Upload
norma-stewart
View
220
Download
3
Tags:
Embed Size (px)
Citation preview
oE-safety is about measures and best practices fer netizens to guard their personel safety and the security of their network.
E-Safety
objective
• Conditions where digital security breaches & attacks can happen
• Understand the effects of various kind of security breaches & attacks.
• Ways to get protect from security breaches & attacks.
• Important to safe guard digital safety and security.
• Shared Resources VS Dedicated Resources
Unethical Behavior
Downloading pirated software Printing a lot of personel files Storing files that have nothing to do
work such as personel photo files in the share storage
INTERNET dangers: Internet threats can take on a range of forms or attacks Internet can create illusion to turn strangers into “friends” It can damage your reputation.
Common Forms of Digital Security Breaches Identity Theft - Phishing e-mails Hacker & Crackers Cyber stalking Cyber bully Internet Predator and Pornography
Phishing e-mail• SPAM emails? - randomly sent email purporting to come from an
organisation or individual and claim to contain urgent news, confirmation of a non-existent order.
• Why? - to get as much personal information from a user as possible. This includes login information, date of birth, and other identifiable information that can help Cyberstalkers open up bogus accounts under your name or steal from your existing ones.
• Effect? Visiting to this web site with an unprotected computer and web browser allows the attacker to run spyware on your PC.
Protection from security breaches & attacks
Self Awareness• Online Banking: Only do online banking in the
security of your own home if at all possible. • Identity Theft• Phishing.• keeping up to date is very important.
Protection from security breaches & attacks
Implement policy • Good Password Practice:
Use strong password. Hard to guess.use hardly password Changed periodically by force password change on first
login and establish a maximum password lifetime. it will minimize the risk of unauthorized access.
Kept it secret. be VERY careful where it’s stored and don’t tell anyone else your password. And the most important thing is, you can remembered it: Embedding special characters like “P@sswOrd”. Use the first letters of a common phrase and throw in some
special characters and numbers like “Hope for the best, plan for the worst” to “H4tb,p4tw”.
Protection from security breaches & attacks
Implement policy on shared resources• A shared resource or network share is a device or piece of
information on a computer that can be remotely accessed from another computer via a local area network or Intranet. It can be a file access, printer, scanner or etc Best Practice:
Limit user access to sensitive areas of the network, so users can only access specified areas as required by their job.
Ensure users have the correct hardware, resources and software in place to protect them against data breaches.
Educating users on organisation security policies and precautions, so they are aware of how data breaches can happen and the implications
Ensuring users log off their accounts, turn of computers and don’t share passwords with others to prevent people accessing data.
Plan backup and recovery strategy to ensure organisation functioning well.
Ask user to report immediately to network admin if they see something weird on your pc.
Common forms of digital security breach
Identify theft:the importance of securing personel information on that computer.
Pishing email:phish,yir money gone. Hacker and cracker:kaspersky’s Malaysian site
Hacked By Turkish Hacker. Cyber Stalking:Cyber Stalking a serious threat Cyber Bullying:Nine teenegerfs chared in the
death of phoebe Prince Internet Predator:Calgary Man with luring 6
girls.
How erase the data from old computer
Dismantle the computer Take out the hard driver Physically destroy the hard disk