. 7. Practice safe Internet use ~ • Accessing any site on the internet could be tracked back to your name and location. • Accessing sites with questionable content often results in spam or release of viruses. • And it bears repeating… Don’t download unknown or unsolicited programs!
  • 15. 8. & 9. Physically secure your area and data when unattended ~ • Secure your files and portable equipment - including memory sticks. • Secure laptop computers with a lockdown cable. • Never share your ID badge, access codes, cards, or key devices (e.g. Axiom card)
  • 16. 10. Lock your screen • For a PC ~ <ctrl> <alt> <delete> <enter> OR <> <L> • For a Mac ~ Configure screensaver with your password Create a shortcut to activate screensaver • Use a password to start up or wake-up your computer.
  • 17. Which workstation security safeguards are YOU responsible for following and/or protecting? a) User ID b) Password c) Log-off programs d) Lock up office or work area (doors, windows) e) All of the above
  • 18. Which workstation security safeguards are YOU responsible for following and/or protecting? a) User ID b) Password c) Log-off programs d) Lock up office or work area (doors, windows) e) All of the above
  • 19. The mouse on your computer screen starts to move around on its own and click on things on your desktop. What do you do? a) Show a faculty member or other students b) Unplug network cable c) Unplug your mouse d) Report the incident to the SOC or System administrator e) Turn your computer off f) Run anti-virus software g) All of the above
  • 20. The mouse on your computer screen starts to move around on its own and click on things on your desktop. What do you do? This is a security incident! Immediately report the problem to whomever supports your computer, and to CSIRT if the incident occurs while you are on duty and working on Public institution Since it is possible that someone is controlling the computer remotely, it is best if you can unplug the network cable until you can get help.
  • 21. What can an attacker do to your computer? a) Hide programs that launch attacks b) Generate large volumes of unwanted traffic, slowing down the entire system c) Distribute illegal software from your computer d) Access restricted information (e.g. identity theft) e) Record all of your keystrokes and get your passwords A compromised computer can be used for all kinds of surprising things.
  • 22. Other Good practices Managing Restricted Data • Know where data is stored. • Destroy restricted data which is no longer needed ~ Protect restricted data that you keep ~ back-up your data regularly Restricted data includes: • People personal information • Health or medical information • Social security numbers • Date of birth • Financial information (credit card number, bank account number) • Proprietary data and copyrighted information • Student records • Information subject to a non-disclosure agreement
  • 23. Reporting Security Incidents Immediately report anything unusual, suspected security incidents, or breaches to whomever supports your computer, or CSIRT if it involves a government institution. CSIRT Customer Support: Dial 4045 Loss or theft of any computing device with sensitive information MUST be reported immediately to the Natioanl Police.
  • 24. Thank you & God Bless You Presented by Erick N GASANA EC-council ECSA, CEH, CHFI certified