Windows Security Larry MacPhee Why Security Matters Public nuisance Loss of productivity –The cost of spam!The cost of spam! Loss of data.

Slides:



Advertisements
Similar presentations
Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Advertisements

How to Keep Your PC Running Like New Bryan Nowak.
SECURITY CHECK Protecting Your System and Yourself Source:
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
Computer Viruses.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
Don’t Lose Your Identity – Protect Yourself from Spyware Dan Frommer Sherry Minton.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
What is spyware? Supervisor dr. lo’ay tawalbeh Search By Mahmoud al-ashram Soufyan al-qblawe.
Annual Safety & Security Briefing - 9/22/04 Teresa Downey – SLAC Computer Security Group & SCS Applications Group.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
Chapter 10 Periodic Maintenance. Synopsis Daily Tasks Weekly Tasks Monthly Tasks What to do every year.
Use computer and internet safely Dave Dai Computer security Malware Virus: a program that copies itself and infect a computer without permission.
COMPUTER BACKUP A disaster will happen to you one day…an accidentally deleted file, a new program that caused problems or a virus that wreaked havoc, wiping.
Security. Physical security Protection from fire/water Protection from dust and extremes of temperature.
GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.
1 Computer Security: Protect your PC and Protect Yourself.
September 2007 General Security Basics Your Responsibilities for Safe Computing.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Protecting Yourself Antivirus Programs By: Stephanie Shaughnessy.
How to maintain your computer
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Protect Your Computer from Viruses and Other Threats! 1. Use antivirus software. 2. Run Windows updates. 3. Use a strong password. 4. Only install reputable.
Over 3,000 computers are affected monthly by Malware and Phishing.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
With Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation to Accompany GO! with Microsoft ® Windows 7.
© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.
Security 101 Harper P. Johnson Information Technology Services Director of Information Security.
the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.
Learning In A Techno World How Safe is Your Cyberspace?
1 Spyware, Adware, and Browser Hijacking. ECE Agenda What is Spyware? What is Adware? What is Browser Hijacking? Security concerns and risks Prevention,
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
IT security By Tilly Gerlack.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
Cyber Security… Compiled by J. Camp Benfer Elementary Klein ISD March 2009 …or How to Keep Your Computer & Your Personal Information Safer …or How to Keep.
PC Maintenance How to keep your computer healthy.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Computer Security By Rachel Gaines. Computers are used for work, play, and everything in between. So here’s how to keep it fun and protected.
Homework #2 John Bach IST 110 Section 031 JMB6824 9/15/2012.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
Malware & Phishing By: mackenzie olson. Internet fraudsters send out spam, pop-ups, appealing websites, and desirable downloads.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Computer Security By: Alex Metzler. Table of Contents Protecting Your Personal Info Know Who You’re Dealing With Use Updated Security Software Update.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
By: Austin Kellogg. What’s the difference Phishing Scam where frauds send pop-up messages to lure personal information.
W elcome to our Presentation. Presentation Topic Virus.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
COMPUTER VIRUSES By James Robins. THE IMPACT OF VIRUSES By James 2.
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Computer Security Keeping you and your computer safe in the digital world.
Protect Your Computer Against Harmful Attacks!
Things To Avoid: 1-Never your password to anyone.
Presentation transcript:

Windows Security Larry MacPhee

Why Security Matters Public nuisance Loss of productivity –The cost of spam!The cost of spam! Loss of data Identity theft Credit card fraud Erosion of trust

Focus on Prevention Prevention is easy – 6 steps Cure is hard

1. Use an Anti-Virus tool 50,000+ Windows Viruses New viruses up 400% from last year Download SophosDownload Sophos Anti-Virus from ITS

a. Keep your virus definitions up to date b. Scan while you sleep c. Automate the process

2. Guard Against Spyware NAU recommends SpybotSpybot

Find and remove

3. Filter Spam Manage your NAU

Customize your filters No more Viagra!

4. Beware the phish hook

Something phishy? Urgent requires your immediate action Plays on fear of compromised security Usually doesn’t refer to you by name Asks you to confirm your identity Asks you to enter your password Message may contain typos May use a suspicious URL More reading

5. Apply Security Updates a. Start/Windows Update b. Choose Express Install c. Install Priority Updates Note: NAU pushes out security updates to campus machines

Express Install Bypass non-critical updates

Automatic Updates a. Start/Control Panel b. System c. System Properties d. Automatic Updates

6. Browse Securely Look for the lock symbol and Use the VPN for wireless transactionsVPN Use hard to guess passwords Change passwords frequently Read your credit card statements Don’t approve save of credit card info

Why so vulnerable? 90% of computers run Windows Many dislike Microsoft and Bill Gates Windows is not very secure MS is slow to patch security holes Hard to regulate and enforce Lots of novices online

Is my computer compromised? Slower than normal performance System crashes Pop-up ads Home page has changed Browser crashes Possibly no symptoms!

Be afraid! You might be a zombie! You might have a keystroke logger You might be a DDOS pawn You might be a notorious spammer!

Remedies Disconnect from the network (temporarily) Boot up from a System Restore CD Run anti-virus software Run anti-spyware software Run disk, hardware check utilities Wipe the drive and reinstall everything! Get a Mac? Learn Linux?

Coming Soon! Microsoft Free Computing Environments (MFCE) Costs and Benefits The Open Source Movement Macintosh Linux Open Office

Acknowledgements Stephanie McCarthy - Graphics “Big Dave” Dennehey - Technical Consulting