SlideShare ist ein Scribd-Unternehmen logo
1 von 15
PCC Training Track – Lesson 3 ,[object Object]
Security ,[object Object],[object Object],[object Object]
Demonstrate an understanding of security-conscious computer use ,[object Object],[object Object],[object Object],[object Object],[object Object]
Be able to explain the difference between a user name and a password ,[object Object],[object Object],[object Object],[object Object],[object Object]
Know how to create a secure password ,[object Object],[object Object],[object Object],[object Object],[object Object]
Recognize suspicious email attachments and instant messages and advise patrons on how to handle them ,[object Object],[object Object],[object Object],[object Object]
Recognize suspicious email attachments and instant messages and advise patrons on how to handle them ,[object Object],[object Object],[object Object],[object Object]
Recognize “phishing” scams & advise patrons on how to handle them ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],Recognize “phishing” scams & advise patrons on how to handle them
Explain why email clients (Outlook Express, etc.) are a risk and web-based email is recommended ,[object Object],[object Object],[object Object],[object Object]
Understand the effects of public access computing security on user privacy ,[object Object],[object Object],[object Object]
Know how the public access security set-up retains records in the form of cookies, Internet history or saved files between user sessions ,[object Object]
Know how to remove saved records upon patron request ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Inform patrons of their options for saving files created in a user session ,[object Object],[object Object],[object Object]
Security Quiz ,[object Object],[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
Atlantic Training, LLC.
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guide
mjtheman
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
Sadaf Walliyani
 
Module4 policies&procedures-b
Module4   policies&procedures-bModule4   policies&procedures-b
Module4 policies&procedures-b
BbAOC
 

Was ist angesagt? (16)

Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computing
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
Dark Alleys/Internet Security
Dark Alleys/Internet SecurityDark Alleys/Internet Security
Dark Alleys/Internet Security
 
Impact on IT system breaches
Impact on IT system breachesImpact on IT system breaches
Impact on IT system breaches
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethics
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protection
 
Information security awareness, middle management
Information security awareness, middle managementInformation security awareness, middle management
Information security awareness, middle management
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Poicy 121
Poicy 121Poicy 121
Poicy 121
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guide
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
CBSE class X Computer Applications ch 1 INTERNET
CBSE class X Computer Applications ch 1 INTERNETCBSE class X Computer Applications ch 1 INTERNET
CBSE class X Computer Applications ch 1 INTERNET
 
Module4 policies&procedures-b
Module4   policies&procedures-bModule4   policies&procedures-b
Module4 policies&procedures-b
 

Andere mochten auch

The Power Of Vision (malay)
The Power Of Vision (malay)The Power Of Vision (malay)
The Power Of Vision (malay)
notarazi
 
Ven A Ver El Mar
Ven A Ver El MarVen A Ver El Mar
Ven A Ver El Mar
pepe_linea
 
Reportaje Yous & La Juana
Reportaje Yous & La JuanaReportaje Yous & La Juana
Reportaje Yous & La Juana
pepe_linea
 
P China2004
P China2004P China2004
P China2004
Alicia_C
 
Librarians learn web day 3
Librarians learn web day 3Librarians learn web day 3
Librarians learn web day 3
Robin Hastings
 
Maatschappelijk jaarverslag mc donald's nederland 2010 def
Maatschappelijk jaarverslag mc donald's nederland 2010 defMaatschappelijk jaarverslag mc donald's nederland 2010 def
Maatschappelijk jaarverslag mc donald's nederland 2010 def
Tom Janssen
 
Reconstruction and it Effects
Reconstruction and it EffectsReconstruction and it Effects
Reconstruction and it Effects
Jenny Hulbert
 
An Amazing Man Wb
An Amazing Man   WbAn Amazing Man   Wb
An Amazing Man Wb
notarazi
 
english presentation
english presentationenglish presentation
english presentation
iriera5
 

Andere mochten auch (20)

Pass4sure 640-554 Cisco IOS Network Security
Pass4sure 640-554 Cisco IOS Network SecurityPass4sure 640-554 Cisco IOS Network Security
Pass4sure 640-554 Cisco IOS Network Security
 
Web 2.0 For Teachers
Web 2.0 For TeachersWeb 2.0 For Teachers
Web 2.0 For Teachers
 
Becoming entrepreneur
Becoming entrepreneurBecoming entrepreneur
Becoming entrepreneur
 
The Power Of Vision (malay)
The Power Of Vision (malay)The Power Of Vision (malay)
The Power Of Vision (malay)
 
CADE Games and Virtual Worlds Training
CADE Games and Virtual Worlds TrainingCADE Games and Virtual Worlds Training
CADE Games and Virtual Worlds Training
 
Blogging in Education
Blogging in EducationBlogging in Education
Blogging in Education
 
Open Id
Open IdOpen Id
Open Id
 
Ven A Ver El Mar
Ven A Ver El MarVen A Ver El Mar
Ven A Ver El Mar
 
Drupal nagw
Drupal nagwDrupal nagw
Drupal nagw
 
Hinduism
HinduismHinduism
Hinduism
 
Reportaje Yous & La Juana
Reportaje Yous & La JuanaReportaje Yous & La Juana
Reportaje Yous & La Juana
 
P China2004
P China2004P China2004
P China2004
 
Librarians learn web day 3
Librarians learn web day 3Librarians learn web day 3
Librarians learn web day 3
 
Rancangan Perniagaan
Rancangan PerniagaanRancangan Perniagaan
Rancangan Perniagaan
 
Delicious
DeliciousDelicious
Delicious
 
Ensuring HIgh Quality Online Professional Development
Ensuring HIgh Quality Online Professional DevelopmentEnsuring HIgh Quality Online Professional Development
Ensuring HIgh Quality Online Professional Development
 
Maatschappelijk jaarverslag mc donald's nederland 2010 def
Maatschappelijk jaarverslag mc donald's nederland 2010 defMaatschappelijk jaarverslag mc donald's nederland 2010 def
Maatschappelijk jaarverslag mc donald's nederland 2010 def
 
Reconstruction and it Effects
Reconstruction and it EffectsReconstruction and it Effects
Reconstruction and it Effects
 
An Amazing Man Wb
An Amazing Man   WbAn Amazing Man   Wb
An Amazing Man Wb
 
english presentation
english presentationenglish presentation
english presentation
 

Ähnlich wie PCC Training - Security

Email Effective Security Practices: 10 Concrete Steps to Consider
Email Effective Security Practices: 10 Concrete Steps to ConsiderEmail Effective Security Practices: 10 Concrete Steps to Consider
Email Effective Security Practices: 10 Concrete Steps to Consider
webhostingguy
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
R_Yanus
 
6 Cyber Security Introduction - sec101-idtheft .pptx
6 Cyber Security Introduction - sec101-idtheft .pptx6 Cyber Security Introduction - sec101-idtheft .pptx
6 Cyber Security Introduction - sec101-idtheft .pptx
DevenderDahiya9
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
amiinaaa
 

Ähnlich wie PCC Training - Security (20)

Email Effective Security Practices: 10 Concrete Steps to Consider
Email Effective Security Practices: 10 Concrete Steps to ConsiderEmail Effective Security Practices: 10 Concrete Steps to Consider
Email Effective Security Practices: 10 Concrete Steps to Consider
 
Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety
 
CYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptxCYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptx
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft
Watch Your Back: Let’s Talk Web Safety and Personal Identity TheftWatch Your Back: Let’s Talk Web Safety and Personal Identity Theft
Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft
 
Cyber security and emails presentation refined
Cyber security and emails presentation refinedCyber security and emails presentation refined
Cyber security and emails presentation refined
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006
 
Nt1330 Unit 7
Nt1330 Unit 7Nt1330 Unit 7
Nt1330 Unit 7
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)
 
6 Cyber Security Introduction - sec101-idtheft .pptx
6 Cyber Security Introduction - sec101-idtheft .pptx6 Cyber Security Introduction - sec101-idtheft .pptx
6 Cyber Security Introduction - sec101-idtheft .pptx
 
Usb based secure e mail
Usb based secure e mailUsb based secure e mail
Usb based secure e mail
 
USB BASED SECURE E-MAIL
USB BASED SECURE E-MAIL USB BASED SECURE E-MAIL
USB BASED SECURE E-MAIL
 
Usb based secure e mail
Usb based secure e mailUsb based secure e mail
Usb based secure e mail
 
Cyber security and emails presentation
Cyber security and emails presentationCyber security and emails presentation
Cyber security and emails presentation
 
Mofokeng email etiquette
Mofokeng email etiquetteMofokeng email etiquette
Mofokeng email etiquette
 
Mofokeng email etiquette
Mofokeng email etiquetteMofokeng email etiquette
Mofokeng email etiquette
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
How to stop computer crime
How to stop computer crimeHow to stop computer crime
How to stop computer crime
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 

Mehr von Robin Hastings

Solo tech presentation for nagw
Solo tech presentation for nagwSolo tech presentation for nagw
Solo tech presentation for nagw
Robin Hastings
 
Project management for nagw
Project management for nagwProject management for nagw
Project management for nagw
Robin Hastings
 
Solo Tech - LibTech Presentation
Solo Tech - LibTech PresentationSolo Tech - LibTech Presentation
Solo Tech - LibTech Presentation
Robin Hastings
 
Librarians learn web day 2
Librarians learn web day 2Librarians learn web day 2
Librarians learn web day 2
Robin Hastings
 
Librarians learn web day 1
Librarians learn web day 1Librarians learn web day 1
Librarians learn web day 1
Robin Hastings
 
Don Corrigan – mrrl’s author podcast series
Don Corrigan – mrrl’s author podcast seriesDon Corrigan – mrrl’s author podcast series
Don Corrigan – mrrl’s author podcast series
Robin Hastings
 
Adelstein Presentation
Adelstein PresentationAdelstein Presentation
Adelstein Presentation
Robin Hastings
 

Mehr von Robin Hastings (20)

Linked data - NCompass presentation
Linked data - NCompass presentationLinked data - NCompass presentation
Linked data - NCompass presentation
 
Remodel your website
Remodel your websiteRemodel your website
Remodel your website
 
Solo tech presentation for nagw
Solo tech presentation for nagwSolo tech presentation for nagw
Solo tech presentation for nagw
 
Project management for nagw
Project management for nagwProject management for nagw
Project management for nagw
 
Project management for nagw
Project management for nagwProject management for nagw
Project management for nagw
 
Solo Tech - LibTech Presentation
Solo Tech - LibTech PresentationSolo Tech - LibTech Presentation
Solo Tech - LibTech Presentation
 
Microblogging nagw
Microblogging nagwMicroblogging nagw
Microblogging nagw
 
Charlotte hubbard
Charlotte hubbardCharlotte hubbard
Charlotte hubbard
 
Librarians learn web day 2
Librarians learn web day 2Librarians learn web day 2
Librarians learn web day 2
 
Librarians learn web day 1
Librarians learn web day 1Librarians learn web day 1
Librarians learn web day 1
 
Lisa Campbell Ernst
Lisa Campbell ErnstLisa Campbell Ernst
Lisa Campbell Ernst
 
Don Corrigan – mrrl’s author podcast series
Don Corrigan – mrrl’s author podcast seriesDon Corrigan – mrrl’s author podcast series
Don Corrigan – mrrl’s author podcast series
 
Library mashups
Library mashupsLibrary mashups
Library mashups
 
Communicating In The Cloud Soc Gov
Communicating In The Cloud Soc GovCommunicating In The Cloud Soc Gov
Communicating In The Cloud Soc Gov
 
Web Building With Drupal
Web Building With DrupalWeb Building With Drupal
Web Building With Drupal
 
Adelstein Presentation
Adelstein PresentationAdelstein Presentation
Adelstein Presentation
 
OS & File System
OS & File SystemOS & File System
OS & File System
 
Pcc Hardware Comp
Pcc Hardware CompPcc Hardware Comp
Pcc Hardware Comp
 
Web 3 0
Web 3 0Web 3 0
Web 3 0
 
Transformational Change - The Evolving Role Of Library IT Departments
Transformational Change - The Evolving Role Of Library IT DepartmentsTransformational Change - The Evolving Role Of Library IT Departments
Transformational Change - The Evolving Role Of Library IT Departments
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Kürzlich hochgeladen (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

PCC Training - Security

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.