tg3_student_slides - TECHNOLOGY GUIDE THREE Protecting Your...

Info iconThis preview shows pages 1–7. Sign up to view the full content.

View Full Document Right Arrow Icon
TECHNOLOGY GUIDE THREE Protecting Your Information Assets
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
TECHNOLOGY GUIDE OUTLINE TG3.1 Introduction TG3.2 Behavioral Actions to Protect Your Information Assets TG3.3 Computer-based Actions to Protect Your Information Assets
Background image of page 2
LEARNING OBJECTIVES Identify the various behavioral actions you can take to protect your information assets. Identify the various computer-based actions you can take to protect your information assets.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Behavioral Actions Do not provide personal information to strangers in any format. Protect your social security number. Use credit cards with your picture on them. Use virtual credit cards. Know your credit card billing cycles.
Background image of page 4
Behavioral Actions (continued) Limit use of debit cards. Do not use a personal mailbox at home or at an apartment. Use a cross-cut (confetti) shredder. Sign up with a company that provides proactive protection of your personal information.
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Computer-Based Actions Never open unrequested attachments to e-
Background image of page 6
Image of page 7
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 14

tg3_student_slides - TECHNOLOGY GUIDE THREE Protecting Your...

This preview shows document pages 1 - 7. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online