Presentation is loading. Please wait.

Presentation is loading. Please wait.

Internet Security and Your Computer Welcome to Boot Camp.

Similar presentations


Presentation on theme: "Internet Security and Your Computer Welcome to Boot Camp."— Presentation transcript:

1 Internet Security and Your Computer Welcome to Boot Camp

2 OR How to surf the web safely Without becoming paranoid

3 Subjects We’ll cover viruses, worms, trojan horses, spyware virus scanners, firewalls, spyware blockers E-mail protection, browser protection home network security, wireless security keeping kids safe in “chat rooms”

4 The good, the bad and the ugly

5 The Ugly

6 Welcome to Internet Boot Camp Listen up recruits Internet security basic training is about to start!

7 Your computer is like your house Are you connected to the Internet without using a virus scanner a firewall and a spy-ware blocker? You might as well leave your front door open 24/7

8 Your computer is like your house Virus scanner Police officer

9 Your computer is like your house Virus scanner Firewall Police officer Door guard

10 Your computer is like your house Virus scanner Firewall Spy-ware blocker Police officer Door guard Security guard

11 Your computer is like your house Virus scanner Firewall Spy-ware blocker Browser settings Police officer Door guard Security guard Another guard

12 Your computer is like your house Virus scanner Firewall Spy-ware blocker Browser settings Virus/Worm/Trojan Police officer Door guard Security guard Another guard Criminals

13 Your computer is like your house Virus scanner Firewall Spy-ware blocker Browser settings Virus/Worm/Trojan Spy-ware Police officer Door guard Security guard Another guard Criminals Thief

14 Your computer is like your house Virus scanner Firewall Spy-ware blocker Browser settings Virus/Worm/Trojan Spy-ware Spam Police officer Door guard Security guard Another guard Criminals Thief Junk mail

15 Meet The Enemy virus

16 Meet The Enemy virus worm

17 Meet The Enemy virus worm trojan horse

18 Meet The Enemy virus worm trojan horse spam

19 Meet The Enemy virus worm trojan horse spam spy-ware

20 Meet the Allies Virus scanning software

21 Meet the Allies Virus scanning software Firewall hardware/software

22 Meet the Allies Virus scanning software Firewall hardware/software E-mail scanning software virus/spam

23 Meet the Allies Virus scanning software Firewall hardware/software E-mail scanning software virus/spam Spy-ware blocking software

24 Meet the Allies Virus scanning software Firewall hardware/software E-mail scanning software virus/spam Spy-ware blocking software Pop-up blocking software

25 Meet the Allies Virus scanning software Firewall hardware/software E-mail scanning software virus/spam Spy-ware blocking software Pop-up blocking software Operating system updates

26 Meet the Allies Virus scanning software Firewall hardware/software E-mail scanning software virus/spam Spy-ware blocking software Pop-up blocking software Operating system updates Browser security settings

27 E-Mail friend or foe? Don’t let the enemy use your E-mail to launch their attacks

28 Securing E-mail

29 Use an E-mail virus scanner

30

31

32 Securing E-mail Use an E-mail virus scanner Block images in HTML messages

33

34 Securing E-mail Use an E-mail virus scanner Block images in HTML messages View messages in plain text / block HTML

35

36 Securing E-mail Use an E-mail virus scanner Block images in HTML messages View messages in plain text / block HTML Use spam blocking software or ISP blocking

37 Securing E-mail Use an E-mail virus scanner Block images in HTML messages View messages in plain text / block HTML Use spam blocking software or ISP blocking Set up spoof E-mail account(s)

38 Securing E-mail Use an E-mail virus scanner Block images in HTML messages View messages in plain text / block HTML Use spam blocking software or ISP blocking Set up spoof E-mail account(s) Update E-mail software regularly

39 Securing E-mail Never open attachments from “?” sender

40 Securing E-mail Never open attachments from “?” sender Never “unsubscribe” from spam

41 Securing E-mail Never open attachments from “?” sender Never “unsubscribe” from spam Never click on links in spam / junk mail

42 Securing E-mail Never open attachments from “?” sender Never “unsubscribe” from spam Never click on links in spam / junk mail Never give information reply to “?” mail

43 Securing E-mail Never open attachments from “?” sender Never “unsubscribe” from spam Never click on links in spam / junk mail Never give information reply to “?” mail Never give real E-mail address to websites

44 Securing E-mail Never open attachments from “?” sender Never “unsubscribe” from spam Never click on links in spam / junk mail Never give information reply to “?” mail Never give real E-mail address to websites Beware of “phishing”

45 Eliminating Spy-ware The enemy has spies everywhere “All spies will be shot on sight”

46 Eliminating Spy-ware Download and install AD-AWARE

47

48 Eliminating Spy-ware Download and install AD-AWARE Download and install Spybot Search & Destroy

49

50 Eliminating Spy-ware Download and install AD-AWARE Download and install Spybot Search & Destroy Always use a firewall that monitors incoming and outgoing internet traffic

51

52

53

54

55

56 Web Browser who’s in control The web browser. Your gateway to the internet and a hackers gateway to your computer Secure that browser soldier!

57 Securing the browser Always use a firewall incoming/outgoing

58 BROSDBAND DSL/CABLE

59 Securing the browser Always use a firewall incoming/outgoing XP must be on SP2

60

61 Securing the browser Always use a firewall incoming/outgoing XP must be on SP2 Security settings as high as you can tolerate

62

63

64

65 Securing the browser Always use a firewall incoming/outgoing XP must be on SP2 Security settings as high as you can tolerate IE must be latest version / updated regularly (windows update)

66

67 Securing the browser Always use a firewall incoming/outgoing XP must be on SP2 Security settings as high as you can tolerate IE must be latest version / updated regularly Disable Active-X controls

68 Never enable activeX to download a file. You don’t need it to download files. This is a trick to get you to enable activeX

69 Home network security Let’s not be sharing information with the enemy

70 Securing a home network Always use a firewall

71 Securing a home network Always use a firewall Never share the OS hard drive

72 Securing a home network Always use a firewall Never share the OS hard drive Don’t share drives / share folders

73

74 Securing a home network Always use a firewall Never share the OS hard drive Don’t share drives / share folders Enable encryption on wireless (WEP)

75 Securing a home network Always use a firewall Never share the OS hard drive Don’t share drives / share folders Enable encryption on wireless (WEP) Hide SSID on wireless

76 Securing a home network Always use a firewall Never share the OS hard drive Don’t share drives / share folders Enable encryption on wireless (WEP) Hide SSID on wireless Change passwords on routers and modems

77 The 10 security commandments Thou shalt use and regularly update an anti- virus program Thou shalt use a firewall program Thou shalt run Windows Update regularly Thou shalt not open E-mail attachments Thou shalt not share hard drives

78 The 10 security commandments Thou shalt not give out personal information to non-trusted sites Thou shalt use an E-mail scanning program Thou shalt use a spy-ware blocking program Thou shalt use encryption on wireless networks Thou shalt use common sense

79 Chat room security Education is the answer

80 Chat Room Security Never share any personal information

81 Chat Room Security Never share any personal information Never give out E-mail address

82 Chat Room Security Never share any personal information Never give out E-mail address Never plan to meet anyone

83 Chat Room Security Never share any personal information Never give out E-mail address Never plan to meet anyone Never go to a web page from chat room

84 Chat Room Security Never share any personal information Never give out E-mail address Never plan to meet anyone Never go to a web page from chat room Never trust anyone on-line

85 Chat Room Security Never share any personal information Never give out E-mail address Never plan to meet anyone Never go to a web page from chat room Never trust anyone on-line Always use a spoof identity

86 Chat Room Security Never share any personal information Never give out E-mail address Never plan to meet anyone Never go to a web page from chat room Never trust anyone on-line Always use a spoof identity Chat room security could be life & death

87 Happy Surfing Congratulations! You’ve graduated from Security Boot Camp


Download ppt "Internet Security and Your Computer Welcome to Boot Camp."

Similar presentations


Ads by Google