1. What is Cyber-safety?

Cyber-safety is a common term used to describe a set of practices, measures and/or actions you can take to protect personal information and your computer from attacks.

2. Cyber security principles

There are three core principles of cyber security: Confidentiality, Integrity, and Availability.
Confidentiality: Information which is sensitive or confidential must remain so and is shared only with appropriate users.

Integrity: Information must retain its integrity and not be altered from its original state.

Availability: Information and systems must be available to those who need it.

For example, your confidential medical records should be released only to those people or organizations (i.e. doctor, hospital, insurance, government agency, you) authorized to see it (confidentiality); the records should be well protected so that no one can change the information without authorization (integrity); and the records should be available and accessible to authorized users (availability).

3. Cyber-safety Threats

3.1 Viruses
Viruses infect computers through email attachments and file sharing. They delete files, attack other computers, and make your computer run slowly. One infected computer can cause problems for all computers on a network.

3.2 Hackers
Hackers are people who “trespass” into your computer from a remote location. They may use your computer to send spam or viruses, host a Web site, or do other activities that cause computer malfunctions.

3.3 Identity Thieves
People who obtain unauthorized access to your personal information, such as Social Security and financial account numbers. They then use this information to commit crimes such as fraud or theft.

3.4 Spyware
Spyware is software that “piggybacks” on programs you download, gathers information about your online habits, and transmits personal information without your knowledge. It may also cause a wide range of other computer malfunctions.

4. Consequences of Inaction

Consequences include:

  • Loss of access to the campus computing network
  • Loss of confidentiality, integrity and/or availability of valuable university information, research and/or personal electronic data
  • Lawsuits, loss of public trust and/or grant opportunities, prosecution, internal disciplinary action or termination of employment

5. Cyber-safety Actions

5.1 Install OS/Software Updates.

5.2 Run Anti-virus Software.

5.3 Prevent Identity Theft.

5.4 Turn on Personal Firewalls.

5.5 Back up Important Files.

5.6 Protect Passwords.

5.7 Avoid Spyware/Adware.

6. Cyber-safety at Home & Work

  • Physically secure your computer by using security cables and locking doors and windows in the dorms and off-campus housing.
  • Avoid leaving your laptop unsupervised and in plain view in the library or coffee house, or in your car, dorm room or home.
  • Set up a user account and password to prevent unauthorized access to your computer files.
  • Do not install unnecessary programs on your computer.
  • Talk with your technical support coordinator about what cyber-safety measures are in place in your department.
  • Report to your supervisor any cyber-safety policy violations, security flaws/weaknesses you discover or any suspicious activity by unauthorized individuals in your work area.

Reference :
http://security.ucdavis.edu/pdf/cybersafety_basics.pdf