SlideShare una empresa de Scribd logo
1 de 13
+

Information Security
Carson City Library
@Two Digital Learning Center
+

Terminology


Virus:



Hacker: a general term used for anyone who spends time
poking into others computers looking for vulnerabilities.



Social Engineering: the practice of obtaining confidential
information by manipulation. e.g. someone pretending to be
an administer to obtain password, bank account #s, etc.



Firewall-software/hardware used to black unauthorized
access to a machine or network.



Password: a key that allows access to information.
+

What we’ll cover


Basic security terminology.



How to secure your home
and public computer.



Securely creating and
managing accounts and
passwords.



How to secure your
information on open
wireless networks.



How to avoid online scams
and insecure web pages.
Don’t leave your computer
+
unattended!
At Home
 Create

a password protected screen saver on
your personal computer.



Log in and off your computer & accounts
properly daily.

 Disable

File Sharing or Printing

 Lock

your home computer with Ctrl + Alt + Del
when leaving unattended.

 Shut

down your computer & store in a safe
room.
Don’t leave your computer
+
unattended!
In Public
 Hide

your library session by selecting
“Hide your Session”

 Watch

out for “shoulder surfers”

 Always

log out of private accounts.

 Never

select to have web browser safe
your login information or password.

 Change

months.

your passwords every few
+

Using Public Wireless Connections


Unsecured, public Wi-Fi network at coffee shops, etc.



Most wireless routers have a FIREWALL to protect you from the
internet doesn't mean you're protected from others connected to
the same network.

n

Turn Off Sharing

n

Enable Your Firewall

n

Turn It Off When You're Not Using It!



On your home network, create a password to block
unauthorized users.



For more tips:
http://lifehacker.com/5576927/how-to-stay-safe-on-public-wi+fi-networks
+

Creating Passwords
 At

least 8 characters
long!

 Create

 Create

 Create

a password that
you don’t have written
down.!

a Password that
is easy to remember

a password you
can type Quickly!
+

Most Importantly…
Create

a password that is a mixture of
random lowercase, UPPERCASE,
numbers (1,2,3,4,5,6,7,8,9) and
Punctuation (!@$#)



A GOOD example: Dj2!Hxz5$



A BAD example: password1
+

What you should AVIOD!


Names of any kind.




Any kind of easily obtained information.




Your phone number, address, birthdays, license plate numbers.

Sensitive information (login/user names)




Includes your user/login name, your first and last name,
nicknames, spouse’s or pet’s names.

ATM pins, bank account student id, social security number,
credit/debit .

Words contained in English or foreign language dictionaries.


Like password, secret, abc123, etc.
+

Password WORD sharing!
DON’T do it!


NEVER share your passwords with others even close family and
friends.



Be caution of anyone who wants to quickly login into your
machine or claims to be an administrator.



NEVER send your passwords through e-mail. A new hackers
trick.



NEVER give your passwords or other personal information
through e-mail like your social security number, credit card
information, etc.



Reputable companies will NOT ask you for this information over
the internet or phone. Verify their phone number and call them
back.
+

Discussion of internet websites to
BEWARE!
What

are websites that could be
unsafe and why?

How

can you do to protect yourself
online?
+

Sites


Buying and Selling sites such as Craig’s List.



Banking websites



Social Networking sites like Facebook.



E-mail accounts.



Others….
+

QUESTIONS

Más contenido relacionado

La actualidad más candente

EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTEEMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTEAlminaVelasco
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and SafetyConor O'Neill
 
Internet Threats
Internet ThreatsInternet Threats
Internet ThreatsLeelet1121
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of NetiquetteRochelle Nato
 
Ten Important Rules
Ten Important RulesTen Important Rules
Ten Important Rulesritz482
 
Computer hacking
Computer hackingComputer hacking
Computer hackingArjun Tomar
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipstephensc
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipstephensc
 
Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteJuan Miguel Palero
 
Ethics and safety measures in Computing
Ethics and safety measures in ComputingEthics and safety measures in Computing
Ethics and safety measures in ComputingAnkit Malviya
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipstephensc
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersStephen Thomas, CISSP
 
Online Netiquette
Online NetiquetteOnline Netiquette
Online NetiquetteZoro18
 
Netiquette on using internet
Netiquette  on using internetNetiquette  on using internet
Netiquette on using internetMaricrs Alfarö
 
Confidentiality in a Wired World
Confidentiality in a Wired WorldConfidentiality in a Wired World
Confidentiality in a Wired WorldDavid Whelan
 

La actualidad más candente (20)

EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTEEMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
EMPOWERMENT TECHNOLOGY 11 - ICT SAFETY, SECURITY, AND NETIQUETTE
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and Safety
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Hacking
HackingHacking
Hacking
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
Ten Important Rules
Ten Important RulesTen Important Rules
Ten Important Rules
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 
Hacking
HackingHacking
Hacking
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and Etiquette
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Ethics and safety measures in Computing
Ethics and safety measures in ComputingEthics and safety measures in Computing
Ethics and safety measures in Computing
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
Are Your Security Aware?
Are Your Security Aware?Are Your Security Aware?
Are Your Security Aware?
 
Online Netiquette
Online NetiquetteOnline Netiquette
Online Netiquette
 
Netiquette on using internet
Netiquette  on using internetNetiquette  on using internet
Netiquette on using internet
 
Confidentiality in a Wired World
Confidentiality in a Wired WorldConfidentiality in a Wired World
Confidentiality in a Wired World
 
hacking
hackinghacking
hacking
 

Similar a Information Secuirty

Data theft
Data theftData theft
Data theftLaura
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is DangerousGihan Dias
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewWhy is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewSTO STRATEGY
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014B2BPlanner Ltd.
 
CYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptxCYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptxTapan Khilar
 
Security and the Service Desk
Security and the Service DeskSecurity and the Service Desk
Security and the Service DeskNorthCoastHDI
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security TipsInfusionsoft
 
Internet Security
Internet SecurityInternet Security
Internet SecurityAvnish Jain
 
End User Security Awareness - Information Security
End User Security Awareness - Information SecurityEnd User Security Awareness - Information Security
End User Security Awareness - Information SecurityWorldTrade3
 
UserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.pptUserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.pptDiveshK4
 
Ethical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptxEthical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptxFarhanaMariyam1
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006Ben Rothke
 
Awareness Security 123.pptx
Awareness Security 123.pptxAwareness Security 123.pptx
Awareness Security 123.pptxRajuSingh730938
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxBilmyRikas
 
USG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer (1).pptxUSG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer (1).pptxssuser59e4b8
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxsumita02
 

Similar a Information Secuirty (20)

Data theft
Data theftData theft
Data theft
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
 
Why is password protection a fallacy a point of view
Why is password protection a fallacy a point of viewWhy is password protection a fallacy a point of view
Why is password protection a fallacy a point of view
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 
CYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptxCYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Security and the Service Desk
Security and the Service DeskSecurity and the Service Desk
Security and the Service Desk
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security Tips
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
End User Security Awareness - Information Security
End User Security Awareness - Information SecurityEnd User Security Awareness - Information Security
End User Security Awareness - Information Security
 
UserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.pptUserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.ppt
 
Ethical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptxEthical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptx
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006
 
IT security awareness
IT security awarenessIT security awareness
IT security awareness
 
Awareness Security 123.pptx
Awareness Security 123.pptxAwareness Security 123.pptx
Awareness Security 123.pptx
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptx
 
USG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer (1).pptxUSG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer (1).pptx
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptx
 

Más de Carson City Library

Más de Carson City Library (17)

Digitorium at the Carson City Library
Digitorium at the Carson City LibraryDigitorium at the Carson City Library
Digitorium at the Carson City Library
 
Rocking Your PowerPoint Presentation
Rocking Your PowerPoint Presentation Rocking Your PowerPoint Presentation
Rocking Your PowerPoint Presentation
 
Introduction to HTML
Introduction to HTMLIntroduction to HTML
Introduction to HTML
 
Introduction to Mac OSX
Introduction to Mac OSXIntroduction to Mac OSX
Introduction to Mac OSX
 
Carson City Library MAKERSPACE
Carson City Library MAKERSPACECarson City Library MAKERSPACE
Carson City Library MAKERSPACE
 
Presenting Data In Excel
Presenting Data In ExcelPresenting Data In Excel
Presenting Data In Excel
 
Beginning Adobe InDesign CS6
Beginning Adobe InDesign CS6Beginning Adobe InDesign CS6
Beginning Adobe InDesign CS6
 
There's An App for That! Android
There's An App for That! AndroidThere's An App for That! Android
There's An App for That! Android
 
There's An App for That! Apple
There's An App for That! AppleThere's An App for That! Apple
There's An App for That! Apple
 
Beginning Digital Photography
Beginning Digital PhotographyBeginning Digital Photography
Beginning Digital Photography
 
There's An App For That! Librarian and Patron Edition
There's An App For That! Librarian and Patron EditionThere's An App For That! Librarian and Patron Edition
There's An App For That! Librarian and Patron Edition
 
Social Networking Introduction
Social Networking IntroductionSocial Networking Introduction
Social Networking Introduction
 
Pinterest
Pinterest Pinterest
Pinterest
 
Mouse and Keyboard
Mouse and KeyboardMouse and Keyboard
Mouse and Keyboard
 
Computers for Beginners
Computers for Beginners Computers for Beginners
Computers for Beginners
 
Beginning Excel
Beginning ExcelBeginning Excel
Beginning Excel
 
Introduction to Windows 7
Introduction to Windows 7Introduction to Windows 7
Introduction to Windows 7
 

Último

ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvRicaMaeCastro1
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxCLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxAnupam32727
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQuiz Club NITW
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdfMr Bounab Samir
 
Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfChristalin Nelson
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptxDhatriParmar
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...Nguyen Thanh Tu Collection
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationdeepaannamalai16
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6Vanessa Camilleri
 
4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptxmary850239
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research DiscourseAnita GoswamiGiri
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Developmentchesterberbo7
 

Último (20)

ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxCLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdf
 
Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdf
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentation
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6
 
4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research Discourse
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Development
 

Information Secuirty

  • 1. + Information Security Carson City Library @Two Digital Learning Center
  • 2. + Terminology  Virus:  Hacker: a general term used for anyone who spends time poking into others computers looking for vulnerabilities.  Social Engineering: the practice of obtaining confidential information by manipulation. e.g. someone pretending to be an administer to obtain password, bank account #s, etc.  Firewall-software/hardware used to black unauthorized access to a machine or network.  Password: a key that allows access to information.
  • 3. + What we’ll cover  Basic security terminology.  How to secure your home and public computer.  Securely creating and managing accounts and passwords.  How to secure your information on open wireless networks.  How to avoid online scams and insecure web pages.
  • 4. Don’t leave your computer + unattended! At Home  Create a password protected screen saver on your personal computer.  Log in and off your computer & accounts properly daily.  Disable File Sharing or Printing  Lock your home computer with Ctrl + Alt + Del when leaving unattended.  Shut down your computer & store in a safe room.
  • 5. Don’t leave your computer + unattended! In Public  Hide your library session by selecting “Hide your Session”  Watch out for “shoulder surfers”  Always log out of private accounts.  Never select to have web browser safe your login information or password.  Change months. your passwords every few
  • 6. + Using Public Wireless Connections  Unsecured, public Wi-Fi network at coffee shops, etc.  Most wireless routers have a FIREWALL to protect you from the internet doesn't mean you're protected from others connected to the same network. n Turn Off Sharing n Enable Your Firewall n Turn It Off When You're Not Using It!  On your home network, create a password to block unauthorized users.  For more tips: http://lifehacker.com/5576927/how-to-stay-safe-on-public-wi+fi-networks
  • 7. + Creating Passwords  At least 8 characters long!  Create  Create  Create a password that you don’t have written down.! a Password that is easy to remember a password you can type Quickly!
  • 8. + Most Importantly… Create a password that is a mixture of random lowercase, UPPERCASE, numbers (1,2,3,4,5,6,7,8,9) and Punctuation (!@$#)  A GOOD example: Dj2!Hxz5$  A BAD example: password1
  • 9. + What you should AVIOD!  Names of any kind.   Any kind of easily obtained information.   Your phone number, address, birthdays, license plate numbers. Sensitive information (login/user names)   Includes your user/login name, your first and last name, nicknames, spouse’s or pet’s names. ATM pins, bank account student id, social security number, credit/debit . Words contained in English or foreign language dictionaries.  Like password, secret, abc123, etc.
  • 10. + Password WORD sharing! DON’T do it!  NEVER share your passwords with others even close family and friends.  Be caution of anyone who wants to quickly login into your machine or claims to be an administrator.  NEVER send your passwords through e-mail. A new hackers trick.  NEVER give your passwords or other personal information through e-mail like your social security number, credit card information, etc.  Reputable companies will NOT ask you for this information over the internet or phone. Verify their phone number and call them back.
  • 11. + Discussion of internet websites to BEWARE! What are websites that could be unsafe and why? How can you do to protect yourself online?
  • 12. + Sites  Buying and Selling sites such as Craig’s List.  Banking websites  Social Networking sites like Facebook.  E-mail accounts.  Others….