Home
本文 - 内閣官房情報セキュリティセンター
Contents
1.
2.
3.
4.
5. OHP mY Sy
6. e etc e 12
7. 0 000 2 25 ISB SI2 Bcc USB 20000 22000
8. 0 5 6 1 1
9. 98 9 lt
10. 20 22 1 ICT 21 38 1 23 2 980
11. 41 42 ICT SPREAD JNSA 6S 3 5 1
12. A1 A2 A3
13. 2 72 2 7 10 2
14. Q1 A B
15. 70 71
16. 99 0 7
17. 6 Q9 22 A1
18. 1 2 1 lt gt lt gt gt
19. 1 9 1 1 3 Cyber Security Videos Protect Yourself 30
20. 7 Q11 IND Al A2 A3
21. 1 25 lt mn A
22. A2 A3 A 1 Q 10 22 A2
23. O QI Al A2 A3 QL10 2 Al A2 A3 3
24. 4 EU oo 45 43 http www bmwi de BMWi Navigation Technologie und Innovation Digitale Welt Digitale Gesellschaft internet erfahren did 299118 html 07 01 2012 44 Bundesministerium fur Wirtschaft und Technologie BMWi 2011 Erlebnis Internet Erfahrung schaffen p 44 45 http www internetpate
25. 16 http www pref chiba lg j p kyouiku kj nanbou shidoushitsu documents self pdf 22 2 3 2 T IT IT TT IPA T
26. i ee 14 14 4 IPA 2011 10
27. 0S ID ID
28. O 22 3 2 1 EE EE EE EE A1 A22 AS To OO OO 2
29. URL URL NPO TT
30. A1 A2 13 3 Os 3
31. Q14 Al A2
32. 2 64 3 1 1
33. Be Ready Utah 6 Be Ready Utah Ready Your Business Business Continuity Planning Guidebook 81 7 12
34. 7 http slb jnsa org slbm NTT 10 8 1 5 IPA IPA
35. 39 5 2 IT 2008 Riktlinjer for informationssakerhet i Goteborgs Stad 6 2010 58 84
36. ee dt da FN PR NS 2 2 2
37. IDA SII 74 You Tube IDA 75 FHacebook TwWitter Flickr SII Silver Infocomm Junctions SIJ 2007 76 IT 9 IT
38. 4 8M USB
39. 2 2 A3
40. Red Red Red
41. np Bf e Y IPA O03 5978 7509 10 00 12 00 13 30 17 00 03 5974 OO68CF 10
42. 3 3 3 1 Red 2 Yellow 3 Blue lue lt gt 7 13 Red Yellow
43. PDCA OO SI CA pa abe NT PDCA 19
44. National Council on Aging NCOA Bank of America Charitable Foundation Savvy Saving Seniors 2011
45. http www pref chiba lg jp kyouiku kj nanbou shidoushitsu index html PDE PDF tse esse 1 oooeererrrerrrrrrrnrr 2 1 2 5 3 eeemermmrm 4
46. 32 NE CN ET CU0 34
47. how to take advantage of the opportunities without falling prey to predators so you can have peace of mind when you go online 1 3 1 Consumer Issues A Z Safeguarding Consumers gt Internet Safety gt Seniors CONTACT Us gt All Consuming Blog RTT AGO Self Help 7 Brochures Tade fracte tj SENIORS Busimess Resources a Consumer Alerts amp Increased risks 5 Evemts Social Networkin Communica Online Cy Pres Cyberbullying Socializing Online File a Complaint Online Dating Sharing Images Online Internet Safety Information Exposure Gaming Online Adults Safety Tips Spending amp Saving Online Familes amp Educators The internet creates excellent Identity Theft Seniors opportunities for seniors to meet Computing o
48. A 1 SNS A2 3 Q 1 O A3 24 Q 2 0
49. A1 A2 5 1 A3
50. Q1 6
51. 3 4 PDF NPO
52. 2002 1 5 2009 5 3 2010 8 4 29 3 4 TVCM
53. A 2 To Cc Boc 3 To To To Cc Bcc Cc Bcc
54. 9 http www atg wa gov InternetSafety FamiliesAndEducators aspx 12 01 2012 12 Internet safety contract for families 10 1 3 2 Internet Safety Topics PDF 1 8 2
55. 9 IPA 2010 12 11 NN 5Y O 4
56. 0 10 20 30 40 50 60 70 80 96 65 71 6 6 69 6 lt 21 n 1 795 21 22 n 6 986 0 2 0 2 4 7 22 3 5
57. A 2 7 38 60 EUS MUN ba td nl S20 98 4 4 TU LAE rt 5
58. URL 3 http www checkpc so jp quiz detail html contents head NTT 1 4 JNSA
59. 297 36 66 37 Bundesministerium fur Familie Senioren Frauen und Jugend Alter schafft Neues Initiativen und Informationen fur altere Menschen 8 BAGSO Wegweiser durch die digitale Welt Fur altere Bugerinnen und Burger
60. A 1 A3 A2 18 7 Q 1 1 22 A3
61. IT http www meti go jp press 20070122003 20070122003 html Q1
62. 20 60 27 26 23 42 4 28 13 19 00 10 0 20 0 30 0 40 0 50 0 50 0 70 0 18
63. 1 2 JNN 1 2 i
64. A A3 A 1 Q 19 SNS 3 lt A3
65. gt 4 3 2 1 lt gt lt gt 4 3 2 1 4 3 2 1 gt mmo
66. A 1 A2 A3 15
67. ICT SPREAD JNSA
68. 12
69. 2 5 SNS
70. A1 A2 AS Q O
71. 2 ACTTION 3 ACTION ACTION ACTION 4 NA A ACTION 0
72. s ID s 10 http www ipa go D security ciadr checksheet html 12 2 21 0 PD ap O A CAME 0 O O O AA O O O yIT 0 6 IPA
73. IPA 03 5978 7509 10 O0 12 00 13 30 17 00 e 03 5974 OO68 10 00 17 OO 1
74. 2 A B C A B C C 9 A
75. 2 7 8 1
76. IT BA 41 4 2 1 Goteborgs Stad CHECKLISTA RIKTLINJER FOR INFORMATIONSSAKERHET I GOTEBORGS STAD Version 1 0 Hantermg av mmfnrmathnmstllgamgar Nr Har en forteckming Gver samtliga informationssyvstem Finns informationsagare utsedda far verksamhetens A information Har samtliga nformationssyvstem en utsedd systermgare EE Innehaller forteckmingen en indamalsbeskrivming for respektive informationssystem Innehaller forteclkmingen en beskrivming over tllanmpliga regler lagar avtalsrattsli
77. 65 3 4 1 web HP
78. SNS 8
79. S CT 5 B 9 PA 8 http www ipa go jp security ciadr checksheetappendix html NTT
80. 2 EE 12 http 7 www mhlw so jp topics 2004706 dtp0630 1d pdf 14 3 20 5
81. i A 1 A1 A2 21 1 5 A2 A2
82. B A B 0 16 17 22 23 A B 0 19 20 28 29 15 13 http www fatigue co p check html 18 19 2 3 2 3 1
83. Action UK IT Digital Inclusion Network 1 Making the most of the internet Getting Started Getting Online
84. Bcc 3 10 Q 16 gt 22 A1 A2 A3
85. T Online BKK24 ed ee U 0 RE A ANETTA CA CE TAKE UA ER 4 20 10 16
86. 2 4 1 4 3 4 8 General Quiz 1 General Quiz 2 At Home Advanced Quiz 4 5 13 1 1 1 Contents Verification 9
87. 3 31 1 1 7 TE 1 i i EMI ET iT dL 77 31 32 21 48 32
88. MM381 83 3 1 Gi Suchen mit Google HrellE raw aongle de Surhfeld Im Recgrifall knnen Sie dielkt mit der Einga be san Su hetnrn held rar Ia dem Sauchfeld im PinkumentEnfEnster Tnichs mn Har IP Adessreilel nchmal it der blinkende Balken LursnT noch nicht sichithiar amn kicken 5 infach mit HEr Ting PNautaste in das Surhfeld Denach hnrn Si Irm Stichitirher nnh Die morale uche hahmen ir mn Se suchen Iirfosmationen zm ThHmma WuwFmFmrm Lahmm 5ig das Wt a 5uch ml win und klicken Sie danr auf ongle Suche oder drhcten gam infach im Eingahatasts 50 ans Netz 7Was begeistert Sie am Internet Was argert Sie77 BAGSO
89. A3 Q 2 1 LAN a A2 LAN LAN A2 LAN
90. 21 19 http www shigaku go jp files s center checklist23 kasetsu pdf 26 3 3 1 2 1 2 OO NEC IT O O O O 0 a RN O O 22 27 3 2 NEC T NEC
91. Bcc A1 A3 AS 22 10 Q16 22 lt A1
92. lt 20 IT 272 8 0 http www ipa go p jinza1 award vendor2011 doc a3_check pdf 24 lt 2 4 Py 2 4 1 23 http www shigaku so jp s_center_checklist
93. OSs 2 5 SNS 8 OS 11 1
94. 15 IT IT 8 IT IT 15
95. A1 A2 4 5 A3 Q 17
96. 20 A 1 Freet IPA Word 80 3
97. 6 18 7
98. ID 0S ID ID
99. 26 1 3 2 gt 4 4 7 4 6 12 5 9 10 Ql Q3 Q4 Q2 Q18 Q5 Q6 Q7 Q8 Q9 Q10 QI Q12 Q16 Q18 014 Q20 Q22 Q13 Q17 Q19 Q15 Q21 B
100. http www soumu so jp main sosiki joho_tsusin joho_tsusin html lt 9 a 5 7 Q2 Q3a Q4 Q5 QG Q7 7 9 nto Fls sh
101. JNSA http www jnsa org 2011 11 1 nb2 100 C 0 oz 100 20 eeerestesseeeseeeesteeseeeeeeeeeseereeeseeeeeeeeeeeeeeeeeeeeterereereeeereeeeeeeeeeeeeeeeeeeee 3 DT SS 100 9 4 100 32 ju 100 16 6 doinaka 100 G 30 arcs Ti mascara 2010 3 2 33 2008 13 11 1215 ei
102. 1 3
103. ani eo 34 CM ge ebiot Biers eisai yon en ihe 8 4 22 200 29 CM
104. 2 i Ee 4 EA GO EE ECVHEUN A lt NS 4 NC ft eim00 Hs CE 17 6 16 http www1 pref shimane lg jp contents kansen infpdf7poster23 pdf 27 C
105. WebUD 2 http www nec co D commumnity 1a 1t elderly html 28 3 3 2011 7 TVCM
106. Glossary 2 8 1 2 3 1 Glossary BnnidwIdth A TiE slTE Of hw Tnurh InforrT ti con be tronsferred withlri o ghren TIurt of iT in Megoabits per second or MbD5 Domqle Sa dEvICE You can plug into your I DtOD to occess brnnharid IntErriEt the Dawnlond lnq rnrisfer files frnrn the IntErTet to WOUF On COITPUIET Whni used with Tnll IE USunlly refers to CMECti ieW ressn es Wheri used with the weh it UEunly refers to ELIESHIrMd WEh poge Emqlllnq Short for electronic TI Email fs the nternet Wersion of the DOstnl seTviCE WOU serd Messnge olso referred tn os frr fom WOUT computer tn orother person who olso hos dECE55 to ETTI IL Hoard rlve The disk inside your CDITDutET where your documents photos ond software ore stored Interne the met A WOrldwide collection of cormputers joined by retworks which nre linked to en other vin cormmunication links such os telephone lines To join the internet oll you he to do ts CONnect WOUT COITIDUhET to one of the networks
107. 3 VM 99 3 29 2 3
108. A2 Q 1 3 22 A1 0 A2
109. IT IT 8 8
110. a TP P IP 3 34 http www hessen it de dynasite cfm2dsmid 13688 num 11705 07 01 2012 30 4 3 50 50 ans Netz Online Jahr 50plus 2006 2007 2006 2007 50 2000
111. etc etc 1 etc etc 1 etc etc a 1 1 i ee 5
112. A2 23 11 SNS Q 18 22 SNS CO SS A1 SNS SNS A2
113. Q 1 re A1 A2 A3 11 SNS Q 18 SNS 22 A1 SNS
114. 8 9 3 4 1 Rate mal wer dran ist So schutzen Sie sich vor Betrugern Trickdieben as itt Strafanzeige ist eine Tat fur den Tater oder die Taterin aber in aller Regel vollig gefahr und fo genlos i Auch wenn die betroffene altere Person Strafan Zeiqe erstattet rechnen sich manche Kriminelle besondersqute Chancen aus ohne Strafe davon zukommen Sie gehen davon aus dass viele Alte re eher schlecht sehen sichvielleicht auch nicht Imehr in allen Einzelheiten an das Geschehene erinnern und damit vergleichsweise ungefahrli che Zeugen sind
115. Blue 3 Red Yellow Blue Red Yellow Red Yellow Yellow Blue 2 2
116. 2 3 J 1 1 Red
117. yr USB _ P NN 0 gt SS 0S ip N a
118. 17 http 7blog protectmyid co uk 18http www protectmyid co uk HowldentityProtectionWorks aspx hnk bottommodule amp Site Versionl D 609 amp SiteID 100258 amp sc 501003 amp bcd 15 1272011 19 http www actionfraud org uk resources 15 12 2011 20 http www actionfraud org uk about us 15 12 2011 19 3 2 Personal Security Checklist 2 22 Get Safe Online OS Mac Linux 10
119. 2 8 2 2 3 2 Making the most of the interne was secretly heartbroken when my eldest daughter accepted a job in America I thought I d lose all contact But now I have learned to use email tt has helped us to keep in touch and I also managed to book my flights online to visitt her lcouldn t believe how simple it was Margoaret 58 23 2 Tnternet security Staying safe onhne 26 Email encounterss 4 Telephone scams
120. SNS SNS OS 1 e
121. 16 Qg 22 A2 8 A2 A2 A 1 A 3
122. a 00 web HP PDF 23 36 2 4 1 1 2 2 4 3 3 1 5 1
123. Blue lt gt Yellow gt Red lt gt Red ICT 1 33 0 3 3 Red
124. 8 1 Fasten Up Up 5 3 9 2 8 2 5 1 1 5 1 1 Pa 55wvyordd wyhaEt 5 that ri ns hausband ond wife wae ghare i wa th ec h other ah A Es PFTTmrTePTIY used by PrTtFmLitEr wst rr to wiTr You tentity to eterrrine if tt should grant you to the systemi Hoeewver ITeEHT Can Mashjueratde Hs YOU mW cress woOur Personal mformration fF the Person Eos PL es http www singcert org sg awareness passwords htm Scam Scam i
125. OS 4 Q 5 Al A2 A3 Q6 z A1 A2 A3
126. eg USB 4 5
127. 3 37 37 3 6
128. SNS 19 20 31 HE LN 6 19A ui19y4BUU JO 9jd oUl4d 8UO41SUuJW AJeD Yeo dillUd Z 0 YH 1 AZ 3 1 AZ
129. 35 36 2012 1 9 a Rh A B
130. 61 http www singcert org sg awareness index htm 12701 2012 45 5 1 2 5 1 2 http www singcert org sg awareness updates htm 2 6 JI 6 5 1 83 5 1 5 OT TT A 46 5 1 8
131. 1 CRed Yellow Red Awareness Yellow Response edit bg Red
132. Y OS Y SNS VY SQL APT 1 e e 1 USB LAN e
133. A3 A1 A1 20 9 3 2 A2 A3 9
134. 8 W 23 25 65 24 23 40 2 26 1980 69 2009 43 2 1980 28 1 2009 2 52 0 gt PP 4 55 2 12 13 14 15 16 17 18 19 1980 985 1990 1995 1998 997 999 999 2000 2001 2002 2003 2004 2005 2006
135. PeiPp6 6 1 hl 29 22 1 ICT 45 3 2 96
136. 2 1 1 Read more facts about fraud 2 1 2 Identity Fraud Risk of all frauds recorded in 2010 Calculate your identity fraud risk and see how to reduceit were identity frauds approx How you bank where your postis delivered to the information You post online all these thinqS can make 4 100 000 cases i 3 0 Souroe CIFAS March 2011 you more vulnerable to identity theft and fraud Calculate your risk level now with our quiz and see if You 0 Could reduce it with a few simplestepSs ee of Britons providedtheir date of birth online 20 their National A details 4 1 1 8881 ele and 45 their credit card details Source Finextra 11 05 2011 Answer a short series of questions to find out how at risk you are from identity theft and fraud The questions will be based on four areas at home in public online and Criminals can Durchase a about you Based on your answers in each section we wl give you tips on how you whole new identity online can reduce your risk level eS Includ
137. 3 3 2011 10 CE 5 TPA 2011 10 2 9 6 2 4 22
138. 1 http www city minato tokyo jp kurasi iza bosai anzen koureianzen index html 31 2012 3 NTT I oi 4 EN 5 2 1 Michigan Cyber Initiative Toolkit 5 2 2 Cyber Security Controls Checklnst ie 8 2 3 Seniors Internet Safety 11 2 4 1 Savvy Saving SBINOSRRMRMKMANNMARN 14 DA 17 OOCCE NN 17 3 2 PFSORaAl SeCUMtY CheckhS SS 20 3 3 Making the most of the internet nternet security Staying safe onhne i 22 4 1 IT BSI Leitfaden 1 SS1 EAN 25 4 2 IT CD Sicher ins NetzDie TIT Sicherheits CD 28 4 83 1 50 50 ans Netz Online Jahr 50plus 2006 2007 31 4 4
139. EE 24 http www ageuk org uk Documents EN GB Information guides AgeUKIG22 Making the_most of the internet inf pdf dtrk true 19 12 2011 25 http www ageuk org uk Documents EN GB Information guides AgeUKIL4 Internet security inf pdf dtrk true 19 12 2011 22 Keeping in touch SNS SNS Saving time and money Information and advice Staying active Useful organisations Age UK
140. 1 WWW 2 3 33 ENISA European Network and Information Information security awareness Local government and internet providers August 2007 http www itu int osg csd cybersecurity WSIS 3rd _meeting docs contributions Information 208Securi ty 20Awareness 20Initiatives 20Undertaken 20by 20Local 20Governments 20and 20ISPs 2 Oin 20the 20EU_FINAL pdf pp 46 47 07 01 20192 28 53 6 7 8 3 2 1 Kompetenzcheck unbeartbeitet beantw
141. official 1ooking materials So SNS e a way predators to find potential victims
142. USB DVD R A3 A1 A2 A2 19 Q S lt S
143. Q2 ID ID ID ID D Q3
144. USB CD R Winny share Cabos 3 Q7 Al A2 A3 Q8 A1 A2 A3
145. e 3 1 2 8cam 38 e 8 9 14
146. 8 4 1 Sicher leben im Alter SiiA 8 48 29 07 2011 http www bmfsfj de BMFSEJ aeltere menschen did 173980 html 15 12 2011 35 5 5 1 SurfaLugnt se 2005 The Ministry of Health Post and Telecom Agency Save the Children IT 6
147. 58 http www actioncaring se Eng RngActionfolder pdf p 2 09 01 2012 59 Tbid p 3 09 01 2012 60 http www actioncaring se Rng Engpress htm 09701 2012 43 5 12 3 4 83 1 ACTION THE ACTIUN SERVICE ACTION FROGRAMNNES ACTION CALL CENTRE ACTION STATION EDUCATIDN AND SUFFORT Increased quality of life and reduced care costs Incr
148. A E B B am 36 27 A MAR 1 3 A 1
149. C OS Q3 A B C Q2 A BB
150. 22 Ca A1 29 ill
151. Http Www michigan gov cybersecurity 0 4557 7 217 34396 153715 00 htm1 4 http www mlchigan gov documents cybersecurty Getting Started Guide2010 293885 7 pdf 07 01 2012 2 2 Cyber Securty Controls Checklist Departmenr of Public Security Homeland Security Be Ready Utah 5 Cyber Security Controls Checklist
152. 0 7 0 1 2 3 5 25 cA 6 7 13 http www mhlw go jp topics 2004 06 dl tp0630 1d pdf 16 2 2 2 120 127 2005 3 8 http www fatigue
153. TT IT IT IPA http www ipa go jp jinzai award yendor2011 application html files PDF PDEF 3 10 20
154. 22 09 2 EG
155. 4 20 5 46 http www bmfsfi de bmfsfh generator BMFSEJ Service Publhkatnonen publhkationen dd126226 htm 07 01 2012 7 13 01 2012 34
156. 3 8 ee 0 EN i 4 N 6 18 3 7 PRARSON 12 p714 717 2009 9 30 19
157. ENE Q1 URL 1 2 3 4 Q2 USB 1 USB 2 USB 3
158. Becoming Resource FULL with the Help of Benefits amp Peace of Mind Savings 2 Avoiding scams 90 PDE PPT PDF 28 PDE Webinar 10 1 4 2 1 4 3 5 PREconomic Security Resources 12
159. 28 3 10 Yes No 1 NSRS SN
160. LE L TH E TT lmpact Frnbability Tr 65 llrmpagt x Probability 1 Failure to Com pty wih regulaiory or El raguirameanis fie to probact confidentiality of mlCry datka 2 Liability for scis of mbermal Usars or attackears who abuse the syslenm to penpetrats Unlawful CE mE inicibegment to aesm gambling money laurdearng LL Ll LL istributinn of PorniDHT PIE or winlent maberial 3 Liability for darmeanes if am intamal user aliacks other EE L LL RELIABILITY OF ERRWIEE THREATES lmpact Frnbability B UE llmpact x Prahabilitwl 1 Cr nahur di5 5tEws firea ITIDIKB waber BthHHUIK DrTri5TurTIC ThrT Hng5 PCBT UN BC Iinoir metural disasters of short duration or causing Iittla Harmia pr hulmani CBUIEB disaslers war BTTOTI5EI nccents bnrrhs Ciwil igturaiEB dangerous ChBITIC radiological aceidents etc 3 16
161. 22 QA C 3 Q 5 1 1 22
162. PDF 0 DDO ce Areides ER i AB C DE F G i i i
163. PDF 6 1 6 14 50 4 4
164. 8 2 12 SiiA 21 07 2011 http www bmfsfj de BMFSFJ aeltere menschen did 140394 html 15 12 2011 49 http www pts se sv Internet Internetsakerhet For hemmet Surfa lugnt Lar kanna hoten sa surfar du lugnare lt http www pro se Teknikhornan Surfa lugnt gt 14 12 2011 50 http surfalugnt se wp content uploads Unga tjejer_dominerar pdf 07 01 2012 51 http surfalugnt se quiz 07 01 2012 52 http surfalugnt se wp content uploads pdf engelska pdf 07701 2012 36 4 1 1 Q 11 15
165. IT 10 2 3 Seniors Internet Safety Washington State Office of the Attorney General Adults Families amp Educators Seniors Teens 4 1 8 1 8 1
166. IT 7 28 https www bsi bund de SharedDocs Downloads EN BSI Grundschutz gundehnes gundehnes_pdf pdf blob publicationHile p 3 07 01 2012 29 https www bsi bund de ContentBS1 grundschutz intl intl htm1 07701 2012 https www bsi bund de ContentBSI EN Topics TTGrundschutz TTSecurttydundehnes gundehnes html 07 01 2012 25 50 80 IT IT p
167. x 2010 200 30 3 5
168. 90 40 n 5019 5 8 IPA 2010 12 10 6 90 50
169. 40 5 6 ICT SPREAD ep 66 2 h NM
170. QG3 A 3 A1 A2 OS 14 4 Q 5 22 A3
171. 24 2010 62 5 IT 3 Quiz http www singcert org sg awareness quiz htm 10 True False 5 1 3 QUIZ 1 Having anl virus on my cormputer IS enouqh to secure my computer and prevent information Stored on my computer from being stolen Correct Ans FALSE Firewalls try to stop susplclous data such as viruses and worms from entering your COmDuter and attempts to prevent data such as Your credit card nurmbers and passwords from being stolen from your computer About Us Terms amp Conditions of Use http www singcert org sg awareness quiz2 htm
172. 39 BAGSO BAGSO 0 35 der Bundesregierung autf die Kleine Anfrage der Abgeordneten Brrtta Haljelmann Grietje Staffelt Ekin Deligoz weiterer Abgeordneter und der Fraktion BUNDNIS 90 DIE GRUNEN Drucksache 16 10379 http dipbt bundestag de dip21 btd 16 105 1610540 pdf 16 01 2012 36 http www internetpaten info Digitale Integration Aeltere Erwachsene Online Jahr 07 01 2012 37 Tbid 38 http www bmfsfi de RedaktionBMFSEJ Broschuerenstelle Pdf Anlagen Alter schafft Neues property pdf bereich bmfsffj sprache de rwb true pdf pp 65 66 07 01 2012 39 http www bagso de publikationen html 4 13 01 2012 31 5
173. USB DVD R 3 8 Q12 Al A2 URL
174. 2 2 2 ID 3 0S 1 IN 2 12 2 Sa NN MM 9 MD 0 ID gt 4 4 gt 5 5
175. Web HP i 22 34 3 SR eR
176. OS 9
177. 2 3 5 3 gt 10
178. Sicherheitsmal3inahmen Firewalls a Einfuhrung Netzwerk Firewall Systemverwaltung Sichere Passworter 1 F Umgang mit E Mail Gefalschte Webseiten nte rn et Einsatz von VolP Malware bekampfen Modem und Router Firewalls Netzwerk Firewalls Wirkund Personal Firewall Programme einschranken Fj RWM ll Grenzen von Personal te A Firewalls Konfiguration N Datei Lernmodus Personal Firewall Windows XP Firewall ED Intranet a Mobile Sicherheit Funknetze sichern 1 2 3 4 5 EE
179. Ready Your Business http beready utah gov beready business documents BRUCyberSecurntyChecklst pdf 1 4 57 Yes No 7 Personnel Security Physical Security Account and Password Management Confidentiality of Sensitive Data Disaster Recovery Gecurity Awareness and Education Compliance and Audit 5 http beready utah gov beready about html 08 01 2012 6 http beready utah gov beready business 08 01 2012 7 http beready utah gov beready business documents RYB BCP2009Guidebook pdf 08 01 2012 8 Yes
180. NNW YS A3 3
181. Yellow Yellow 0 Blue 8 2
182. 7 10
183. NTT 15 24 A 3 hi ID 15 1
184. 41 NPO 67 3 MO
185. C Q4 A PC C 3 lt http www soumu go jp main sosiki ioho_tsusin security security_check s check htm NTT 1 3
186. 98 86 87 79 http www ida gov sg doc News 20and 20Events News_and Events Level2 20060530162222 Facts heet SII pdf 07 01 2012 90 Silver Infocomm Initiative 1DA Singapore http www ida gov sg Programmes 20060419135418 aspx getPagetype 34 16 12 2011 81 Silver Infocomm Day 28 29 November 2009 Singapore Polytechnic http www youtube com watch v eL30LJxeKOU amp NR 1 amp feature endscreen 10701 2012 82 More than 6 000 attend SID 2011 16 12 2011 93 September 2010 Media Factsheet Silver Infocomm Initiative iDA Singapore 2010 http www egov gov sg c document_hbrary get file uund a031688d bf9f 4726 bb92 1b6a8c7f6b91 amp groupld 10157 19 12 2011 34 August 2011 Factsheet Silver Infocomm Initiative 1DA Singapore 2011 http www 1da gov sg doc News 20and 20EYvVents News_and_Hvents_ Level2 20060530162222 Facts heet SII pdf p 4 10701 2012 95 http 7www 1da gov sg 1nsg post SII New Silver Infocomm Junction opensnn Tampines asDx 10701 2012 86 Inter Generational IT Bootcamp http www youtube com watch v qfHiaWUQHEUO 10 01 2012 87 TDS Singapore 11 1 2012
187. 17 Phttp www pref chiba lg j p kyouiku kj nanbou shidoushitsu documents self pdf 21 1 A4 1 1 18 2 1 gt 1
188. 55 Ver 1 2008 Riktlinjer for informationssakerhet i Goteborgs Stad v 1 0 TT TiStadeny 56 57 80 TT 9 Yes No 7
189. AS LAN A1 12 25 Q 22 A1 1
190. 4 1 2 Fraga TF A FS a ge NN ge ia 2 SLa Svakodnevnica mladih na internetu osam savjeta koja Ce vam ponnoci do veceg sudjelovanja Youngsters and what they get up to on the Internet eight tips on how to become more involved Nuorten arki internetissa kahdeksan vinkkia vanhemmille Jiyana rojane ya ciwanan li ser Tnternete hest pesniyazen ku ji daxilbiina te re dibin alikar gt mw LS wo EsS bow ww GS Si uD jap CU Ullg gt gy 9 yal Codzienno5c mfodzie y w Internecie osienn wskazowek ktore pomoga Ci w nie uczestniczyc Le ternengo d es pe Tnterneto oxto zakonori kaj azutil tot te ankles maj Prin ardo ande d ela Nolol maalmeedka da yarta ee interetka siddeed talo oo kaa caawrinaya in aad qayb weyn ku yeelato La vida diaria de los jovenes en Internet ocho consejos para involucrarse mas Ungas vardag pa internet atta tips som hjalper dig att bli mer delaktig gs SS 3 HS ge I Ra 4 ts A AU
191. ID UM gt 4 4 6 2 0 4 gt 6 6 9 _ caie D D 8 000 2
192. Online shopping and banking Social networking Protect your computer CSAFE 27 S Spy ware A Anti virus F Firewall R Rnsure Useful organisations Glossary
193. i 1 1 lt lt lt TV CM TV CM ppt PDF
194. 3 3 3 Al A2 A3 QA Al A A3 S Os OS OS OS
195. ACTION Telia ACTION AB REACTION AB ACTION ACTION AB 60 ACTION ACTTION ACTTON 4 1 ACTION
196. 30 30 70 46 1 30 21 36 9 78 0 73 1 E 5 0 2Q 1 30 1 21 47 2
197. Two Silver Infocomm Junctions SIJ Opened for Senior Citizens sgcdo com http sgcgo com silver infocomm junctions 19 12 2011 1 iLIVE 79 Silver Infocomm Hotspots 2011 3 34 2012 100 89 Silver Infocomm Hotspots Silver Infocomm Day IDA IT 81 3 2007
198. 2 5 Y IE AM WP gt fi7 gt 2 lt C7 4 1 2 d 20 amp 12 p714 717 18 PEARSON 2 PDF PDF PDF
199. 2 3 8 2 3 3 CTnternet security Staying safe onhne 1 12 The internet ts a useful way to do your shopping and manage your money Going online ts quick convenitent and can offer you some great savings CCE EO EE EO 2 2 26 http www ageuk org uk
200. 5 LCA 2 0 1 2 3 4 A 0 4 x 10 40 10 A OO ND PF UD to B 0 4 x 10 40 11
201. Word A URL nO0l9 os 20 40 60X 80 100 11 2 TPA 2010 12 21 12
202. re NR NN 9 LE NII ERR ES 6 NN 7 eds 8 9 BR 0 rt
203. OD O 11 13 2 2 2 2 1 http www mhlw so jp topics 2004 06 tp0630 1 htm PDF
204. A B C kW 1 s A 1 s A 2 1 P A 3 s A 4 A 5
205. 5 6 Deutscher Seniorentag 60 9 2 1 2 3
206. 68 6 3HIEIE9 2 69 Ui 69 2 69 NR Nh 70 1 2 3 4 5 6 1 1 1 1 2011 7 8 2011 lt 2011 7 8
207. CM 2011 12 21 Y 2011 12 21
208. High Medium Medium High Medium Medium Low Low 5 17 5 18 Twitter SNS Protect My ID Action Fraud Risk Assessment Quiz 19Action Fraud Home Office 20
209. 3 x Risk Impact x Likelihood 6 0 6 05 a 3 1 10 5 7 8 8 1 2 8 14 1 2 2
210. i 3 OS 5 q 12
211. 34 5 6 35 54 ct CE gi i 1 Ice 1 A 1 BC 1 D 1 E lt lt
212. 4 40 9 920 ey Py 123 5 hy 105 00 10 mm6016 10 1 199 9 0 20 40 60 32 8 TPA 2010 12 49 3 31 70
213. 5 7 68 http cyberonia org sg ncpc index php ncpcregister 69 3D 70
214. gt 6 http slb jnsa org slbm 2m 4 25 30 2 8 PC
215. Rate mal wer dran nst So schutzen Se sich vor Betrugern Trickdneben 34 LT A A i i i i 36 5 1 SurfaLugmnt se Sk 36 SF UU AN TA LE I RI 40 5 3 ACTION Assistnng Carers using Telematics Interventions to meet Older BSOMISINIOBGISUEEERN SO 43 2 20 NN 45 61 SUM K KN 45 6 2 Cyberonna Virtual Cyber Security Park 6 3 Silver Inforcomm Initiative SID i Mao 5 gt H Ea 07 oR amp 4 cee 6 A AAL EE LL A NG X Ne OY
216. 1 2 Q OS so 4 S
217. 1 2 1 1 2 1 4 Make a Plan 4 Geta Kit 4 Be Informed 4 Get Involved CYBER SECURITY CONTROLS CHECKLIST This lia simpla checklist deasigned to nmenthy an docimeant the existerces and staius or a ECOMIMEnden basic gt of crber security conirols policies siandards and PDiEEUTBE 1 for an CrHBTiration Sacuniy coontrols are designed to reduce TiHipr alinminste the nentied thresathuinerabilitias thai CB BT ormganizaton gt rs PE RSOMELL SECURITY Yas eo 1 Has your staff wear ID badges n EE sacumreant piciures part of ha ID Badgg 3 Are authorized CCBE5 lgwgl5 rd PB Iemployes cortractor wiEHnT ideantified i on the Badge 4 Do wpu check the credentials of exiamal contraciors i 5 Ha pu hw Oi addressing bBEKnruriH checks for emplioyess and canirachors i Do you hawe a process for effectwely cutting off acress to facilities nd information systems wher ah amhlnyagrcnrtraCtnr iamin ls BMCmTTianT 2
218. 15 PDF web 1 PDF PDF PDF web web web 2 21 19 5 6 33 22
219. 3 13 59http www5 goteborg se prod Intraservnce Namndhandhngar SamrumPortalnsf 4CC390011F20F30 1C12577C30046B792 File 53010_TU pdf2OpenElement 07 01 2012 54http www5 goteborg se prod Intraservnce Namndhandhngar SamrumPortal nsf 01F4AD6BB58555 F7C1257808002E44C8 Hile tuinformationssakerhet pdf OpenElement 07 01 2012 55 09701 2012 56http www goteborg se wps portal ut p c577ctBDoIwEEDRs3CCTqcDiEtKDa0asDYYZGO6MIZEwWIX R69sbaP7y5YtRpJb4nu7xNa1LfIhBiMUV873XuFPA ckA6rJnbV 1SBpNfkgtA22AUdAUZcJ6PioNEP Of 383HVTWSoPAEwNgCPdtbb2Epz6cbd2nW_iOffDp8qyL3rXyz8 dl13 d3 L2dJQSEyUUt3QS92ZQnZ8L zZfM1VLUUIySijMwOEVSRDAyQjdVOEJEODEOOTI 07 01 2012 57 09701 2012 40 TIT
220. Oi 0 2 EE 2 5 5 BPS Bcc 4 USB 0 2 5 Di 9 39 63 B 1
221. 2 2 1 2 3 co cs LE
222. 60 28 2 27 23 43 AE CAR 29 10 20 0 St 1 0 20 H 00 qoo Or A 1 200 Pr 1 4 100 a i rE Ee 5 a 1 4 D 1
223. 9 462 78 2 10 000 9 000 8 000 7 000 5 000 so000 4 000 3 000 2 000 1 000 1 55 1997 1998 1999 2000 2001 2002 2008 2004 2005 2006 2007 2008 2009 2010 mm 2 1 9 12 2 6 1 PHS 3 13 6 6
224. Me PH ee 0 6 CR a NE 4
225. PDCA 2 lt Seeroe ro oo FT FL a E C 3
226. 2 RR Glossary 2 2 2 N Secure Wireless networks Without protection Wi Fi wireless networks are vulnerable WPLFi wirelesS networks are vulneraDle to eavesdropping hackers and freeloaderS Why protect wireless networks Wireless networks which are sometimes known as Wi Fi or 802 11 networks let computers talk to one another using a radio Iink similar to cordless phones Like any radio transmission anyone in ranqe can pick up the siqnal or transmit on the same frequency This means that wireless networks are at risk from Hacking anyone in range can connect to the network This means that the network must be restricted to known and trusted users and computers Freeloading where a wireless network is used to share a broadband internet connection there is a risk that unauthorised users will use your connection without permission The problem is that mostwireless network equipment when it comes out of the box is not protected aqainsi make it secure How to protect a wireless network
227. 2011 SIJ 3 12 7 5 10 78 Silver Infocomm Curriculum SIJ TT 12 iBEGIN iLIVE iBREGIN 74 TDA Singapore 11701 2012 1 7 http www youtube com idasingapore 07 01 2012 16 http www as1aone com News AsiaOne News Singapore Story A1Story20100920 238061 html 07 01 2012 7 More than 6 000 attend SID 2011 Infocomm News From Singapore 1iNS 28709 2011 07 01 2012 http www ida gov sg insg post More than 6000 attend SID 2011 aspx 16 1272011 78 http www 1da gov sg Programmes 20060419135418 aspx2getPagetype 34 2 6
228. gt MV MY 8 V4V FY 7 W 7 7 1 y 1 AZ 7 M 7 7 Z W 7 AXZ gt 9 87 5H YY H gt Z WV M IN YA7 y 1 SE 7 2 1
229. A2 LAN A3 13 Q 22 22 A 1 A2 A3 1 10 11 12 1 Q 1 22 A1
230. 11 IPA http www ipa go jp security ciadr checksheet html 46 Yes No A B C 3
231. 4 USB Q3 1 OS 2 3 4 7 1 2 http slb jnsa org slbm NTT 9 Q4 1 ID 2 3
232. JNSA 8 1 5 IPA 11 13 2 SEE 13 2 BE Eee 14 A Si 20 VA Nf 25 Mui 27 a 27 3 2 NEC IT NEC w wx 28 3 3 ki 29 3 4 30 3 5 31 1 11 ORK gt 2 n JNSA 3
233. Y IPA 03 5978 7509 10 00 12 00 13 3O 1 7OO 03 5974 OO68CF 10 00 17 OO 2H y 27 NN
234. lt OOSDIONG EE TIE ET ED CETTE A2 A3 O OOOO OOO OO 3 1 Q 1 22 A1 A2 A3 2 2 A1 A2 A3
235. 15 29 A 4 A 1 A 3 16 2 3 4 NG 0 2 20 LE 5 16
236. ID gt 2012 3 NTT 3 1 3 12 N06 4 3 e 6 1 4
237. 41 http www internetpaten info Digitale Integration Aeltere Rrwachsene Online Jahr 07 01 2012 42 Kompetenzzentrum 2006 Online Jahr 50plus Internet verbindet 32 2006 9 Aktionswoche Onhne Jahr 50plus Internet verbindet 2008 Internet erfahren BAGSO erlebnis internet erfahrung schaffen 93 50 ans Netz
238. 12 1 4 AA 7 10 U
239. YES NO 2 2 2 1 2 2 1 Get Safe Online Free exDert advice Link to us Knowledqebase Glossary Press le ej qd Anti virus software Do you have anti virus software ls it kept up to date with a current subscription If you are unsure answer Yes No Firewall Do you have a firewall If you are unsure answer no oYes ONo Up to date software ls Windows on your computer up to date ls it set up to check for updates on a regular basis lf You are unsure answer no oyYes nNo Spyware Do you have anti spyware software installed on your computer This is not the same thing as anti virus software lf you are unsure answer no Yes ONo 21 http www getsafeonline org nqcontent cfm a_id 1111 15 12 2011 22 http www getsafeonline org nqcontent cfm a _id 1275 15 12 2011 20 PT A 2 2 nA
240. IT 4 4 6 PDE Tip sheet 7 4 Getting Started Guide PDED G 14 3 Citizens
241. M4 W A EE EE r TU ik wi RR FF nt WW 03 56 64M GA 4 ROT DE Cw WH LE EE RR RE 1 1 w 4 mw 1 1 IL nT 3 3 hr ra ok gt EE HH FL LVEDD Ait WIEUE 4 mt LOCC ET 1 i 0 DE Od A tCra tu 3 EE 3 EH NR EE EE EE 1 1 i a Eg i 7 5 1 fol Bl 9 07 1 5 SE 531 SOU S 0 3 3 EB 00 tf x pt 5 Te be 0 bt A 38 1 38 TPA 2010 12 61 A 3
242. 11 1 6 3 6 OS
243. 10 1 2008 4 1 FAQ 2005 4 1 2008 1 16 3008 1 16
244. 3 6 5 IT 1 1
245. 40 35 Die Bundesarbeitsgemeinschaft der Senioren Organisationen BAGSO Kompetenzzentrum Technik Diversity Chancengleichheit e V 2006 5 2007 7 50 ans Netz 50 50 ans Netz 50
246. Es AI RO 1PA 4 a O 1 2 3 4 ee 1 1 2 5 w 3 3
247. Flash ei lt gt dg tS 0S 2 http www soumu eo ip main sosiki joho tsusin security security check s check htm 4 3 7 5
248. O 1 3 armswEghs 12 0 1 lt G 13 fON jj 3 Mi 1 2 3 ee mon es man WE DRC 1 1 EMF Th
249. IT 20 Yes No Module 1 Introduction IT S for You Check It Out Before we begin Module 2 let us play this simple game to check your current level of awareness on IT Security My password is five characters long and is based on my date of birth Do you follow this practice scoRE 100 course overview sludy uide resources page 5 1 4 IT TISIHfOTrIYOU Module 3 IT Security While Away From the Office Quiz You have come to the end of this module Can you recall some keywords related to computer and data protection Try to locate six such keywords in this word maze BHA MRBHHMHBRHH Clue V What should you do to protect your computer system from external network intruders Install anti virus software Install a Keylogger Install Personal Firewall Install a CCTV ou have attempnted 9 of13 47 1 Fasten Up
250. Q Nationalencyklopedin Groogle Q 40 23 32 Q Q 2 SE CGN QQ 8 9 IM Gnstant messag1ng Facebook Q 9 14 26 57 74 37 4 1 1 Testa dina kunSkapeh amp S Populara unqdomssajter pa natet FO Dae scies ll Fragor om ungas Uardag pa natet WR mot osunda deak de populara sajter dar barn och unga Hur gammal maste du vara fOr att starta en hanger ps natet Gemensamt for de Unga tjejer dominerar bloggs flesta ar att de fun erar som Ociala motesplatser dar man haller kontakt med befintliga kompisar och lar kanna nysa www blogg se www bloglovin com www dayviews com J Detfinns ingen ldersgrans US www facebook com www
251. 3 50 83 62 lt http www singcert org sg awareness security htm gt 10 01 2012 00 lt http www singcert org sg awareness spyware_contestr htm gt 14 12 2011 48 6 2 Cyberonia Virtual Cyber Secur1ty Park Cyber Security Awareness Alliance National Crime Prevention Council Virtual Cyber Security Park 4 2 MP2 Infocomm Security Masterplan 2 2 5 2011 4 8 2008 66
252. IT PDF 5 IT IT Grundschutz Tag 2011 11 30 IT 29 IT PDF 87 2006 https www bsi bund deharedDocs DownloadsDE BS1 Grundschutz Lentfaden GS Leitfaden_pdf pdf blob pubhcatnonHile PDE 49 2007 6 https www bsi bund deharedDocs Downloads EN BSI Grundschutz gundehnes guidehnes pdf pdf2 blob publicatnonHile IT 5
253. A3 _ 3 12 Q 20 USB 22 A1 A2 USB A3 USB GQ 1 LAN 22 A1
254. x Oo 4 3 http www checkpc go p qunz detail html contents head
255. 4 62 A 5 A 1 A 4 39 gt 1 gt 1 1 gt 2 gt 2
256. A2 A3 SNS SNS Q 19 22 SNS 1 A2 SNS
257. 5 J eeeeeeeeeeeeeeeeeerereeee 16 3 http www pref chiba lg jp kyouiku kj nanbou shidoushitsu documents self pdf 20 4 3 4 3 2 1 gt
258. 22 A3 USB CD R A1 A 1 A2 A AS 15 5 Q 7
259. i 8 Yes No 10 NN by
260. 23 3 5 1 24 1 1 1 9 g In 0 24 22 2 23 29 22 http www stat go p data kokusen 2010 kouhou useful u01 _z19 htm 39 nt at ld 25 65 CK 3 25 000 45 0 400 L 2 65 3 30 0 15 oo ES 1 5 Ge 25o ae 0 EE 9 200 0 uD 10 000 24 4 0 iil 15 0 7 Pe ie enle 0506 tn 3 313 RY 5 0 oo 55 GO 2 7 12 13 14 45 16 7 9 20 21 19a80 1985 1990 1995 2000 2001 2002 2003 2OO4 2005 2007 2008 2009 51
261. 7 64 http app mica gov sg Default aspx tabid 36 amp ctl Details mid 539 amp ItemID 1126 08 01 2012 95 Singapore Tries Virtual Cybersecurty Park thenewnewinternet com http www thenewnewinternet com 2010 03 22 singapore tries virtual cyber security park 15 12 2011 66 National Crime Prevention Council Annual Report 2010 2011 p 6 lt http www ncpc gov sg pdf lannual2011 pdf gt 08 01 2012 http cyberonia org sg ncpc index php ncpc parents 08 01 2012 67 http cyberonia org sg ncpc index php ncpc parents 08 01 2012 68 Singapore Tries Virtual Cybersecurity Park thenewnewinternet com http www thenewnewinternet com 2010 03 22 singapore tries virtual cyber security park 15 12 2011 99 http www aitong moe edu sg cos o x c wbn pagetree amp func view amp rid 1124502 0 Chua Hian Hou A park to teach kids cyber safety AsiaOne Education available at http www asiaone com News Education Story A1Story20100324 206453 html 15 12 2011 1 Factsheet on Cyber Security Awareness Alliance issued on 9 2 2011 pp 2 3 http www 1da gov sg doc News 20and 20Events News_and_ Events Level2 20070402172309 Facts heet_ CSAA pdf 08 01 2012 49
262. Mn 2 15 11 1 1 MD 1 G 1 3 11 8 0 0 1 lt 3 6
263. 100 9 1 40 EF ea 0 5 hm 3 4 2 lt mim llslwlwlelele ml lnlmlwlmlelwlw 5 4 3 6
264. A2 A 1 AS URL AS URL 1
265. Age Concern England Help the Aged 2009 4 Age UK CMaking the most of the internet 24 Tnternet security Staying safe onhne 25 Age UK
266. 4 Qs 1 2 3 4 Q6 1 2 3 Web 4 8 272 25 8
267. FE 13 FE T 1 w I 3 1 1 2 30 1 EEL 3 lt 29 2 28 23 2 5 44 6
268. 50 320https www Dbsi bund de SharedDocs Downloads EN BSI Grundschutz gundehnes gundehnes_pdf pdf blob publcationHile pp 17 35 07 01 2012 26 IT 1 2008 2010 2004 11 2008 4 63 hh pp 51 56 pp 49 53 3 1 2 IT 3 1 2 IT 11 6 Checklist Importance of IT security and relevance of the IT to your company Definition of IT security objectives Have your employees been made sufficiently aware as regards IT security In the past 12 months have you updated the security policy the protection requirement assessment and the PC passports or are you ust about to do 1t
269. 09 10 ns5010 0 20 40 00 13 3 IPA 2010 12 23 IPA 3 2 14 PA IPA RS e e
270. 9 40 16 20 50 11 1
271. 1 http Www nisc go jp active kihon pdf awareness2011 pdf 2 http www nisc go jp active kihon pdf js2011 pdf 2 NTT le A SENATE 2 2 1
272. 4 22 A3 OS A 1 A3 AS
273. Internet safety contract for families Internet safety contract for families The Internet is a public place and I am responsible for nsingit safely to help protect myself my family and my friends I will only use safe contact names in e mail IM blogs etc I wll never use the Internet to bully or harass anYone I wll not post content to a public site without my parent s permission lt I will not expose my personal information or the information of my friends or family name address phone or cell numbers school in text or through pictures I will never meet in person an Internet friend without telling my parents and having someone I trust with me Itis my responsibility to browse safely I will not look for inappropriate content and I will tell my parents if I see something that npsets me I will only download programs from the Internet that my parents have approved I will not register to use Web sites or take surveys or quizzes that ask for personal information I know that informahon posted on the Web can stay up there forever I will think about with whom I am sharinginformaton and be thoughtfunl about what is appropriate to share Child s name Date http www atg wa gov InternetSafety FamiliesAndEducators aspx 13 2 4 Savvy Saving Seniors
274. 10 NCOA 1 10 2 90 NCOA 1 4 1 1 4 1 NCOA am a aE em a me ue Sawwy Saving Seniors rar Fu ya ie Te ya ma lim nm EE a or Ew an Tm rE Wes rr meen ed Ee rr ns Ee http www ncoa org enhance economic security economic security Initiative savvy seniors marketing html 10 http www marketwatch com story new tools help seniors avoid scams 2011 10 18 12 01 2012 11 http www ncoa ore calendar of events howr to facilitate the savvy 1 html 12 01 2012 14 2 1
275. 1_ a 2 8 9 cr NR Ne A 02
276. 2
277. 1Q Mail Frontier 3 10 C Better Business Bureau 1 1 1 At Home 1 http www dhs gov files programs gc_ 1158611596104 shtm 07 01 2012 2 http events esd org 17 01 2012 3 http www mnichigan gov cybersecurity 0 4557 7 217 51788 192552 00 html 07701 2012 5 Category At Home Change category Yaour current score 0 0 This question score 100 uestion What is the name for a program or programming code that replicates by hemmg copied or mitiating its copyving to another program computer boot sector or document Total Number of questions for this category 10 2 3 PDF 1 1 2 1 1 2 CYBER NSIBILI 1 e 1 1 2 1 1 4 1 Wi Rg MULTI STATE Infermatlon Sharing amp Analysis Cemler A miower 3 ns 3 5 PDF 5
278. 23 2012 3 NTT 0 R20 1 1 ee 3 2 A 3 J 2 3 4 EE MR AE i 5 1 i 6 2 II 9 3 10 4 13 020 OK EE eC EE 15 1 RT 16 2 18 9 NO RE RN ER 29 2 EC NO ER EN 0 oss 30 lo 30 De WC 2 33 3 35 Dn PE OR NE NANO 36 EE CR NN CR 37 WE IAM
279. 3 2 4 69 4
280. 5 3 2 1 2 3
281. etetiiocaionini tete pe 3 IPA 13 2 6016
282. TT 1 http www ipa go p jinza1 award Vendor2011 doc a3_check pdf 23 3 lt 4 gt eo XGA gt 4J s PDCA
283. 13 7 1 4 2 What s Your Money Mosth As You re a debt collector s reanml Personality Quiz You have very lttle amrarcrscss of your money arnd thas l When family friends come to visit I ME EH ye cnmimmr hc th you rek pritimg intn srrirrerr uicbrt b Buy frozcn mcals from thc supcrmarkct Froblems c Scc what I have in the fnidgc tuld be a gr dEa tn learm mee abnut controlling d Get out my recipe books YOUF mminncr bekre Em to lahc c Ask my gucsts to bring somcthing with thcm 2 How do you feel about money Mosthy Bs You re a casual deb to a I don t think about it You lke te le for the mcmernt and eu nm E think b 1 managc to gct by somchow much turther ahead than lon hirme c I should think about it morc aa hr dant 1 1 a d I kccp prctty good control of it 1 a nr bee rmnrh yon e get left c Talways cnd up with morc than I startcd with _ _ fF ye rc mt carFHhul nu cnuld be am pdcal camdidatE for 3 Saving money 1S debe a Not somcthing I m intcrcstcd in ltde bet of plannimg arm make your money wark better b Really hard to do for nu and help yo vd stress c Somcthi
284. 4 11 15 69 12 15 79 13 6 1 3 22 RR nk tg er amp Hn RM ARUN 2 22 4 22 I 001 pdf
285. 4 am A2 OS 1 2 A 2 A1 A3 A1 A3
286. UsSB A3 USB A 1 USB A A2 A3
287. 4 500 2011 9 17 19 Nanyang Polytechnic Silver Infocomm Day 2 000 2 6 000 82 Silver Infocomm Day IT 10 83 Inter generatlonal IT Bootcamps IT 2010 84 TFHacebook
288. CD http www hessen 1t de sncherhet Inhalte Brandning html TV CD 2005 7 2 CD 2007 1 CD 8 IT CD IT 8 4
289. Gefahren und Angriffe gS Netzwerk Angriffe Einfuhrung Netzwerk Angriffe Schaden amp Angreifer Dieser Abschnitt behandelt Angriffe bei denen Anqreifer Uber das Netzwerk auf fremde Computer Betrug im Internet zugreifen Ziel der Angreifer ist dabei der Zugriff auf die auf diesen Systemen qespeicherten Daten Phishing oder die Installation von neuer Software In diesen Bereich fallen folgende Angriffe Pharming Port Scan Diese Technik dient zur Erkundunq von fremden Computern und Netzwerken Der alt ein Bild 1 a 8 Angreifer erhalt ein Bild uber den Zustand seines Ziels Port Scan Port Scan Animation Dienste und Freigaben Exploits Remote Exploits Zugriffe auf Dienste und Freigaben Auf vielen privaten Computern sind Server Programme installiert deren Existenz den Benutzern unbekannt ist Durch Zugriff auf diese Server konnen die Angreifer Daten des Computers erhalten manchmal sogar andern Netzwerk Wurmer Angriffe auf Web Browser Script Angriffe Downloads und Attachments Belauschen von Kommunikation Man in the middle Malware Spionaqe amp Sabotaqe Denial of Service Bot Netze Gekaperte Computer Angriffe gegen Online Dienste RisSiken bei Voice over IP Mobile Sicherheit Jugendschutz Remote Exploits Durch das Ausnutzen von Fehlern in legitimen Programmen koOnnen Angreifer einen beliebigen fremden Programmcod
290. IT ITT TT IT NPO 2008 1000 TT 2 IT T NEC IT Vista Windows
291. 10 73 5 2 1 TUTORIAL CITY EE 7480 This ts the view of your city You can click on district any of these tiles to view either your or another players district i Click Next to continue 5 2 2 You can build the following facilities to increase your OQ siuiliy score Installing Firewall and Anti Virus in your faoilities will also inorease Seourity You can Produce them in the Software House 72 Factsheet on Cyber Securnty Awareness Alliance issued on 9 2 2011 pp 2 3 http Www ida gov sg doc News 20and 20Events News and Events Level2 20070402172309 Facts heet_CSAA_pdf 08 01 2012 73 http cyberonia org sg ncpc index php ncpc parents 08 01 2012 50 6 3 Silver Inforcomm 1Initiative SII Silver Inforcomm Initiative SII TT DA Singapore DA Infocomm Development Authority of Singapore 50 TT
292. In the PC passport have you already entered the contact and the hotline telephone numbers for all IT systems Do you have a specific contact to turn to when problems occur with the computers programs applications and have you entered his her telephone number hotline telephone number in the PC assport Have you informed your employees that a password needs to be changed on a regular basis must include at least 8 characters should not be easy to guess like husband s first name own car ID etc and must be recorded and stored in a closed envelope Do you have a shredder in your organisation IT PDF 70 2008 https www bsi bund de SharedDocs Downloads DRE BSIL Grundschutz Hilfsmittel Profil e it grundschutz profil klein pdf blob publication File PDF 66 https www bsi bund de SharedDocs Downloads EN BSI Grundschutz profiles Profile smal 1 organisation pdf pdf blob publicationFile BSI IT Grundschutz IT IT Grundschutz tool GSTOOL 32 lhttp
293. OE CE RT 1 lt 8 TTYTO8HO ALTno8S BUOSJ9J SITYO8HO ToIIU0D A111n298 redA EC 2 2 1 Michigan Cyber Initiative Toolkit Michigan Cyber Initiative http www michigan gov cybersecurity 9 10 2011 10 7
294. varies from manufacturer to manufacturer This means that the advice will seem a little technical because it is only possible to say what you have to do not how you do it Consequently you will need to refer to the documentation that came with your hardware to setthese defences up Use encryption WPA or WPA2 are the best Failing either of these for example if you are using Use a strong password on the wireless access point to control administrator access See Use stron passwords PC GetSafeOnline THacebook https www facebook com GetSafeOnhine 23 23 http feeds2 feedburner com GetSafeOnlineBlog 15 12 2011 21 3 3 Making the most of the interne Internet security Staying safe online Age UK
295. 2007 2008 2009 RG 61 1 2 7 26 25 23 41 3 27 3
296. Documents EN B Information guides AgeUKIL4 Internet security_inf pdf2dtrk true p 2 19 12 2011 27 Tbid pp 12 13 19 12 2011 24 4 4 1 IT BSI Leitfaden IT Sicherheit IT 28 Bundesamt fur Sicherheit in der Informationstechnik BSD IT IT Grundschutz IT TT TT Grundschtz IT IT TT Grundschetz IT Leitfaden IT Sicherheit 2006
297. ME ERR 37 0 ee NOMU IN 03 oi 97 3 1 38 2 39 2 41 3 42 4 43 EE a A CA ER NE 0 IN 44 6 45 6 46 J Ro a 47 2 48 90 0 eee eo 2 50 3 3 51 1 52 2 54 3 65 3 4 66 1 66 2 67 3
298. co jp check htm 2011 3 ms 0 0 RS un Et a a PP Ea ng Hi a vl Ea EH es 0 1 Pie rei mE 1 hit re asoWRee 9 8 ee RE Rn ni Ri 1 EE zuass ae i i LF Ea Hr TE nm 5 rd ret Oh 7 NT1 A sutras ac me FTI steno iria ok a Pr CPN EH a mi EE es lr Ei MESEE3UUEEYRe nis 8 MR2gs 0 ea EE a hr pa asa air La 14 http www fatigue co jp check html 17 20 5
299. passwords been securely deposited for EMETEENCIESY A all involved persons familiar with he existing policies and responsibilities Ate there checklists cowering factors that need to be considered when new staff join or existing stalf leawe the company authorisations kews training etc Is the efTectiyeness of IT security saleguards checked regularly ls there a documented IT security corncept 3 12 e IT IT e IT bp T TT TT Grundschutz Profile IT
300. 00 17 OO0 y I I I I I I I I I I I I I I I 1 QO w l I I I I I I 5 1 9
301. 23 htm PDF PDEF 8 Yes No 50 No 8 1 2 3 4 6 7 8 25 1
302. e economlc secur1ty economc securty Initiatnve top 8 ways to protect html 12 01 2012 16 3 9 1 Protect My ID Protect My ID Experian a CE CR A 6 99 15 16
303. e zur Ausfuhrung bringen Damit kann ein Angreifer die komplette Kontrolle uber einen Computer erlangen Netzwerk Wurmer nutzen Remote Exploits um sich in kurzester Zeit auf viele Computer zu verbreiten Angriffe auf Web Browser Der Browser ist fur viele Benutzer das wichtigste Programm Uberhaupt und damit ein besonders interessantes Ziel fur Angreifer Es konnen die Einstellunqen des Browsers dauerhaft verandert Zugangskennungen anderer Dienste gestohlen oder weitere Prograrmme installiert werden Script Angriffe Angreifer konnen Schadprogramme oder Schadscripte in die Ausfuhrung von Webseiten einschleusen MOgliche Folgen sind der Diebstahl von Zugangsdaten die Veranderunq von Webseiten oder gie Manipulation von Datenbanken Downloads und Attachments Viele Schadprogramme werden als populare Downloads getarnt Verbreitet Eine weitere Klasse von Angriffen zielt auf das Belauschen oder Manipulieren von Kommunikation Bei Man in the middle Attacken setzt ein Anqreifer sich zwischen seine Opfer Zuruck Weiter 29 SicherheitsmaBnahmen 8 2 83 328
304. eased quality of life and independence for older people and their families 44 6 6 1 Fasten up Infocomm Security Division GSecp Fasten Up firewall Anti virus Scam Update Password 5 TIT Go Safe Online 1
305. flashback org www habbo se Var tycker ungdomar att de hittar den mest www hamsterpaj net trovardiga informationen www kamrat com www kpwebben se www ls8 se OE se msn com www myspace com Nationalencyklopedin www snuttis se www stallet se www tumblr com OO EE www worldofwarcraft com www wordpress org Vad betyder internetforkortningen POS www youtube com PO Posihion_oversess lt em Parentovershoulder 38 11 Rad amp tips 8 12 4 1 2
306. ga ataganden etc tor respektive informationssystem Innehaller forteclmingen en beskrivming over ansvarstordelningen tar respektive informationssvstem am minimum ska informationsagare och syvstemagare finnas deftinierade Har informationsklassning genomtorts och dokumenterats tor respektive informationssystem Personalresurser och sakerhet Nr Fraga a Nej EKommentar Har lraven som stalls pa personer som ska fa tillgang tll respektive informationssystem detinierats Finns det en dokumenterad anvandarinstruktion for respektive informationssystem Ar anvandarinstruktionen utformad s4 att en amvandares behov ay att satta s1g 1m 1 detaljer kring gallande lagstiftning regler for informationssvstemet minimeras 42 5 3 ACTION Assisting Carers using Telematics Interventions to meet Older persons Needs 1997 EU 8
307. ind drivind licence and bank statements for as little 5 as 210 Bedl n Source Finextra 11 05 2011 ID Fraud incidences have increased by 24496 over the 4 4 06 ss four years ce Finextra 16 05 2011 Read more facts about fraud http www protectmyid co uk areyouatrisk aspx SiteVersnonlD 609 SitelD 100258 sc 501041 amp bcd HM NONE PMID ADBX B1 15http www protectmyid co uk WhatYoudet aspx hnk bottommodule amp Site VersionID 609 amp SitelD 100258 amp sc 501041 amp bcd HM NONE PMID ADBX B1 19 12 2011 16http www protectmyid co uk areyouatrisk aspx SiteVersionID 609 amp SiteID 100258 amp sc 501268 amp b cd ActionFraudresources amp areaid 0 amp pkgid UKPNO 19 12 2011 17 5 At Home tn Public Online Mobile About You 2 1 8 Risk assessment tool 6 GET CE 1 Do you shred pieces of direct mail such as Credit card applications Always sometimes if I think it s a particularly important piece of mail Rarely if I remember Never 2 Have you moved recently say in the last 6 months A Yes No 3 Are you on the electoral roll a
308. n info Digitale Integration Aeltere Erwachsene 07 01 2012 33 4 4 Rate mal wer dran ist SO Schutzen Sie slch vor Betrugern Trickdieben Rate mal wer dran ist So schutzen Sie sich vor Betrugern Trickdieben Bundesministeriums fur Tamilie Senioren Frauen und Jugend 2011 3 25 PDF 46 6 F
309. n the Go em people conduct business plan IO travel access records staY in 9 touch with friends and family Eraud Resources amp Links and support hobbies and Defensive Computing Games entertainment interests You Defending your Computer By Topic can learn how to take i advantage of the opportunities without falling prey to redators so you can have peace of mind when you go online 1 a D Dea YOU g 8 http www atg wa gov InternetSafety Seniors aspx 13701 2012 11 e
310. ng I aim for d Somcthing cvcryonc should do a i Wis et faerie i hi Mosthy Cs You re a smart spend er 12 Economic Security Resources available at lt http www ncoa org enhance economic security economic security Initiative economic security resources html gt 13 12 2011 15 1 4 3 ml Lp Fb Eprmrma Monthiy Budget a s Hy neome a em ee ES Teterest Cirle EE 0 iT COEhr _ 3 ee re Hy Expen ss hmrrr Tioeztion Ear Ti Em Far Mi Pam HH lmaasrr Cher cbt Pamrrra Hakt nares Webinar NCOA 10 1 8 13 http www ncoa org enhance economc secur1ty economlc securty Initiative top 10 scams targeting html 12701 2012 14 http www ncoa org enhanc
311. ortet Neustarten Sie haben 4 von 8 bearbeitet Sie kennen die Funktionsweise der Wesentlichen Dienste des Internets E Mail WWW etc 5 Sie kennen die Mein Kompetenzstatus unterschiedlichen Fortgeschrittener Sie konnen den Kommunikationsnrozess zwischen internetbasierten Internetnutzernm grundsatzlich beschrelben Angriffsformen Sie konnen die allgemeinen Aufgaben und Funktionen von 1 Modem und Router benennen Treffen Sie Ihre personliche SelbsteinschatzZunq Sie konnen technische Begriffe wie Protokoll Router oder Backbone erlautern Wir empfehlen Ihnen folgende 0 Inhalte zu bearbeiten 5 Sie kennen die unterschiedlichen internetbasierten Angriffsformen trifft nicht zu Gefahren und Angriffe 9 6 Sie kennen verschiedene Schadproqramme z B Viren Trojaner trifft weniger zu SicherheitsmaBnahmen 7 Sije sind mit den wesentichen nzeichen fur den Befall mit Black Hat Corporation Viren oder von ganderen Schadprogrammenl vertraut trifft zum Teil zu 8 Sie kennen einige Moglichkeiten der Vermeidung und trifft voll zu Bekampfung von Angriffen aus dem Internet Gefahren und Angriffe 8 2 2 3 2 2
312. p 74 79 pp 42 45 50 3 1 1 8 1 1 ITT IT security management Hasmanagement defined the IT security objectives and aceepted that they are responsible for IT security Have all the legal and corntractual issues been considered lsthereanIT Security Officer AreIT security requirements considered earl on im every project e g during planning of a new network new purchases of IT systems and applications Cutsoureing and service aereerments ls there a surnmary of the most important applications and TT systerns amd their protection requirermerts ls there an action plan that prioritises security objectives Td defines how the apreed TT security safeguards should be implermerted Has it been determirned for al IT security safeguards whether they have to be carried Qut once ornly or at reeular intervals e g updates to the anti virus software Have respomsihilities been defined for ll the IT security saleguards 0 0 Are appropriate deputisatior arrangermernts in place Tor persons in positions of responsibility amd are the stand ins familiar with the tasks they haye to perform im this capacity Have the most important
313. s www bsi bund de SharedDocs Downloads EN BSI Grundschutz profiles Profile small organis ation pdf pdf blob publicationFile p 1 07 01 2012 32https www bsi bund de EN Topics ITGrundschutz ITGrundschutzGSTOOL itgrundschutzgstool no de html 07 01 2012 27 4 2 IT CD Sicher ins NetzDie IT Sicherheits CD CD IT TIT Ver 1 2005 Ver 2 2007 DT 0 TT IT 6
314. t your current address EO Yes No 4 Do you share a common letter box hallway with another house or apartment s Yes A No 4 5 Yes No Facebook Twitter SNS 18
Download Pdf Manuals
Related Search
Related Contents
デジタルイメージフレーム DF Axis Q3505-V 9 mm Nostalgia Electrics GCM600 Use and Care Manual Chapter 4 Mise en page 1 Avaya Business Communications Manager 450 (BCM 450) Application Note Samsung RS25H5223SL/AP Manual de Usuario AEROLUB Copyright © All rights reserved.
Failed to retrieve file