8
its.unc.edu 1 Version Oct 2009 v3 An ITS Security Training Module CLICK “FULL” TO VIEW SLIDE IN FULL SCREEN.

Security Awareness 9-10-09 v5 Wireless

Embed Size (px)

DESCRIPTION

Wireless

Citation preview

Page 1: Security Awareness 9-10-09 v5 Wireless

its.unc.edu 1

Version Oct 2009 v3

An ITS Security Training Module

CLICK “FULL” TO VIEW SLIDE IN FULL

SCREEN.

Page 2: Security Awareness 9-10-09 v5 Wireless

its.unc.edu 2

Many public places offer

free wireless connections

(WiFi). The convenience of

WiFi can also be abused to

illegally monitor and steal

your data.

Sensitive Information & Wireless

Connections

Sensitive Information & Wireless

Connections

Page 3: Security Awareness 9-10-09 v5 Wireless

its.unc.edu 3

Financial data& Wireless

Connections

Financial data& Wireless

Connections

If you bank online or

check your credit card

statement on the Web,

be sure to use a

wired connection or

encryption.

Section: Sensitive Information & Wireless

Page 4: Security Awareness 9-10-09 v5 Wireless

its.unc.edu 4

Is the information safely transferred?Is the information safely transferred?

A lock on the website

indicates that encryption

will be used in transfer

Website addresses that

start with https

Safe transfer of Sensitive Information may be indicated by a

number of items.

https://bankhere.xxx

Section: Sensitive Information & Wireless

Page 5: Security Awareness 9-10-09 v5 Wireless

its.unc.edu 5

Off-campus access to campus network

Off-campus access to campus network

If you are off-campus

and you need to

connect to campus,

use VPN software to

establish a secure

and encrypted data

connection to

campus.

Section: Sensitive Information & Wireless

Page 6: Security Awareness 9-10-09 v5 Wireless

its.unc.edu 6

Off-campus access to campus network

Off-campus access to campus network

Download the Cisco VPN

software program available

from shareware.unc.edu.

Any UNC-Chapel Hill affiliate

with an Onyen may use this

program.

Problems or Questions? Contact (919.962.HELP) or your departmental IT staff for assistance on downloading and installing any software from the ITS Shareware site.

Section: Sensitive Information & Wireless

Page 7: Security Awareness 9-10-09 v5 Wireless

its.unc.edu 7

Learning Point # 4Learning Point # 4

You stop by Starbucks and realize that you need to email an urgent report to your supervisor. Even though you

have your laptop with you, it is better to wait until you are in your office to send an email to your supervisor. Right?

Right!Wi-Fi hotspots, such as wireless

connections in coffeehouses, are a common location for criminals to

sniff wireless traffic. If you must use a wireless connection to connect to campus, use encryption provided by

VPN software.

Section: Sensitive Information & Wireless

Page 8: Security Awareness 9-10-09 v5 Wireless

its.unc.edu 8

Learning Point # 5Learning Point # 5

You check your gmail messages in the library, but since there is no other

user in the terminal area, you do not need to log out of your

account. Right?Wrong!

Many public access terminals do not have lock-out times and subsequent

users can retrieve your personal information cached on Web sites.

Logging out of Web sites is the only way to ensure that your login

credentials can not be accessed by other users.

Section: Sensitive Information & Wireless