SlideShare a Scribd company logo
An ITS Security Training Module Version Oct 2009 v3 CLICK “FULL” TO VIEW SLIDE IN FULL SCREEN.
	Web Browser Security If you don’t log out when using Web browsers, others may access your private and Sensitive Information.
	Web Browser Security Section: Web Browser Security When using Web browsers (like Internet Explorer or Firefox) log out of sites storing Sensitive Information. banking sites, Payroll services, Student Central, etc. Many Web sites store (cache) personal information, such as login names and passwords, until a user logs out.
Suspect Unauthorized Access? …Steps to Take  Section: Web Browser Security Immediately notify University officials: Your supervisor Office of University Counsel Information Security Office at (919.445.9393) ITS Help Desk at (919.962.HELP) Problems or Questions?  Contact (919.962.HELP) or your departmental IT staff for assistance on downloading and installing any software from the ITS Shareware site.
Your Responsibilities If Unauthorized Access Occurs Section: Web Browser Security The University is required to take reasonable steps to lessen harmful effects of any unauthorized access. Timely notification of the incident is vitalto minimize potential harm. Remember: It is always better to ask questions first rather than risk violating a University policy. Call (919.962.HELP) for advice.
Learning Point # 6 Section: Web Browser Security If you believe that Sensitive Information has been accessed by a hacker, you should inform University staff. Right? Right! Everyone affiliated with the University should report an unauthorized access to Sensitive Information. Notification can occur by calling 919.962.HELP.

More Related Content

What's hot

10 Components of Business Cyber Security
10 Components of Business Cyber Security10 Components of Business Cyber Security
10 Components of Business Cyber Security
Comodo SSL Store
 
Antivirus
AntivirusAntivirus
Antivirus
yuvan80
 
PACE-IT: IT Security Measures
PACE-IT: IT Security MeasuresPACE-IT: IT Security Measures
PACE-IT: IT Security Measures
Pace IT at Edmonds Community College
 
Inappropriate use of the network ppt
Inappropriate use of the network pptInappropriate use of the network ppt
Inappropriate use of the network ppt
Kristi DeRoche
 
10 critical elements of next generation of endpoint layered security
10 critical elements of next generation of endpoint layered security10 critical elements of next generation of endpoint layered security
10 critical elements of next generation of endpoint layered security
Jose Lopez
 
Pace IT - Common Security Threats
Pace IT - Common Security ThreatsPace IT - Common Security Threats
Pace IT - Common Security Threats
Pace IT at Edmonds Community College
 
Understanding Virus
Understanding VirusUnderstanding Virus
Understanding Virus
Phannarith Ou, G-CISO
 
System security
System securitySystem security
System security
invertis university
 
Security Education Platform_AnilShukla
Security Education Platform_AnilShuklaSecurity Education Platform_AnilShukla
Security Education Platform_AnilShukla
Anil Shukla
 
Et 5083 week 3 assignment - technology safety, security, & filtering traini...
Et 5083   week 3 assignment - technology safety, security, & filtering traini...Et 5083   week 3 assignment - technology safety, security, & filtering traini...
Et 5083 week 3 assignment - technology safety, security, & filtering traini...
jsoderst75
 
InfoSec World 2014 Security Imperatives for IOS and Android
InfoSec World 2014 Security Imperatives for IOS and AndroidInfoSec World 2014 Security Imperatives for IOS and Android
InfoSec World 2014 Security Imperatives for IOS and Android
Symosis Security (Previously C-Level Security)
 
PACE-IT, Security+1.4: Common Network Protocols (part 3)
PACE-IT, Security+1.4: Common Network Protocols (part 3)PACE-IT, Security+1.4: Common Network Protocols (part 3)
PACE-IT, Security+1.4: Common Network Protocols (part 3)
Pace IT at Edmonds Community College
 
Security Training and Threat Awareness by Pedraza
Security Training and Threat Awareness by PedrazaSecurity Training and Threat Awareness by Pedraza
Security Training and Threat Awareness by Pedraza
Atlantic Training, LLC.
 
Help Desk Signage
Help Desk SignageHelp Desk Signage
Help Desk Signage
CMICHHELPDESK
 
Research Group Presentation
Research Group PresentationResearch Group Presentation
Research Group Presentation
Kunlakan (Jeen) Cherdchusilp
 
Mitigating the clicker
Mitigating the clickerMitigating the clicker
Mitigating the clicker
Claus Cramon Houmann
 
Information Security Awareness for everyone
Information Security Awareness for everyoneInformation Security Awareness for everyone
Information Security Awareness for everyone
Yasir Nafees
 
Vdi for staff and students
Vdi for staff and studentsVdi for staff and students
Vdi for staff and students
Lori Lee Mickelson
 
Malware Defense-in-Depth 2.0
Malware Defense-in-Depth 2.0Malware Defense-in-Depth 2.0
Malware Defense-in-Depth 2.0
Ayed Al Qartah
 
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration Recommendations
Meg Weber
 

What's hot (20)

10 Components of Business Cyber Security
10 Components of Business Cyber Security10 Components of Business Cyber Security
10 Components of Business Cyber Security
 
Antivirus
AntivirusAntivirus
Antivirus
 
PACE-IT: IT Security Measures
PACE-IT: IT Security MeasuresPACE-IT: IT Security Measures
PACE-IT: IT Security Measures
 
Inappropriate use of the network ppt
Inappropriate use of the network pptInappropriate use of the network ppt
Inappropriate use of the network ppt
 
10 critical elements of next generation of endpoint layered security
10 critical elements of next generation of endpoint layered security10 critical elements of next generation of endpoint layered security
10 critical elements of next generation of endpoint layered security
 
Pace IT - Common Security Threats
Pace IT - Common Security ThreatsPace IT - Common Security Threats
Pace IT - Common Security Threats
 
Understanding Virus
Understanding VirusUnderstanding Virus
Understanding Virus
 
System security
System securitySystem security
System security
 
Security Education Platform_AnilShukla
Security Education Platform_AnilShuklaSecurity Education Platform_AnilShukla
Security Education Platform_AnilShukla
 
Et 5083 week 3 assignment - technology safety, security, & filtering traini...
Et 5083   week 3 assignment - technology safety, security, & filtering traini...Et 5083   week 3 assignment - technology safety, security, & filtering traini...
Et 5083 week 3 assignment - technology safety, security, & filtering traini...
 
InfoSec World 2014 Security Imperatives for IOS and Android
InfoSec World 2014 Security Imperatives for IOS and AndroidInfoSec World 2014 Security Imperatives for IOS and Android
InfoSec World 2014 Security Imperatives for IOS and Android
 
PACE-IT, Security+1.4: Common Network Protocols (part 3)
PACE-IT, Security+1.4: Common Network Protocols (part 3)PACE-IT, Security+1.4: Common Network Protocols (part 3)
PACE-IT, Security+1.4: Common Network Protocols (part 3)
 
Security Training and Threat Awareness by Pedraza
Security Training and Threat Awareness by PedrazaSecurity Training and Threat Awareness by Pedraza
Security Training and Threat Awareness by Pedraza
 
Help Desk Signage
Help Desk SignageHelp Desk Signage
Help Desk Signage
 
Research Group Presentation
Research Group PresentationResearch Group Presentation
Research Group Presentation
 
Mitigating the clicker
Mitigating the clickerMitigating the clicker
Mitigating the clicker
 
Information Security Awareness for everyone
Information Security Awareness for everyoneInformation Security Awareness for everyone
Information Security Awareness for everyone
 
Vdi for staff and students
Vdi for staff and studentsVdi for staff and students
Vdi for staff and students
 
Malware Defense-in-Depth 2.0
Malware Defense-in-Depth 2.0Malware Defense-in-Depth 2.0
Malware Defense-in-Depth 2.0
 
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration Recommendations
 

Viewers also liked

Site Security Policy - Yahoo! Security Week
Site Security Policy - Yahoo! Security WeekSite Security Policy - Yahoo! Security Week
Site Security Policy - Yahoo! Security Week
guest9663eb
 
Internet
InternetInternet
Internet
Prabhjot Chawla
 
More Browser Basics, Tips & Tricks 2 Draft 17
More Browser Basics, Tips & Tricks 2 Draft 17More Browser Basics, Tips & Tricks 2 Draft 17
More Browser Basics, Tips & Tricks 2 Draft 17
msz
 
Web Browser Basics, Tips & Tricks Draft 17
Web Browser Basics, Tips & Tricks Draft 17Web Browser Basics, Tips & Tricks Draft 17
Web Browser Basics, Tips & Tricks Draft 17
msz
 
Security-Web Vulnerabilities-Browser Attacks
Security-Web Vulnerabilities-Browser AttacksSecurity-Web Vulnerabilities-Browser Attacks
Security-Web Vulnerabilities-Browser Attacks
Raghu Addanki
 
More Browser Basics, Tips & Tricks 3 Draft 8
More Browser Basics, Tips & Tricks 3 Draft 8More Browser Basics, Tips & Tricks 3 Draft 8
More Browser Basics, Tips & Tricks 3 Draft 8
msz
 
IT103Microsoft Windows XP/OS Chap12
IT103Microsoft Windows XP/OS Chap12IT103Microsoft Windows XP/OS Chap12
IT103Microsoft Windows XP/OS Chap12
blusmurfydot1
 
3D Internet
3D Internet3D Internet
3D Internet
Prasad Patil
 
Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & security
nadikari123
 
The Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsThe Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy Concerns
Corinne Weisgerber
 
Chapter 4 Using a Web Browser
Chapter 4 Using a Web BrowserChapter 4 Using a Web Browser
Chapter 4 Using a Web Browser
Patty Ramsey
 
Web Browsers
Web BrowsersWeb Browsers
Web Browsers
Aahmed Hussain
 
Web Security
Web SecurityWeb Security
Web Security
Bharath Manoharan
 

Viewers also liked (13)

Site Security Policy - Yahoo! Security Week
Site Security Policy - Yahoo! Security WeekSite Security Policy - Yahoo! Security Week
Site Security Policy - Yahoo! Security Week
 
Internet
InternetInternet
Internet
 
More Browser Basics, Tips & Tricks 2 Draft 17
More Browser Basics, Tips & Tricks 2 Draft 17More Browser Basics, Tips & Tricks 2 Draft 17
More Browser Basics, Tips & Tricks 2 Draft 17
 
Web Browser Basics, Tips & Tricks Draft 17
Web Browser Basics, Tips & Tricks Draft 17Web Browser Basics, Tips & Tricks Draft 17
Web Browser Basics, Tips & Tricks Draft 17
 
Security-Web Vulnerabilities-Browser Attacks
Security-Web Vulnerabilities-Browser AttacksSecurity-Web Vulnerabilities-Browser Attacks
Security-Web Vulnerabilities-Browser Attacks
 
More Browser Basics, Tips & Tricks 3 Draft 8
More Browser Basics, Tips & Tricks 3 Draft 8More Browser Basics, Tips & Tricks 3 Draft 8
More Browser Basics, Tips & Tricks 3 Draft 8
 
IT103Microsoft Windows XP/OS Chap12
IT103Microsoft Windows XP/OS Chap12IT103Microsoft Windows XP/OS Chap12
IT103Microsoft Windows XP/OS Chap12
 
3D Internet
3D Internet3D Internet
3D Internet
 
Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & security
 
The Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsThe Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy Concerns
 
Chapter 4 Using a Web Browser
Chapter 4 Using a Web BrowserChapter 4 Using a Web Browser
Chapter 4 Using a Web Browser
 
Web Browsers
Web BrowsersWeb Browsers
Web Browsers
 
Web Security
Web SecurityWeb Security
Web Security
 

Similar to Security Awareness 9-10-09 v5 Web Browser

Cyber Safety
Cyber Safety Cyber Safety
Cyber Safety
Asim Sourav Rath
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)
Cyber Security Infotech
 
Cybersafety basics.ppt cs
Cybersafety basics.ppt csCybersafety basics.ppt cs
Cybersafety basics.ppt cs
Vinay Soni
 
Social Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus NetworkSocial Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus Network
thowell
 
Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety
Tawose Olamide Timothy
 
Information security a new era technology_
Information security a new era technology_Information security a new era technology_
Information security a new era technology_
Tahmid Munaz
 
How to stop computer crime
How to stop computer crimeHow to stop computer crime
How to stop computer crime
university of education,Lahore
 
Comp 107 cep 8
Comp 107 cep 8Comp 107 cep 8
Comp 107 cep 8
Bala Ganesh
 
Protect
ProtectProtect
Protect
Yamitza Rosas
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
AbhishekDas794104
 
WK8.pptx
WK8.pptxWK8.pptx
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guide
Nguyen Xuan Quang
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Adeel Younas
 
Securing Your Business
Securing Your BusinessSecuring Your Business
Securing Your Business
Jose L. Quiñones-Borrero
 
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptx
jondon17
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
MBRoman1
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
ijsrd.com
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
ANIKETKUMARSHARMA3
 
Information Technology Threat
Information Technology ThreatInformation Technology Threat
Information Technology Threat
Bilhami
 
Cscu module 06 internet security
Cscu module 06 internet securityCscu module 06 internet security
Cscu module 06 internet security
Sejahtera Affif
 

Similar to Security Awareness 9-10-09 v5 Web Browser (20)

Cyber Safety
Cyber Safety Cyber Safety
Cyber Safety
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)
 
Cybersafety basics.ppt cs
Cybersafety basics.ppt csCybersafety basics.ppt cs
Cybersafety basics.ppt cs
 
Social Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus NetworkSocial Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus Network
 
Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety
 
Information security a new era technology_
Information security a new era technology_Information security a new era technology_
Information security a new era technology_
 
How to stop computer crime
How to stop computer crimeHow to stop computer crime
How to stop computer crime
 
Comp 107 cep 8
Comp 107 cep 8Comp 107 cep 8
Comp 107 cep 8
 
Protect
ProtectProtect
Protect
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
WK8.pptx
WK8.pptxWK8.pptx
WK8.pptx
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guide
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Securing Your Business
Securing Your BusinessSecuring Your Business
Securing Your Business
 
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Information Technology Threat
Information Technology ThreatInformation Technology Threat
Information Technology Threat
 
Cscu module 06 internet security
Cscu module 06 internet securityCscu module 06 internet security
Cscu module 06 internet security
 

More from Catherine MacAllister

Security Awareness 9-10-09 v5 Overview
Security Awareness 9-10-09 v5 OverviewSecurity Awareness 9-10-09 v5 Overview
Security Awareness 9-10-09 v5 Overview
Catherine MacAllister
 
Security Awareness 9-10-09 v5 Appropriate Disposal
Security Awareness 9-10-09 v5 Appropriate DisposalSecurity Awareness 9-10-09 v5 Appropriate Disposal
Security Awareness 9-10-09 v5 Appropriate Disposal
Catherine MacAllister
 
Security Awareness 9-10-09 v5 Protect Equipment
Security Awareness 9-10-09 v5 Protect EquipmentSecurity Awareness 9-10-09 v5 Protect Equipment
Security Awareness 9-10-09 v5 Protect Equipment
Catherine MacAllister
 
Security Awareness 9-10-09 v5 You've Got Mail
Security Awareness 9-10-09 v5 You've Got MailSecurity Awareness 9-10-09 v5 You've Got Mail
Security Awareness 9-10-09 v5 You've Got Mail
Catherine MacAllister
 
Security Awareness 9-10-09 v5 Wireless
Security Awareness 9-10-09 v5 WirelessSecurity Awareness 9-10-09 v5 Wireless
Security Awareness 9-10-09 v5 Wireless
Catherine MacAllister
 
Security Awareness 9-10-09 v5 Sensitive Information
Security Awareness 9-10-09 v5 Sensitive InformationSecurity Awareness 9-10-09 v5 Sensitive Information
Security Awareness 9-10-09 v5 Sensitive Information
Catherine MacAllister
 
Security Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 VirusesSecurity Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 Viruses
Catherine MacAllister
 
Security Awareness 9 10 09 V4 Appropriate Disposal
Security Awareness 9 10 09  V4  Appropriate  DisposalSecurity Awareness 9 10 09  V4  Appropriate  Disposal
Security Awareness 9 10 09 V4 Appropriate Disposal
Catherine MacAllister
 
Security Awareness 9 10 04 V4 Wireless Connections
Security Awareness 9 10 04 V4 Wireless ConnectionsSecurity Awareness 9 10 04 V4 Wireless Connections
Security Awareness 9 10 04 V4 Wireless Connections
Catherine MacAllister
 
Security Awareness 9 10 09 V4 Workplace Policies
Security Awareness 9 10 09 V4 Workplace PoliciesSecurity Awareness 9 10 09 V4 Workplace Policies
Security Awareness 9 10 09 V4 Workplace Policies
Catherine MacAllister
 

More from Catherine MacAllister (10)

Security Awareness 9-10-09 v5 Overview
Security Awareness 9-10-09 v5 OverviewSecurity Awareness 9-10-09 v5 Overview
Security Awareness 9-10-09 v5 Overview
 
Security Awareness 9-10-09 v5 Appropriate Disposal
Security Awareness 9-10-09 v5 Appropriate DisposalSecurity Awareness 9-10-09 v5 Appropriate Disposal
Security Awareness 9-10-09 v5 Appropriate Disposal
 
Security Awareness 9-10-09 v5 Protect Equipment
Security Awareness 9-10-09 v5 Protect EquipmentSecurity Awareness 9-10-09 v5 Protect Equipment
Security Awareness 9-10-09 v5 Protect Equipment
 
Security Awareness 9-10-09 v5 You've Got Mail
Security Awareness 9-10-09 v5 You've Got MailSecurity Awareness 9-10-09 v5 You've Got Mail
Security Awareness 9-10-09 v5 You've Got Mail
 
Security Awareness 9-10-09 v5 Wireless
Security Awareness 9-10-09 v5 WirelessSecurity Awareness 9-10-09 v5 Wireless
Security Awareness 9-10-09 v5 Wireless
 
Security Awareness 9-10-09 v5 Sensitive Information
Security Awareness 9-10-09 v5 Sensitive InformationSecurity Awareness 9-10-09 v5 Sensitive Information
Security Awareness 9-10-09 v5 Sensitive Information
 
Security Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 VirusesSecurity Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 Viruses
 
Security Awareness 9 10 09 V4 Appropriate Disposal
Security Awareness 9 10 09  V4  Appropriate  DisposalSecurity Awareness 9 10 09  V4  Appropriate  Disposal
Security Awareness 9 10 09 V4 Appropriate Disposal
 
Security Awareness 9 10 04 V4 Wireless Connections
Security Awareness 9 10 04 V4 Wireless ConnectionsSecurity Awareness 9 10 04 V4 Wireless Connections
Security Awareness 9 10 04 V4 Wireless Connections
 
Security Awareness 9 10 09 V4 Workplace Policies
Security Awareness 9 10 09 V4 Workplace PoliciesSecurity Awareness 9 10 09 V4 Workplace Policies
Security Awareness 9 10 09 V4 Workplace Policies
 

Recently uploaded

Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Diana Rendina
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
สมใจ จันสุกสี
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 

Recently uploaded (20)

Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 

Security Awareness 9-10-09 v5 Web Browser

  • 1. An ITS Security Training Module Version Oct 2009 v3 CLICK “FULL” TO VIEW SLIDE IN FULL SCREEN.
  • 2. Web Browser Security If you don’t log out when using Web browsers, others may access your private and Sensitive Information.
  • 3. Web Browser Security Section: Web Browser Security When using Web browsers (like Internet Explorer or Firefox) log out of sites storing Sensitive Information. banking sites, Payroll services, Student Central, etc. Many Web sites store (cache) personal information, such as login names and passwords, until a user logs out.
  • 4. Suspect Unauthorized Access? …Steps to Take Section: Web Browser Security Immediately notify University officials: Your supervisor Office of University Counsel Information Security Office at (919.445.9393) ITS Help Desk at (919.962.HELP) Problems or Questions? Contact (919.962.HELP) or your departmental IT staff for assistance on downloading and installing any software from the ITS Shareware site.
  • 5. Your Responsibilities If Unauthorized Access Occurs Section: Web Browser Security The University is required to take reasonable steps to lessen harmful effects of any unauthorized access. Timely notification of the incident is vitalto minimize potential harm. Remember: It is always better to ask questions first rather than risk violating a University policy. Call (919.962.HELP) for advice.
  • 6. Learning Point # 6 Section: Web Browser Security If you believe that Sensitive Information has been accessed by a hacker, you should inform University staff. Right? Right! Everyone affiliated with the University should report an unauthorized access to Sensitive Information. Notification can occur by calling 919.962.HELP.