Texas Christian UniversityTechnology Resources COMPUTER HOME.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Keep Your PC Safe (Windows 7, Vista or XP) Nora Lucke 02/05/2012 Documents - security.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Texas Christian University Technology Resources
Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
10 Things You Can do to Secure Your PC Presented by Peter Nowak OIS Client Services Manager.
Computer Security at HomeSlide 1 Computer Security Major Security and Privacy Threats Using The Internet At Home.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Configuring your Home Network Configuring your Home Network Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
 Lesson 05: Computer Maintenance. Keep Software Up-To-Date Patches Security Holes Improves Software Stability Improves Software Performance Adds.
1 Computer Security: Protect your PC and Protect Yourself.
Internet Security In the 21st Century Presented by Daniel Mills.
Securing Your Home Computer Presenter: Donnie Green Date: February 11, 2009 National Aeronautics and Space Administration
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Hierarchical file system Hierarchical file system - A hierarchical file system is how drives, folders, and files are displayed on an operating system.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Security for Seniors SeniorNet Help Desk
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Learning In A Techno World How Safe is Your Cyberspace?
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Securing Your Home Computer Securing Your Home Computer Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
Malicious Attack Corporate Awareness and Walk through Date 29 September 2011.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
Internet Security and Your Computer Welcome to Boot Camp.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
Home Computer Security Sponsored by NASA HQ ITCD Special Projects Training Presented by your Computer Training Center.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Any criminal action perpetrated primarily through the use of a computer.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
Cyber Security: Today’s Threats and Mitigations Jonathan Homer, Cyber Security Analyst Idaho National Laboratory.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
Computer Security Keeping you and your computer safe in the digital world.
Joseph J. Malone Security for Seniors Joseph J. Malone
What they are and how to protect against them
Unit 4 IT Security.
TECHNOLOGY GUIDE THREE
Your Computer Wants To Ruin Your Life
Information Security 101 Richard Davis, Rob Laltrello.
Protect Your Computer Against Harmful Attacks!
ISB Computer Security Training
Information Security Session November 11, 2004
Information Security Session October 24, 2005
Information Security Session October 23, 2006
Connecting Remotely Winter 2014.
9 ways to avoid viruses and spyware
6. Application Software Security
Presentation transcript:

Texas Christian UniversityTechnology Resources COMPUTER HOME

TCU Information Security Services Overview Critical Patches Anti-Virus Software Anti-Spyware Software Internet Firewall Security Backup Your Computer Use Strong Passwords Wireless Security Etcetera

TCU Information Security Services Critical Patches It is critical to keep your software up-to-date Operating system Anti-virus and anti-spyware Applications including browsers, Adobe Acrobat, Java, Flash Newest versions contain fixes for discovered vulnerabilities Enable automatic update features in OS and application software Windows – Control Panel Mac OSX – System Preferences

TCU Information Security Services Anti-virus Software Anti-virus software is used to identify and remove computer viruses, as well as many other types of harmful computer software, collectively referred to as malware Wikipedia Anti-virus software offers ongoing protection, daily scans, daily updates. To be effective virus definitions must be updated routinely. Norton, Trend Micro, McAfee, AVG, Sophos, Eeye, also included in internet security packages.

TCU Information Security Services Anti-Spyware Software Protects your computer from malicious spyware. Spyware may monitor your online activities and collect personal information while you surf the web. Periodically scans your computer for spyware. Must also be kept up-to-date Ad-Adware, Spybot, also included in internet security packages

TCU Information Security Services Internet Firewall Anti-virus and anti-spyware products inspect files on your computer, in incoming and outgoing , and on removable media. Firewall software and/or hardware monitors the communications between your computer and the outside world (the Internet). Firewalls prevent unauthorized access to or from a private network (i.e., your home computer).

TCU Information Security Services Internet Firewall (continued) You can implement a firewall in either hardware or software form, or a combination of both. Hardware Firewall Router (wired or wireless), i.e., Linksys DSL Modem, Gateway Software Firewall Built-in Windows Firewall Only stops inbound traffic, does not check outbound Mac OSX 10.2 and later also has an built-in firewall Part of an internet security package

TCU Information Security Services Internet Security Packages Some commercial internet security packages include anti-virus, anti-software and firewall software. Norton, Trend Micro, McAfee, Sophos, EEye, ESET, AVG

TCU Information Security Services Security Phishing Spam Attachments

TCU Information Security Services Phishing Phishing is an illegal activity that uses social engineering techniques to manipulate people into giving out personal information. A highly targeted version of a phishing scam is spear phishing.

TCU Information Security Services Phishing (continued) Characteristics of phishing s Unsolicited request for personal information Username, userid, id, identity Password Social security number Birthdate Generic greetings Contains an ultimatum Grammatical errors Content appears genuine

TCU Information Security Services Phishing techniques Link manipulation Technical deception designed to make a link in an and the spoofed website it leads to, appear to belong to the spoofed organization. Spoofed website Looks almost exactly like the real thing Website forgery A spoofed website that uses JavaScript to alter the address bar to appear legitimate. Filter evasion Misspelled words and images instead of text are used to evade anti- phishing filters.

A Recent TCU Phishing Link manipulation

Fake Website Look between first double // and first single / - thats NOT TCU No https

Real Website That is TCUSecure

Watch out for links in s. Do not click on them Type the link directly into web browser Learn to spot non-legitimate web sites Look at the address between the // and the first / - it should end with the company you expect Fake: Real: Is it secure? https in the address Yellow lock icon Avoid being Phished!

TCU Information Security Services Avoid being Phished (continued) Greet or phone calls seeking personal information with skepticism. If you think it may be legitimate, call customer service number provided when account was opened. Be leery of alarming statements that urge you to respond immediately. Do NOT reply to phishing s. OnGuard Online Phishy Home Video home.aspx

TCU Information Security Services Avoid being Phished (continued) TCU Technology Resources, including the computer help desk and information security services will NEVER ask you for your password via , the phone or in person. When TCU upgrades its computer or systems we will NEVER send a link inside an which will go to a website requesting that you login or enter your username and password.

TCU Information Security Services Spam Spam is anonymous, unsolicited junk sent indiscriminately to huge numbers of recipients. Do not open that is obviously Spam. If you do open spam, do not click on any links.

TCU Information Security Services Attachments Computer viruses and other malicious software are often spread through attachments. If a file attached to an contains a virus, it is often launched when you open (or double-click) the attachment. Dont open unexpected attachments.

TCU Information Security Services Backup Your Computer Be prepared for the worst by backing up critical data and keeping backups in a separate, secure location. Use supplemental hard drives, CDs/DVDs or flash drives Backup data, files, pictures

TCU Information Security Services Use Strong Passwords Strong passwords At least one alphabetic, one numeric and one special character At least 7 characters long Mixed case Not similar to other passwords or your name Not found in the dictionary Lets test some passwords:

TCU Information Security Services Wireless Security Change the administrator username and password on your wireless hardware. Use WPA2 encryption to secure communication between your computer and your wireless access point. Change the Default SSID (default name of the your wireless network – i.e., Linksys devices are normally linksys) Run setup wizard that comes with wireless router. Restrict which computers can access your network.

TCU Information Security Services Wireless Security continued OnGuard Online Wireless Video secuirty-yul-kwon.aspx

TCU Information Security Services Etcetera Supervise Children Teach computer security Use monitoring software Turn off computer when not using it Warning – if off for weeks it wont get updates. Force updates when you turn it back on. Use FireFox instead of Internet Explorer Turn on Master Password Beware of freeware or shareware – it may be spyware

TCU Information Security Services Etcetera (continued) If you need to access the TCU network from home, use VPN with Remote Desktop (Windows) or Screensharing (Mac) When getting rid of an old computer, even if the hard drive is broken, drill holes through it. Beware of public computer access Wireless hotspots – not secure, dont require encryption. You may want to use TCU VPN. Kiosks or public computers – not secure, key logging software may be installed.

TCU Information Security Services Recap Critical Patches – keep everything up-to-date! Anti-virus, anti-spyware, firewall Recommendation – all inclusive internet security package security Watch for links in s and learn to spot non- legitimate web sites Use strong passwords Wireless security

TCU Information Security Services Resources TCU Computer Help Desk Location: Mary Couts Burnett Library, first floor Information Security Services