Home Computer Security

Slides:



Advertisements
Similar presentations
Keep Your PC Safe (Windows 7, Vista or XP) Nora Lucke 02/05/2012 Documents - security.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Thank you to IT Training at Indiana University Computer Malware.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Configuring Windows Vista Security Chapter 3. IE7 Pop-up Blocker Pop-up Blocker prevents annoying and sometimes unsafe pop-ups from web sites Can block.
1 Computer Security: Protect your PC and Protect Yourself.
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Internet safety By Lydia Snowden.
Trojan Horse Implementation and Prevention By Pallavi Dharmadhikari Sirisha Bollineni VijayaLakshmi Jothiram Vasanthi Madala.
P6 - CONFIGURE THE SOFTWARE. CONFIGURE SOFTWARE Most software can be configured to suit an individual user, for example by changing the appearance of.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Tutorial 11 Installing, Updating, and Configuring Software
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Securing Your Home Computer Securing Your Home Computer Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
Malicious Attack Corporate Awareness and Walk through Date 29 September 2011.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Safer Online Shopping and Practices Presenter: Brian Moats Students Active In Leadership.
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Internet Security and Your Computer Welcome to Boot Camp.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Cyber Safety Jamie Salazar.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
Internet Safety.
2.4 Cyber-Safety.
Chapter 40 Internet Security.
Scams & Schemes Common Sense Media.
Done by… Hanoof Al-Khaldi Information Assurance
Internet Business Associate v2.0
Chapter 6 Application Hardening
Cyber Security & awareness
Unit 4 IT Security.
I S P S loss Prevention.
Data Compromises: A Tax Practitioners “Nightmare”
How to build a good reputation online
OWASP CONSUMER TOP TEN SAFE WEB HABITS
Information Security 101 Richard Davis, Rob Laltrello.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Lecture-16(B) Taking Protective Measures
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Information Security Session October 24, 2005
Protecting Your Identity:
Information Security Session October 24, 2005
Cyber Security & awareness
2.4 Cyber-Safety.
Part 3.
Connecting Remotely Winter 2014.
Bethesda Cybersecurity Club
CYBERSAFETY & Personal information
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Windows 10 An Operating System
Presentation transcript:

Home Computer Security Desktop Network Services Tom Ishimitsu Beth Tillinghast March 10, 2004

Why protect my computer at home? Intruders want access to your stored information: •credit card numbers •bank account information •social security numbers Identity theft is stealing another person’s identity, usually to leverage the victim’s credit rating to obtain personal loans, credit cards,or instant credit, and run up debts that are never repaid. Money can even be siphoned directly from a victim’s existing bank account. Social Security numbers might be used to establish identity by those entering the U.S. illegally for employment, renting an apartment or for utilities, or for establishing credit.

Why protect my computer at home? Intruders want your computer’s resources •your hard disk space •your fast processor •your Internet connection for attacking other computers on the Internet.

Your goal should be to keep intruders and their programs off of your computer!

How do they break into your computer? Via email with attachments containing a virus Via a weakness in a program that you have installed on your computer Via files that you might download off of the Internet

The First Step in creating a safe computing environment is to understand how the Internet and some of its technologies work.

Background on the Internet What is the Internet? Computer to Computer Communication Internet Protocols

How can Anti-virus programs help to secure my home computer? Install and use anti-virus programs Program looks at a virus signature and decides what to do with the file Update your anti-virus program as it includes the most recent set of virus signatures Besides checking specific files, schedule all of your files for periodic checks by the program

Steps in evaluating anti-virus programs: Demand: Can you check a file on demand? Update: Can you update the virus signature automatically? Respond: What are all the ways that you can respond to an infected file? Can the program clean a file? Check: Can you check every file that gets to your home computer? Automatically? Heuristics: Does the virus check do heuristics tests?

How can Patches help to secure my home computer? Regularly install patches for important programs and the operating system Free patches from vendors’ Web sites Sign up to receive patch notices via email Automatic updates bundled in program Warning about patches The “Undo” feature

Windows Update

Office Update

How can email awareness help to secure my home computer? Use care when reading email with attachments Social Engineering technique Know: Do you know the sender? Received: Have you received email from them before? Expect: Were you expecting email with an attachment from this sender? Sense: Does the contents in the Subject line make sense?

How can Backups help to secure my home computer? Make Backups of Important Files and Folders What files should you back up? How often should you back them up? What should you back them up to? Where should you store the media?

To start Backup, click Start, point to Programs, point to Accessories, point to System Tools, and then click Backup.

How can Passwords help to secure my home computer? Use a unique password with every account you have Strong: Is it as strong (length and content) as the rules allow? Unique: Is the password unique and unrelated to any of your other passwords? Practical: Can you remember it without writing it down? Recent: Have you changed it recently?

Taking care when downloading and installing programs can help to secure my computer. How do you decide if a program is what it says and how do you gauge the risk of running a program? Learn as much as you can about the product before you purchase it. Understand the refund/return policy. Buy from a local store or a national chain with an established reputation.

What about free programs? Which programs deserve your confidence and are worth the risk of installing and running? What does the program do? You should be able to read a clear description of what the program does. What changes are made on your system when the program is installed? Who is the author? Contact this person for verification. Learn what you can from others about the program before you install it.

Installing and using a Firewall Program. Windows XP Internet Connection Firewall Zone Alarm Hardware vs. Software based firewalls

Using Encryption Programs and Access Why encryption? HTTPS, SSH, SFTP PGP

25 Steps to Safe Computing 1. Turn off file sharing 2. Enable Windows Logon 3. Don’t use Administrator account as an everyday account 4. Use strong passwords 5. Install a NAT/router for DSL/Cable connections

25 Steps to Safe Computing 6. Install a personal firewall 7. Install a real-time anti-virus checker 8. If you use IE, set security settings for the Internet Zone to High 9. Use Mozilla or Opera instead of IE 10. Turn off preview mode in Outlook Express

25 Steps to Safe Computing 11. Don’t download free software, especially from Kazaa or Morpheus 12. Don’t use free “download assist” programs 13. Don’t use RealPlayer 14. Run WindowsUpdate frequently 15. Run spyware removal tools

25 Steps to Safe Computing 16. Update IE/OE to the latest version 17. Never reply to spam or unsolicited email 18. Avoid posting your email address anywhere on the Internet 19. Use secure Webmail 20. Turn off html email in OE

25 Steps to Safe Computing 21. Avoid opening unknown email attachments 22. Don’t let anyone connect to your network 23. Change .vbs file type to open with notepad 24. Change View to show all hidden files 25. Change View to show file extensions

Resources Home Computer Security Home User Security: Your First Defense National Cyber Security Alliance The Simplest Security: A Guide To Better Password Practices Stomp the Identity Thieves