Transcript Slide 1

PLUG IT IN SIX
Protecting
Your Information Assets
OUTLINE
PI6.1 How to Protect Your Assets: The Basics
PI6.2 Behavioral Actions to Protect Your
Information Assets
PI6.3 Computer-Based Actions to Protect
Your Information Assets
LEARNING OBJECTIVES
1. Explain why it is critical that you protect your
information assets
2. Identify the various behavioral actions you
can take to protect your information assets
3. Identify the various computer-based actions
you can take to protect your information
assets
How to Protect Your Assets:
The Basics
• Two types of actions to protect your
information assets
– Behavioral actions
– Computer-based actions
Behavioral Actions to Protect Your
Information Assets
• Never provide personal information to strangers in any
format (physical, verbal, or electronic)
• Securing your credit cards
• Pay attention to credit card billing cycles
• Limit debit card usage
• Do not use a personal mailbox at home or apartment for
anything other than catalogs and magazines
• Cross-cut or confetti-shred mails and old records
• Sign up with a company that protects personal
information
Computer-Based Actions to Protect
Your Information Assets
• Determining where people have visited on the
internet using your computer
• The dangers of social networking sites
• Determining if your computer is infected with
malicious software (malware)
Computer Actions to Prevent
Malware Infections
• Never…
– Open unrequested attachments to e-mail files
– Open attachments or web links in e-mails from unknown
people
– Accept files from chat or instant messaging
– Download files/software over the internet from unknown
web sites
– Download unrequested files/software
• Test your system to evaluate how well your system is
protected from a variety of attacks
Computer Actions to Prevent Malware
Infections
• Install…
– Security suite
– Anti-malware product
– Antispyware product
– Monitoring software
– Content-filtering software
– Antispam software
– Proactive intrusion detection and prevention software
• Manage patches
• Use a browser other than internet explorer
• Use an operating system other than windows
Protecting Your Portable Devices
and Information
• Prevent the theft
• Use two-factor authentication
• Encrypt your data
Safety Features in
Internet Explorer 9
•
•
•
•
•
•
•
•
Protected Mode
ActiveX Opt-In
Fix My Settings
Widows Defender
Personal Data Safeguards
Personal Data Safeguards
Phishing Filter
Delete Browsing History
Safety Features in
Internet Explorer 9
•
•
•
•
•
•
InPrivate
Domain Highlighting
SmartScreen Filter
Add-on Manager
Cross-site Scripting Filter
A 128-Bit Secure Connection for Using Secure Web
Sites
Other Actions That You Can Take
on Your Computer
•
•
•
•
•
•
Detecting worms and Trojan horses
Detecting spoofed (fake) web sites
Turning off peer-to-peer file sharing
Looking for new and unusual files
Preparing for personal disasters
Restoring backup files
Protecting Your Privacy
•
•
•
•
•
Use strong passwords
Adjusting the privacy settings on your computer
Surf the web anonymously
E-mail anonymously
Erasing your Google
search history
Wireless Security
•
•
•
•
•
•
•
•
Hide your Service Set Identifier (SSID)
Use encryption
Filter out Media Access Control (MAC) addresses
Limit Internet Protocol (IP) addresses
Sniff out intruders
Using a public hotspot
Test your wireless network
Wireless security software