Presentation is loading. Please wait.

Presentation is loading. Please wait.

Technology: Our Job & Battleground Designed for Technology Support & Training By Lisa M. Low (Cadre 8) EDTC 515 ~ Fall II (2006)

Similar presentations


Presentation on theme: "Technology: Our Job & Battleground Designed for Technology Support & Training By Lisa M. Low (Cadre 8) EDTC 515 ~ Fall II (2006)"— Presentation transcript:

1 Technology: Our Job & Battleground Designed for Technology Support & Training By Lisa M. Low (Cadre 8) EDTC 515 ~ Fall II (2006)

2 Overview What is this technological threat? How will it affect our department and organization? As the Help Desk, how do we deal with it? What are the strategies, preventive measures, and resources?

3 Viruses, Worms & Trojan Horses Viruses: Malicious programs that are attached to files. Melissa macro (1999) Worms: Programs that makes multiple copies of itself to fill up memory. Gaobot (2004) Trojan Horses: Legitimate looking programs that are actually malicious programs. AOL4Free (1997)

4 Effects of Viruses, Worms & Trojan Horses Lost data and work. Panicked and frustrated users. Possible infestation on multiple computers within and outside of the organization.

5 Help Desk Procedures for Viruses, Worms & Trojan Horses 1. Ask Questions. What error messages, if any, do you receive? Are there any unusual graphics, text, or sounds? What were you doing at the time? Did you open any attachments or download any software? Is your computer running slower? Do you notice any strange file behavior?

6 Help Desk Procedures for Viruses, Worms & Trojan Horses 2. Use Norton Anti-Virus to update definitions and run a full scan. 3. Research all symptoms. Use Symantec, Trend Micro, or McAfee sites.SymantecTrend Micro McAfee 4. Contact Tech Support if #2 and #3 fail.

7 The Wares (Spyware, Adware, Parasiteware & Malware) MalwareMalware: Malicious software. Viruses, Worms, Trojan Horses AdwareAdware: Profiles web surfing or gives unwanted pop-up ads. ParasitewareParasiteware: Overwrites tracking links. SpywareSpyware: Records keystrokes and monitors all activity on a computer.

8 Effects of the Wares Slower computers. Identity theft. Organizational data theft. Unwanted pop-up ads.

9 Help Desk Procedures for the Wares 1. Ask Questions: What were you doing at the time? Did you download any software? Is your computer running slower? Are you receiving a lot of pop-up ads? 2. Run Spy Sweeper.Spy Sweeper 3. Contact Tech Support if #2 doesnt work.

10 Data Theft Compromised passwords. Unauthorized access to machines, network, or information. Scams (i.e. phishing, pharming).phishingpharming Spam. Spam

11 Effects of Data Theft Personal information loss and identity theft. Increased spam. Organizational data theft.

12 Help Desk Procedures for Identity Theft 1. Reset passwords. 2. Safeguard questions and alert on account. 3. Contact local law enforcement. 4. Notify manager immediately. 5. Notify group immediately.

13 Help Desk Procedures for Organizational Data Theft 1. Reset passwords. 2. Notify manager immediately. 3. Notify Tech Support immediately.

14 Help Desk Procedures for Spam 1. Direct internal user to spam filter on Stanford site.spam filter 2. Direct external user to USA.net address for spam filtering. 3. Direct external user to spam filtering features in account. SPAM

15 Stolen Computer Equipment (Laptops) Viewed as a work tool. Prior occurrences: Airport Locked car Café Please protect me!

16 Effects of Stolen Computer Equipment (Laptops) Personal information loss and identity theft. Organizational data theft. Potential lawsuits for Stanford University! Loss of work time for user. Financial loss for Stanford University!

17 Help Desk Procedures for Stolen Computer Equipment (Laptops) 1. Ask Questions: When was the last time you saw the laptop? Where? What programs were on that laptop? Was there any confidential information or documentation on your machine? Were any passwords or financial information on your machine?

18 Help Desk Procedures for Stolen Computer Equipment (Laptops) 2. Contact Tech Support and Senior Management immediately. Stolen computer!

19 Time Wasters Any activity using computer work equipment that has nothing to do with work. Personal s. Instant messaging. Web browsing. Download of unauthorized software. Playing computer games.

20 Effect of Time Wasters Potential illegal use of Stanford equipment. One very angry boss. And you were doing what for three hours?

21 Help Desk Procedures for Time Wasters Dont support the user. Im sorry that youre having difficulties downloading personal family photos on your machine, but we cant assist you.

22 Prevention & Awareness for our Users ineed-NEWS. Messages from senior management. Reiterate rules and procedures in class and via . Follow through with consequences. Sign computer usage agreements.

23 Our Strategies for Prevention Prevention and Resource Handouts. Software and hardware firewall. Secure . Automated Windows updates. Automated anti-virus updates and scans. Free anti-virus and spyware software. IP address blockage. Spam filtering system. Laptop tutorial.

24 Ready to do battle? Get your tactics and gear ready!

25 Resources for Presentation CompuMentor. (2006). Spam Prevention Toolkit. techsoup. Retrieved December 6, 2006 from Consumers Union, Inc. (2006, September). Cyber Insecurity. Consumer Reports, FaceTime Communications, Inc. (2006). Intro to Greynets and Spyware. Spyware Guide. Retrieved December 6, 2006 from McAfee Incorporated. (2006). McAfee Threat Center. Knowledge M. McAfee. Retrieved December 6, 2006 from

26 Resources for Presentation (continued) Microsoft Corporation. (2006). Recognize phishing scams and fraudulent s. Microsoft. Retrieved December 8, 2006 from Trend Micro Incorporated. (2006). Security Info. Trend Micro. Retrieved December 6, 2006 from Shelly, G., Cashman, T., Gunter, G., & Gunter, R. (2006). Integrating Technology and Digital Media in the Classroom. Boston, MA: Thomson Course Technology. Stanford University. (2006). Dealing with Spam. Stanford University. Retrieved December 7, 2006 from ccs/security/junkmail.html.http://www.stanford.edu/group/itss- ccs/security/junkmail.html

27 Resources for Presentation (continued) Stanford University. (2006). Stanford Downloads for Windows. Stanford University. Retrieved December 7, 2006 from Symantec Corporation. (2006). Online Fraud: Pharming. Symantec. Retrieved December 8, 2006 from Symantec Corporation. (2006). Virus Definitions and Security Updates. Symantec. Retrieved December 6, 2006 from


Download ppt "Technology: Our Job & Battleground Designed for Technology Support & Training By Lisa M. Low (Cadre 8) EDTC 515 ~ Fall II (2006)"

Similar presentations


Ads by Google