Protecting Your Information Assets 5. 1. Explain why it is critical that you protect your...

22
Protecting Your Information Assets 5 5

Transcript of Protecting Your Information Assets 5. 1. Explain why it is critical that you protect your...

Protecting Your Information Assets

55

1.Explain why it is critical that you protect your information assets.

2. Identify the various behavioral actions you can take to protect your information assets.

3. Identify the various computerbased actions you can take to protect your information assets.

1. Introduction

2.Behavioral Actions to Protect Your Information Assets

3.Computer-Based Actions to Protect Your Information Assets

IntroductionTG 5.1

• Risk of Using Wireless Hot Spots While Traveling or Working from Home

• Protecting Yourself Due to the Rise in Organized Crime Online

• Two Types of Actions to Protect Yourself– Behavioral Actions– Computer-Based Actions

Behavioral Actions to Protect Your Information Assets

TG 5.2

• General Behavioral Actions• What to Do in the Event of

Identity Theft

General Behavioral Actions– Never provide personal information to strangers in

any format – Physical, Verbal, or Electronic– Protect Your Social Security Number– Secure Your Credit Cards Against Fraudulent Use

• Include a Picture on Your Credit Card• Write “Photo ID Required” in Signature Area• Use Virtual Credit Cards for Online Shopping• Pay close attention to Billing Cycles• Limit Use of Debit Cards• Have Credit Card Bills Delivered Paperless/Digitally

General Behavioral Actions (Continued)– Use a P.O. Box instead of your personal mailbox

at your home or apartment

– Lock Credit Files with LifeLock or TrustedID

What to Do in the Event of Identity Theft• Get a Lawyer• Get Organized• File a Detailed Police Report• Get the name and phone number of

your police investigator, and give it to your creditors

• In all communications about the crime, use certified, return-receipt mail

What to Do in the Event of Identity Theft (Continued)• Be sure to obtain your unique case number

from each credit agency, and ask each credit agency to send you your credit report

• Tell each agency to issue a fraud alert• Obtain the document that you need to file a

long-term fraud alert, which lasts for seven year or until cancelled.

• Ask the credit agencies for the names and phone number of lenders with whom fraudulent accounts have been opened

What to Do in the Event of Identity Theft (Continued)• Point out to each agency all entries

generated due to fraud• Instruct each agency to notify anyone who

received your credit report in the last six months that you are disputing the information

• Californians can order a “credit freeze” with all three major credit agencies

• Call your credit card companies directly• Change all your credit cards immediately

What to Do in the Event of Identity Theft (Continued)• Be alert for unauthorized change-of-

address notifications in your mail• Fill out fraud affidavits for creditors• If debt collector demand payment of

fraudulent accounts, write down the name of the company as well as the collector’s name, address, and phone number, and inform them you have been victimized

Computer-Based Actions to Protect Your Information Assets

TG 5.3

• Determining Which Internet Sites People Using Your Computer Have Visited

• Dangers of Social Networking Sites• Determining Whether Your Computer Is

Infected• Computer Actions to Prevent Malware

Infections• Protecting Your Portable Devices and

Information• Internet Explorer 9

Computer-Based Actions to Protect Your Information Assets (Continued)

TG 5.3

• Other Actions That You Can Take On Your Computer

• Protecting Your Privacy• Preparing for Personal

Disasters• Restoring Backup Files• Wireless Security

Computer Actions to Prevent Malware Infections• Test Your System• Install a Security Suite on Your

Computer• Install an Anti-Malware Product on Your

Computer• Install a Firewall on Your Computer• Install an Antispyware Product on Your

Computer

Computer Actions to Prevent Malware Infections (Continued)• Install Monitoring Software on Your

Computer• Install Content-Filtering Software on

Your Computer• Install Anti-spam Software on Your

Computer• Install Proactive Intrusion Detection

and Prevention Software on Your Computer

Computer Actions to Prevent Malware Infections (Continued)• Manage Patches• Use a Browser Other Than Internet

Explorer• Use an Operating System Other

Than Windows

Internet Explorer 9

• Protected Mode• ActiveX Opt-In• Fix My Settings• Windows Defender• Personal Data Safeguards• Phishing Filter• Delete Browsing History

Internet Explorer 9 (Continued)

• InPrivate• Domain Highlighting• SmartScreen Filter• Add-on Manager• Cross-site Scripting Filter• A 128-bit Secure Connection for

Using Secure Web Sites

Other Actions That You Can Take On Your Computer

• How To Detect a Worm• How to Detect a Trojan Horse• How to Detect Fake Web Sites

Protecting Your Privacy

• Use Strong Passwords• How to Adjust Your Privacy Settings on

Your Computer• How to Surf the Web Anonymously• How to E-Mail Anonymously• Turning Off Your Google Web History• Removing All Google Web or Search

History

Wireless Security

• Hide Your Service Set Identifier (SSID)

• Use Encryption• Filter Out Media Access Control

(MAC) Addresses• Limit Internet Protocol (IP) Addresses

Wireless Security (Continued)• Sniff Out Intruders• Using a Public Hotspot• Test Your Wireless Network• Wireless Security Software