Protecting Your Information Assets 5. 1. Explain why it is critical that you protect your...
-
Upload
constance-barton -
Category
Documents
-
view
217 -
download
1
Transcript of Protecting Your Information Assets 5. 1. Explain why it is critical that you protect your...
1.Explain why it is critical that you protect your information assets.
2. Identify the various behavioral actions you can take to protect your information assets.
3. Identify the various computerbased actions you can take to protect your information assets.
1. Introduction
2.Behavioral Actions to Protect Your Information Assets
3.Computer-Based Actions to Protect Your Information Assets
IntroductionTG 5.1
• Risk of Using Wireless Hot Spots While Traveling or Working from Home
• Protecting Yourself Due to the Rise in Organized Crime Online
• Two Types of Actions to Protect Yourself– Behavioral Actions– Computer-Based Actions
Behavioral Actions to Protect Your Information Assets
TG 5.2
• General Behavioral Actions• What to Do in the Event of
Identity Theft
General Behavioral Actions– Never provide personal information to strangers in
any format – Physical, Verbal, or Electronic– Protect Your Social Security Number– Secure Your Credit Cards Against Fraudulent Use
• Include a Picture on Your Credit Card• Write “Photo ID Required” in Signature Area• Use Virtual Credit Cards for Online Shopping• Pay close attention to Billing Cycles• Limit Use of Debit Cards• Have Credit Card Bills Delivered Paperless/Digitally
General Behavioral Actions (Continued)– Use a P.O. Box instead of your personal mailbox
at your home or apartment
– Lock Credit Files with LifeLock or TrustedID
What to Do in the Event of Identity Theft• Get a Lawyer• Get Organized• File a Detailed Police Report• Get the name and phone number of
your police investigator, and give it to your creditors
• In all communications about the crime, use certified, return-receipt mail
What to Do in the Event of Identity Theft (Continued)• Be sure to obtain your unique case number
from each credit agency, and ask each credit agency to send you your credit report
• Tell each agency to issue a fraud alert• Obtain the document that you need to file a
long-term fraud alert, which lasts for seven year or until cancelled.
• Ask the credit agencies for the names and phone number of lenders with whom fraudulent accounts have been opened
What to Do in the Event of Identity Theft (Continued)• Point out to each agency all entries
generated due to fraud• Instruct each agency to notify anyone who
received your credit report in the last six months that you are disputing the information
• Californians can order a “credit freeze” with all three major credit agencies
• Call your credit card companies directly• Change all your credit cards immediately
What to Do in the Event of Identity Theft (Continued)• Be alert for unauthorized change-of-
address notifications in your mail• Fill out fraud affidavits for creditors• If debt collector demand payment of
fraudulent accounts, write down the name of the company as well as the collector’s name, address, and phone number, and inform them you have been victimized
Computer-Based Actions to Protect Your Information Assets
TG 5.3
• Determining Which Internet Sites People Using Your Computer Have Visited
• Dangers of Social Networking Sites• Determining Whether Your Computer Is
Infected• Computer Actions to Prevent Malware
Infections• Protecting Your Portable Devices and
Information• Internet Explorer 9
Computer-Based Actions to Protect Your Information Assets (Continued)
TG 5.3
• Other Actions That You Can Take On Your Computer
• Protecting Your Privacy• Preparing for Personal
Disasters• Restoring Backup Files• Wireless Security
Computer Actions to Prevent Malware Infections• Test Your System• Install a Security Suite on Your
Computer• Install an Anti-Malware Product on Your
Computer• Install a Firewall on Your Computer• Install an Antispyware Product on Your
Computer
Computer Actions to Prevent Malware Infections (Continued)• Install Monitoring Software on Your
Computer• Install Content-Filtering Software on
Your Computer• Install Anti-spam Software on Your
Computer• Install Proactive Intrusion Detection
and Prevention Software on Your Computer
Computer Actions to Prevent Malware Infections (Continued)• Manage Patches• Use a Browser Other Than Internet
Explorer• Use an Operating System Other
Than Windows
Internet Explorer 9
• Protected Mode• ActiveX Opt-In• Fix My Settings• Windows Defender• Personal Data Safeguards• Phishing Filter• Delete Browsing History
Internet Explorer 9 (Continued)
• InPrivate• Domain Highlighting• SmartScreen Filter• Add-on Manager• Cross-site Scripting Filter• A 128-bit Secure Connection for
Using Secure Web Sites
Other Actions That You Can Take On Your Computer
• How To Detect a Worm• How to Detect a Trojan Horse• How to Detect Fake Web Sites
Protecting Your Privacy
• Use Strong Passwords• How to Adjust Your Privacy Settings on
Your Computer• How to Surf the Web Anonymously• How to E-Mail Anonymously• Turning Off Your Google Web History• Removing All Google Web or Search
History
Wireless Security
• Hide Your Service Set Identifier (SSID)
• Use Encryption• Filter Out Media Access Control
(MAC) Addresses• Limit Internet Protocol (IP) Addresses