Information Security Louis Morgan, CISSP Information Security Officer By

advertisement
Information Security
By
Louis Morgan, CISSP
Information Security Officer
Why Bother with IT Security?
• Recent estimate - 900 million personal
computers worldwide.
• Computer hackers are out there.
• How long do you think an unprotected PC
will remain uninfected after it is connected
to the internet?
Responsible Computing @ PVAMU
Since you're using PVAMU computing resources,
you're obligated to:
• Abide by PVAMU’s University Rules, Information
Security Standards, and all relevant local, state, and
federal laws.
• Protect your computing account(s). For example:
Log out of sites that require authentication and log
off of shared computers such as those in Open
Access Labs.
Responsible Computing @ PVAMU
Don't:
• Let someone use your account (e.g., log-in
as "you“).
• Use PVAMU computing resources for illegal
purposes, or commercial activities.
Password - First Line of Defense
• Passwords, in combination with a username,
help authenticate users.
• They are the first line of defense against
unauthorized access to your computing
devices and your accounts.
• Therefore, it is important that you create
strong passwords and keep them secure
from disclosure.
Creating Strong Passwords
Strong Passwords Should Contain:
• At least 2 upper case letters (A-Z)
• At least 2 lower case letters (a-z)
• At least 2 numbers (one of which is NOT
the first or last character of the password)
• At least 2 special characters (*$#-^)
• At least 8 characters
Password Example
• Think of a phrase or sentence that's
easy for you to remember.
• Such as “Look before you leap”
• Lb4u!3@P
Protecting Your Passwords
• Don't allow websites or Internet Browsers
to "remember" your passwords.
• Use caution when typing in a password in
public, someone may be watching.
• Change your password when you suspect
that someone else may know it.
Portable Device Security
• Keep track of your portable device(s),
especially those flash drives.
• Don't leave your laptop (or other portable
device) lying around or unattended in
public areas; and store it in a safe place
(out of sight) when you're not using it.
Protecting Your Data with Encryption
You can encrypt:
• Files
• Folders
• USB/Flash Drives
•
•
•
•
Email Attachments
Images
Videos
Hard Drives
• and more...
• For more information see PVAMU encryption training…
Backing Up Your Data
• Back up anything that's important to
you.
– Papers/essays, Projects , Research data ,
Pictures, Music files, and more...
Methods:
• Save the file to your share drive.
• Save the file on a CD/DVD, flash drive, etc.
Malware
• Malware is software designed to infiltrate
and/or damage a computer system. The
most common forms of malware are:
• Viruses and Worms
• Trojan Horses, Root kits, Backdoors
• Spyware
Web Threats
• How can you avoid online threats?
– Watch out for "phishy" emails.
– Beware of fraudulent ("spoofed") websites.
– Seeing spam pop-ups or ads? Click with
caution.
Beware of Fraudulent Sites
• Pharming, a form of phishing, is becoming one of the
most popular forms of web attack. Just by typing in a
URL and visiting a website, you could be directed to a
fraudulent site.
• Before disclosing any personal information online,
– check the website certificate to make sure you're not at a
fraudulent site.
– Open the website certificate.
– Make sure the name following "Issued to" matches the
site you think you're on.
To click, or not to click?
• Web threats come in various forms, and
understandably some are more obvious than others.
Phishing attacks and pop-up downloads are easier to
detect and protect against than pharming attacks and
drive-by downloads, however one thing that will assist
in avoiding these threats is paying attention to what
you click on.
• Don't click on:
– Pop-ups or spam mail.
– Links within email that ask for your personal information.
If You Are Still Unsure
• Contact the supposed/claimed sender (e.g., your
bank or credit card company) using the contact
information on the company's official website.
• Never respond to an email requesting your
password, username, Social Security number,
credit/debit card number, or other personal
information, no matter how official it looks.
5 Ways to Protect Your Computer
• Patches/Updates
• Anti-Virus Software
• Personal Firewall - Install a third-party 'bidirectional' firewall (one that protects against
inbound and outbound threats)
• Anti-Spyware - Install an anti-spyware program,
• Caution: Free Downloads - Download only from
trusted websites (e.g., Download.com)
File Sharing & Copyright Law (DMCA)*
Be aware that file-sharing can:
• Expose your computer to malware
• Accidentally expose personal/confidential information
• Lead to copyright infringement
• Keep in mind. . . your online activity is not anonymous
and it is traceable
* The
Digital Millennium Copyright Act
THINK BEFORE
YOU CLICK!
QUESTIONS?
Contact Information
Louis Morgan
lamorgan@pvamu.edu
936-261-2126
Download