Monday, November 10, 2014



Get a Voki now!

What are your thoughts about Internet safety?
How can we keep our children safe when going online?
----------------------------------------------------------------------------------------------------

Does your school have an Internet Safety Plan?

What is NYCDOE's Internet Acceptable Use Policy? (IAUP)

Educating your school on ETHICAL AND SAFE USE OF THE INTERNET
---------------------------------------------------------------------------------------------------
-

Being a knowledgeable parent is the best course of action.
Talk to your child and ask them what they are doing.
Take interest in your child's online life.

Please feel free to comment and express your thoughts.


Here are some great resources for Cyber Safety:


Anti-Bullying Resources 

1.       http://stopbullyingnow.hrsa.gov/kids/ Lessons, Cartoon Webisodes and resources.
2.       http://www.pacer.org/bullying/resources/  Resources, printable handouts in English, Spanish and Somali
4.       http://www.cybersafety.ca.gov/educators.htm  Cyberbullying resources
5.       http://bullying.org/htm/main.cfm?content=1060   Resource guide
6.       http://cybersmartcurriculum.org/cyberbullying/nasp/  Downloadable printables, lesson plans and activities from the National Association of School Psychologists

The City of New York
City of New York
Information Security Awareness
NEWSLETTER

October 2010Volume 5, Issue 10

Why Cyber Security Is Important

From DoITT’s Information Security Team

October Is Cyber Security Awareness Month
In recognition of the 2010 National Cyber Security Awareness Month, this edition of the newsletter is designed to focus attention on the basics of cyber security and how users can protect themselves online.

Many aspects of our lives rely on the Internet and computers, including communications (email, cell phones, texting), transportation (traffic control signals, car engine systems, airplane navigation), government (birth/death records, social security, licensing, tax records), finance (bank accounts, loans, electronic paychecks), medicine (equipment, medical records), and education (virtual classrooms, online report cards, research).

Consider how much of your personal information is stored either on your own computer or on someone else's system. How is that data and the systems on which that data resides (or is transmitted) kept secure?


What Is Cyber Security?
Cyber security involves protecting the information and systems we rely on every day - whether at home, work or school.

There are three core principles of cyber security: Confidentiality, Integrity, and Availability:

Confidentiality: Information that is private or confidential must remain so and is shared only with appropriate users.
Integrity: Information has not been altered or destroyed from its intended form or content.
Availability: Information is accessible, functional and usable when needed by authorized users.

Different types of data and systems require different levels of appropriate security. For example, your confidential medical records should be released only to those individuals or organizations (i.e., doctor, hospital, insurance company, government agency, you) authorized to see it (confidentiality); the records should be well protected so that no one can change the information without authorization (integrity); and the records should be available and accessible to authorized users (availability).
Why Is Cyber Security Important?


The increasing volume and sophistication of cyber security threats - including targeted phishing scams, data theft, and other online vulnerabilities - demand that we remain vigilant about securing our systems and information. The average computer connected to the Internet without proper security controls can be compromised in moments. Thousands of infected Web pages are being discovered every day. Hundreds of millions of records have been involved in data breaches. New attack methods are launched continuously.

These are just a few examples of the threats facing us, and they highlight the importance of cyber security as a necessary approach to protecting data and systems.

Threats

There are many threats, some more serious than others. Some examples of how your computer and systems could be affected by a cyber security incident - whether because of improper cyber security controls, man-made or natural disasters, or malicious users wreaking havoc - include the following:

Denial-of-service: Refers to an attack that successfully prevents or impairs the authorized functionality of networks, systems or applications by exhausting resources. What impact could a denial-of-service have if it shut down a government agency's website, thereby preventing citizens from accessing information or completing transactions? What financial impact might a denial-of-service have on a business? What would the impact be on critical services such as emergency medical systems, police communications or air traffic control? Can some of these be unavailable for a week, a day, or even an hour?

Malware, worms, and Trojan horses: These spread by email, instant messaging, malicious websites, and infected non-malicious websites. Some websites will automatically download the malware without the user's knowledge or intervention. This is known as a "drive-by download." Other methods will require the users to click on a link or button.

Botnets and zombies: A botnet, short for robot network, is an aggregation of compromised computers that are connected to a central "controller." The compromised computers are often referred to as "zombies." These threats will continue to proliferate as the attack techniques evolve and become available to a broader audience with less technical knowledge required to launch successful attacks. Botnets designed to steal data are improving their encryption capabilities and thus becoming more difficult to detect.

Scareware - fake security software warnings: This type of scam can be particularly profitable for cyber criminals, as many users believe the pop-up warnings telling them their system is infected and are lured into downloading and paying for the special software to "protect" their system.

Social Network Attacks: Social networks can be major sources of attacks because of the volume of users and the amount of personal information that is posted. Users' inherent trust in their online friends is what makes these networks a prime target. For example, users may be prompted to follow a link on someone's page, which could bring them to a malicious website.

What Can You Do?
It is important that we each understand the risks, as well as the actions we can take to help protect our information and systems.

Properly configure and patch operating systems, browsers, and other software programs.
Use and regularly update firewalls, anti-virus, and anti-spyware programs.
Use strong passwords (combination of uppercase and lowercase letters, numbers and special characters) and do not share passwords.
Be cautious about all communications; think before you click. Use common sense when communicating with users you DO and DO NOT know.
Do not open email or related attachments from un-trusted sources.
Allow access to systems and data to only those who need it, and protect those access credentials.
Follow Citywide Information Security Policies and Standards and report security violations and issues to the Citywide Service Desk at (718) 403-8888.

Useful Links:

Citywide Information Security Policies and Standards are available at http://cityshare.nycnet/infosec.


No comments:

Post a Comment