Title: Cyber Security Awareness
1Cyber Security Awareness
- May 3, 2004
- Dr. Dan Manson
- dmanson_at_csupomona.edu
2When We Use The Internet
- Everything we do on a computer is at the mercy of
viruses and hackers - Our passwords
- Our email
- Our instant messages
- Confidential data
- Our reputation
3What Makes Us Vulnerable?
- Out of date anti-virus software
- Out of date operating software
- Spyware
- Poor passwords on Windows NT, 2000, and XP
desktops - Too much file sharing
4Out of Date Anti-Virus Software
- Viruses and worms cost billions of dollars each
year - New computer viruses are released almost daily
- Without continual updates anti-virus software
will not protect us from new viruses - IIT eHelp Virus Information Page -
http//www.csupomona.edu/ehelp/antivirus/
5Out of Date Operating System
- Microsoft Protect Your PC Page -
http//www.microsoft.com/security/protect/default.
asp - IIT eHelp Protect Your Mac Web Page -
http//www.symantec.com/mac/security/open_door.htm
l - Your local campus tech can help you keep your
Operating System up-to-date
6Personal Firewalls
- A personal firewall is installed directly on your
computer. - It monitors traffic into and out of your
computer. Lets you know when there is something
going on. - Free ZoneAlarm Firewall - http//www.zonelabs.com/
store/content/company/products/znalm/freeDownload.
jsp?lidzadb_zadown
7What is Spyware?
- Spyware is technology that aids in gathering
information about a person or organization
without their knowledge - If the following occurs, you may have spyware
- Toolbars in your Internet Explorer that you
didn't intentionally install - Your browser start page has changed without your
knowing - Even if you do not see anything, you may be
infected
8How Do I Check for Spyware?
- Ad-aware spyware remover
- SpyBot spyware remover
- Your local campus tech can help you check for and
remove Spyware
9SpyBot SearchDestroy Screenshot
10Gator Spyware
- Gator collects which webpages your computer views
and how much time you spend at those sites, your
response to the ads it displays, the software on
your computer, your first name, your country,
your five-digit ZIP code, and your system
settings - Many popular file-sharing programs install Gator
11SPAM Protection
- IIT eHelp Web Site Manage Your Spam Page -
http//www.csupomona.edu/ehelp/spam/index.html
12Windows Desktop Passwords
- If the Windows Administrator account does not
have a password, or has a weak password, anyone
on the network can take complete control of the
computer. - Set a strong password on the Administrator
account on all Windows NT/2000/XP Professional
systems.
13What is a Strong Password?
- Not easy to guess (no dictionary words)
- Not too short (at least eight characters)
- Not too simple (include uppercase, lowercase,
numbers and punctuation marks) - A sentence can remind you of your password
- The new CLA Japanese Garden looks great!
(TnCLAJGlg!) - My office is in Building 94. (MoiiB94.)
14Passwords are like Underwear
- Change them often
- Do not share with friends
- Do not leave yours lying around
- The longer the better
- Be mysterious
15Too Much File Sharing
- Computers allow us to share folders on our
computers - Make sure you don't give away more than you
intend by following these steps - Never share an entire hard drive
- Create specific folders to share rather than
sharing existing ones - Be careful what you put in shared folders
- Be careful about letting others store files in
your folders without a password - Your local campus tech can help you with shared
folders
16Alternatives to Security Awareness
- When user behavior is not enough, we use
additional technology and policy - Firewalls and Virtual Private Networks (VPN) can
be used to restrict communications and
applications - Computer and application configurations and
choices can be restricted and locked down - Additional procedures and approval processes can
be created. - We can reduce but never eliminate security threats
17Bottom Line Reality
- We all live and work in a world of confidential
information. - By virtue of our jobs, we are custodians of that
information and must follow the laws, policies
and procedures related to safeguarding the
information. - Additional restrictions and laws surrounding
privacy are forthcoming. - Identity fraud is nations top consumer fraud
complaint.
Source Sonoma State University Confidential
Information Systems Access Agreement, March
28,2003
18Information Security Contact Information
- Dr. Dan Manson dmanson_at_csupomona.edu (909)
869-3244 - Know your local tech
- To report computer abuse abuse_at_csupomona.edu
- SANS On-Line Security Awareness Training
- Security Awareness Video -http//www.csupomona.edu
/an/portfolio/Computer20Security/main.swf