Upload
giles-benson
View
212
Download
0
Embed Size (px)
Citation preview
Cyber HygieneThe Big Picture
© 2014 Project Lead The Way, Inc.Computer Science and Software Engineering
• Protect your public persona• Protect your private information• Protect devices and software• Protect the economy and
infrastructure
Why Focus on Cyber Hygiene?
Five Areas of Readiness
Action Description
Identify What's at risk? Data, devices, …
Protect How do you prevent a problem?
Detect How do you identify a problem?
Respond How do you contain a problem?
Recover How do you get back to normal?
How to Handle It• Document• Report• Do not escalate
Cyberbullying
How to Think About It• The Internet is
not anonymous.• Picture the
person! Keep it human.
• Cyber security jobs are projected to expand 5-fold in next few years
• Cyber attacks are now a common military weapon, targeting businesses
• Cyber espionage costs U.S. $400b/yr
High Demand in Cybersecurity Jobs
• Don't get too personal online• Protect passwords• Use a firewall and anti-virus
software• Use only well-reviewed software • Do not visit pornographic and
hacking sites• Backup your data; loss is inevitable
General Security
• Backup your data; loss is inevitableRegularly schedule time to backup data from servers, portable storage, and your devices
• Protect from physical loss
Protect Your Data