SlideShare a Scribd company logo
Good Computer Security Practices Basic Security Awareness
Overview What is Information and Computer Security? “ Top 10 List” of Good Computer Security Practices  Protecting Restricted Data Reporting Security Incidents Additional Resources
What is Information and  Computer Security ?
…  the protection of computing systems and the data that they store or access. Desktop computers Confidential data Laptop computers Restricted data Servers Personal information Blackberries Archives Flash drives Databases
Isn’t this just an IT Problem? Why do  I  need to learn about computer security? Everyone who uses a computer needs  to understand how to keep his or her computer and data secure.
Good security practices follow the “90/10” rule 10% of security safeguards are technical 90% of security safeguards rely on us – the user - to adhere to good computing practices
Embarrassment to yourself and/or the University Having to recreate lost data Identity theft Data corruption or destruction Loss of patient, employee, and public trust Costly reporting requirements and penalties Disciplinary action (up to expulsion or termination) Unavailability of vital data What are the consequences of security violations?
“ Top Ten List”   Good Computer Security Practices
Don’t keep restricted data on portable devices.  2 .   Back-up your data. Make backups a regular task, ideally at least once a day.  Backup data to removable media such as portable hard drives, CDs, DVDs, or a USB memory stick.  Store backup media safely and separately from the equipment.  Remember, your data is valuable…  don’t keep your backups in the same physical location as your computer!
Data Backups How effective would you be if your email, word processing documents, excel spreadsheets and contact database were wiped out?  How many hours would it take to rebuild that information from scratch?
3. Use cryptic passwords that can’t be easily guessed and protect your passwords - don’t write them down and don’t share them!
4. Make sure your computer has anti-virus, anti-spyware and firewall protection as well as all necessary security patches. 5. Don’t install unknown or unsolicited programs on your computer. “ I’ll   just   keep finding new ways to break in!”
6 .  Practice safe e-mailing Don’t open, forward, or reply to suspicious e-mails Don’t open e-mail attachments or click on  website addresses  Delete spam  Use secure e-mail system to send confidential information
You receive an e-mail with an attachment from “IT Security” stating that you need to open the attachment.  What should you do?  a) Follow the instructions b) Open the e-mail attachment c) Reply and say “take me off this list” d) Delete the message  e) Contact Customer Support
You receive an e-mail with an attachment from “IT Security” stating that you need to open the attachment .  What should you do?  a) Follow the instructions b) Open the e-mail attachment c) Reply and say “take me off this list” d) Delete the message  e) Contact Customer Support  d)   Delete the e-mail message!  e) Contact Customer Support for further instructions – but do not open, reply to, or forward any suspicious e-mails!
Your sister sends you an e-mail at school with a screen saver attachment.   What should you do?  a) Download it b) Forward the message  c) Call a tech-savvy friend to help install it d) Delete the message
Your sister sends you an e-mail at school with a screen saver attachment.  What should you do?  a) Download it b) Forward the message to a friend c) Call a tech-savvy friend to help install it d) Delete the message d) Delete it! Never put unknown or unsolicited programs or software on your computer. Screen savers may contain viruses.
7. Practice safe Internet use ~ Accessing any site on the internet could be tracked back to your name and location. Accessing sites with questionable content often results in spam or release of viruses. And it bears repeating… Don’t download unknown or unsolicited programs!
8. & 9. Physically secure your area and data when unattended ~ Secure your files and portable equipment -  including memory sticks. Secure laptop computers with a lockdown cable. Never share your ID badge, access codes, cards, or key devices (e.g. Axiom card)
10. Lock your screen For a PC ~ <ctrl> <alt> <delete> <enter>  OR <  > <L> For a Mac ~ Configure screensaver with your password   Create a shortcut to activate screensaver Use a password to start up or wake-up your computer .
Which workstation security safeguards are  YOU   responsible  for following and/or protecting? a) User ID b) Password c) Log-off programs d) Lock up office or work area (doors, windows) e) All of the above
Which workstation security safeguards are  YOU  responsible  for following and/or protecting? a) User ID b) Password c) Log-off programs d) Lock-up office or work area (doors, windows) e) All of the above ALL OF THE ABOVE!
The mouse on your computer screen starts to move around on its own and click on things on your desktop.  What do you do?  a) Show a faculty member or other students b) Unplug network cable c) Unplug your mouse d) Report the incident to whomever supports your computer e) Turn your computer off f)  Run anti-virus software g) All of the above
The mouse on your computer screen starts to move around on its own and click on things on Your desktop.  What do you do?   This is a security incident! Immediately report the problem to whomever supports your computer. Since it is possible that someone is controlling the computer remotely, it is best if you can unplug the network cable until you can get help.
What can an attacker do to your computer? a) Hide programs that launch attacks  b) Generate large volumes of unwanted traffic, slowing down the entire system c) Distribute illegal software from your computer d) Access restricted information (e.g. identity theft) e) Record all of your keystrokes and get your passwords
What can an attacker do to your computer? a) Hide programs that launch attacks  b) Generate large volumes of unwanted traffic, slowing down the entire system c) Distribute illegal software from your computer  d) Access restricted information (e.g. identity theft) e) Record all of your keystrokes and get your passwords ALL OF THE ABOVE! A compromised computer can be used for all kinds of surprising things.
Protecting Restricted Data
Restricted data includes, but is not limited to: Name or first initial and last name  Health or medical information Social security numbers Ethnicity or gender Date of birth Financial information (credit card number,  bank account number) Proprietary data and copyrighted  information Student records Information subject to a non-disclosure  agreement
Managing Restricted Data Know where this data is stored. Destroy restricted data which  is no longer needed ~ shred or otherwise destroy restricted data before throwing it away erase/degauss information before disposing of or re-using drives Protect restricted data that you keep ~ back-up your data regularly
Reporting Security Incidents

More Related Content

PPTX
Cyber Threats
PPTX
Different types of attacks in internet
PPT
Browser Security
PDF
Introduction to Software Security and Best Practices
PDF
Secure coding guidelines
PDF
Threat Hunting with Splunk Hands-on
PPTX
Social Engineering
PPTX
Cyber Threats
Different types of attacks in internet
Browser Security
Introduction to Software Security and Best Practices
Secure coding guidelines
Threat Hunting with Splunk Hands-on
Social Engineering

What's hot (20)

PPTX
Social engineering
DOC
Cybersecurity
PDF
Cyber Security Vulnerabilities
PPTX
PPTX
Cybersecurity 1. intro to cybersecurity
PPTX
Is6120 data security presentation
PPTX
Cyber Security Awareness
PDF
How To Handle Cybersecurity Risk PowerPoint Presentation Slides
PPTX
Social Networking Security
PDF
Web Application Security 101
PDF
Cyber Security 2017 Challenges
PPT
PDF
Web Application Security and Awareness
PPTX
Network security and viruses
PDF
What is Social Engineering? An illustrated presentation.
PPTX
Cyber security with ai
PDF
Cloud Security Top Threats
PDF
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
PPTX
OWASP Top 10 2021 Presentation (Jul 2022)
ODP
Cyber security awareness
Social engineering
Cybersecurity
Cyber Security Vulnerabilities
Cybersecurity 1. intro to cybersecurity
Is6120 data security presentation
Cyber Security Awareness
How To Handle Cybersecurity Risk PowerPoint Presentation Slides
Social Networking Security
Web Application Security 101
Cyber Security 2017 Challenges
Web Application Security and Awareness
Network security and viruses
What is Social Engineering? An illustrated presentation.
Cyber security with ai
Cloud Security Top Threats
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
OWASP Top 10 2021 Presentation (Jul 2022)
Cyber security awareness
Ad

Viewers also liked (20)

PDF
Computer Security
PDF
Computer Security and Risks
PPTX
Computer Security 101
PDF
Computer Security Threats
PPT
Social Media Technologies for Business Intelligence (Crisis, Security, Travel...
PDF
network+ شهادة
PPT
Network security
PDF
PPM Security Manifesto - Gulhigen #Olhuvaalimanifesto
PPT
Computer Network Security
PPTX
Introduction to security
PPT
Network Security
PPT
Introduction to Malware
PPTX
The Benefits of Social Media Marketing for Business in the 21st century.
PPTX
Antivirus PPt
ODP
Computer virus
PPT
Computer Malware
PDF
Computer Security and Safety, Ethics & Privacy
PPTX
presentation on computer virus
PDF
Social Media for Business
PPTX
Computer virus (Microsoft Powerpoint)
Computer Security
Computer Security and Risks
Computer Security 101
Computer Security Threats
Social Media Technologies for Business Intelligence (Crisis, Security, Travel...
network+ شهادة
Network security
PPM Security Manifesto - Gulhigen #Olhuvaalimanifesto
Computer Network Security
Introduction to security
Network Security
Introduction to Malware
The Benefits of Social Media Marketing for Business in the 21st century.
Antivirus PPt
Computer virus
Computer Malware
Computer Security and Safety, Ethics & Privacy
presentation on computer virus
Social Media for Business
Computer virus (Microsoft Powerpoint)
Ad

Similar to Computer Security (20)

PPTX
Basic_computerHygiene
PPTX
Security Awareness 101
PDF
Cyber security
DOCX
Giarritano concept paper 4
PPTX
Cyber-savvy Cyber-safety
DOCX
A day that will be remembered
PPT
UserSecurityAwareness.ppt awareness of security
PPT
IT security awareness
PPTX
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
PDF
Employee Security Awareness Program
PPTX
USG_Security_Awareness_Primer (1).pptx
PPTX
USG_Security_Awareness_Primer.pptx
PPTX
Awareness Security 123.pptx
PPTX
USG_Security_Awareness_Primer.pptx
PPTX
IT Security DOs and DON'Ts
PPT
Information security awareness
 
PPTX
Computer Safety and Ethics.pptx
PPTX
Internet
PPTX
Security awareness
PPT
Securitytips
Basic_computerHygiene
Security Awareness 101
Cyber security
Giarritano concept paper 4
Cyber-savvy Cyber-safety
A day that will be remembered
UserSecurityAwareness.ppt awareness of security
IT security awareness
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Employee Security Awareness Program
USG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer.pptx
Awareness Security 123.pptx
USG_Security_Awareness_Primer.pptx
IT Security DOs and DON'Ts
Information security awareness
 
Computer Safety and Ethics.pptx
Internet
Security awareness
Securitytips

Recently uploaded (20)

PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
cuic standard and advanced reporting.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Approach and Philosophy of On baking technology
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
NewMind AI Monthly Chronicles - July 2025
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Big Data Technologies - Introduction.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Chapter 3 Spatial Domain Image Processing.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
NewMind AI Weekly Chronicles - August'25 Week I
Network Security Unit 5.pdf for BCA BBA.
cuic standard and advanced reporting.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Unlocking AI with Model Context Protocol (MCP)
Approach and Philosophy of On baking technology
Digital-Transformation-Roadmap-for-Companies.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”

Computer Security

  • 1. Good Computer Security Practices Basic Security Awareness
  • 2. Overview What is Information and Computer Security? “ Top 10 List” of Good Computer Security Practices Protecting Restricted Data Reporting Security Incidents Additional Resources
  • 3. What is Information and Computer Security ?
  • 4. … the protection of computing systems and the data that they store or access. Desktop computers Confidential data Laptop computers Restricted data Servers Personal information Blackberries Archives Flash drives Databases
  • 5. Isn’t this just an IT Problem? Why do I need to learn about computer security? Everyone who uses a computer needs to understand how to keep his or her computer and data secure.
  • 6. Good security practices follow the “90/10” rule 10% of security safeguards are technical 90% of security safeguards rely on us – the user - to adhere to good computing practices
  • 7. Embarrassment to yourself and/or the University Having to recreate lost data Identity theft Data corruption or destruction Loss of patient, employee, and public trust Costly reporting requirements and penalties Disciplinary action (up to expulsion or termination) Unavailability of vital data What are the consequences of security violations?
  • 8. “ Top Ten List” Good Computer Security Practices
  • 9. Don’t keep restricted data on portable devices. 2 . Back-up your data. Make backups a regular task, ideally at least once a day. Backup data to removable media such as portable hard drives, CDs, DVDs, or a USB memory stick. Store backup media safely and separately from the equipment. Remember, your data is valuable… don’t keep your backups in the same physical location as your computer!
  • 10. Data Backups How effective would you be if your email, word processing documents, excel spreadsheets and contact database were wiped out? How many hours would it take to rebuild that information from scratch?
  • 11. 3. Use cryptic passwords that can’t be easily guessed and protect your passwords - don’t write them down and don’t share them!
  • 12. 4. Make sure your computer has anti-virus, anti-spyware and firewall protection as well as all necessary security patches. 5. Don’t install unknown or unsolicited programs on your computer. “ I’ll just keep finding new ways to break in!”
  • 13. 6 . Practice safe e-mailing Don’t open, forward, or reply to suspicious e-mails Don’t open e-mail attachments or click on website addresses Delete spam Use secure e-mail system to send confidential information
  • 14. You receive an e-mail with an attachment from “IT Security” stating that you need to open the attachment. What should you do? a) Follow the instructions b) Open the e-mail attachment c) Reply and say “take me off this list” d) Delete the message e) Contact Customer Support
  • 15. You receive an e-mail with an attachment from “IT Security” stating that you need to open the attachment . What should you do? a) Follow the instructions b) Open the e-mail attachment c) Reply and say “take me off this list” d) Delete the message e) Contact Customer Support d) Delete the e-mail message! e) Contact Customer Support for further instructions – but do not open, reply to, or forward any suspicious e-mails!
  • 16. Your sister sends you an e-mail at school with a screen saver attachment. What should you do? a) Download it b) Forward the message c) Call a tech-savvy friend to help install it d) Delete the message
  • 17. Your sister sends you an e-mail at school with a screen saver attachment. What should you do? a) Download it b) Forward the message to a friend c) Call a tech-savvy friend to help install it d) Delete the message d) Delete it! Never put unknown or unsolicited programs or software on your computer. Screen savers may contain viruses.
  • 18. 7. Practice safe Internet use ~ Accessing any site on the internet could be tracked back to your name and location. Accessing sites with questionable content often results in spam or release of viruses. And it bears repeating… Don’t download unknown or unsolicited programs!
  • 19. 8. & 9. Physically secure your area and data when unattended ~ Secure your files and portable equipment - including memory sticks. Secure laptop computers with a lockdown cable. Never share your ID badge, access codes, cards, or key devices (e.g. Axiom card)
  • 20. 10. Lock your screen For a PC ~ <ctrl> <alt> <delete> <enter> OR <  > <L> For a Mac ~ Configure screensaver with your password Create a shortcut to activate screensaver Use a password to start up or wake-up your computer .
  • 21. Which workstation security safeguards are YOU responsible for following and/or protecting? a) User ID b) Password c) Log-off programs d) Lock up office or work area (doors, windows) e) All of the above
  • 22. Which workstation security safeguards are YOU responsible for following and/or protecting? a) User ID b) Password c) Log-off programs d) Lock-up office or work area (doors, windows) e) All of the above ALL OF THE ABOVE!
  • 23. The mouse on your computer screen starts to move around on its own and click on things on your desktop. What do you do? a) Show a faculty member or other students b) Unplug network cable c) Unplug your mouse d) Report the incident to whomever supports your computer e) Turn your computer off f) Run anti-virus software g) All of the above
  • 24. The mouse on your computer screen starts to move around on its own and click on things on Your desktop. What do you do? This is a security incident! Immediately report the problem to whomever supports your computer. Since it is possible that someone is controlling the computer remotely, it is best if you can unplug the network cable until you can get help.
  • 25. What can an attacker do to your computer? a) Hide programs that launch attacks b) Generate large volumes of unwanted traffic, slowing down the entire system c) Distribute illegal software from your computer d) Access restricted information (e.g. identity theft) e) Record all of your keystrokes and get your passwords
  • 26. What can an attacker do to your computer? a) Hide programs that launch attacks b) Generate large volumes of unwanted traffic, slowing down the entire system c) Distribute illegal software from your computer d) Access restricted information (e.g. identity theft) e) Record all of your keystrokes and get your passwords ALL OF THE ABOVE! A compromised computer can be used for all kinds of surprising things.
  • 28. Restricted data includes, but is not limited to: Name or first initial and last name Health or medical information Social security numbers Ethnicity or gender Date of birth Financial information (credit card number, bank account number) Proprietary data and copyrighted information Student records Information subject to a non-disclosure agreement
  • 29. Managing Restricted Data Know where this data is stored. Destroy restricted data which is no longer needed ~ shred or otherwise destroy restricted data before throwing it away erase/degauss information before disposing of or re-using drives Protect restricted data that you keep ~ back-up your data regularly

Editor's Notes

  • #2: Hello; Thank you Overview of computer security and good computing practices. This is kind-of a whirlwind overview, so the handout that you have has additional information and details about any of the things that I will be talking about.