safeguarding the collaborative community: the safe computing campaign at texas tech university allen...
TRANSCRIPT
Safeguarding the Collaborative Community: The Safe Computing Campaign at
Texas Tech University
Allen Young Managing Director, Technology Support
Shannon CepicaManaging Director, IT Help Central
February 23, 2007
Copyright TTU Information Technology Division 2007
This presentation may only be used with permission from the TTU Office of the CIO. To request permission please send an email to [email protected]. If used, proper recognition must be given to the TTU Information Technology Division.
Safeguarding the Collaborative Community: The Safe Computing Campaign at Texas Tech University
Practices Campaign
http://safecomputing.ttu.edu
Safeguarding the Collaborative Community: The Safe Computing Campaign at Texas Tech University
Do You Know About…Series Targets a TTU-relevant technology topic (e.g. e-mail scams/hoaxes, file
sharing, identity theft, connecting a new computer to the network (TTUnet), and password security);
Provides safe computing tips and suggestions; and
Offers simple, practical information for addressing IT issues or concerns.
DYKA topics: Educational events Security alerts Mailbox maintenance tips Security practices Software information and updates Computing facilities Virus information and protection
C) Fall for this “hook, line and sinker”
This is an example of ______________. The best thing to do is:A) Delete it
B) Click on the link and update all personal information as soon as possible!
Phishing
From: Blain [mailto:[email protected]] Sent: Sunday, January 21, 2007 9:16 AMTo: Doe, JaneSubject: hi__________________________________________________________________Buy must-have pills wherever you are!High-quality meds at discount prices here <http://juklgi.ndkoo.hk/legalrx/?page=wellbutrinsr&ref=&pid=2075&lang=&cart=>!Worldwide delivery directly to your home!
This is an example of __________. The best thing to do is:
A) Delete it
B) Click on the link, and send it to all your friends and ask what they think
C) Fry it up and place between two pieces of bread with a nice slice of cheese
Spam
How does your system get a virus?
B) Read your email
C) An infected personsneezes on your computer
A)Open an email attachment from an unknown source.
This is a representation of what type of harmful computer issue? What can it do?
A) Can breach security on your network by replicating itself
B) Crashes into your hard drive and makes it skip while playing music
C) If placed over your computer, protects you from NTVs (network-transmitted viruses)
Trojan Horse
Safeguarding the Collaborative Community: The Safe Computing Campaign at Texas Tech University
Building lines of communication
Modes of communication
Fostering successful collaborative outcomes
Safeguarding the Collaborative Community: The Safe Computing Campaign at Texas Tech University
Importance/Relevance to Other Institutions:
Development of timely and relevant IT Information for both the University and surrounding community
A coordinated, focused campaign to provide education in safe computing practices
Development of persistent lines of communication
Safeguarding the Collaborative Community: The Safe Computing
Campaign at Texas Tech University
Q & A
Copyright TTU Information Technology Division 2007
This presentation may only be used with permission from the TTU Office of the CIO. To request permission please send an email to [email protected]. If used, proper recognition must be given to the TTU Information Technology Division.