Presentation is loading. Please wait.

Presentation is loading. Please wait.

Steve Riley Sr. Security Strategist Microsoft Trustworthy Computing Group SEC303.

Similar presentations


Presentation on theme: "Steve Riley Sr. Security Strategist Microsoft Trustworthy Computing Group SEC303."— Presentation transcript:

1

2 Steve Riley Sr. Security Strategist Microsoft Trustworthy Computing Group steve.riley@microsoft.com http://blogs.technet.com/steriley SEC303

3

4 www.microsoft.com/protect/ The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and entertainment A means to learn, meet people, and explore

5 www.microsoft.com/protect/ Leading Internet Risks and Threats To Children Predators Cyberbullies File-sharing abuses Invasion of privacy Disturbing content To Personal Safety Spam Online fraud and phishing Hoaxes Identity theft To Computers Viruses Worms Trojans Spyware

6 www.microsoft.com/protect/ Online Security Versus Online Safety Security: We must secure our computers with technology in the same way that we secure the doors to our homes. Safety: We must act in ways that protect us against the risks and threats that come with Internet use.

7 www.microsoft.com/protect/ Predators These people use the Internet to trick children into meeting with them in person. File-share Abuse Exchanging music, video, and other files may be illegal, and can give strangers access to your computer or download viruses or worms. Cyber-bullies Both children and adults may use the Internet to harass or intimidate other people. Invasion of Privacy If kids fill out online forms, they may share information you don’t want strangers to have about them or your family. Disturbing Content If kids explore unsupervised, they could stumble upon images or information you may not want them exposed to. Leading Online Risks for Children

8 www.microsoft.com/protect/ Spam Unwanted e-mail, instant messages, e-cards, and other online communication Phishing E-mail sent by online criminals to trick you into revealing personal information Identity Theft A crime where con artists get your personal information and access your cash and/or credit Hoaxes E-mail sent by online criminals to trick you into giving them money Leading Threats to Personal Online Safety

9 www.microsoft.com/protect/ Viruses/Worms Software programs designed to invade your computer, and copy, damage or delete your data Trojans Viruses that pretend to be programs that help you while destroying your data and damaging your computer Spyware Software that secretly watches and records your online activities or sends you endless pop-up ads Leading Threats to Computer Security

10 www.microsoft.com/protect/ Steps You Can Take Your computer 1.Turn on Windows Internet firewall. 2.Use Microsoft Update to keep Windows up- to-date automatically. 3.Install and maintain antivirus software. 4.Install and maintain Microsoft Windows Defender. Yourself 1.Practice Internet behavior that lowers your risk. 2.Manage your personal information carefully. 3.Use anti-phishing and anti-spam technology built into Windows Vista, Windows XP SP2, Internet Explorer 7, Windows Live, and Microsoft Outlook. Your family 1.Talk with your kids about what they do online. 2.Keep personal information private. 3.Set clear rules for Internet use. 4.Use Microsoft’s Family Safety Settings.

11 www.microsoft.com/protect/ Take Steps to Help Protect Your Family Talk with your kids about what they do online Keep personal information private Set clear rules for Internet use Use family safety software

12 www.microsoft.com/protect/ Talk with Your Kids about Online Risks Talk frankly with your kids about Internet risks, including Sexual predators Inappropriate content Invasion of privacy Empower them by teaching them how their own behavior can reduce those risks and help to keep them safe when they are online. Helpful online resources www.staysafe.org www.getnetwise.org www.microsoft.com/protect

13 www.microsoft.com/protect/ Pay Attention to What Your Kids Do Online Keep the computer in a central area Get to know how your kids use the Internet Let your kids be the teacher Teach kids to trust their instincts Encourage them to report any problems

14 www.microsoft.com/protect/ Keep Personal Information Private Teach children never to share personal information online without permission Monitor your children’s online activities Teach your children to report suspicious activity Help children choose appropriate screen names and e-mail addresses

15 www.microsoft.com/protect/ Set Clear Rules for Internet Use Never go alone to meet an Internet “friend” in person Do not share files or open attachments Do not click links from strangers Treat others the way you want to be treated Stand up for yourself Respect other people’s property

16 www.microsoft.com/protect/ Use Family Safety Software Available in Windows Vista, Windows Live OneCare, Xbox 360 Helps parents control and monitor the content their children view, what they do, and who they communicate with online

17 www.microsoft.com/protect/ How to Handle Problems Make it safe for your children to tell you when they feel uncomfortable online Contact police to report any threat immediately Report incidents to: CyberTipline 800-843-5678 www.cybertipline.com

18 www.microsoft.com/protect/ Take Steps to Help Protect Yourself Practice Internet behavior that lowers your risk Manage your personal information carefully Use technology to reduce nuisances, and raise the alarm when appropriate

19 www.microsoft.com/protect/ Delete Spam without Opening It Never reply to spam Technology can help you identify spam so you can delete it Many Internet providers delete it for you

20 www.microsoft.com/protect/ Be on the Lookout for Scams! Many signs can alert you to e-mail scams: Alarming messages and threats of account closures Promises of big bucks for little effort Deals that sound too good to be true Misspellings and grammatical errors

21 www.microsoft.com/protect/ Use Strong Passwords Create passwords that are hard to crack. Use at least eight characters, and combine letters, numbers, and symbols. Never share your passwords with friends or give them away over e-mail.

22 www.microsoft.com/protect/ Manage Personal Information Carefully Delete e-mails that request personal information Do not use e-mail or instant messages to share personal information

23 www.microsoft.com/protect/ Use Anti-Phishing and Anti-Spam Technology Microsoft Outlook: helps protect you by recognizing and filtering most spam Internet Explorer 7: Phishing Filter blocks known scam sites and warns about suspicious sites

24 www.microsoft.com/protect/ Get a copy of your credit report and ensure your account is marked “fraud alert” and “victim’s statement” If Your Identity is Stolen Report it Follow up in writing Change all passwords Place fraud alert on credit reports

25 www.microsoft.com/protect/ Turn on Windows Internet firewall Four Steps to Protect Your Computer Use Microsoft Update to keep Windows up-to-date automatically Install and maintain Microsoft Windows Defender Install and maintain antivirus software

26 www.microsoft.com/protect/ Turn on Windows Internet Firewall An Internet firewall is like a moat around a castle, creating a barrier between your computer and the Internet

27 www.microsoft.com/protect/ Use Microsoft Update to Keep Windows Up-to-date Automatically Install all security updates as soon as they are available Automatic updates provide the best protection

28 www.microsoft.com/protect/ Install Antivirus Software Antivirus software helps to detect and destroy computer viruses before they can cause damage. Just like flu shots, for antivirus software to be effective, you must keep it up-to-date. Don’t let it expire

29 www.microsoft.com/protect/ Install and Maintain Microsoft Windows Defender Use antispyware software so unknown people cannot lurk on your computer and potentially steal your information.

30 www.microsoft.com/protect/ Other Ways to Protect Your Computer Back up your files regularly Think before you click Read Web site privacy statements Close pop-ups using red “X”

31 www.microsoft.com/protect/ Back up Your Files Save to CD or DVD Use a Web-based backup service

32 www.microsoft.com/protect/ Think Before You Click Don’t open e-mail attachments unless you know what they contain and who sent them Only download files from Web sites you trust

33 www.microsoft.com/protect/ Read Privacy Statements Understand what you are getting before you agree to download or share your personal information

34 www.microsoft.com/protect/ Close Pop-ups Using Red “X” Always use the red “X” in the corner of a pop-up screen. Never click “yes,” “accept” or even “cancel,” because it could be a trick that installs software on your computer.

35 www.microsoft.com/protect/ How Does Microsoft Help Improve Security and Safety? By developing software products and tools that increase security and safety, helping people minimize their risk online and make informed choices By partnering with non-governmental organizations, other technology companies, and governments worldwide to help keep children safe By providing useful guidance that helps people understand risks and what actions they can take PartnershipTechnologyGuidance

36 www.microsoft.com/protect/ For More Information www.microsoft.com/protect www.staysafe.org www.getnetwise.org

37

38

39 © 2007 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.


Download ppt "Steve Riley Sr. Security Strategist Microsoft Trustworthy Computing Group SEC303."

Similar presentations


Ads by Google