Cybersafety is the safe and responsible use of information and communication technology. It is about keeping information safe and secure, but also about being responsible with that information, being respectful of other people online, and using good 'netiquette' (internet etiquette).
This presentation includes 60+ slides that mainly deals with three Computer Security aspects i.e
1. Security Attacks and Threats
2. Security Services
3. Security Mechanisms
Along with that we've also includes Security Awareness and Security Policies
This presentation includes 60+ slides that mainly deals with three Computer Security aspects i.e
1. Security Attacks and Threats
2. Security Services
3. Security Mechanisms
Along with that we've also includes Security Awareness and Security Policies
Cyber Security Awareness (Reduce Personal & Business Risk)Gian Gentile
Information Technology is evolving at rapid speeds, and so are the cyber threats / hackers. SecurityRI.com created this SlideShare to help bring awareness to the end-users. Each slide helps explain the threats, and ways to avoid / reduce your exposure.
Please contact us with any questions, and be sure to follow our company account on LinkedIn for daily updates / informational tips.
Thank you!
F. Questier, Computer security, workshop for Lib@web international training program 'Management of Electronic Information and Digital Libraries', university of Antwerp, October 2015
Cyber security awareness training by cyber security infotech(csi), Information Security,
website development company,
Employee Monitoring System,
Employee Monitoring Software
Computer security threats & prevention,Its a proper introduction about computer security and threats and prevention with reference. Have info about threats and their prevention.
Cyber crime & security
If we can defeat them sitting at home……who needs to fight with tanks and guns!!!!
Introduction
Cyber Crime
- What Is Cyber Crime?
- Types Of Cyber Crime
Cyber Security
- What Is Cyber Security?
- Top Seven Cyber Safety Actions
- Cyber Safety At Work & Home
Coclusion
INRTODUCTION
This tutorial provides some basic information about “Cyber Crime” and practical suggestions for protecting your personal information and computer from cyber-attacks i.e. “Cyber Security”!!!
What Is Cyber Crime ?
Cybercrime is nothing but where the computer used as an object or subject of crime!
Crime committed using a computer and the internet to steal a person’s identity!!
Cyber Security Awareness (Reduce Personal & Business Risk)Gian Gentile
Information Technology is evolving at rapid speeds, and so are the cyber threats / hackers. SecurityRI.com created this SlideShare to help bring awareness to the end-users. Each slide helps explain the threats, and ways to avoid / reduce your exposure.
Please contact us with any questions, and be sure to follow our company account on LinkedIn for daily updates / informational tips.
Thank you!
F. Questier, Computer security, workshop for Lib@web international training program 'Management of Electronic Information and Digital Libraries', university of Antwerp, October 2015
Cyber security awareness training by cyber security infotech(csi), Information Security,
website development company,
Employee Monitoring System,
Employee Monitoring Software
Computer security threats & prevention,Its a proper introduction about computer security and threats and prevention with reference. Have info about threats and their prevention.
Cyber crime & security
If we can defeat them sitting at home……who needs to fight with tanks and guns!!!!
Introduction
Cyber Crime
- What Is Cyber Crime?
- Types Of Cyber Crime
Cyber Security
- What Is Cyber Security?
- Top Seven Cyber Safety Actions
- Cyber Safety At Work & Home
Coclusion
INRTODUCTION
This tutorial provides some basic information about “Cyber Crime” and practical suggestions for protecting your personal information and computer from cyber-attacks i.e. “Cyber Security”!!!
What Is Cyber Crime ?
Cybercrime is nothing but where the computer used as an object or subject of crime!
Crime committed using a computer and the internet to steal a person’s identity!!
Introduction
Cyber Crime
- What Is Cyber Crime?
- Types Of Cyber Crime
Cyber Security
- What Is Cyber Security?
- Top Seven Cyber Safety Actions
- Cyber Safety At Work & Hom
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
IT security, hackers,IT security and risks and safe guards, password, how to create password, bio-metric authentication , virus , antivirus software ,how to safe a devices from virus.types of viruses
Introduction
What is Cyber Crime?
Computer crime, or cybercrime, is crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target.
What is Cyber Security?
C
yber security, also known as computer security or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. It includes controlling physical access to the hardware, as well as protecting against harm that may come via network access, data and code injection and due to malpractice by operators,whether intentional, accidental, or due to them being tricked into deviating from secure procedures.
The field is of growing importance due to the increasing reliance on computer systems in most societies and the growth of "smart" devices,including smartphones, televisions and tiny devices as part of the Internet of Things – and of the Internet and wireless network such as Bluetooth and Wi-Fi.
Some organizations are turning to big data platforms, such as Apache Hadoop, to extend data accessibility and machine learning to detect advanced persistent threats.
Vulnerabilities and Attacks
Vulnerability is a system susceptibility or flaw, and much vulnerability are documented in the Common Vulnerabilities and Exposures (CVE) database and vulnerability management is the cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities as they are discovered.
An exploitable vulnerability is one for which at least one working attack or "exploit" exists.
To secure a computer system, it is important to understand the attacks that can be made against it, and these threats can typically be classified into one of the categories below.
An introduction to cyber security by cyber security infotech pvt ltd(csi)Cyber Security Infotech
An introduction to cyber security by cyber security infotech pvt ltd(csi). we are website development company and provide Information Security, Employee Monitoring System, Employee Monitoring Software.
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
In essence, computer security is the safeguarding of data and computer systems against loss, theft, and unauthorized access. It involves keeping an eye out for and stopping illegal use of your computer system.
A variety of computer security techniques are frequently employed to safeguard the critical data held by an organization cyber security.
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeAftab Hussain
Understanding variable roles in code has been found to be helpful by students
in learning programming -- could variable roles help deep neural models in
performing coding tasks? We do an exploratory study.
- These are slides of the talk given at InteNSE'23: The 1st International Workshop on Interpretability and Robustness in Neural Software Engineering, co-located with the 45th International Conference on Software Engineering, ICSE 2023, Melbourne Australia
Navigating the Metaverse: A Journey into Virtual Evolution"Donna Lenk
Join us for an exploration of the Metaverse's evolution, where innovation meets imagination. Discover new dimensions of virtual events, engage with thought-provoking discussions, and witness the transformative power of digital realms."
GraphSummit Paris - The art of the possible with Graph TechnologyNeo4j
Sudhir Hasbe, Chief Product Officer, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Unleash Unlimited Potential with One-Time Purchase
BoxLang is more than just a language; it's a community. By choosing a Visionary License, you're not just investing in your success, you're actively contributing to the ongoing development and support of BoxLang.
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Globus
Large Language Models (LLMs) are currently the center of attention in the tech world, particularly for their potential to advance research. In this presentation, we'll explore a straightforward and effective method for quickly initiating inference runs on supercomputers using the vLLM tool with Globus Compute, specifically on the Polaris system at ALCF. We'll begin by briefly discussing the popularity and applications of LLMs in various fields. Following this, we will introduce the vLLM tool, and explain how it integrates with Globus Compute to efficiently manage LLM operations on Polaris. Attendees will learn the practical aspects of setting up and remotely triggering LLMs from local machines, focusing on ease of use and efficiency. This talk is ideal for researchers and practitioners looking to leverage the power of LLMs in their work, offering a clear guide to harnessing supercomputing resources for quick and effective LLM inference.
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns
Unlocking Business Potential: Tailored Technology Solutions by Prosigns
Discover how Prosigns, a leading technology solutions provider, partners with businesses to drive innovation and success. Our presentation showcases our comprehensive range of services, including custom software development, web and mobile app development, AI & ML solutions, blockchain integration, DevOps services, and Microsoft Dynamics 365 support.
Custom Software Development: Prosigns specializes in creating bespoke software solutions that cater to your unique business needs. Our team of experts works closely with you to understand your requirements and deliver tailor-made software that enhances efficiency and drives growth.
Web and Mobile App Development: From responsive websites to intuitive mobile applications, Prosigns develops cutting-edge solutions that engage users and deliver seamless experiences across devices.
AI & ML Solutions: Harnessing the power of Artificial Intelligence and Machine Learning, Prosigns provides smart solutions that automate processes, provide valuable insights, and drive informed decision-making.
Blockchain Integration: Prosigns offers comprehensive blockchain solutions, including development, integration, and consulting services, enabling businesses to leverage blockchain technology for enhanced security, transparency, and efficiency.
DevOps Services: Prosigns' DevOps services streamline development and operations processes, ensuring faster and more reliable software delivery through automation and continuous integration.
Microsoft Dynamics 365 Support: Prosigns provides comprehensive support and maintenance services for Microsoft Dynamics 365, ensuring your system is always up-to-date, secure, and running smoothly.
Learn how our collaborative approach and dedication to excellence help businesses achieve their goals and stay ahead in today's digital landscape. From concept to deployment, Prosigns is your trusted partner for transforming ideas into reality and unlocking the full potential of your business.
Join us on a journey of innovation and growth. Let's partner for success with Prosigns.
Large Language Models and the End of ProgrammingMatt Welsh
Talk by Matt Welsh at Craft Conference 2024 on the impact that Large Language Models will have on the future of software development. In this talk, I discuss the ways in which LLMs will impact the software industry, from replacing human software developers with AI, to replacing conventional software with models that perform reasoning, computation, and problem-solving.
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamtakuyayamamoto1800
In this slide, we show the simulation example and the way to compile this solver.
In this solver, the Helmholtz equation can be solved by helmholtzFoam. Also, the Helmholtz equation with uniformly dispersed bubbles can be simulated by helmholtzBubbleFoam.
Enterprise Resource Planning System includes various modules that reduce any business's workload. Additionally, it organizes the workflows, which drives towards enhancing productivity. Here are a detailed explanation of the ERP modules. Going through the points will help you understand how the software is changing the work dynamics.
To know more details here: https://blogs.nyggs.com/nyggs/enterprise-resource-planning-erp-system-modules/
Quarkus Hidden and Forbidden ExtensionsMax Andersen
Quarkus has a vast extension ecosystem and is known for its subsonic and subatomic feature set. Some of these features are not as well known, and some extensions are less talked about, but that does not make them less interesting - quite the opposite.
Come join this talk to see some tips and tricks for using Quarkus and some of the lesser known features, extensions and development techniques.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppGoogle
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
👉👉 Click Here To Get More Info 👇👇
https://sumonreview.com/ai-fusion-buddy-review
AI Fusion Buddy Review: Key Features
✅Create Stunning AI App Suite Fully Powered By Google's Latest AI technology, Gemini
✅Use Gemini to Build high-converting Converting Sales Video Scripts, ad copies, Trending Articles, blogs, etc.100% unique!
✅Create Ultra-HD graphics with a single keyword or phrase that commands 10x eyeballs!
✅Fully automated AI articles bulk generation!
✅Auto-post or schedule stunning AI content across all your accounts at once—WordPress, Facebook, LinkedIn, Blogger, and more.
✅With one keyword or URL, generate complete websites, landing pages, and more…
✅Automatically create & sell AI content, graphics, websites, landing pages, & all that gets you paid non-stop 24*7.
✅Pre-built High-Converting 100+ website Templates and 2000+ graphic templates logos, banners, and thumbnail images in Trending Niches.
✅Say goodbye to wasting time logging into multiple Chat GPT & AI Apps once & for all!
✅Save over $5000 per year and kick out dependency on third parties completely!
✅Brand New App: Not available anywhere else!
✅ Beginner-friendly!
✅ZERO upfront cost or any extra expenses
✅Risk-Free: 30-Day Money-Back Guarantee!
✅Commercial License included!
See My Other Reviews Article:
(1) AI Genie Review: https://sumonreview.com/ai-genie-review
(2) SocioWave Review: https://sumonreview.com/sociowave-review
(3) AI Partner & Profit Review: https://sumonreview.com/ai-partner-profit-review
(4) AI Ebook Suite Review: https://sumonreview.com/ai-ebook-suite-review
#AIFusionBuddyReview,
#AIFusionBuddyFeatures,
#AIFusionBuddyPricing,
#AIFusionBuddyProsandCons,
#AIFusionBuddyTutorial,
#AIFusionBuddyUserExperience
#AIFusionBuddyforBeginners,
#AIFusionBuddyBenefits,
#AIFusionBuddyComparison,
#AIFusionBuddyInstallation,
#AIFusionBuddyRefundPolicy,
#AIFusionBuddyDemo,
#AIFusionBuddyMaintenanceFees,
#AIFusionBuddyNewbieFriendly,
#WhatIsAIFusionBuddy?,
#HowDoesAIFusionBuddyWorks
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Shahin Sheidaei
Games are powerful teaching tools, fostering hands-on engagement and fun. But they require careful consideration to succeed. Join me to explore factors in running and selecting games, ensuring they serve as effective teaching tools. Learn to maintain focus on learning objectives while playing, and how to measure the ROI of gaming in education. Discover strategies for pitching gaming to leadership. This session offers insights, tips, and examples for coaches, team leads, and enterprise leaders seeking to teach from simple to complex concepts.
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisGlobus
JASMIN is the UK’s high-performance data analysis platform for environmental science, operated by STFC on behalf of the UK Natural Environment Research Council (NERC). In addition to its role in hosting the CEDA Archive (NERC’s long-term repository for climate, atmospheric science & Earth observation data in the UK), JASMIN provides a collaborative platform to a community of around 2,000 scientists in the UK and beyond, providing nearly 400 environmental science projects with working space, compute resources and tools to facilitate their work. High-performance data transfer into and out of JASMIN has always been a key feature, with many scientists bringing model outputs from supercomputers elsewhere in the UK, to analyse against observational or other model data in the CEDA Archive. A growing number of JASMIN users are now realising the benefits of using the Globus service to provide reliable and efficient data movement and other tasks in this and other contexts. Further use cases involve long-distance (intercontinental) transfers to and from JASMIN, and collecting results from a mobile atmospheric radar system, pushing data to JASMIN via a lightweight Globus deployment. We provide details of how Globus fits into our current infrastructure, our experience of the recent migration to GCSv5.4, and of our interest in developing use of the wider ecosystem of Globus services for the benefit of our user community.
Atelier - Innover avec l’IA Générative et les graphes de connaissancesNeo4j
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Allez au-delà du battage médiatique autour de l’IA et découvrez des techniques pratiques pour utiliser l’IA de manière responsable à travers les données de votre organisation. Explorez comment utiliser les graphes de connaissances pour augmenter la précision, la transparence et la capacité d’explication dans les systèmes d’IA générative. Vous partirez avec une expérience pratique combinant les relations entre les données et les LLM pour apporter du contexte spécifique à votre domaine et améliorer votre raisonnement.
Amenez votre ordinateur portable et nous vous guiderons sur la mise en place de votre propre pile d’IA générative, en vous fournissant des exemples pratiques et codés pour démarrer en quelques minutes.
How to Position Your Globus Data Portal for Success Ten Good PracticesGlobus
Science gateways allow science and engineering communities to access shared data, software, computing services, and instruments. Science gateways have gained a lot of traction in the last twenty years, as evidenced by projects such as the Science Gateways Community Institute (SGCI) and the Center of Excellence on Science Gateways (SGX3) in the US, The Australian Research Data Commons (ARDC) and its platforms in Australia, and the projects around Virtual Research Environments in Europe. A few mature frameworks have evolved with their different strengths and foci and have been taken up by a larger community such as the Globus Data Portal, Hubzero, Tapis, and Galaxy. However, even when gateways are built on successful frameworks, they continue to face the challenges of ongoing maintenance costs and how to meet the ever-expanding needs of the community they serve with enhanced features. It is not uncommon that gateways with compelling use cases are nonetheless unable to get past the prototype phase and become a full production service, or if they do, they don't survive more than a couple of years. While there is no guaranteed pathway to success, it seems likely that for any gateway there is a need for a strong community and/or solid funding streams to create and sustain its success. With over twenty years of examples to draw from, this presentation goes into detail for ten factors common to successful and enduring gateways that effectively serve as best practices for any new or developing gateway.
Developing Distributed High-performance Computing Capabilities of an Open Sci...Globus
COVID-19 had an unprecedented impact on scientific collaboration. The pandemic and its broad response from the scientific community has forged new relationships among public health practitioners, mathematical modelers, and scientific computing specialists, while revealing critical gaps in exploiting advanced computing systems to support urgent decision making. Informed by our team’s work in applying high-performance computing in support of public health decision makers during the COVID-19 pandemic, we present how Globus technologies are enabling the development of an open science platform for robust epidemic analysis, with the goal of collaborative, secure, distributed, on-demand, and fast time-to-solution analyses to support public health.
Enhancing Research Orchestration Capabilities at ORNL.pdfGlobus
Cross-facility research orchestration comes with ever-changing constraints regarding the availability and suitability of various compute and data resources. In short, a flexible data and processing fabric is needed to enable the dynamic redirection of data and compute tasks throughout the lifecycle of an experiment. In this talk, we illustrate how we easily leveraged Globus services to instrument the ACE research testbed at the Oak Ridge Leadership Computing Facility with flexible data and task orchestration capabilities.
3. This tutorial provides some basic information and practical suggestions
for protecting your personal information and computer from cyber-
attacks. Cyber-safety topics covered include:
What is Cyber Safety?
Cyber Safety Threats
What are Cybercriminals?
Cyber-safety Actions
Cyber-safety at Home &Work
4. WHAT IS CYBER-SAFETY?
Cybersecurity refers to the
technologies and processes
designed to protect computers,
networks and data from
unauthorized access,
vulnerabilities and attacks
delivered via the Internet by
cyber criminals.
5. CYBER-SAFETY THREATS
• First, let’s talk about some common cyber-safety threats and the
problems they can cause
Viruses
Viruses infect computers through email attachments
and file sharing. They delete files, attack other
computers, and make your computer run slowly. One
infected computer can cause problems for all
computers on a network.
Hackers
Hackers are people who “trespass” into your computer from a
remote location. They may use your computer to send spam or
viruses, host a Web site, or do other activities that cause
computer malfunctions.
Identity Thieves
People who obtain unauthorized access to your
personal information, such as Social Security and
financial account numbers. They then use this
information to commit crimes such as fraud or theft.
Spyware
Spyware is software that “piggybacks” on programs you
download, gathers information about your online habits, and
transmits personal information without your knowledge. It may
also cause a wide range of other computer malfunctions.
6. What are Cybercriminals?
A cybercriminal is an individual who commits cybercrimes, where he/she
makes use of the computer either as a tool or as a target or as both.
Cybercriminals use computers in three broad ways:
1. Select computer as their target: These criminals attack other people's
computers to perform malicious activities, such as spreading viruses, data
theft, identity theft, etc.
2. Uses computer as their weapon: They use the computer to carry out
"conventional crime", such as spam, fraud, illegal gambling, etc.
3. Uses computer as their accessory: They use the computer to save stolen or
illegal data.
7. Roles of Cyber Criminals
Cybercriminals often work in organized groups. Some cybercriminal roles are:
1. Programmers: Write code or programs used by cybercriminal organization
2. Distributors: Distribute and sell stolen data and goods from associated cybercriminals
3. IT experts: Maintain a cybercriminal organization's IT infrastructure, such as servers,
encryption technologies and databases
4. Hackers: Exploit systems, applications and network vulnerabilities
5. Fraudsters: Create and deploy schemes like spam and phishing
6. System hosts and providers: Host sites and servers that possess illegal contents
7. Cashiers: Provide account names to cybercriminals and control drop accounts
8. Money mules: Manage bank account wire transfers
9. Tellers: Transfer and launder illegal money via digital and foreign exchange methods
10. Leaders: Often connected to big bosses of large criminal organizations. Assemble and direct
cybercriminal teams, and usually lack technical knowledge.
8. CYBER-SAFETYACTIONS
The following slides describe the top seven actions you can take to
protect personal information and your computer. These actions will
help you meet the UC Davis Cyber-safety Program policy standards.
By implementing all seven of these security measures, you will
protect yourself, others, and your computer from many common
threats.
In most cases, implementing each of these security measures will only
take a few minutes.
9. TOP SEVEN CYBER-SAFETY ACTIONS
1. Install OS/Software Updates 2. Run Anti-virus Software
3. Prevent Identity Theft 4. Turn on Personal Firewalls
5. Avoid Spyware/Adware
7. Back up Important Files
6. Protect Passwords
10. Install OS/Software Updates
Updates-sometimes called patches-fix problems with your
operating system (OS) (e.g., Windows XP, Windows Vista,
Mac OS X) and software programs (e.g., Microsoft Office
applications).
Most new operating systems are set to download updates by
default. After updates are downloaded, you will be asked to
install them. Click yes!
To download patches for your system and software, visit
your OS update center.
Be sure to restart your computer after updates are installed
so that the patches can be applied immediately.
11. Run Anti-Virus Software
Many computers come pre-installed with certain
anti-virus software, but if not, or if you want
more powerful software, research online to find
what product suits you. Anti-virus software is
crucial to keep your computer healthy. A "sick"
computer, or one racked with viruses, is more
susceptible to hacking. Set your preferences so
your anti-virus software updates automatically.
12. Prevent Identity Theft
Identity thieves steal your personal information to commit fraud. They can damage your credit
status and cost you time and money restoring your good name. To reduce your risk of becoming a
victim, follow the tips below:
• Don't carry your Social Security card in your wallet or write it on your checks. Only give out
your SSN when absolutely necessary.
• Protect your PIN. Never write a PIN on a credit/debit card or on a slip of paper kept in your
wallet.
• Watch out for "shoulder surfers". Use your free hand to shield the keypad when using pay
phones and ATMs.
• Collect mail promptly. Ask the post office to put your mail on hold when you are away from
home for more than a day or two.
• Pay attention to your billing cycles. If bills or financial statements are late, contact the sender.
• Keep your receipts. Ask for carbons and incorrect charge slips as well. Promptly compare
receipts with account statements. Watch for unauthorized transactions.
• Tear up or shred unwanted receipts, credit offers, account statements, expired cards, etc., to
prevent dumpster divers getting your personal information.
• Store personal information in a safe place at home and at work. Don't leave it lying around.
13. Turn on Personal Firewalls
Check your computer's security settings
for a built-in personal firewall. If you
have one, turn it on. Microsoft
Windows 7,8 and 10 and Mac OSX
have built-in firewalls.
14. Avoid Spyware/Adware
Spyware can log your keystrokes as you type, then
send your user names and passwords back to the
software's authors.
Spyware is software that resides on a computer and
sends information to its creator. That information
may include surfing habits, system details or, in its
most dangerous form, passwords and login
information for critical applications such as online
banking. Many spyware programs are more annoying
than dangerous, serving up pop-up ads or gathering e-
mail addresses for use in spam campaigns. Even
those programs, however, can cost you valuable time
and computing resources.
15. Protect Passwords
Do not share your passwords, and always make new passwords difficult to
guess by avoiding dictionary words, and mixing letters, numbers and
punctuation.
Do not use one of these common passwords or any variation of them:
qwerty1, abc123, let mein, password1, iloveyou1, (yourname1),
baseball1.
Change your passwords periodically.
When choosing a password:
o Mix upper and lower case letters
o Use a minimum of 8 characters
o Use mnemonics to help you remember a difficult password
Store passwords in a safe place. Consider using KeePass Password Safe
“http://keepass.info/”, Keychain (Mac) or an encrypted USB drive to store
passwords. Avoid keeping passwords on a Post-it under your keyboard, on
your monitor or in a drawer near your computer!
16. Back Up Important Files
Reduce your risk of losing important files to a virus, computer crash, theft
or disaster by creating back-up copies.
Keep your critical files in one place on your computer’s hard drive so you
can easily create a back up copy.
Save copies of your important documents and files to a CD, online back up
service, flash or USB drive, or a server.
Store your back-up media in a secure place away from your computer, in
case of fire or theft.
Test your back up media periodically to make sure the files are accessible
and readable.
17. CYBER-SAFETYAT HOME
Physically secure your computer by using security cables and locking
doors and windows in the dorms and off-campus housing.
Avoid leaving your laptop unsupervised and in plain view in the
library or coffee house, or in your car, dorm room or home.
Set up a user account and password to prevent unauthorized access to
your computer files.
Do not install unnecessary programs on your computer.
18. CYBER-SAFETYAT WORK
Be sure to work with your technical support coordinator before
implementing new cyber-safety measures.
Talk with your technical support coordinator about what cyber-safety
measures are in place in your department.
Report to your supervisor any cyber-safety policy violations, security
flaws/weaknesses you discover or any suspicious activity by unauthorized
individuals in your work area.
Physically secure your computer by using security cables and locking
building/office doors and windows.
Do not install unnecessary programs on your work computer.