SlideShare une entreprise Scribd logo
1  sur  7
Télécharger pour lire hors ligne
Leah Giarritano
March 20, 2012
LIS451LE
Concept Paper #4: Security


It’s easy to be lulled into a false sense of security when using your
computer. However, potential dangers lurk just around the corner and
you must be prepared. There are hardware, software and user security
issues to be aware of when using your computer. The following are my
top ten suggestions to follow in order to keep your computer and
network safe and have some peace of mind.

  1. Protect your home network from “crackers” by using firewalls
     (hardware and software options exist and you can use both
     forms) to monitor data traffic. Select the desired level of security
     for your firewall.Anytime an application without an established
     firewall rule attempts to access the Internet, the firewall will
     allow the user to allow or deny Internet access. Most commonly,
     you want to be sure that access to the Internet be allowed for
     email, web surfing, and chatting. (Hardware/Software Issue)
  2. If you use a wireless router, set a password and enable
     encryption. Most routers have either Wireless Encryption (WEP)
     or Wi-Fi Protected Access (WPA). Selecting the encryption option
     and a secure router administrator password are two very
     important steps to keep your network secure.A broadband router
     with a built in firewall provides the first line of defense at the
     perimeter of the LAN (where the LAN meets the Internet).
     (Hardware Issue)
  3. Installing anti-virus software (to protect against worms, viruses
     and Trojans) is a critical step in protecting your system. It has the
     ability to prevent malware from infecting your computer. Be sure
     to keep your anti-virus software up-to-date by using the auto-
     update feature on a weekly basis. You may also need to regularly
     check for patches and updates for the operating system and other
     important software packages. (Software Issue)
  4. Additional applications to investigate are anti-spyware and anti-
     adware programs. Like anti-virus software, these programs
     monitor your online activities and send information to another
computer. Many of these programs have an option to monitor
      your computer in real time. In others cases, you may have to set
      up a regular, manual monitoring schedule.(Software Issue)
 5.   Be cautious about email that you receive from unknown senders.
      To be safe, avoid clicking on hyperlinks in email that can
      potentially lead you to a site hosting malware or initiate a
      malware download. To be extra cautious, don’t click on
      hyperlinks at all, type the URL into your browser’s address bar
      yourself.(User Issue)
 6.   Be very protective of your passwords. Select passwords that
      include a string of letters, numbers and other characters. Don’t
      use the same password for all of your accounts. Change your
      passwords every 30-60 days. Create an encrypted list of
      passwords for yourself so you can keep track of them.(User
      Issue)
 7.   As an Internet user, recognize the threat that exists to your
      personal identity and the information housed on your computer.
      Change your Internet behavior by first understanding the
      personal consequences of getting hacked or getting a virus. This
      realization should alter your behavior and make you think twice
      before engaging is unsafe Internet practices like downloading
      unknown documents, following links from unknown senders and
      generally putting blind trust in the things that are sent to
      you.(User Issue)
 8.   Be wary of social engineering schemes in which a hacker makes a
      call to you, pretending to be an ISP professional. They will ask you
      for your password to do a systems check. However, a real support
      person would never ask for your password. Do not give
      identification information out over the phone.(User Issue)
 9.   Data protection is critical and therefore, you should back up your
      regularly to protect it from hackers, viruses, natural disasters and
      user error. The frequency of backups should be determined by
      your own personal use, daily, weekly and monthly options are all
      viable depending on your usage patterns. Consider storing your
      backup data in a water and fireproof location.(User Issue)
10.    For added security, disconnect your computer from its Ethernet
       interface when not in use. A hacker cannot attack your computer
       system if it is powered off and disconnected from the
       network.(Hardware Issue)
Narrative/Insights
I would recommend the following top three security tips for this
audience of typical users in a shared computer lab environment. These
are user security issues that would be relevant to computer users in a
shared space. The hardware and software issues in this circumstance
would be left up to the IT people in charge of the computer lab and not
appropriate for use during the users’ time in the lab.

   1. Be cautious about email that you receive from unknown senders.
      To be safe, avoid clicking on hyperlinks in email that can
      potentially lead you to a site hosting malware or initiate a
      malware download. To be extra cautious, don’t click on
      hyperlinks at all, type the URL into your browser’s address bar
      yourself. (User Issue)
   2. Be very protective of your passwords. Select passwords that
      include a string of letters, numbers and other characters. Don’t
      use the same password for all of your accounts. Change your
      passwords every 30-60 days. Create an encrypted list of
      passwords for yourself so you can keep track of them. (User
      Issue)
   3. As an Internet user, recognize the threat that exists to your
      personal identity and the information housed on your computer.
      Change your Internet behavior by first understanding the
      personal consequences of getting hacked or getting a virus. This
      realization should alter your behavior and make you think twice
      before engaging is unsafe Internet practices like downloading
      unknown documents, visiting and inputting private information
      on unknown websites,following links from unknown senders and
      generally putting blind trust in the things that are sent to you.
      (User Issue)

Regarding the first suggestion, I feel this is important because these
users will likely be checking their email while at the computer lab. The
flier with this suggestion will remind them about the potential danger in
emails that contain links. With so many users in and out of the lab, the
personnel will want to be sure that the users have some basic security
knowledge so that the computers in the lab are safe from malware
issues. While doing research for this paper, I found this tip to be an
important reminder of the potential danger found when following links.
It isn’t always a given that links sent in emails from friends are safe, they
could have been corrupted as well and sent out without your friend’s
knowledge (like in the case of our Bill Gates example during on-
campus). Typing the URL into the browser’s address bar is a practice I
will personally adopt in the future.

The issue of passwords is critical because so many people conduct
business online, including banking and shopping. If passwords are
reused from account to account or not updated regularly, users run a
huge risk of being exploited, having their identity stolen, and running up
huge credit card debt. This is an issue that can be easily controlled by
the user and a flier to remind them while they are using the computer
lab to login to one of many sites is very timely and pertinent. I
personally feel overwhelmed trying to keep track of all of my own
unique passwords so I can image that this is an issue for most people. As
a suggestion, there are tools available to help you create strong and
secure passwords and then to manage and house them securely
(http://www.iobit.com/passwordgenerator.html).

General awareness about the dangers of getting too comfortable while
using the Internet is an important security message for all users. It is so
easy to feel safe and secure. A reminder that there are serious personal
and hardware implications when you carelessly provide secure
information on unknown websites, download documents that may be
dangerous or link to a website that contains malware will go a long way
in protecting computer users. I personally have become less
discriminatory when shopping online now that it is such a common
practice. This serves as an important reminder to me that I should
investigate a little more before blinding shopping on any old website.
Be Smart. Be Safe. Don’t Click.



Avoid clicking on hyperlinks in emails,
        they may be infected!!



  Type the URL into your browser’s
            address bar!
zoeD9o=$!l
      Phonetic Pronunciation
(zulu - oscar - echo - DELTA - Nine - oscar -
   Equals - Dollar - Exclamation - lima)




      Secure your passwords
    Include a string of upper and lower case letters,
                 numbers and characters
         Make them 10-12 characters in length
  Use phonetics to help you remember your password
  Don’t use the same password for all of your accounts
       Change your passwords every 30-60 days
Prevent your computer and personal
   information from getting infected!


      Engage in smart Internet behaviors…




        Do not download unknown documents
  Be cautious about entering private information on
                   unknown websites
Don’t blindly trust emails and links that are sent to you

Contenu connexe

Tendances

Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Webdpd
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacySamudin Kassan
 
Network Threats
Network ThreatsNetwork Threats
Network ThreatsDan Oblak
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacyeiramespi07
 
Information security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handoutInformation security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handoutMarc Vael
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness ProgramBill Gardner
 
Information security awareness training
Information security awareness trainingInformation security awareness training
Information security awareness trainingSandeep Taileng
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness TrainingDenis kisina
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Securitydkp205
 
Computer security
Computer securityComputer security
Computer securityfiza1975
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 
Internet security
Internet securityInternet security
Internet securityrfukunaga
 

Tendances (20)

Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
 
Ransomware 101
Ransomware 101Ransomware 101
Ransomware 101
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & Privacy
 
New internet security
New internet securityNew internet security
New internet security
 
Network Threats
Network ThreatsNetwork Threats
Network Threats
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
Information security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handoutInformation security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handout
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Computer security
Computer securityComputer security
Computer security
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness Program
 
internet security
internet securityinternet security
internet security
 
Information security awareness training
Information security awareness trainingInformation security awareness training
Information security awareness training
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
Security threats
Security threatsSecurity threats
Security threats
 
User security awareness
User security awarenessUser security awareness
User security awareness
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
 
Computer security
Computer securityComputer security
Computer security
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Internet security
Internet securityInternet security
Internet security
 

Similaire à Giarritano concept paper 4

Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppWeSecureApp
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)Cyber Security Infotech
 
Information security for health practitioners
Information security for health practitionersInformation security for health practitioners
Information security for health practitionersDanny Doobay
 
TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxHAYDEECAYDA
 
Computer Security Guide to Pc Security
Computer Security Guide to Pc SecurityComputer Security Guide to Pc Security
Computer Security Guide to Pc SecurityMallTake
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudNordic Backup
 
IT Security Seminar Cougar CPS
IT  Security  Seminar  Cougar  CPSIT  Security  Seminar  Cougar  CPS
IT Security Seminar Cougar CPScougarcps
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guideNguyen Xuan Quang
 
How to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHow to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHabFg
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS
 
The Safest Way To Interact Online
The Safest Way To Interact OnlineThe Safest Way To Interact Online
The Safest Way To Interact Onlinepcsafe
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxMustafa Amiri
 
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...Cengage Learning
 

Similaire à Giarritano concept paper 4 (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)
 
Information security for health practitioners
Information security for health practitionersInformation security for health practitioners
Information security for health practitioners
 
Data security
 Data security  Data security
Data security
 
Emp tech las-week-2
Emp tech las-week-2Emp tech las-week-2
Emp tech las-week-2
 
TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptx
 
Computer Security Guide to Pc Security
Computer Security Guide to Pc SecurityComputer Security Guide to Pc Security
Computer Security Guide to Pc Security
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the Cloud
 
IT Security Seminar Cougar CPS
IT  Security  Seminar  Cougar  CPSIT  Security  Seminar  Cougar  CPS
IT Security Seminar Cougar CPS
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guide
 
How to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHow to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, Virus
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurity
 
The Safest Way To Interact Online
The Safest Way To Interact OnlineThe Safest Way To Interact Online
The Safest Way To Interact Online
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
Guide to pc_security
Guide to pc_securityGuide to pc_security
Guide to pc_security
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
 
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...
 
Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety
 
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
 

Plus de leahg118

School library scenario
School library scenarioSchool library scenario
School library scenarioleahg118
 
Modified giarritano practicum work journal
Modified giarritano practicum work journalModified giarritano practicum work journal
Modified giarritano practicum work journalleahg118
 
Clean cookstove program
Clean cookstove programClean cookstove program
Clean cookstove programleahg118
 
Abe book talks
Abe book talksAbe book talks
Abe book talksleahg118
 
Lis403 directories - giarritano
Lis403   directories - giarritanoLis403   directories - giarritano
Lis403 directories - giarritanoleahg118
 
Lis506 giarritano-listserv
Lis506 giarritano-listservLis506 giarritano-listserv
Lis506 giarritano-listservleahg118
 
Communication devices
Communication devicesCommunication devices
Communication devicesleahg118
 
Giarritano networking - user manual
Giarritano   networking - user manualGiarritano   networking - user manual
Giarritano networking - user manualleahg118
 
Giarritano final animoto presentation
Giarritano final   animoto presentationGiarritano final   animoto presentation
Giarritano final animoto presentationleahg118
 
Giarritano st in daily life
Giarritano st in daily lifeGiarritano st in daily life
Giarritano st in daily lifeleahg118
 
Giarritano final ya project
Giarritano final ya projectGiarritano final ya project
Giarritano final ya projectleahg118
 
Giarritano practicum work journal
Giarritano practicum work journalGiarritano practicum work journal
Giarritano practicum work journalleahg118
 
Islma presentation
Islma presentationIslma presentation
Islma presentationleahg118
 
Book talk brochure
Book talk brochureBook talk brochure
Book talk brochureleahg118
 
Book group discussion questions
Book group discussion questionsBook group discussion questions
Book group discussion questionsleahg118
 
Hoover elementary school
Hoover elementary schoolHoover elementary school
Hoover elementary schoolleahg118
 
Giarriatno lesson plan final
Giarriatno lesson plan finalGiarriatno lesson plan final
Giarriatno lesson plan finalleahg118
 
Epsy 430 5 girls - giarritano
Epsy 430  5 girls - giarritanoEpsy 430  5 girls - giarritano
Epsy 430 5 girls - giarritanoleahg118
 

Plus de leahg118 (18)

School library scenario
School library scenarioSchool library scenario
School library scenario
 
Modified giarritano practicum work journal
Modified giarritano practicum work journalModified giarritano practicum work journal
Modified giarritano practicum work journal
 
Clean cookstove program
Clean cookstove programClean cookstove program
Clean cookstove program
 
Abe book talks
Abe book talksAbe book talks
Abe book talks
 
Lis403 directories - giarritano
Lis403   directories - giarritanoLis403   directories - giarritano
Lis403 directories - giarritano
 
Lis506 giarritano-listserv
Lis506 giarritano-listservLis506 giarritano-listserv
Lis506 giarritano-listserv
 
Communication devices
Communication devicesCommunication devices
Communication devices
 
Giarritano networking - user manual
Giarritano   networking - user manualGiarritano   networking - user manual
Giarritano networking - user manual
 
Giarritano final animoto presentation
Giarritano final   animoto presentationGiarritano final   animoto presentation
Giarritano final animoto presentation
 
Giarritano st in daily life
Giarritano st in daily lifeGiarritano st in daily life
Giarritano st in daily life
 
Giarritano final ya project
Giarritano final ya projectGiarritano final ya project
Giarritano final ya project
 
Giarritano practicum work journal
Giarritano practicum work journalGiarritano practicum work journal
Giarritano practicum work journal
 
Islma presentation
Islma presentationIslma presentation
Islma presentation
 
Book talk brochure
Book talk brochureBook talk brochure
Book talk brochure
 
Book group discussion questions
Book group discussion questionsBook group discussion questions
Book group discussion questions
 
Hoover elementary school
Hoover elementary schoolHoover elementary school
Hoover elementary school
 
Giarriatno lesson plan final
Giarriatno lesson plan finalGiarriatno lesson plan final
Giarriatno lesson plan final
 
Epsy 430 5 girls - giarritano
Epsy 430  5 girls - giarritanoEpsy 430  5 girls - giarritano
Epsy 430 5 girls - giarritano
 

Giarritano concept paper 4

  • 1. Leah Giarritano March 20, 2012 LIS451LE Concept Paper #4: Security It’s easy to be lulled into a false sense of security when using your computer. However, potential dangers lurk just around the corner and you must be prepared. There are hardware, software and user security issues to be aware of when using your computer. The following are my top ten suggestions to follow in order to keep your computer and network safe and have some peace of mind. 1. Protect your home network from “crackers” by using firewalls (hardware and software options exist and you can use both forms) to monitor data traffic. Select the desired level of security for your firewall.Anytime an application without an established firewall rule attempts to access the Internet, the firewall will allow the user to allow or deny Internet access. Most commonly, you want to be sure that access to the Internet be allowed for email, web surfing, and chatting. (Hardware/Software Issue) 2. If you use a wireless router, set a password and enable encryption. Most routers have either Wireless Encryption (WEP) or Wi-Fi Protected Access (WPA). Selecting the encryption option and a secure router administrator password are two very important steps to keep your network secure.A broadband router with a built in firewall provides the first line of defense at the perimeter of the LAN (where the LAN meets the Internet). (Hardware Issue) 3. Installing anti-virus software (to protect against worms, viruses and Trojans) is a critical step in protecting your system. It has the ability to prevent malware from infecting your computer. Be sure to keep your anti-virus software up-to-date by using the auto- update feature on a weekly basis. You may also need to regularly check for patches and updates for the operating system and other important software packages. (Software Issue) 4. Additional applications to investigate are anti-spyware and anti- adware programs. Like anti-virus software, these programs monitor your online activities and send information to another
  • 2. computer. Many of these programs have an option to monitor your computer in real time. In others cases, you may have to set up a regular, manual monitoring schedule.(Software Issue) 5. Be cautious about email that you receive from unknown senders. To be safe, avoid clicking on hyperlinks in email that can potentially lead you to a site hosting malware or initiate a malware download. To be extra cautious, don’t click on hyperlinks at all, type the URL into your browser’s address bar yourself.(User Issue) 6. Be very protective of your passwords. Select passwords that include a string of letters, numbers and other characters. Don’t use the same password for all of your accounts. Change your passwords every 30-60 days. Create an encrypted list of passwords for yourself so you can keep track of them.(User Issue) 7. As an Internet user, recognize the threat that exists to your personal identity and the information housed on your computer. Change your Internet behavior by first understanding the personal consequences of getting hacked or getting a virus. This realization should alter your behavior and make you think twice before engaging is unsafe Internet practices like downloading unknown documents, following links from unknown senders and generally putting blind trust in the things that are sent to you.(User Issue) 8. Be wary of social engineering schemes in which a hacker makes a call to you, pretending to be an ISP professional. They will ask you for your password to do a systems check. However, a real support person would never ask for your password. Do not give identification information out over the phone.(User Issue) 9. Data protection is critical and therefore, you should back up your regularly to protect it from hackers, viruses, natural disasters and user error. The frequency of backups should be determined by your own personal use, daily, weekly and monthly options are all viable depending on your usage patterns. Consider storing your backup data in a water and fireproof location.(User Issue) 10. For added security, disconnect your computer from its Ethernet interface when not in use. A hacker cannot attack your computer system if it is powered off and disconnected from the network.(Hardware Issue)
  • 3. Narrative/Insights I would recommend the following top three security tips for this audience of typical users in a shared computer lab environment. These are user security issues that would be relevant to computer users in a shared space. The hardware and software issues in this circumstance would be left up to the IT people in charge of the computer lab and not appropriate for use during the users’ time in the lab. 1. Be cautious about email that you receive from unknown senders. To be safe, avoid clicking on hyperlinks in email that can potentially lead you to a site hosting malware or initiate a malware download. To be extra cautious, don’t click on hyperlinks at all, type the URL into your browser’s address bar yourself. (User Issue) 2. Be very protective of your passwords. Select passwords that include a string of letters, numbers and other characters. Don’t use the same password for all of your accounts. Change your passwords every 30-60 days. Create an encrypted list of passwords for yourself so you can keep track of them. (User Issue) 3. As an Internet user, recognize the threat that exists to your personal identity and the information housed on your computer. Change your Internet behavior by first understanding the personal consequences of getting hacked or getting a virus. This realization should alter your behavior and make you think twice before engaging is unsafe Internet practices like downloading unknown documents, visiting and inputting private information on unknown websites,following links from unknown senders and generally putting blind trust in the things that are sent to you. (User Issue) Regarding the first suggestion, I feel this is important because these users will likely be checking their email while at the computer lab. The flier with this suggestion will remind them about the potential danger in emails that contain links. With so many users in and out of the lab, the personnel will want to be sure that the users have some basic security knowledge so that the computers in the lab are safe from malware
  • 4. issues. While doing research for this paper, I found this tip to be an important reminder of the potential danger found when following links. It isn’t always a given that links sent in emails from friends are safe, they could have been corrupted as well and sent out without your friend’s knowledge (like in the case of our Bill Gates example during on- campus). Typing the URL into the browser’s address bar is a practice I will personally adopt in the future. The issue of passwords is critical because so many people conduct business online, including banking and shopping. If passwords are reused from account to account or not updated regularly, users run a huge risk of being exploited, having their identity stolen, and running up huge credit card debt. This is an issue that can be easily controlled by the user and a flier to remind them while they are using the computer lab to login to one of many sites is very timely and pertinent. I personally feel overwhelmed trying to keep track of all of my own unique passwords so I can image that this is an issue for most people. As a suggestion, there are tools available to help you create strong and secure passwords and then to manage and house them securely (http://www.iobit.com/passwordgenerator.html). General awareness about the dangers of getting too comfortable while using the Internet is an important security message for all users. It is so easy to feel safe and secure. A reminder that there are serious personal and hardware implications when you carelessly provide secure information on unknown websites, download documents that may be dangerous or link to a website that contains malware will go a long way in protecting computer users. I personally have become less discriminatory when shopping online now that it is such a common practice. This serves as an important reminder to me that I should investigate a little more before blinding shopping on any old website.
  • 5. Be Smart. Be Safe. Don’t Click. Avoid clicking on hyperlinks in emails, they may be infected!! Type the URL into your browser’s address bar!
  • 6. zoeD9o=$!l Phonetic Pronunciation (zulu - oscar - echo - DELTA - Nine - oscar - Equals - Dollar - Exclamation - lima) Secure your passwords Include a string of upper and lower case letters, numbers and characters Make them 10-12 characters in length Use phonetics to help you remember your password Don’t use the same password for all of your accounts Change your passwords every 30-60 days
  • 7. Prevent your computer and personal information from getting infected! Engage in smart Internet behaviors… Do not download unknown documents Be cautious about entering private information on unknown websites Don’t blindly trust emails and links that are sent to you