0% found this document useful (0 votes)
31 views2 pages

Safe Computing Brochure08

This document provides information on data security and steps to secure a mobile computer. It discusses securing sensitive personal information stored on mobile devices, including using encryption and reporting any sensitive data stored. It also outlines basic steps to secure a computer, such as installing and updating anti-virus software, using strong passwords, backing up files, and enabling firewall protection.

Uploaded by

BetaNTest
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views2 pages

Safe Computing Brochure08

This document provides information on data security and steps to secure a mobile computer. It discusses securing sensitive personal information stored on mobile devices, including using encryption and reporting any sensitive data stored. It also outlines basic steps to secure a computer, such as installing and updating anti-virus software, using strong passwords, backing up files, and enabling firewall protection.

Uploaded by

BetaNTest
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Mobile Security Data Security

www.security.uci.edu
Simple steps you can take to protect
your computer from cyber attacks.
Mobile computing offers the freedom of using Under California law, California residents must
your notebook computer or other mobile device be notified when a computer security breach
in many remote locations. With this freedom (including loss or theft of equipment) is reason-
also comes greater responsibility to keep the ably believed to have allowed their personal
computer and information secure. information to be acquired by an unauthorized
person. UCI requires that employees take ap-
propriate care of sensitive data that is stored on
Securing Your Computer computers, PDAs or other devices. Do not store
Follow the steps in 8 Steps to Secure Your sensitive data unless absolutely necessary.
Computer on the inside of this pamphlet.

UCIrvine | Safe Computing


What is Sensitive Data?
Physical Security Sensitive data is restricted data for which ac-
Portable computers have an cess or modification is limited by law or Univer-
added risk of being easier steal. sity policy. A prime example of such data (un-
It is important to have a way less the data is encrypted) is an individual’s first
to secure your computer when name or first initial and last name in combina-
you are not using it. tion with any of the following:
• Lock your notebook com- • Social security number
puter in a safe location when not in use. • Driver’s license number or California ID card
• Buy and use a notebook security cable. number.
• Financial account information, such as a
Wireless Precautions credit card number.
Using WiFi is a convenient way to use the net-
work from remote locations. However this is Report any sensitive data stored on your com-
a shared network. A shared network is like a puter to your Electronic Security Coordinator.
dinner party - anyone can eavesdrop on your
conversation, if they know how.

Secure Web Browsing This pamphlet outlines some basic concepts


Use secure, encrypted sessions using https for of Safe Computing. Detailed information and
Web browsing and SSH instead of Telnet for instructions can be found on the Safe Comput-
logging into servers. ing Website at:
www.security.uci.edu
Secure Internet Transactions
This information is provided by Network and
Use UCI’s VPN to encrypt all your network traf- Academic Computing Services (NACS) with
fic. input from Administrative Computing (Adcom),
the Electronic Security Coordinators and other
members of the UCI Community.

Updated – August 20, 2008


8 Steps To Secure Your Computer Email Safety Tips
There are simple steps you can take to make your computer safer. Any computer connected to the network 1. Don’t Open Unexpected Attachments
is vulnerable to attack, but by following the steps below you can minimize your risk. Viruses are often sent via email attach-
ments. UCI scans incoming email (sent to
“@uci.edu” addresses) and cleans known
Required Strongly Recommended viruses. However, new viruses may get
through before our anti-virus software has
1. Safely Install Your Operating System 1. Enable Firewall Protection
been updated.
Follow the guidelines from NACS to safely Firewall software can help protect your
install your operating system. Unprotected computer against hackers and other security
2. Use Spam Filters
systems can get attacked quickly on the attacks. Severe attacks can delete impor-
Spam is often more of an annoyance than
network. tant information, crash your system, or steal
a security risk. However, many email vi-
private information like passwords or credit
ruses are sent as spam and can be caught
2. Update Your Operating System card numbers. Windows XP, Vista and Mac
by spam filters before they end up in your
Most security issues are related to vulner- OS X (v. 10.2 or later) have built in fire-
Inbox. Some phishing email messages are
abilities in the operating system. As these walls.
also caught by spam filters. UCI employs
flaws are discovered software companies
various methods to block spam from getting
release patches and updates to protect you 2. Install and Use Spyware Removal Tools
to you. If you use NACS Mailbox Services
from the security holes. Spyware is software that is downloaded and
you can set up spam filters using “My Email
installed onto your computer, often with-
Options”.
3. Install and Update Anti-Virus Software out your knowledge. Spyware monitors and
One of the largest risks to a network and shares your information while you browse
your data is an infected or compromised the Internet.
computer. Anti-virus software is critical to
practice safe computing. 3. Back Up Important Files
No system is completely secure. If you have
4. Use Strong Passwords important files stored on your computer,
By default modern operating systems are copy them to another removable drive or
accessible remotely. If you have not set a disc and store them in a different location
strong administrative password or left it from your computer.
blank, this makes your computer vulnerable
to various types of attacks, including “dic- 4. Enable Screen Saver Passwords
3. Beware of Spoof Email or Phishing
tionary attacks” which is a rapid, automated When you are away from your computer,
Phishing emails are an attempt by thieves
guessing of common passwords. lock the screen or set a screen saver pass-
to lure you into divulging personal informa-
word. This will prevent someone from using
tion for their profit. Learn to recognize the
your computer when you are away from
telltale signs of Phishing.
your desk.
4. Don’t Send Sensitive Data in Email
When you send a message, you no longer
have control over what is done with it or to
whom it is forwarded.

For more detailed information on Safe Computing, visit www.security.uci.edu.

You might also like