11
Introduction to IT Security and Desktop PC Protection Speaker: Stone Miu

Introduction to IT Security and Desktop PC Protection Speaker: Stone Miu

Embed Size (px)

Citation preview

Page 1: Introduction to IT Security and Desktop PC Protection Speaker: Stone Miu

Introduction to IT Security and Desktop PC ProtectionSpeaker: Stone Miu

Page 2: Introduction to IT Security and Desktop PC Protection Speaker: Stone Miu

Agenda

•WHY WE ARE HERE?•SECURE YOUR DESKTOP PC•INTERNET SECURITY PROTECTION•HOW TO IDENTIFY AND HANDLE FAKE

EMAIL AND WEBSITE•INTERNET SECURITY PROTECTION•INTELLECTUAL PROPERTY RIGHTS FOR

SOFTWARE AND INFORMATION•PHYSICAL SECURITY

Page 3: Introduction to IT Security and Desktop PC Protection Speaker: Stone Miu

WHY WE ARE HERE?

•What is Information Security? CIA Model▫Confidentiality▫Integrity▫Availability

•Importance of Information Security•How to Achieve a Satisfied Level of Infor

mation Security?•Roles and Responsibilities•Policy and Guidelines in HKUST

Page 4: Introduction to IT Security and Desktop PC Protection Speaker: Stone Miu

SECURE YOUR DESKTOP PC• Password Protection

▫ How to create secure Passwords?▫ Importance of Changing Passwords frequently

• Data Security -> LOGOFF when you are away from your PCs• Basic Security Settings of a PC e.g. firewall DEMO

▫ Software firewall▫ Hardware firewall

• How to Avoid from Virus Attacks? E.g. Anti-Virus Program DEMO▫ How can Antivirus Software Protect your Computer?

• How to Install Antivirus Software and Virus Signature Update in HKUST?

• Backup and Restore▫ The Importance of Backup and Recovery▫ Steps for Backup & Recovery

• Protections of Data/ Files e.g. file encryption• Windows Update

Page 5: Introduction to IT Security and Desktop PC Protection Speaker: Stone Miu

INTERNET SECURITY PROTECTION• Security Settings of a Web Browser Demo• Attentions Needed when Surfing Web Pages• Software Update Management e.g. Adobe pdf, Java,

Thunderbird, Firefox, etc• Cookies• Closing Saved Password• Pop-up Blocker• How to determine the website is safe to browse?

▫ http://google.com/safebrowsing/diagnostic?site=▫ hpHosts▫ Norton Safe Web▫ Unmasked Parasites▫ AVG LinkScanner▫ AVG's free Mobilation Android app▫ Lookout Mobile Security

Page 6: Introduction to IT Security and Desktop PC Protection Speaker: Stone Miu

HOW TO IDENTIFY AND HANDLE FAKE EMAIL AND WEBSITE•What is Scam Email?•How to Handle Scam Email?•What is Email Spoofing / Phishing?•How to Handle Email Spoofing / Phishing?

▫Preventive Measures▫Detective Measures▫Responsive Measures

•What is Digital Signature & how it is used in HKUST?

Page 7: Introduction to IT Security and Desktop PC Protection Speaker: Stone Miu

INTELLECTUAL PROPERTY RIGHTS FOR SOFTWARE AND INFORMATION•Freeware•Shareware•Liteware

Page 8: Introduction to IT Security and Desktop PC Protection Speaker: Stone Miu

INCIDENT HANDLING PROCEDURES•Basic Concept of Incident Handling E.g.

Task Manager•Common Incident Handling•Handling Procedure of Security Incidents•Loophole Warning

Page 9: Introduction to IT Security and Desktop PC Protection Speaker: Stone Miu

PHYSICAL SECURITY

•Clear Screen Protection•Protection of External Device•Disposal of Computer Equipment

▫Delete and Format Commands▫Overwriting▫Degaussing▫Physical Destruction

Page 10: Introduction to IT Security and Desktop PC Protection Speaker: Stone Miu

Useful Links• Change User Account Password

▫ http://itsc.ust.hk/services/general-it-services/user-account-management/change-user-account-password/

• Security Tips for Email▫ http://itsc.ust.hk/services/general-it-services/

communication-collaboration/email/security-tips-for-emails/

• Get Ready for Signed Email in HKUST▫ http://itsc.ust.hk/services/it-infrastructure/hkust-

ca-certificates/get-ready-for-signed-email/• HKUST PKI

▫ http://itsc.ust.hk/services/it-infrastructure/hkust-ca-certificates/

• HKUST▫ http://www.ust.hk/

• Information Technology Services Center (ITSC) ▫ http://itsc.ust.hk/

• ITSC Policies and Guidelines▫ http://itsc.ust.hk/it-policies-guidelines/

• ITSC A-Z Guide▫ http://itsc.ust.hk/a-z/

• IT Security Web Site▫ http://itsc.ust.hk/services/it-security/campus/

• IT Security Guidelines▫ http://itsc.ust.hk/it-policies-guidelines/informatio

n-technology-security-guidelines/

• Anti-Virus In Campus▫ http://itsc.ust.hk/services/it-security/anti-virus-in-

campus/▫ http://itsc.ust.hk/services/it-security/anti-virus-in-

campus/virus-definition-update/

• How to Protect Your Computer?▫ http://itsc.ust.hk/services/it-security/security-

awareness/protecting-your-computer/• Guidelines and Tips on Using USB Drive

▫ http://itsc.ust.hk/services/it-security/campus/usb-drive/

• How to Dispose your hard disk securely?▫ http://itsc.ust.hk/services/it-security/campus/

dispose-harddisk/• Be Aware of Fake mail

▫ http://itsc.ust.hk/beware-of-fake-mail-20130718/• Phishing Sample Emails

▫ http://itsc.ust.hk/services/general-it-services/communication-collaboration/email/phishing-samples/

• Java Security Alert▫ http://itsc.ust.hk/java-security-alert/

• Windows 7▫ http://itsc.ust.hk/services/general-it-services/

procurement-licensing/windows7/• Windows XP

▫ http://www.ust.hk/itsc/windowsxp/

Page 11: Introduction to IT Security and Desktop PC Protection Speaker: Stone Miu

Q & A