5 Protecting Your Information Assets 1 Explain why

  • Slides: 22
Download presentation
5 Protecting Your Information Assets

5 Protecting Your Information Assets

1. Explain why it is critical that you protect your information assets. 2. Identify

1. Explain why it is critical that you protect your information assets. 2. Identify the various behavioral actions you can take to protect your information assets. 3. Identify the various computerbased actions you can take to protect your information assets.

1. Introduction 2. Behavioral Actions to Protect Your Information Assets 3. Computer-Based Actions to

1. Introduction 2. Behavioral Actions to Protect Your Information Assets 3. Computer-Based Actions to Protect Your Information Assets

TG Introduction 5. 1 • Risk of Using Wireless Hot Spots While Traveling or

TG Introduction 5. 1 • Risk of Using Wireless Hot Spots While Traveling or Working from Home • Protecting Yourself Due to the Rise in Organized Crime Online • Two Types of Actions to Protect Yourself – Behavioral Actions – Computer-Based Actions

TG Behavioral Actions to Protect Your Information Assets 5. 2 • General Behavioral Actions

TG Behavioral Actions to Protect Your Information Assets 5. 2 • General Behavioral Actions • What to Do in the Event of Identity Theft

General Behavioral Actions – Never provide personal information to strangers in any format –

General Behavioral Actions – Never provide personal information to strangers in any format – Physical, Verbal, or Electronic – Protect Your Social Security Number – Secure Your Credit Cards Against Fraudulent Use • • • Include a Picture on Your Credit Card Write “Photo ID Required” in Signature Area Use Virtual Credit Cards for Online Shopping Pay close attention to Billing Cycles Limit Use of Debit Cards Have Credit Card Bills Delivered Paperless/Digitally

General Behavioral Actions (Continued) – Use a P. O. Box instead of your personal

General Behavioral Actions (Continued) – Use a P. O. Box instead of your personal mailbox at your home or apartment – Lock Credit Files with Life. Lock or Trusted. ID

What to Do in the Event of Identity Theft • • Get a Lawyer

What to Do in the Event of Identity Theft • • Get a Lawyer Get Organized File a Detailed Police Report Get the name and phone number of your police investigator, and give it to your creditors • In all communications about the crime, use certified, return-receipt mail

What to Do in the Event of Identity Theft (Continued) • Be sure to

What to Do in the Event of Identity Theft (Continued) • Be sure to obtain your unique case number from each credit agency, and ask each credit agency to send your credit report • Tell each agency to issue a fraud alert • Obtain the document that you need to file a long-term fraud alert, which lasts for seven year or until cancelled. • Ask the credit agencies for the names and phone number of lenders with whom fraudulent accounts have been opened

What to Do in the Event of Identity Theft (Continued) • Point out to

What to Do in the Event of Identity Theft (Continued) • Point out to each agency all entries generated due to fraud • Instruct each agency to notify anyone who received your credit report in the last six months that you are disputing the information • Californians can order a “credit freeze” with all three major credit agencies • Call your credit card companies directly • Change all your credit cards immediately

What to Do in the Event of Identity Theft (Continued) • Be alert for

What to Do in the Event of Identity Theft (Continued) • Be alert for unauthorized change-of-address notifications in your mail • Fill out fraud affidavits for creditors • If debt collector demand payment of fraudulent accounts, write down the name of the company as well as the collector’s name, address, and phone number, and inform them you have been victimized

TG 5. 3 Computer-Based Actions to Protect Your Information Assets • Determining Which Internet

TG 5. 3 Computer-Based Actions to Protect Your Information Assets • Determining Which Internet Sites People Using Your Computer Have Visited • Dangers of Social Networking Sites • Determining Whether Your Computer Is Infected • Computer Actions to Prevent Malware Infections • Protecting Your Portable Devices and Information • Internet Explorer 9

TG 5. 3 • Other Actions That You Can Take On Computer-Based Actions to

TG 5. 3 • Other Actions That You Can Take On Computer-Based Actions to Protect Your Information Assets (Continued) • • Your Computer Protecting Your Privacy Preparing for Personal Disasters Restoring Backup Files Wireless Security

Computer Actions to Prevent Malware Infections • Test Your System • Install a Security

Computer Actions to Prevent Malware Infections • Test Your System • Install a Security Suite on Your Computer • Install an Anti-Malware Product on Your Computer • Install a Firewall on Your Computer • Install an Antispyware Product on Your Computer

Computer Actions to Prevent Malware Infections (Continued) • Install Monitoring Software on Your Computer

Computer Actions to Prevent Malware Infections (Continued) • Install Monitoring Software on Your Computer • Install Content-Filtering Software on Your Computer • Install Anti-spam Software on Your Computer • Install Proactive Intrusion Detection and Prevention Software on Your Computer

Computer Actions to Prevent Malware Infections (Continued) • Manage Patches • Use a Browser

Computer Actions to Prevent Malware Infections (Continued) • Manage Patches • Use a Browser Other Than Internet Explorer • Use an Operating System Other Than Windows

Internet Explorer 9 • • Protected Mode Active. X Opt-In Fix My Settings Windows

Internet Explorer 9 • • Protected Mode Active. X Opt-In Fix My Settings Windows Defender Personal Data Safeguards Phishing Filter Delete Browsing History

Internet Explorer 9 (Continued) • • • In. Private Domain Highlighting Smart. Screen Filter

Internet Explorer 9 (Continued) • • • In. Private Domain Highlighting Smart. Screen Filter Add-on Manager Cross-site Scripting Filter A 128 -bit Secure Connection for Using Secure Web Sites

Other Actions That You Can Take On Your Computer • How To Detect a

Other Actions That You Can Take On Your Computer • How To Detect a Worm • How to Detect a Trojan Horse • How to Detect Fake Web Sites

Protecting Your Privacy • Use Strong Passwords • How to Adjust Your Privacy Settings

Protecting Your Privacy • Use Strong Passwords • How to Adjust Your Privacy Settings on Your Computer • How to Surf the Web Anonymously • How to E-Mail Anonymously • Turning Off Your Google Web History • Removing All Google Web or Search History

Wireless Security • Hide Your Service Set Identifier (SSID) • Use Encryption • Filter

Wireless Security • Hide Your Service Set Identifier (SSID) • Use Encryption • Filter Out Media Access Control (MAC) Addresses • Limit Internet Protocol (IP) Addresses

Wireless Security (Continued) • • Sniff Out Intruders Using a Public Hotspot Test Your

Wireless Security (Continued) • • Sniff Out Intruders Using a Public Hotspot Test Your Wireless Network Wireless Security Software