Cyber Security Awareness Day
description
Transcript of Cyber Security Awareness Day
![Page 1: Cyber Security Awareness Day](https://reader035.fdocuments.net/reader035/viewer/2022081801/568166cb550346895ddad775/html5/thumbnails/1.jpg)
Cyber Security Awareness Day
October 17, 2013
![Page 2: Cyber Security Awareness Day](https://reader035.fdocuments.net/reader035/viewer/2022081801/568166cb550346895ddad775/html5/thumbnails/2.jpg)
WelcomeDr. Amanda Lee
Vice President of Instructional Services
![Page 3: Cyber Security Awareness Day](https://reader035.fdocuments.net/reader035/viewer/2022081801/568166cb550346895ddad775/html5/thumbnails/3.jpg)
Session 1Are You Protected?
Mark Grover & Garrett BaltezegarCFCC Instructors
![Page 4: Cyber Security Awareness Day](https://reader035.fdocuments.net/reader035/viewer/2022081801/568166cb550346895ddad775/html5/thumbnails/4.jpg)
Why are we here? Awareness
Definition: a. Knowledge or perception of a situation or fact b. Concern about and well-informed interest in a particular situation or development
Knowledge Resources:
www.cfcc.edu/cybersecurity
![Page 5: Cyber Security Awareness Day](https://reader035.fdocuments.net/reader035/viewer/2022081801/568166cb550346895ddad775/html5/thumbnails/5.jpg)
Topics Terminology Passwords Malware Wireless How do I protect myself?
![Page 6: Cyber Security Awareness Day](https://reader035.fdocuments.net/reader035/viewer/2022081801/568166cb550346895ddad775/html5/thumbnails/6.jpg)
Topics Terminology Passwords Malware Wireless How do I protect myself?
![Page 7: Cyber Security Awareness Day](https://reader035.fdocuments.net/reader035/viewer/2022081801/568166cb550346895ddad775/html5/thumbnails/7.jpg)
Terminology Threat
An event or object that may defeat security resulting in a loss.
Vulnerability A weakness that allows a threat to bypass security
Malware Any program intended to cause harm.
Virus Performs annoying or destructive activities – requires user
intervention to activate.
![Page 8: Cyber Security Awareness Day](https://reader035.fdocuments.net/reader035/viewer/2022081801/568166cb550346895ddad775/html5/thumbnails/8.jpg)
Terminology Worm
Takes advantage of vulnerabilities to enter a computer – does NOT require user interaction to spread.
Trojan Program advertised to do one thing but does something else.
Hacker A person that illegally breaks into, or attempts to break into, a
computer system. Phishing
Emails that attempt to trick users into surrendering private information or visit malicious websites.
![Page 9: Cyber Security Awareness Day](https://reader035.fdocuments.net/reader035/viewer/2022081801/568166cb550346895ddad775/html5/thumbnails/9.jpg)
Topics Terminology Passwords Malware Wireless How do I protect myself?
![Page 10: Cyber Security Awareness Day](https://reader035.fdocuments.net/reader035/viewer/2022081801/568166cb550346895ddad775/html5/thumbnails/10.jpg)
PasswordsWeak Passwords: Found in Dictionary Too Short Contain Personal
Information Reused multiple times Not Changed
![Page 11: Cyber Security Awareness Day](https://reader035.fdocuments.net/reader035/viewer/2022081801/568166cb550346895ddad775/html5/thumbnails/11.jpg)
Passwords Which password is better?
Xp4!e% Thisisaverylongpassword
Length ALWAYS trumps complexity
http://howsecureismypassword.net
![Page 12: Cyber Security Awareness Day](https://reader035.fdocuments.net/reader035/viewer/2022081801/568166cb550346895ddad775/html5/thumbnails/12.jpg)
Passwords Any password that can be memorized is a
weak password. Solution? Use a PASSPHRASE
NEVER share your password with anyone.
![Page 13: Cyber Security Awareness Day](https://reader035.fdocuments.net/reader035/viewer/2022081801/568166cb550346895ddad775/html5/thumbnails/13.jpg)
Topics Terminology Passwords Malware Wireless How do I protect myself?
![Page 14: Cyber Security Awareness Day](https://reader035.fdocuments.net/reader035/viewer/2022081801/568166cb550346895ddad775/html5/thumbnails/14.jpg)
Malware Can you recognize Malware?
Can you recognize a Phishing attack?
Demonstration
![Page 15: Cyber Security Awareness Day](https://reader035.fdocuments.net/reader035/viewer/2022081801/568166cb550346895ddad775/html5/thumbnails/15.jpg)
Topics Terminology Passwords Malware Wireless How do I protect myself?
![Page 16: Cyber Security Awareness Day](https://reader035.fdocuments.net/reader035/viewer/2022081801/568166cb550346895ddad775/html5/thumbnails/16.jpg)
Wireless Routers
Use STRONG passwords to lock down the device Disable Remote Management Use STRONG wireless security options
Use WPA2 instead of WEP
Bluetooth Turn OFF if not actively in use
![Page 17: Cyber Security Awareness Day](https://reader035.fdocuments.net/reader035/viewer/2022081801/568166cb550346895ddad775/html5/thumbnails/17.jpg)
Topics Terminology Passwords Malware Wireless How do I protect myself?
![Page 18: Cyber Security Awareness Day](https://reader035.fdocuments.net/reader035/viewer/2022081801/568166cb550346895ddad775/html5/thumbnails/18.jpg)
How do I protect myself? Keep your Operating System up to date Install and update your AntiVirus solution Install and update a Malware scanning
solution Recognize Phishing Scams Use STRONG Passwords Backup Important files
![Page 19: Cyber Security Awareness Day](https://reader035.fdocuments.net/reader035/viewer/2022081801/568166cb550346895ddad775/html5/thumbnails/19.jpg)
Session 2Topics in Information
SecurityZachary Mitcham
Chief Information Security OfficerUniversity of North Carolina Wilmington
![Page 20: Cyber Security Awareness Day](https://reader035.fdocuments.net/reader035/viewer/2022081801/568166cb550346895ddad775/html5/thumbnails/20.jpg)
Cyber Security Awareness Day
October 17, 2013
![Page 21: Cyber Security Awareness Day](https://reader035.fdocuments.net/reader035/viewer/2022081801/568166cb550346895ddad775/html5/thumbnails/21.jpg)