Information
Assurance and
Security
Honest Answers Only
• What made the girl meet the boy?
• What was the consequence of the girl’s
meeting with the boy?
• What should have been done to prevent
the risk?
• Did the girl think the possible outcome of
her meeting with the boy?
• Can you think of more dangers that could
arise in the said meeting?
• How can you relate this incident to
yourself as a teenager?
Guidelines for Computer Safety
• Get your parents or guardians involved in
your computer and internet activities
• Keep your identity private
• Never exchange photographs or picture of
your family
• Never agree or go to a meeting with a chat
mate or somebody you met online without
informaing your parents or an adult
• Bear in mind that people may pretend to
be sombody they are not inside the
Internet
• Never tell anyone your passwords
• Do not respond to e-mail, chat and forum
messages if you feel it is
rude
threatening
obscene
suggestive
against what your parents / school taught
you
• Do not believe everything inside the
internet.
• Be extremely careful when somebody
lures you through giving gifts offering
money in exchange for a private meeting,
sending of photos with different poses or a
web camera conversation
• Instll anti-virus software to protect your
computer and all its data
• Maintain a 1st degree access to your
friendster
• Avoid websites or places in the Internet
that are for adults only
Computer Dangers and their Common
Causes
Computer Common Causes
Dangers
Inappropriate Accessing obscene and pronographic websites
Materials
Child Pornography Lack of communication with parents regarding computer and
Internet activities
Bullying Making pranks and jokes; sending e-mail hoaxes
Violation or Privacy Giving out of identifying information; sending photographs
Legal and Financial Giving of credit card numbers; addiction to online gambling
Problems
Violent Behavior Playing online games that depict hostility and
aggression; accessing websites with violent content
Physical Abuse Absence of communication with parents regarding
computer and Internet activities
Malicious lack of protection against viruses, Trojan horse, worms and
Software spywares; accessing inappropriate websites; opening
e-mail from unknown sources and clicking pop-up mssages
Privacy and Security Principles
1. Respect our users. Respect their privacy.
2. Be clear about what data we collect and why.
3. Never sell our users’ personal information to
anyone.
4. Make it easy for people to control their privacy.
5. Empower people to review, move, or delete their
data.
6. Build the strongest security technologies
7. Lead by example to advance online security for
all.
Physical Security
the protection of
personnel, hardware, software, networks and
data from physical actions and events that
could cause serious loss or damage to an
enterprise, agency or institution. This includes
protection from fire, flood, natural disasters,
burglary, theft, vandalism and terrorism.
Three Important Components
• access control
• surveillance
• testing
• The internet of things (IoT) is widening the
sphere of physical security as smart
devices connected to business systems
via the internet may be located outside of
established secure perimeters
• Security is crucial to any office or
facility, but understanding how to get
started in this field can be difficult
Physical Security
• The best, most viable physical security strategies make
use of both technology and specialized hardware to
achieve its safety goals. You will need to protect your
assets from intruders, internal threats, cyber attacks,
accidents and natural disasters, which in turn requires a
mix of technology and in-person monitoring that requires
careful planning and placement of security staff and
other tactics. For your preventive measures and
countermeasures to be effective, you also need to
introduce a security perimeter, the size and scope of
which may vary depending on your specific needs and
possible threats to your facility. Physical security bundles
many needs together, so make sure you consider your
space as a whole, not as separate parts.
Personal Information Security
• Secure Social Networking (Dont Overshare,
Read the Privacy Disclaimer before using a
website, Be selective about who you accept as
friends or followers)
• Social Engineering - the art of human
manipulation. It encompasses everything below
with the express purpose of getting a person to
act a certain way.
• Phishing is the potentially fraudulent process of
attempting to acquire sensitive information such
as usernames, passwords, and credit card
details by pretending to be trustworthy in some
type of communication.
• Email Scams are unsolicited emails that claim
the prospect of a bargain or something for
nothing. Some spam messages ask for
business, others invite victims to a website with
a detailed sales pitch.
• Phone Scams Unsuspecting phone customers
receive voicemail messages with call back
numbers with international area codes
• PDAs, notebooks, iPads, smart phones, etc. are
also vulnerable to security breaches. Be
cautious about what information you store on
your mobile devices, so that you are less
vulnerable if a device is lost or stolen.
Here are 10 ideas you might consider.
• Rethink your email setup
• Encryption
• Web Browsing
• Cloud Services
• File storage and archiving
• Social networking
• Location data
• Wireless Services
• Personal Security
• Search engines
• Create a digital poster that would promote
awareness of the potential dangers in the
use of computers by the youth.
• Write a one-line message
• Make sure that it would create a strong
impact to its viewers and the message
should instill values to them.
Requirements: Short bond paper, any
software/applications, portrait