Presentation is loading. Please wait.

Presentation is loading. Please wait.

“Antibiotics don't work against viruses.” - Mayo Clinic Computer Security You Can (and Should) Use Sandia High School November 8 th, 2013 University of.

Similar presentations


Presentation on theme: "“Antibiotics don't work against viruses.” - Mayo Clinic Computer Security You Can (and Should) Use Sandia High School November 8 th, 2013 University of."— Presentation transcript:

1 “Antibiotics don't work against viruses.” - Mayo Clinic Computer Security You Can (and Should) Use Sandia High School November 8 th, 2013 University of New Mexico Under Attack

2 Who We Are We are graduate students at the Anderson School of Management at UNM studying Information Assurance. As part of our Information Security class we are promoting information security in the community by speaking to High School students. We hope that this information proves to be useful for you.

3 How Widespread is it? Computer Virus StatisticsNumber Number of US households that experience heavy spam24 million Number of households that have had serious virus problems in the past 2 years 16 million Number of households that have had spyware problems in the past 6 months 8 million Number of households that lost money or had accounts misused by phishing 1 million Estimated cost to US households for viruses, spyware and phishing $4.55 billion Percent of all US households that have been affected by viruses 40 % Most widespread virus to date by number of infections – “Conficker Virus” 8,976,038

4 What’s Out There? Threats by TypeNumber Viruses57 % Misc. Trojans21 % Trojan downloaders and droppers7 % Misc potentially unwanted software4 % Adware3 % Exploits3 % Worms2 % Password stealers and monitoring tools 2 % Backdoors1 % Spyware0.01 %

5 It’s Not for Lunch Anymore In August, 2013 unsolicited emails made up 67.6% of all global email traffic. – Kapersky Labs

6 What About SHS? How many times has a computer you use (personal or home) become infected with some type of malware (virus, couldn’t make a program stop appearing, etc.)?

7 What About SHS? When doing online research, have you ever clicked on a link that went to someplace other than what it claimed, containing adult content?

8 Why? $$$ (Yours)

9 Why? $$$ (Yours) $$$ (if you’re not the consumer, you’re the product

10 Why? $$$ (Yours) $$$ (if you’re not the consumer, you’re the product Distributed Denial of Service Attack –Financial –Political –Personal satisfaction

11 Types Phishing

12 Types Phishing Trojans/Viruses/Bots

13 Types Phishing Trojans/Viruses/Bots Adware

14 Types Phishing Trojans/Viruses/Bots/Worms Adware Mobile –Up to 90 percent of Android devices are infected, due to Google’s open development

15 Types

16

17 What Can I Do? Curiosity killed the cat

18 What Can I Do? Curiosity killed the computer

19 What Can I Do? Curiosity killed the computer No one can make you feel inferior without your consent. -Eleanor Roosevelt

20 What Can I Do? Curiosity killed the computer No one can make you feel inferior without your consent. -Eleanor Roosevelt Very few types of malicious programs can infect your computer without your consent. –Keith Smith

21 What Can I Do? Curiosity killed the computer No one can make you feel inferior without your consent. -Eleanor Roosevelt Very few types of malicious programs can infect your computer without your consent. –Keith Smith Drive by (iFrame insertion)

22 What Not to Do Don’t click on that link

23 What Not to Do Don’t click on that link Don’t click on that button

24 What Not to Do Don’t click on that link Don’t click on that button Don’t click on that image

25 What Not to Do Don’t click on that link Don’t click on that button Don’t click on that image That one-line email was sent by a friend, a friend with a virus. Hi! I advise link http://gangsterlife.net/_45_advise.facebook.apps_34 _.html?otagiwiw=4136897http://gangsterlife.net/_45_advise.facebook.apps_34 _.html?otagiwiw=4136897

26 What Not to Do Don’t click on that “close window” X

27 What Not to Do Don’t change your profile picture to a giraffe!!

28 What to Do Update, update, update –Automatic

29 What to Do Update, update, update –Automatic Use protection –Microsoft –AVG –ZoneAlarm –Symantec –Etc.

30 What to Do Use incomplete search terms –(pssstt! Wanna buy Air Force One?)

31 What to Do Use incomplete search terms –(pssstt! Wanna buy Air Force One?) That (song, movie, software) might cost you MUCH more if you get it free –Torrent. World’s greatest source of revenue for McAfee and Symantec

32 What to Do Be careful out there

33 What to Do Be careful out there

34 Next- Social diseases…

35 How Over Sharing Hurts You Identity Theft –Social media sites ask for personal information like the following: Full Name Email Address Date of Birth Home Town School Name, Location and Graduation Dates Pet Names Other Interests and hobbies

36 How Over Sharing Hurts You Why is this information dangerous? –That information is commonly used for passwords and security questions. –Hackers can lock you out of your own accounts. Protect Yourself –When creating online profiles do not use your full name and do not allow your email address to be visible. –Give as little other information as possible.

37 How Over Sharing Hurts You Stalkers –Checking in at locations. Thieves –Announcing when you and your family are away. Employers –May find the content of your profiles to be inappropriate.

38 How Over Sharing Hurts You Protect Yourself –Do not check in at places. If you must, make sure your profile is private and you know all of your friends and followers. –Do not let people know when you are away, even those you know in real life. –Don’t post things you wouldn’t be comfortable talking about in the workplace.

39 Protect Your Reputation Don’t post anything online you wouldn’t want your parents to see! Check pictures that your friends tag you in. Google yourself.

40 Protect Your Online Reputation

41 Protect Your Reputation Why is this important? –77% of employers check applicant’s social networking sites during the hiring process. –80% of top colleges check applicant’s social networking sites during the recruiting process.

42 Geotagging Geotagging is marking a form of media, video, photo, etc. with the location of where that media file was created.

43 Geotagging

44 General Internet Security Guidelines Create a strong password. –8 characters in length –Use each of the following: A lower case letter An uppercase letter Number Special character

45 General Internet Security Guidelines Create a strong password. –Don’t use the names of family, friends or pets. –Use acronyms instead of full words. Ex: My dog Rex is 4 years old! Would be used in a password as MdRi4yo! –Change your passwords every 6 months. –Don’t use the same password for all of you logins, especially banking and financial services. –Use a password vault.

46 General Internet Security Guidelines Don’t leave your personal devices logged in to online accounts. If you suspect one of your accounts has been hacked, change your passwords immediately.

47 General Internet Security Guidelines Use Two-Factor Authentication –Two factor authentication is a security process in which the user provides two means of identification to access an account. –Helps reduce identity theft, phishing scams, and other online fraud.

48 General Internet Security Guidelines Use two factor authentication.

49 Questions? References: –Fisher, Anne. "Checking out Job Applicants on Facebook? Better Ask a Lawyer." Fortune Management Career Blog. CNN Money, 2 Mar. 2011. Web. 01 Nov. 2013. –Jackson, Ben, and Larry Pesce. "I Can Stalk U." I Can Stalk U. Mayhemic Labs, 2010. Web. 01 Nov. 2013. –Lewis, Kent. "How Social Media Networks Facilitate Identity Theft and Fraud." How Social Media Networks Facilitate Identity Theft and Fraud | Entrepreneurs' Organization. Entreprenuers Association, n.d. Web. 01 Nov. 2013. –Natarajan, Ramesh. "The Ultimate Guide for Creating Strong Passwords." The Geek Stuff. N.p., n.d. Web. 08 June 2008. –Quigley, Robert. "Geekosystem." Report 80 of College Admissions Departments Check Applicants Facebook Pages Comments. Geek System, 25 Feb. 2011. Web. 01 Nov. 2013. –Wawro, Alex. "How to Set up Two-factor Authentication for Facebook, Google, Microsoft, and More." PCWorld. N.p., 25 Apr. 2013. Web. 01 Nov. 2013.


Download ppt "“Antibiotics don't work against viruses.” - Mayo Clinic Computer Security You Can (and Should) Use Sandia High School November 8 th, 2013 University of."

Similar presentations


Ads by Google