Cyber Security Awareness Day 2013 Web

advertisement
Cyber Security Awareness Day
October 17, 2013
Welcome
Dr. Amanda Lee
Vice President of Instructional Services
Session 1
Are You Protected?
Mark Grover & Garrett Baltezegar
CFCC Instructors
Why are we here?

Awareness
 Definition:
a. Knowledge or perception of a situation or fact
b. Concern about and well-informed interest in a
particular situation or development

Knowledge
 Resources:
www.cfcc.edu/cybersecurity
Topics

Terminology

Passwords

Malware

Wireless

How do I protect myself?
Topics

Terminology

Passwords

Malware

Wireless

How do I protect myself?
Terminology

Threat


Vulnerability


A weakness that allows a threat to bypass security
Malware


An event or object that may defeat security resulting in a
loss.
Any program intended to cause harm.
Virus

Performs annoying or destructive activities – requires user
intervention to activate.
Terminology

Worm


Trojan


Program advertised to do one thing but does something else.
Hacker


Takes advantage of vulnerabilities to enter a computer –
does NOT require user interaction to spread.
A person that illegally breaks into, or attempts to break
into, a computer system.
Phishing

Emails that attempt to trick users into surrendering private
information or visit malicious websites.
Topics

Terminology

Passwords

Malware

Wireless

How do I protect myself?
Passwords
Weak Passwords:

Found in Dictionary

Too Short

Contain Personal
Information

Reused multiple times

Not Changed
Passwords

Which password is better?
 Xp4!e%
 Thisisaverylongpassword

Length ALWAYS trumps complexity

http://howsecureismypassword.net
Passwords

Any password that can be memorized is a weak
password.
 Solution?

Use a PASSPHRASE
NEVER share your password with anyone.
Topics

Terminology

Passwords

Malware

Wireless

How do I protect myself?
Malware

Can you recognize Malware?

Can you recognize a Phishing attack?

Demonstration
Topics

Terminology

Passwords

Malware

Wireless

How do I protect myself?
Wireless

Routers
 Use
STRONG passwords to lock down the device
 Disable
 Use
STRONG wireless security options
 Use

Remote Management
WPA2 instead of WEP
Bluetooth
 Turn
OFF if not actively in use
Topics

Terminology

Passwords

Malware

Wireless

How do I protect myself?
How do I protect myself?

Keep your Operating System up to date

Install and update your AntiVirus solution

Install and update a Malware scanning solution

Recognize Phishing Scams

Use STRONG Passwords

Backup Important files
Session 2
Topics in Information Security
Zachary Mitcham
Chief Information Security Officer
University of North Carolina Wilmington
Cyber Security Awareness Day
October 17, 2013
Download