Johnson Logistics Solutions Office of Systems and Information Technology.
-
Upload
cassandra-boyd -
Category
Documents
-
view
222 -
download
4
Transcript of Johnson Logistics Solutions Office of Systems and Information Technology.
![Page 1: Johnson Logistics Solutions Office of Systems and Information Technology.](https://reader037.fdocuments.in/reader037/viewer/2022102906/56649ccf5503460f9499afc6/html5/thumbnails/1.jpg)
IT Security Awareness
Johnson Logistics Solutions
Office of Systems and Information Technology
![Page 2: Johnson Logistics Solutions Office of Systems and Information Technology.](https://reader037.fdocuments.in/reader037/viewer/2022102906/56649ccf5503460f9499afc6/html5/thumbnails/2.jpg)
Defining IT Security
• Follow the rules• Stay up to date
What is IT Security?
![Page 3: Johnson Logistics Solutions Office of Systems and Information Technology.](https://reader037.fdocuments.in/reader037/viewer/2022102906/56649ccf5503460f9499afc6/html5/thumbnails/3.jpg)
How Do You Know You’ve Been Hacked?
• New programs installed• Passwords changed• Spam email being sent• Increased network activity• Security programs uninstalled• Computer does things on its own
![Page 4: Johnson Logistics Solutions Office of Systems and Information Technology.](https://reader037.fdocuments.in/reader037/viewer/2022102906/56649ccf5503460f9499afc6/html5/thumbnails/4.jpg)
• Disconnect network cable• Notify Systems staff immediately• Run security software
– Anti-virus– Anti-spyware/malware
What Should I Do?
![Page 5: Johnson Logistics Solutions Office of Systems and Information Technology.](https://reader037.fdocuments.in/reader037/viewer/2022102906/56649ccf5503460f9499afc6/html5/thumbnails/5.jpg)
Social Media
• Do not use Johnson email address• Think before you post• Speak for yourself• Keep secrets secret• Observe security protocols
![Page 6: Johnson Logistics Solutions Office of Systems and Information Technology.](https://reader037.fdocuments.in/reader037/viewer/2022102906/56649ccf5503460f9499afc6/html5/thumbnails/6.jpg)
Peer to Peer
• Multiple users have access to resources• File sharing• Examples
• Not installed on company owned devices• Not used or logged in while on VPN
![Page 7: Johnson Logistics Solutions Office of Systems and Information Technology.](https://reader037.fdocuments.in/reader037/viewer/2022102906/56649ccf5503460f9499afc6/html5/thumbnails/7.jpg)
Avoiding Dangerous Sites
• Internet filters• Search engine filters• Don’t guess the address• Secure sites• Use your senses
![Page 8: Johnson Logistics Solutions Office of Systems and Information Technology.](https://reader037.fdocuments.in/reader037/viewer/2022102906/56649ccf5503460f9499afc6/html5/thumbnails/8.jpg)
Email Security
![Page 9: Johnson Logistics Solutions Office of Systems and Information Technology.](https://reader037.fdocuments.in/reader037/viewer/2022102906/56649ccf5503460f9499afc6/html5/thumbnails/9.jpg)
Gone Phishin’
• Legitimate looking email• Real company• Asks for personal information to avoid
certain disaster• Call the company before opening• Delete and delete some more• Spear phishing
![Page 10: Johnson Logistics Solutions Office of Systems and Information Technology.](https://reader037.fdocuments.in/reader037/viewer/2022102906/56649ccf5503460f9499afc6/html5/thumbnails/10.jpg)
Online Accounts
![Page 11: Johnson Logistics Solutions Office of Systems and Information Technology.](https://reader037.fdocuments.in/reader037/viewer/2022102906/56649ccf5503460f9499afc6/html5/thumbnails/11.jpg)
Password Security
• At least eight characters• At least three upper and/or lower case
letters plus punctuation, symbols, and numbers
• Variation• Variety
I love my catIlovemycatIluvmyc@t
Iluvmyc@t!2013
![Page 12: Johnson Logistics Solutions Office of Systems and Information Technology.](https://reader037.fdocuments.in/reader037/viewer/2022102906/56649ccf5503460f9499afc6/html5/thumbnails/12.jpg)
Email Addresses
![Page 13: Johnson Logistics Solutions Office of Systems and Information Technology.](https://reader037.fdocuments.in/reader037/viewer/2022102906/56649ccf5503460f9499afc6/html5/thumbnails/13.jpg)
Hardware Security
![Page 14: Johnson Logistics Solutions Office of Systems and Information Technology.](https://reader037.fdocuments.in/reader037/viewer/2022102906/56649ccf5503460f9499afc6/html5/thumbnails/14.jpg)
Automatic Updates
![Page 15: Johnson Logistics Solutions Office of Systems and Information Technology.](https://reader037.fdocuments.in/reader037/viewer/2022102906/56649ccf5503460f9499afc6/html5/thumbnails/15.jpg)
Matching Quiz
![Page 16: Johnson Logistics Solutions Office of Systems and Information Technology.](https://reader037.fdocuments.in/reader037/viewer/2022102906/56649ccf5503460f9499afc6/html5/thumbnails/16.jpg)
What Did We Learn
• We defined IT security• We identified sources of threats• We discussed
– Online security– Email security including phishing– Password best practices– Hardware security– Wireless Internet security