PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics...

Click here to load reader

download PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based

of 32

  • date post

    12-Jan-2016
  • Category

    Documents

  • view

    214
  • download

    2

Embed Size (px)

Transcript of PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics...

Chapter 8

7Protecting Your Information AssetsPLUG IT INHow to Protect Your Assets: The BasicsBehavioral Actions to Protect Your Information AssetsComputer-Based Actions to Protect Your Information AssetsExplain why it is critical that you protect your information assets.Identify the various behavioral actions you can take to protect your information assets.Identify the various computer-based actions you can take to protect your information assets.>>>How to Protect Your Assets: The BasicsPI7.1Business travelWorking from homeVarious activities at our favorite hotspotIndustrial strength IS security from workAttacks on a home networkAreas of ExposureBusiness travel Working from homeVarious activities at our favorite hotspotIndustrial strength IS security from work Versus Attacks on a home network

4How to Protect Your Assets: The Basics

Two types of actions to protect your information assets:behavioral actionscomputer-based actions5Behavioral Actions to Protect Your Information AssetsPI7.2General Behavioral ActionsWhat to Do in the Event of Identity TheftBehavioral actions: those actions that do not specifically involve a computer.6General Behavioral ActionsNever provide personal information to anyone in any formatProtect your Social Security numberUse credit cards with your picture on themWrite Photo ID Required on the back of credit cardsGeneral Behavioral Actions (Continued)Use virtual credit cardsPay very close attention to your credit card billing cyclesReceive your credit card bills electronicallyOnly use the last four digits of your credit card account when paying by checkGeneral Behavioral Actions (Continued)Limit your use of debit cardsUse secure, private mailbox/PO BoxUse a cross-cut or confetti shredder to dispose of old mail & recordsSign up for a proactive protection service (e.g., lifelock.com, trustedid.com, cardcops.com)What to Do in the Event of Identity TheftReview instructions from the Federal Trade Commission (FTC) and immediately take the actions outlined in the following slides.

What to Do in the Event of Identity Theft (continued)Step 1:Place an Initial Fraud Alert by contacting all three credit reporting agencies (Equifax, Experian, TransunionKeep a detailed record of all communication (phone calls, letters, e-mail)

What to Do in the Event of Identity Theft (continued)Step 2:Order credit reports from all three nationwide credit reporting companies.Keep detailed records of everything you requested and received

What to Do in the Event of Identity Theft (continued)Step 3:Create and Identity Theft Report that includes an Identity Theft Affidavit and a police report.

What to Do in the Event of Identity Theft (continued)Step 4:Regularly review your credit report.Pay particular attention to medical benefit explanations from your insurance company.Respond quickly to notices from the Internal Revenue Service (IRS)Obtain legal counsel

Computer-Based Actions to Protect Your Information AssetsPI7.3Determining Where People Have Visited on the Internet Using Your ComputerThe Dangers of Social Networking SitesDetermining if Your Computer is InfectedComputer-based actions: relate to safe computing.

15Computer-Based Actions to Protect Your Information Assets (Continued)PI7.3Computer Actions to Prevent Malware InfectionsProtecting Your Portable Devices and InformationOther Actions You Can Take On Your ComputerProtecting Your PrivacyComputer-Based Actions to Protect Your Information Assets (Continued)PI7.3Preparing for Personal DisastersWireless SecurityMobile Security

Determining Where People Have Visited on the Internet Using Your ComputerOther people who may use your home computer may not practice Safe Computing practicesReview the browser historyRequire a password for users on your home computerThe Dangers of Social Networking SitesNever post personal information about yourself or your familyDeleted photos, posts, and messages can be copied and reposted by othersUse the Privacy Settings to maintain control over your information

The Dangers of Social Networks

(Source: Jure Porenta / Shutterstock)Determining if Your Computer is InfectedSigns that your computer system is infected with malicious software or malwareYour computer shuts down unexpectedly by itselfYour computer does not start normallyDetermining if Your Computer is Infected (continued)Your computer exhibits erratic behavior, displaying some or all of these characteristics:System runs out of hard drive space (memory)System continually runs out of main memory (RAM)Programs take longer to load than normalPrograms act erraticallyMonitor displays strange graphics or messages.System displays a high number of error messages.Your e-mail client automatically sends messages to all your contactsComputer Actions to Prevent Malware InfectionsTest Your SystemInstall a Security Suite on Your ComputerInstall an Anti-malware Product on Your ComputerInstall a Firewall on Your ComputerComputer Actions to Prevent Malware Infections (cont)Install an Antispyware Product on Your ComputerInstall Monitoring Software on Your ComputerInstall Content-Filtering Software on Your ComputerComputer Actions to Prevent Malware Infections (cont)Install Antispam Software on Your ComputerManage Software PatchesUse a Browser Other Than Internet ExplorerUse an Operating System Other Than WindowsProtecting Your Portable Devices and InformationKeep portable devices in an inconspicuous container/carrierDo not leave portable devices unattended in plain viewUse alarmsTwo-factor authenticationUse data encryption on portable devicesOther Actions You Can Take On Your ComputerHow to detect a wormHow to detect a Trojan HorseHow to detect fake Web Sites

Protecting Your PrivacyUse strong passwordsHow to adjust your privacy settings on your computerHow to surf the Web anonymouslyHow to e-mail anonymouslyErasing your Google search historyPreparing for Personal DisastersSafe deposit box for important papersFireproof safe at home for important documentsRegularly backup key computer filesEncrypt backup filesBackup to cloud or external drivesWireless SecurityHide your Service Set Identifier (SSID)Use encryptionFilter out media access control addressesLimit IP AddressesSniff out intrudersWireless Security (continued)Using a Public HotspotTest your wireless networkWireless security softwareMobile SecurityMobile best practicesStrong passwordEncrypted backupsAutolock optionLimit location based servicesMaintain software/hardware updatesBe cautious when downloading apps32