SlideShare a Scribd company logo
Presented By:
This tutorial provides some basic information and practical suggestions
for protecting your personal information and computer from cyber-
attacks. Cyber-safety topics covered include:
What is Cyber Safety?
Cyber Safety Threats
What are Cybercriminals?
Cyber-safety Actions
Cyber-safety at Home &Work
WHAT IS CYBER-SAFETY?
Cybersecurity refers to the
technologies and processes
designed to protect computers,
networks and data from
unauthorized access,
vulnerabilities and attacks
delivered via the Internet by
cyber criminals.
CYBER-SAFETY THREATS
• First, let’s talk about some common cyber-safety threats and the
problems they can cause
Viruses
Viruses infect computers through email attachments
and file sharing. They delete files, attack other
computers, and make your computer run slowly. One
infected computer can cause problems for all
computers on a network.
Hackers
Hackers are people who “trespass” into your computer from a
remote location. They may use your computer to send spam or
viruses, host a Web site, or do other activities that cause
computer malfunctions.
Identity Thieves
People who obtain unauthorized access to your
personal information, such as Social Security and
financial account numbers. They then use this
information to commit crimes such as fraud or theft.
Spyware
Spyware is software that “piggybacks” on programs you
download, gathers information about your online habits, and
transmits personal information without your knowledge. It may
also cause a wide range of other computer malfunctions.
What are Cybercriminals?
A cybercriminal is an individual who commits cybercrimes, where he/she
makes use of the computer either as a tool or as a target or as both.
Cybercriminals use computers in three broad ways:
1. Select computer as their target: These criminals attack other people's
computers to perform malicious activities, such as spreading viruses, data
theft, identity theft, etc.
2. Uses computer as their weapon: They use the computer to carry out
"conventional crime", such as spam, fraud, illegal gambling, etc.
3. Uses computer as their accessory: They use the computer to save stolen or
illegal data.
Roles of Cyber Criminals
Cybercriminals often work in organized groups. Some cybercriminal roles are:
1. Programmers: Write code or programs used by cybercriminal organization
2. Distributors: Distribute and sell stolen data and goods from associated cybercriminals
3. IT experts: Maintain a cybercriminal organization's IT infrastructure, such as servers,
encryption technologies and databases
4. Hackers: Exploit systems, applications and network vulnerabilities
5. Fraudsters: Create and deploy schemes like spam and phishing
6. System hosts and providers: Host sites and servers that possess illegal contents
7. Cashiers: Provide account names to cybercriminals and control drop accounts
8. Money mules: Manage bank account wire transfers
9. Tellers: Transfer and launder illegal money via digital and foreign exchange methods
10. Leaders: Often connected to big bosses of large criminal organizations. Assemble and direct
cybercriminal teams, and usually lack technical knowledge.
CYBER-SAFETYACTIONS
 The following slides describe the top seven actions you can take to
protect personal information and your computer. These actions will
help you meet the UC Davis Cyber-safety Program policy standards.
 By implementing all seven of these security measures, you will
protect yourself, others, and your computer from many common
threats.
 In most cases, implementing each of these security measures will only
take a few minutes.
TOP SEVEN CYBER-SAFETY ACTIONS
1. Install OS/Software Updates 2. Run Anti-virus Software
3. Prevent Identity Theft 4. Turn on Personal Firewalls
5. Avoid Spyware/Adware
7. Back up Important Files
6. Protect Passwords
Install OS/Software Updates
 Updates-sometimes called patches-fix problems with your
operating system (OS) (e.g., Windows XP, Windows Vista,
Mac OS X) and software programs (e.g., Microsoft Office
applications).
 Most new operating systems are set to download updates by
default. After updates are downloaded, you will be asked to
install them. Click yes!
 To download patches for your system and software, visit
your OS update center.
 Be sure to restart your computer after updates are installed
so that the patches can be applied immediately.
Run Anti-Virus Software
Many computers come pre-installed with certain
anti-virus software, but if not, or if you want
more powerful software, research online to find
what product suits you. Anti-virus software is
crucial to keep your computer healthy. A "sick"
computer, or one racked with viruses, is more
susceptible to hacking. Set your preferences so
your anti-virus software updates automatically.
Prevent Identity Theft
Identity thieves steal your personal information to commit fraud. They can damage your credit
status and cost you time and money restoring your good name. To reduce your risk of becoming a
victim, follow the tips below:
• Don't carry your Social Security card in your wallet or write it on your checks. Only give out
your SSN when absolutely necessary.
• Protect your PIN. Never write a PIN on a credit/debit card or on a slip of paper kept in your
wallet.
• Watch out for "shoulder surfers". Use your free hand to shield the keypad when using pay
phones and ATMs.
• Collect mail promptly. Ask the post office to put your mail on hold when you are away from
home for more than a day or two.
• Pay attention to your billing cycles. If bills or financial statements are late, contact the sender.
• Keep your receipts. Ask for carbons and incorrect charge slips as well. Promptly compare
receipts with account statements. Watch for unauthorized transactions.
• Tear up or shred unwanted receipts, credit offers, account statements, expired cards, etc., to
prevent dumpster divers getting your personal information.
• Store personal information in a safe place at home and at work. Don't leave it lying around.
Turn on Personal Firewalls
Check your computer's security settings
for a built-in personal firewall. If you
have one, turn it on. Microsoft
Windows 7,8 and 10 and Mac OSX
have built-in firewalls.
Avoid Spyware/Adware
Spyware can log your keystrokes as you type, then
send your user names and passwords back to the
software's authors.
Spyware is software that resides on a computer and
sends information to its creator. That information
may include surfing habits, system details or, in its
most dangerous form, passwords and login
information for critical applications such as online
banking. Many spyware programs are more annoying
than dangerous, serving up pop-up ads or gathering e-
mail addresses for use in spam campaigns. Even
those programs, however, can cost you valuable time
and computing resources.
Protect Passwords
 Do not share your passwords, and always make new passwords difficult to
guess by avoiding dictionary words, and mixing letters, numbers and
punctuation.
 Do not use one of these common passwords or any variation of them:
qwerty1, abc123, let mein, password1, iloveyou1, (yourname1),
baseball1.
 Change your passwords periodically.
 When choosing a password:
o Mix upper and lower case letters
o Use a minimum of 8 characters
o Use mnemonics to help you remember a difficult password
 Store passwords in a safe place. Consider using KeePass Password Safe
“http://keepass.info/”, Keychain (Mac) or an encrypted USB drive to store
passwords. Avoid keeping passwords on a Post-it under your keyboard, on
your monitor or in a drawer near your computer!
Back Up Important Files
 Reduce your risk of losing important files to a virus, computer crash, theft
or disaster by creating back-up copies.
 Keep your critical files in one place on your computer’s hard drive so you
can easily create a back up copy.
 Save copies of your important documents and files to a CD, online back up
service, flash or USB drive, or a server.
 Store your back-up media in a secure place away from your computer, in
case of fire or theft.
 Test your back up media periodically to make sure the files are accessible
and readable.
CYBER-SAFETYAT HOME
 Physically secure your computer by using security cables and locking
doors and windows in the dorms and off-campus housing.
 Avoid leaving your laptop unsupervised and in plain view in the
library or coffee house, or in your car, dorm room or home.
 Set up a user account and password to prevent unauthorized access to
your computer files.
 Do not install unnecessary programs on your computer.
CYBER-SAFETYAT WORK
 Be sure to work with your technical support coordinator before
implementing new cyber-safety measures.
 Talk with your technical support coordinator about what cyber-safety
measures are in place in your department.
 Report to your supervisor any cyber-safety policy violations, security
flaws/weaknesses you discover or any suspicious activity by unauthorized
individuals in your work area.
 Physically secure your computer by using security cables and locking
building/office doors and windows.
 Do not install unnecessary programs on your work computer.
Cyber Security

More Related Content

What's hot

Computer security
Computer securityComputer security
Computer security
Univ of Salamanca
 
Threats to information security
Threats to information securityThreats to information security
Threats to information securityswapneel07
 
Computer Security
Computer SecurityComputer Security
Computer Security
William Mann
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
NetWatcher
 
Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)
Gian Gentile
 
Threats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - ShimnaThreats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - Shimna
Chinnu Shimna
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
davidcurriecia
 
Internet Security
Internet SecurityInternet Security
Internet Security
mjelson
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
Dnyaneshwar Beedkar
 
Computer Security
Computer SecurityComputer Security
Computer Security
Frederik Questier
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
Arzath Areeff
 
Computer Security
Computer SecurityComputer Security
Computer Security
Cristian Mihai
 
Online reputation
Online reputationOnline reputation
Online reputationesl2m
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)
Cyber Security Infotech
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
PriSim
 
Computer security
Computer securityComputer security
Computer security
Shashi Chandra
 

What's hot (20)

Computer security
Computer securityComputer security
Computer security
 
cyber_security
cyber_securitycyber_security
cyber_security
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Computer security and
Computer security andComputer security and
Computer security and
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)
 
Threats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - ShimnaThreats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - Shimna
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
INTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDSINTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDS
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Computer security
Computer securityComputer security
Computer security
 

Similar to Cyber Security

Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety
Tawose Olamide Timothy
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
pinkutinku26
 
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
Smt. Indira Gandhi College of Engineering, Navi Mumbai, Mumbai
 
It security,malware,phishing,information theft
It security,malware,phishing,information theftIt security,malware,phishing,information theft
It security,malware,phishing,information theft
Deepak John
 
User security awareness
User security awarenessUser security awareness
User security awareness
K. A. M Lutfullah
 
Internet security
Internet securityInternet security
Internet security
rfukunaga
 
Internet
InternetInternet
Internet
youssefchefcher
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
UmaraZahidLecturer
 
SAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdfSAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdf
ssusera0b94b
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4leahg118
 
IT Security.pdf
IT Security.pdfIT Security.pdf
IT Security.pdf
HugoReglezRodrguez
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
MuhammadRobeel3
 
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffComputer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
Nicholas Davis
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
Mustafa Amiri
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A  ....Salwan public schoolDev Abhijet Gagan Chaitanya VII-A  ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
Devku45
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the Cloud
Nordic Backup
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)
Cyber Security Infotech
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
Kirti Verma
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
tunzida045
 

Similar to Cyber Security (20)

Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
 
It security,malware,phishing,information theft
It security,malware,phishing,information theftIt security,malware,phishing,information theft
It security,malware,phishing,information theft
 
User security awareness
User security awarenessUser security awareness
User security awareness
 
Internet security
Internet securityInternet security
Internet security
 
Internet
InternetInternet
Internet
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
 
SAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdfSAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdf
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4
 
IT Security.pdf
IT Security.pdfIT Security.pdf
IT Security.pdf
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffComputer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A  ....Salwan public schoolDev Abhijet Gagan Chaitanya VII-A  ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the Cloud
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 

Recently uploaded

openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
Shane Coughlan
 
Pro Unity Game Development with C-sharp Book
Pro Unity Game Development with C-sharp BookPro Unity Game Development with C-sharp Book
Pro Unity Game Development with C-sharp Book
abdulrafaychaudhry
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
Aftab Hussain
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
Donna Lenk
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
Neo4j
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
Ortus Solutions, Corp
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Globus
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
Matt Welsh
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
takuyayamamoto1800
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
NYGGS Automation Suite
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
Max Andersen
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppAI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
Google
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Shahin Sheidaei
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Globus
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Neo4j
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
Globus
 
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Globus
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
Globus
 

Recently uploaded (20)

openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
 
Pro Unity Game Development with C-sharp Book
Pro Unity Game Development with C-sharp BookPro Unity Game Development with C-sharp Book
Pro Unity Game Development with C-sharp Book
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppAI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
 
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
 

Cyber Security

  • 1.
  • 3. This tutorial provides some basic information and practical suggestions for protecting your personal information and computer from cyber- attacks. Cyber-safety topics covered include: What is Cyber Safety? Cyber Safety Threats What are Cybercriminals? Cyber-safety Actions Cyber-safety at Home &Work
  • 4. WHAT IS CYBER-SAFETY? Cybersecurity refers to the technologies and processes designed to protect computers, networks and data from unauthorized access, vulnerabilities and attacks delivered via the Internet by cyber criminals.
  • 5. CYBER-SAFETY THREATS • First, let’s talk about some common cyber-safety threats and the problems they can cause Viruses Viruses infect computers through email attachments and file sharing. They delete files, attack other computers, and make your computer run slowly. One infected computer can cause problems for all computers on a network. Hackers Hackers are people who “trespass” into your computer from a remote location. They may use your computer to send spam or viruses, host a Web site, or do other activities that cause computer malfunctions. Identity Thieves People who obtain unauthorized access to your personal information, such as Social Security and financial account numbers. They then use this information to commit crimes such as fraud or theft. Spyware Spyware is software that “piggybacks” on programs you download, gathers information about your online habits, and transmits personal information without your knowledge. It may also cause a wide range of other computer malfunctions.
  • 6. What are Cybercriminals? A cybercriminal is an individual who commits cybercrimes, where he/she makes use of the computer either as a tool or as a target or as both. Cybercriminals use computers in three broad ways: 1. Select computer as their target: These criminals attack other people's computers to perform malicious activities, such as spreading viruses, data theft, identity theft, etc. 2. Uses computer as their weapon: They use the computer to carry out "conventional crime", such as spam, fraud, illegal gambling, etc. 3. Uses computer as their accessory: They use the computer to save stolen or illegal data.
  • 7. Roles of Cyber Criminals Cybercriminals often work in organized groups. Some cybercriminal roles are: 1. Programmers: Write code or programs used by cybercriminal organization 2. Distributors: Distribute and sell stolen data and goods from associated cybercriminals 3. IT experts: Maintain a cybercriminal organization's IT infrastructure, such as servers, encryption technologies and databases 4. Hackers: Exploit systems, applications and network vulnerabilities 5. Fraudsters: Create and deploy schemes like spam and phishing 6. System hosts and providers: Host sites and servers that possess illegal contents 7. Cashiers: Provide account names to cybercriminals and control drop accounts 8. Money mules: Manage bank account wire transfers 9. Tellers: Transfer and launder illegal money via digital and foreign exchange methods 10. Leaders: Often connected to big bosses of large criminal organizations. Assemble and direct cybercriminal teams, and usually lack technical knowledge.
  • 8. CYBER-SAFETYACTIONS  The following slides describe the top seven actions you can take to protect personal information and your computer. These actions will help you meet the UC Davis Cyber-safety Program policy standards.  By implementing all seven of these security measures, you will protect yourself, others, and your computer from many common threats.  In most cases, implementing each of these security measures will only take a few minutes.
  • 9. TOP SEVEN CYBER-SAFETY ACTIONS 1. Install OS/Software Updates 2. Run Anti-virus Software 3. Prevent Identity Theft 4. Turn on Personal Firewalls 5. Avoid Spyware/Adware 7. Back up Important Files 6. Protect Passwords
  • 10. Install OS/Software Updates  Updates-sometimes called patches-fix problems with your operating system (OS) (e.g., Windows XP, Windows Vista, Mac OS X) and software programs (e.g., Microsoft Office applications).  Most new operating systems are set to download updates by default. After updates are downloaded, you will be asked to install them. Click yes!  To download patches for your system and software, visit your OS update center.  Be sure to restart your computer after updates are installed so that the patches can be applied immediately.
  • 11. Run Anti-Virus Software Many computers come pre-installed with certain anti-virus software, but if not, or if you want more powerful software, research online to find what product suits you. Anti-virus software is crucial to keep your computer healthy. A "sick" computer, or one racked with viruses, is more susceptible to hacking. Set your preferences so your anti-virus software updates automatically.
  • 12. Prevent Identity Theft Identity thieves steal your personal information to commit fraud. They can damage your credit status and cost you time and money restoring your good name. To reduce your risk of becoming a victim, follow the tips below: • Don't carry your Social Security card in your wallet or write it on your checks. Only give out your SSN when absolutely necessary. • Protect your PIN. Never write a PIN on a credit/debit card or on a slip of paper kept in your wallet. • Watch out for "shoulder surfers". Use your free hand to shield the keypad when using pay phones and ATMs. • Collect mail promptly. Ask the post office to put your mail on hold when you are away from home for more than a day or two. • Pay attention to your billing cycles. If bills or financial statements are late, contact the sender. • Keep your receipts. Ask for carbons and incorrect charge slips as well. Promptly compare receipts with account statements. Watch for unauthorized transactions. • Tear up or shred unwanted receipts, credit offers, account statements, expired cards, etc., to prevent dumpster divers getting your personal information. • Store personal information in a safe place at home and at work. Don't leave it lying around.
  • 13. Turn on Personal Firewalls Check your computer's security settings for a built-in personal firewall. If you have one, turn it on. Microsoft Windows 7,8 and 10 and Mac OSX have built-in firewalls.
  • 14. Avoid Spyware/Adware Spyware can log your keystrokes as you type, then send your user names and passwords back to the software's authors. Spyware is software that resides on a computer and sends information to its creator. That information may include surfing habits, system details or, in its most dangerous form, passwords and login information for critical applications such as online banking. Many spyware programs are more annoying than dangerous, serving up pop-up ads or gathering e- mail addresses for use in spam campaigns. Even those programs, however, can cost you valuable time and computing resources.
  • 15. Protect Passwords  Do not share your passwords, and always make new passwords difficult to guess by avoiding dictionary words, and mixing letters, numbers and punctuation.  Do not use one of these common passwords or any variation of them: qwerty1, abc123, let mein, password1, iloveyou1, (yourname1), baseball1.  Change your passwords periodically.  When choosing a password: o Mix upper and lower case letters o Use a minimum of 8 characters o Use mnemonics to help you remember a difficult password  Store passwords in a safe place. Consider using KeePass Password Safe “http://keepass.info/”, Keychain (Mac) or an encrypted USB drive to store passwords. Avoid keeping passwords on a Post-it under your keyboard, on your monitor or in a drawer near your computer!
  • 16. Back Up Important Files  Reduce your risk of losing important files to a virus, computer crash, theft or disaster by creating back-up copies.  Keep your critical files in one place on your computer’s hard drive so you can easily create a back up copy.  Save copies of your important documents and files to a CD, online back up service, flash or USB drive, or a server.  Store your back-up media in a secure place away from your computer, in case of fire or theft.  Test your back up media periodically to make sure the files are accessible and readable.
  • 17. CYBER-SAFETYAT HOME  Physically secure your computer by using security cables and locking doors and windows in the dorms and off-campus housing.  Avoid leaving your laptop unsupervised and in plain view in the library or coffee house, or in your car, dorm room or home.  Set up a user account and password to prevent unauthorized access to your computer files.  Do not install unnecessary programs on your computer.
  • 18. CYBER-SAFETYAT WORK  Be sure to work with your technical support coordinator before implementing new cyber-safety measures.  Talk with your technical support coordinator about what cyber-safety measures are in place in your department.  Report to your supervisor any cyber-safety policy violations, security flaws/weaknesses you discover or any suspicious activity by unauthorized individuals in your work area.  Physically secure your computer by using security cables and locking building/office doors and windows.  Do not install unnecessary programs on your work computer.