Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Attacks that Target Online Banking
Phishing attacks
Pharming
Review your bank’s information about its online privacy policies and practices.
Before setting up any online bill payment, check the privacy policy of the company or service you will be sending payment to.
For security purposes, choose an online personal identification number (PIN) that is unique and hard to guess.
Install anti-virus, firewall, and anti-spyware programs on your computer and keep them up to date.
Use a credit card to pay for online goods and services.
Avoid situations where personal information can be intercepted, retrieved, or viewed by unauthorized individuals.
If you receive email correspondence about a financial account, verify its authenticity by contacting your bank or financial institution.
If you have disclosed financial information to a fraudulent web site, file reports with the following organizations:
How can you use the cloud?
Types of clouds
Choosing a cloud provider
Security
Businesses Are Using Cloud Apps
Common Risks of the Cloud
Risk Mitigation in the Cloud
Remote Backup – Cloud Storage
Cons
Security
Internal Hard Disk Drives
Pros
Cons
Security
Removable Storage Media
Pros
Cons
Security
Types of Removable Storage Media
Choosing the Best Backup Option
The Need to Protect Your Information
Techniques for Removing Information
Deleting
Overwriting
Physical destruction
Advice on Mobile Phones and Tablets
Avoiding Online Gaming Risks
Online Gaming Risks
Social Risks
How to Protect Against the Risks
General Security Practices
Gaming-Specific Security Practices
1. Conduct an inventory to help you answer the following questions:
Cybersecurity Guidance
Employees
Leadership & IT Professionals
Protect Your Workplace
System Failure or Disruption
Suspicious Questioning
Unauthorized Access
Unauthorized Changes or Additions
Suspicious Email
Unauthorized Use
Report Suspicious Behavior and Activity
Surveillance
Deploying Assets
Suspicious Persons
Suspicious Questioning
Tests of Security
Acquiring Supplies
Dry Runs
Spread the Word & Get Involved
IDENTIFY
THE COUNCIL ON CYBERSECURITY
LEADER QUESTIONS
PROTECT
DETECT
CYBER THREATS
CRITICAL SECURITY CONTROL
RECOVER
Recognizing Email Scams
“Old-fashioned Fraud Schemes
Social Engineering/Phishing Email
Trojan Horse Email
What You Can Do to Avoid Becoming a Victim
Filter Spam
Regard Unsolicited Email with Suspicion
Treat Email Attachments with Caution
Use Common Sense
Install Antivirus Software and Keep it Up to Date
Install a Personal Firewall and Keep it Up to Date
Learn the Email Policies of the Organizations You Do Business With
Configure Your Email Client for Security
Security Concerns
Mitigation
(Untitled)
Social Networking Serves Many Purposes
Proceed with Caution
About Portable Devices
What Are the Risks?
What You Can Do to Minimize These Risks
Mobile Threats Are Increasing
Typical Attacks Leverage Portability and Similarity to PCs
Consequences of a Mobile Attack Can Be Severe
Take Steps to Protect Your Mobile Phone
Act Quickly if Your Mobile Phone or PDA Is Stolen
Money Mules Are Used to Commit Fraud
Schemes May Seem Like Legitimate Opportunities
Consequences Can Be Severe
Take Steps to Protect Yourself
Home Wireless Threats
Piggybacking
Wardriving
Unauthorized Computer Access
Protecting Home Wireless
Make Your Wireless Network Invisible
Rename Your Wireless Network
Encrypt Your Network Traffic
Change Your Administrator Password
Use File Sharing with Caution
Keep Your Access Point Software Patched and Up to Date
Check Your Internet Provider’s Wireless Security Options
Public Wireless Threats
Evil Twin Attacks
Wireless Sniffing
Peer-to-Peer Connections
Unauthorized Computer Access
Shoulder Surfing
Safe Wireless Networking in Public Spaces
Watch What You Do Online
Connect Using a VPN
Disable File Sharing
Be Aware of Your Surroundings
Summary
Home Wireless Security
Public Wireless Security
← Prev
Back
Next →
← Prev
Back
Next →