Presentation is loading. Please wait.

Presentation is loading. Please wait.

PC Safety and Security Instructor Doug Bloodworth

Similar presentations


Presentation on theme: "PC Safety and Security Instructor Doug Bloodworth"— Presentation transcript:

1 PC Safety and Security Instructor Doug Bloodworth digdug2@hotmail.com

2 PC Safety and Security During this class we are going to cover: Section 1: Why? Home Computer Security Section 2: Thinking About Securing Your Home Computer Section 3: Online Threats Section 4: Security Suite Section 5: Protect Yourself Section 6: Our young people online safety Section 7: Identity Theft and Internet Fraud Section 8: How to get and use Antivirus software Section 8: How to get and use Anti-Spyware software Section 9: How to get and use Firewall software Section 10: Is online banking Safe?

3 Why? Home Computer Security Your home computer is a popular target for intruders. Why? Because intruders want what you’ve stored there. They look for credit card numbers, bank account information, and anything else they can find. By stealing that information, intruders can use your money to buy themselves goods and services. But it’s not just money-related information they’re after. Intruders also want your computer’s resources, meaning your hard disk space, your fast processor, and your Internet connection. They use these resources to attack other computers on the Internet. In fact, the more computers an intruder uses, the harder it is for law enforcement to figure out where the attack is really coming from. If intruders can’t be found, they can’t be stopped, and they can’t be prosecuted.

4 Why? Home Computer Security Why are intruders paying attention to home computers? Home computers are typically not very secure and are easy to break into. When combined with high-speed Internet connections that are always turned on, intruders can quickly find and then attack home computers. While intruders also attack home computers connected to the Internet through dial-in connections, high-speed connections (cable modems and DSL modems) are a favorite target. No matter how a home computer is connected to the Internet, intruders’ attacks are often successful. Many home computer owners don’t realize that they need to pay attention to computer security. In the same way that you are responsible for having insurance when you drive a car, you need to also be responsible for your home computer’s security. This document explains how some parts of the Internet work and then describes tasks you can do to improve the security of your home computer system. The goal is to keep intruders and their programs off your computer.

5 Why? Home Computer Security How do intruders break into your computer? In some cases, they send you email with a virus. Reading that email activates the virus, creating an opening that intruders use to enter or access your computer. In other cases, they take advantage of a flaw or weakness in one of your computer’s programs – a vulnerability – to gain access. Once they’re on your computer, they often install new programs that let them continue to use your computer – even after you plug the holes they used to get onto your computer in the first place. These backdoors are usually cleverly disguised so that they blend in with the other programs running on your computer.

6 Why? Home Computer Security Whether your computer runs Microsoft ® Windows ®, Apple’s Mac OS, LINUX, or something else, the issues are the same and will remain so as new versions of your system are released. The key is to understand the security-related problems that you need to think about and solve.

7 Thinking About Securing Your Home Computer Before diving into the tasks you need to do to secure your home computer, let’s first think about the problem by relating it to something you already know how to do. In this way, you can apply your experience to this new area. So, think of your computer as you would your house, your apartment, or your condo. What do you know about how that living space works, what do you routinely do to keep it secure, and what have you installed to improve its security? (We’ll use this “computer-is-like-a-house-and-the-things-in- it” analogy throughout, departing only a few times to make a point.)

8 Thinking About Securing Your Home Computer For example, you know that if you have a loud conversation, folks outside your space can probably hear you. You also routinely lock the doors and close the windows when you leave, and you don’t give the keys to just anyone. Some of you may install a security system to complement your practices. All of these are part of living in your home.

9 Thinking About Securing Your Home Computer Let’s now apply similar thinking to your home computer. Email, instant messaging, and most web traffic go across the Internet in the clear; that is, anyone who can capture that information can read it. These are things you ought to know. You should always select and use strong passwords and exercise due care when reading all email, especially the unsolicited variety. These are things you ought to do. Finally, you can add a firewall, an anti-virus program, patches, and file encryption to improve the level of security on your home computer, and we’ll call these things you ought to install. http://www.cert.org/homeusers/HomeComputerSecurity

10 Basic Task for Secure Computing Task 1 - Install and Use Anti-Virus Programs Task 2 - Keep Your System Patched Task 3 - Use Care When Reading Email with Attachments Task 4 - Install and Use a Firewall Program Task 5 - Make Backups of Important Files and Folders Task 6 - Use Strong Passwords Task 7 - Use Care When Downloading and Installing Programs Task 8 - Install and Use a Hardware Firewall Task 9 - Install and Use a File Encryption Program and Access Controls http://www.cert.org/homeusers/HomeComputerSecurity/#1

11 Protect Yourself Stop, Think, Connect -- http://www.staysafeonline.org/ http://www.staysafeonline.org/ Email -- http://www.staysafeonline.org/in- the-home/emailhttp://www.staysafeonline.org/in- the-home/email Online Shopping Social Networking Mobile Devices Downloading and File-sharing

12 Online Threats The Internet is a powerful and useful tool, but in the same way that you shouldn’t drive without buckling your seat belt or ride a bike without a helmet, you shouldn’t venture online without taking some basic precautions. The good news is that there are effective ways to protect yourself while still enjoying the enormous benefits of the Internet. Learning about some of the existing threats can help you enjoy a safer, happier Internet experience. 1.Viruses 2.Spyware 3.Botnets

13 Online Threats Viruses Viruses are harmful computer programs that can be transmitted in a number of ways. Although they differ in many ways, all are designed to spread themselves from one computer to another through the Internet and cause havoc. Most commonly, they are designed to give the criminals who create them some sort of access to those infected computers.

14 Online Threats Spyware The terms "spyware" and "adware" apply to several different technologies. The two important things to know about them is that 1) they can download themselves onto your computer without your permission (typically when you visit an unsafe Web site or via an attachment) and 2) they can make your computer do things you don't want it to do. That might be as simple as opening an advertisement you didn't want to see. In the worst cases, spyware can track your online movements, steal your passwords and compromise your accounts.

15 Online Threats Botnets Although they sound like something out of a bad science fiction movie, botnets have become a very real danger on the Internet. Botnets are made up of large numbers of computers that have been infected by criminals (using some of the tools mentioned above). Often, the people whose computers are controlled by a botnet don't even know that they've been infected. Criminals use these armies of infected computers to attack Web sites by flooding them with massive amounts of traffic or as engines for sending spam. These attacks can devastate companies, and even entire countries in some cases. Victims caught in botnets can also be subject to identity theft as their personal information is compromised.

16 Security Suite The NCSA promotes three protections that every computer connected to the Internet should have installed. This software suite, which sometimes can be purchased as a package, is your frontline defense against cyber criminals and intrusions. Every computer should have the following three core protections installed: 1.Anti-Virus Software 2.Firewall 3.Anti-Spyware Software

17 Security Suite Installing these software packages is the first step. Equally important is keeping them up to date. New threats emerge daily and quality software packages come with subscriptions that allow you to update your defenses on a regular basis. In most cases, you can set the software to retrieve the updates automatically. Set your system for these automatic updates so you don’t create extended periods of potential vulnerability. In addition, your computer runs an operating system. If you surf the Internet, you use a browser as well. Both should be updated regularly. Many of the updates that address security issues can be scheduled to run automatically.

18 Security Suite Anti-Virus Software Anti-virus software protects your computer from viruses by scanning your computer and your incoming email and deleting anything that is infected. Viruses can destroy your data, slow your computer's performance, cause a crash, or allow spammers to send email through your account. To be effective, your anti-virus software should be updated regularly to defend against the latest viruses circulating through the Internet. Most commercial anti-virus software includes a feature to download updates automatically when you are on the Internet. You can download anti-virus software from the Web sites of software companies or buy it in retail stores. Many Internet Service Providers (ISPs) actually offer anti-virus software for free.

19 Security Suite Anti-Spyware Software Spyware is a form of malicious software that monitors your online activities and can potentially collect your personal information. Anti-spyware software helps protect your computer from spyware. It periodically scans your computer for spyware programs, and then gives you the opportunity to remove any harmful surveillance software found. Some anti-virus software also contains anti-spyware capability. Given the increasing sophistication of spyware programs, consider using two different anti-spyware programs. Each one looks for slightly different sets of threats, and together they may offer increased protection.

20 Security Suite Firewalls Firewalls help keep hackers from using your computer to send out your personal information without your permission. While anti- virus software scans incoming email and files, a firewall is like a guard, watching for attempts to access your system and blocking communications with sources you don't permit. Some operating systems come with a built-in firewall that may be set on the "off" mode. Make sure you turn it on and keep it updated. Check your online "Help" feature for specific instructions. If your operating system doesn't include a firewall, get a separate software firewall that runs in the background while you work, or install a hardware firewall (an external device that includes firewall software). Several free firewall software programs are also available on the Internet.

21 Security Suite Operating System and Browser Keeping your computer updated and patched will provide an additional layer of security for your system, and your personal data. Out-of-date or defective software can leave your computer open to attack, so it is essential to be vigilant in the update process. Each computer runs on a specific operating system (OS) that houses the vital components that allows your computer to work. The two biggest operating systems are Windows and Macintosh. Online criminals and hackers launch specific attacks against these computer operating systems for personal gain. In order to stay safe from these attacks, OS manufacturers issue regular updates (or “patches”) that fix specific problems or vulnerabilities in the OS. These updates are primarily “pushed” to the computer user, meaning the computer automatically receives and downloads those fixes.

22 Security Suite Hackers look for ways to exploit users of out-of- date web browsers. They can use unfixed vulnerabilities or problems in a web browser to gather personal information, install malicious software (malware) and launch attacks against other machines. Most of the major browser vendors regularly update their software to reduce risk factors. You should make sure you’re receiving the latest updates, running the most current version of your browser, and making sure you have all the proper security controls turned on.

23 Security Suite Operating System and Browser Keeping your computer updated and patched will provide an additional layer of security for your system, and your personal data. Out-of-date or defective software can leave your computer open to attack, so it is essential to be vigilant in the update process. Each computer runs on a specific operating system (OS) that houses the vital components that allows your computer to work. The two biggest operating systems are Windows and Macintosh. Online criminals and hackers launch specific attacks against these computer operating systems for personal gain. In order to stay safe from these attacks, OS manufacturers issue regular updates (or “patches”) that fix specific problems or vulnerabilities in the OS. These updates are primarily “pushed” to the computer user, meaning the computer automatically receives and downloads those fixes.

24 Our young people online safety Basic Internet Safety for Kids The National Cyber Security Alliance’s K-12 Working Group, which meets monthly to discuss teaching our young people online safety, developed the following tips for parents:

25 Our young people online safety Remain positively engaged. Pay attention to and know the online environments your children use. Surf the Internet with them. Appreciate your children’s participation in their online communities and show interest in their friends. Try to react constructively when they encounter inappropriate material. Make it a teachable moment.

26 Our young people online safety Support their good choices. Expand your children’s online experience and their autonomy when developmentally appropriate, as they demonstrate competence in safe and secure online behavior and good decision making.

27 Our young people online safety Protect your hardware. Safety and security start with protecting all family computers. Install a security suite (antivirus, antispyware, and firewall) that is set to update automatically. Keep your operating system, Web browser, and other software current as well, and back up computer files on a regular basis.

28 Our young people online safety Know the protection features of the Web sites and software your children use. Your Internet service provider (ISP) may have tools to help you manage young children’s online experience (e.g., selecting approved Web sites, monitoring the amount of time they spend online, or limiting the people who can contact them) and may have other security features, such as pop-up blockers. Third-party tools are also available. But remember that your home isn't the only place they can go online.

29 Our young people online safety Review the privacy settings of social network sites, cell phones, and other social tools your children use. Decide together which settings provide the appropriate amount of protection for each child.

30 Our young people online safety Teach critical thinking. Help your children identify safe, credible Web sites and other digital content, and be cautious about clicking on, downloading, posting, and uploading content.

31 Our young people online safety Explain the implications. Help your children understand the public nature of the Internet and its risks as well as benefits. Be sure they know that any digital info they share, such as emails, photos, or videos, can easily be copied and pasted elsewhere, and is almost impossible to take back. Things that could damage their reputation, friendships, or future prospects should not be shared electronically.

32 Our young people online safety Help them be good digital citizens. Remind your children to be good “digital friends” by respecting personal information of friends and family and not sharing anything about others that is potentially embarrassing or hurtful.

33 Our young people online safety Just saying “no” rarely works. Teach your children how to interact safely with people they "meet" online. Though it's preferable they make no in-person contact with online-only acquaintances, young people may not always follow this rule. So talk about maximizing safe conditions: meeting only in well-lit public places, always taking at least one friend, and telling a trusted adult about any plans they make – including the time, place, and acquaintance’s contact information (at least a name and cell phone number). Remind them to limit sharing personal information with new friends.

34 Our young people online safety Empower your children to handle problems, such as bullying, unwanted contact, or hurtful comments. Work with them on strategies for when problems arise, such as talking to a trusted adult, not retaliating, calmly talking with the person, blocking the person, or filing a complaint. Agree on steps to take if the strategy fails.

35 Our young people online safety Encourage your children to be “digital leaders.” Help ensure they master the safety and security techniques of all technology they use. Support their positive and safe engagement in online communities. Encourage them to help others accomplish their goals. Urge them to help if friends are making poor choices or being harmed.

36 Our young people online safety Keep your home computer in a central and open location so you can physically monitor your children while they are online. Be aware of all the ways young people connect to the Internet: Young people have many options to connect to the Internet beyond a home computer. Phones, gaming systems and even TV’s have become connected. Be aware of all the ways and devices (including what they do at friend’s houses) your children are using and be sure they know how to use them safely and responsibly.

37 Our young people online safety Talk to other parents: When and how you decide to let your children use the Internet is a personal parenting decision. Knowing what other parents are thinking and allowing their children to do is important and can be helpful for making decisions about what your children do online. Know the rules: Not all online services are for kids. Even some of the most popular social networking services and other sites are meant to only for use by people 13 and older. There are many terrific sites designed specifically for younger children that provide a safer, more secure and age-appropriate environment.

38 Our young people online safety Keep informed: The online world is ever changing. New services with great features continually emerge. Knowing about them and how young people use them can help you better understand the digital life your children experience as well as any concerns you may have for your children. Consider separate accounts on your computer. Most operating systems (including Windows 7, Vista, Mac OS X and Unix) allow you to create a different account for each user. Separate accounts can lessen the chance that your child might accidentally access, modify, change settings and/or delete your files. You can set up certain privileges (the things that can and can’t be done) for each account.

39 Our young people online safety For emergencies: Know who to contact if you believe your child is in danger. Visit http://kids.getnetwise.org/ for detailed information.http://kids.getnetwise.org/ If you know of a child in immediate risk or danger, call law enforcement right away. Report instances of online child exploitation to the National Center For Missing and Exploited Children's Cyber Tipline. Reports may be made 24-hours a day, 7 days per week at www.cybertipline.com or by calling 1-800-843-5678 www.cybertipline.com

40 Our young people online safety Guide to Online Privacy While kids are often more computer savvy than their parents -- they can easily sign up for a game or subscribe to a chat room service -- they don't understand the consequences of revealing personal information to strangers. As a rule, children should not reveal personal information about themselves online without a parent's permission. This includes their name, email address, postal address, phone number, photo, school address, etc. Teach your children about some of the risks involved if they reveal their name, address, telephone number and/or email address online and print out some of these general rules for your children to follow as they surf online. You can help children protect their privacy and themselves if you teach them to be privacy-wise. Learn more about how to teach your kids to keep their personal information to themselves online by visiting the kids privacy section of GetNetWise.

41 Home Computer Security


Download ppt "PC Safety and Security Instructor Doug Bloodworth"

Similar presentations


Ads by Google