Вы находитесь на странице: 1из 12

SECURITY IN THE

WORK
ENVIRONMENT
By Vivi Phan and Fatima Zahra

Why keep information


secure?
Confidential information> illegal> loosing money/jobs

Highly competitive workplaces makes confidentiality


critical
Companies/schools store lots of information though
computers

Internet Safety at Home/


Workplace

Financial Information:
Do not post pictures of checks/ credit cards
Do not post account numbers
Do not make comments about your finances.
Password/Password Hints:
Do not post your password
Do not post information that could give hackers information

Did you know?


Cyborgs beware! University of
Washington hacked defibrillator,
causing fatal-strength jolts of
electricity.

When you are at home/ Away from home:


Do not post about going out
Anything You Dont Want Others to Share:
Others can share your photos and send them to people
Complaints about work/school get back to your employer
If doubts about a photo for public viewing, it is best to not post it.

Tips for Minimizing Security


Threats

Tip 1: Prioritize Information by value and confidentiality


Tip 2: Install monitoring system that identifies threats
Tip 3: Prevent unauthorized users access to data
Tip 4: Important data should be encrypted
Tip 5: Install and turn on a personal firewall.

Protection of Credit
Cards
Check the site
Check for indicators of fake sites
Type in URL before financial data
Check for s in https
Anti-virus/anti-spam software
Before payment page, do not
give credit card number
Call credit card company

Did you know?


1%-5% of people report
defrauding.

Key Terms
Data Encryption:
Act of concealing data
Also called encipherment or encryption
Firewall:
Method used to oversee network connection
Protect/prevent/allow

Hackers:
People who obtain unlicensed admission
Cost billions every year

Did you know?


Kevin Mitnick was the first hacker
on the U.S. most wanted list!

Security Issues
Accessing/stealing data
Protection

10

References
Vidius
, A. P., Inc. (2004, March 15). Five steps your company can take to keep information private. Retrieved May 18, 2
016, from http://www.computerworld.com/article/2563307/security0/five-steps-your-company-can-take-to-keep-informa
tion-private.html
H. L. (2013, June 11). Credit Card Basics: Everything You Should Know. Retrieved May 18, 2016, from http://www
.forbes.com/sites/moneybuilder/2013/06/11/credit-card-basics-everything-you-should-know/#46fa16012f91
L. A. (2013, November 9). Why Is It So Important to Use a Different Password on Every Site? - Ask Leo! Retrieved
May 19, 2016, from https://askleo.com/why-is-it-so-important-to-use-a-different-password-on-every-site/
S. A. (n.d.
). 9 Things You Should NEVER Share on Facebook. Retrieved May 19, 2016, from https://www.postplanner.com/9-t
hings-you-should-never-share-on-facebook/
C. W. (2015, October 22). What are some amazing facts about hacking? Retrieved May 19, 2016, from https://w
ww.quora.com/What-are-some-amazing-facts-about-hacking
Data encryption. (2016). In Encyclopdia Britannica. Retrieved from http://school.eb.com/levels/high/article/2217
Firewall. (2016). In Encyclopdia Britannica. Retrieved from http://school.eb.com/levels/high/article/471611
Cybercrime. (2016). In Encyclopdia Britannica. Retrieved from http://school.eb.com/levels/high/article/1623
KRISTIN KENT SPECIAL TO THE, S. (2013, November 23). Stay protected while shopping online. Toronto Star (C
anada).

11

Вам также может понравиться