5 Protecting Your Information Assets 1 Explain why






















- Slides: 22
5 Protecting Your Information Assets
1. Explain why it is critical that you protect your information assets. 2. Identify the various behavioral actions you can take to protect your information assets. 3. Identify the various computerbased actions you can take to protect your information assets.
1. Introduction 2. Behavioral Actions to Protect Your Information Assets 3. Computer-Based Actions to Protect Your Information Assets
TG Introduction 5. 1 • Risk of Using Wireless Hot Spots While Traveling or Working from Home • Protecting Yourself Due to the Rise in Organized Crime Online • Two Types of Actions to Protect Yourself – Behavioral Actions – Computer-Based Actions
TG Behavioral Actions to Protect Your Information Assets 5. 2 • General Behavioral Actions • What to Do in the Event of Identity Theft
General Behavioral Actions – Never provide personal information to strangers in any format – Physical, Verbal, or Electronic – Protect Your Social Security Number – Secure Your Credit Cards Against Fraudulent Use • • • Include a Picture on Your Credit Card Write “Photo ID Required” in Signature Area Use Virtual Credit Cards for Online Shopping Pay close attention to Billing Cycles Limit Use of Debit Cards Have Credit Card Bills Delivered Paperless/Digitally
General Behavioral Actions (Continued) – Use a P. O. Box instead of your personal mailbox at your home or apartment – Lock Credit Files with Life. Lock or Trusted. ID
What to Do in the Event of Identity Theft • • Get a Lawyer Get Organized File a Detailed Police Report Get the name and phone number of your police investigator, and give it to your creditors • In all communications about the crime, use certified, return-receipt mail
What to Do in the Event of Identity Theft (Continued) • Be sure to obtain your unique case number from each credit agency, and ask each credit agency to send your credit report • Tell each agency to issue a fraud alert • Obtain the document that you need to file a long-term fraud alert, which lasts for seven year or until cancelled. • Ask the credit agencies for the names and phone number of lenders with whom fraudulent accounts have been opened
What to Do in the Event of Identity Theft (Continued) • Point out to each agency all entries generated due to fraud • Instruct each agency to notify anyone who received your credit report in the last six months that you are disputing the information • Californians can order a “credit freeze” with all three major credit agencies • Call your credit card companies directly • Change all your credit cards immediately
What to Do in the Event of Identity Theft (Continued) • Be alert for unauthorized change-of-address notifications in your mail • Fill out fraud affidavits for creditors • If debt collector demand payment of fraudulent accounts, write down the name of the company as well as the collector’s name, address, and phone number, and inform them you have been victimized
TG 5. 3 Computer-Based Actions to Protect Your Information Assets • Determining Which Internet Sites People Using Your Computer Have Visited • Dangers of Social Networking Sites • Determining Whether Your Computer Is Infected • Computer Actions to Prevent Malware Infections • Protecting Your Portable Devices and Information • Internet Explorer 9
TG 5. 3 • Other Actions That You Can Take On Computer-Based Actions to Protect Your Information Assets (Continued) • • Your Computer Protecting Your Privacy Preparing for Personal Disasters Restoring Backup Files Wireless Security
Computer Actions to Prevent Malware Infections • Test Your System • Install a Security Suite on Your Computer • Install an Anti-Malware Product on Your Computer • Install a Firewall on Your Computer • Install an Antispyware Product on Your Computer
Computer Actions to Prevent Malware Infections (Continued) • Install Monitoring Software on Your Computer • Install Content-Filtering Software on Your Computer • Install Anti-spam Software on Your Computer • Install Proactive Intrusion Detection and Prevention Software on Your Computer
Computer Actions to Prevent Malware Infections (Continued) • Manage Patches • Use a Browser Other Than Internet Explorer • Use an Operating System Other Than Windows
Internet Explorer 9 • • Protected Mode Active. X Opt-In Fix My Settings Windows Defender Personal Data Safeguards Phishing Filter Delete Browsing History
Internet Explorer 9 (Continued) • • • In. Private Domain Highlighting Smart. Screen Filter Add-on Manager Cross-site Scripting Filter A 128 -bit Secure Connection for Using Secure Web Sites
Other Actions That You Can Take On Your Computer • How To Detect a Worm • How to Detect a Trojan Horse • How to Detect Fake Web Sites
Protecting Your Privacy • Use Strong Passwords • How to Adjust Your Privacy Settings on Your Computer • How to Surf the Web Anonymously • How to E-Mail Anonymously • Turning Off Your Google Web History • Removing All Google Web or Search History
Wireless Security • Hide Your Service Set Identifier (SSID) • Use Encryption • Filter Out Media Access Control (MAC) Addresses • Limit Internet Protocol (IP) Addresses
Wireless Security (Continued) • • Sniff Out Intruders Using a Public Hotspot Test Your Wireless Network Wireless Security Software