Instructional Technology & Design Office [email protected] 217-244-4903 or 800-377-1892 Digital Security Basics Presented by Mark Baldwin & Brianna Walker
Feb 23, 2016
Instructional Technology & Design [email protected]
217-244-4903 or 800-377-1892
Digital Security BasicsPresented by Mark Baldwin & Brianna Walker
Objectives
Gain an acquaintance with some of the basic terms and concepts related to personal web security Gain an acquaintance with some of the most common, easy-to-use security tools
Agenda
Malware Types and how to defend against
PhishingTips for secure web browsing
PasswordsExtensions/add-ons
Backups
MalwareSome common types:
VirusesWormsAdwareSpywareTrojans
Reasons behind an attack:Gather information Take control of a computer or networkCrash/break a computer or networkFor fun (or the “lulz”)
Malware ProtectionMost important for Windows users (although mobile devices are beginning to be targeted more frequently)There can be only oneMany great free options:
Microsoft Security EssentialsAVGAvast
Install updates as they comeRun it automatically, on a schedule if possible
PhishingWhat is it?
From Wikipedia: “the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.”
Can include phone/IM scams also (sometimes known as vishing or smishing)
Be careful—investigate any site or individual that asks you for your password.
Secure Web Browsing: PasswordsStrong Passwords:
Don’t use dictionary words, pets’ names, birthdaysInclude caps, lowercase, numbers, and symbolsChange oftenAvoid having your browser save your password
Use different passwords for different sitesProtect all devices that connect to the internetUse a password manager (e.g. LastPass, KeyPass, 1Password)
Secure Web Browsing: Extensions
Browser add-ons/extensions:HTTPS EverywhereAdBlockGhostery
Be wary about, or avoid altogether, conducting sensitive business on public Wi-Fi (anything involving a financial transaction, for example)
Backups
If you encrypt them, make sure you don't lose the password (e.g. iOS devices)Physical
Hard drive (internal or external)DVD/CDFlashdrive
Cloud Dropbox, Google DriveCrashplan
Further Resources
Bookmark the following URL to review the some of the resources mentioned in this workshop at your leisure: http://urli.st/vo8
Note that ITD and the GSLIS Help Desk does not officially support or endorse any of the software listed—use your best judgment!
Questions?Thanks for coming!