We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2
WHAT CAN YOU DO?
It’s important that we each understand the CYBER SECURITY IS
risks as well as the actions we can take to OUR SHARED help protect our information and systems. RESPONSIBILITY • Properly configure and patch operating systems, browsers, and other software DO YOUR programs. • Use and regularly update firewalls, PART! anti-virus, and anti-spyware programs. • Use strong passwords (combination of Why Cyber upper and lower case letters, numbers and special characters) and do not share passwords. How we can empower you? Security Is Important? • Be cautious about all communications; think before you click. Use common sense when communicating with users [email protected] you DO and DO NOT know. Phone 718-368-6679 • Do not open email or related www.kbcc.cuny.edu attachments from un-trusted sources. • Allow access to systems and data to only those who need it, and protect those access credentials. • Follow your organization’s cyber security policies, and report violations Brought to you in partnership and issues when they occur. with the Multi-State Information Sharing and Analysis Center BE SAFE Multi-State Information Sharing and Analysis Center THAN SORRY! www.msisac.org [email protected] WHAT IS CYBER SECURITY? WHY IS CYBER SECURITY IMPORTANT? Malware, Worms and Trojan horses: These spread by email, instant messaging, malicious Many aspects of our lives rely on the Internet The increasing volume and sophistication of cyber websites and infected non-malicious websites. and computers, including communications security threats–including targeting phishing scams, Some websites will automatically download the (email, cell phones, texting), transportation data theft, and other online vulnerabilities–demand malware without the user's knowledge or (traffic control signals, car engine systems, that we remain vigilant about securing our systems intervention. This is known as a "drive-by airplane navigation), government (birth/death and information. download." Other methods will require the users records, social security, licensing, tax records), to click on a link or button. finance (bank accounts, loans, electronic The average unprotected computer (i.e. does not have paychecks), medicine (equipment, medical proper security controls in place) connected to the Botnets and zombies: A botnet, short for records), and education (virtual classrooms, Internet can be compromised in moments. Thousands robot network, is an aggregation of online report cards, research). of infected web pages are being discovered every day. compromised computers that are connected to a Hundreds of millions of records have been involved in central "controller." The compromised Consider how much of your personal data breaches. New attack methods are launched computers are often referred to as "zombies." information is stored either on your own continuously. These are just a few examples of the These threats will continue to proliferate as the computer or on someone else’s system. How is threats facing us, and they highlight the importance of attack techniques evolve and become available that data and the systems on which that data information security as a necessary approach to to a broader audience, with less technical resides (or is transmitted) kept secure? protecting data and systems. knowledge required to launch successful attacks. Botnets designed to steal data are Cyber security involves protecting the RISKS improving their encryption capabilities and thus information and systems we rely on every day— becoming more difficult to detect. whether at home, work or school. There are many risks, some more serious than others. Some examples of how your computer and systems “Scareware” – fake security software There are three core principles of cyber could be affected by a cyber security incident — warnings: This type of scam can be security: Confidentiality, Integrity and whether because of improper cyber security controls, particularly profitable for cyber criminals, as Availability. manmade or natural disasters, or malicious users many users believe the pop-up warnings telling wreaking havoc—include the following: them their system is infected and are lured into Confidentiality: Information which is sensitive downloading and paying for the special software or confidential must remain so and be shared Denial-of-service: refers to an attack that to "protect" their system. only with appropriate users. successfully prevents or impairs the authorized Integrity: Information must retain its integrity functionality of networks, systems or applications by Social Network Attacks: Social network and not be altered from its original state. exhausting resources. What impact could a denial-of- attacks are major sources of attacks because of Availability: Information and systems must be service have if it shut down a government agency’s the volume of users and the amount of personal available to those who need it. website, thereby preventing citizens from accessing information that is posted. Users' inherent trust information or completing transactions? What in their online friends is what makes these For example, your confidential medical records financial impact might a denial-of-service have on a networks a prime target. For example, users should be released only to those people or business? What would the impact be on critical may be prompted to follow a link on someone's organizations (i.e. doctor, hospital, insurance, services such as emergency medical systems, police page, which could bring users to a malicious government agency, you) authorized to see it communications or air traffic control? Can some of website. (confidentiality); the records should be well these be unavailable for a week, a day, or even an protected so that no one can change the hour? information without authorization (integrity); DO YOUR PART! and the records should be available and accessible to authorized users (availability). BE MORE SECURE...