Securing Your Home Computer Securing Your Home Computer Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.

Slides:



Advertisements
Similar presentations
Computer Security: Best Practices for Home Computing Presented by Student Help Desk Merced Community College.
Advertisements

Internet Safety Topic 2 Malware This presentation by Tim Fraser Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other.
PC Security 101 Keeping your data and your computer safe.
SECURE YOUR COMPUTER or Lose It 1. Activate Anti-virus Software. 2. Firewall it. 3. Windows Service Pack 2 4. Fight Spyware 5. Update it, automate updates.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Configuring your Home Network Configuring your Home Network Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
Simple ways to secure Wireless Computers Jay Ferron, ADMT, CISM, CISSP, MCSE, MCSBA, MCT, NSA-IAM, TCI.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
An Introduction to Firewalls By: David Moss, NUIT Technology Support Services Vince Celindro, NUIT Telecommunications and Network Services Robert Vance,
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Configuring your Home Wireless Network Configuring your Home Wireless Network Adapted from Presentation at APCUG By Jay Ferron ADMT, CISM, CISSP, MCDBA,
Kamehameha Schools Kapalama High School Ke Ko’i Lipi 1 to 1 Laptop Learning Program Parent Presentation.
 Lesson 05: Computer Maintenance. Keep Software Up-To-Date Patches Security Holes Improves Software Stability Improves Software Performance Adds.
Security Advice Georgie Pepper Campsmount Acadamy.
Working From Your Home Computer Safely: The Ten Commandments Stephen Jones, GSEC, A+ With special thanks to Balakrishnan Ramachandran.
Choosing an Internet Service Providers (ISP) A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
Alisha horsfield.  Computer virus is something that copies itself to computer software.  Virus can delete the hosts important documents which includes.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Security for Seniors SeniorNet Help Desk
© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Simple Ways to Protect Yourself From Identity Theft Jay Ferron, CISM, CISSP, MCSE, MCDBA, MCT NSA-IAM TCI.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Learning In A Techno World How Safe is Your Cyberspace?
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Staying Safe Online Keep your Information Secure.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
The Internet for Beginners Section Four of Four From the Richard Sugden Library Spencer, MA Jillian M. Parsons.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
 Physical protection and Simple measures  Passwords  Firewalls  Anti-Virus, Spyware and Malware  Web browsers   Patches  Wireless  Encryption.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
Introduction to Firewalls TEC 236. What is a Firewall? A firewall is hardware, software, or a combination of both that is used to prevent unauthorized.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
Protecting Students on the School Computer Network Enfield High School.
Safer Online Shopping and Practices Presenter: Brian Moats Students Active In Leadership.
Computer Security By: Alex Metzler. Table of Contents Protecting Your Personal Info Know Who You’re Dealing With Use Updated Security Software Update.
Intro to Firewalls. A firewall is hardware, software, or a combination of both that is used to prevent unauthorized programs or Internet users from accessing.
Small Business Security Keith Slagle April 24, 2007.
Internet Security and Your Computer Welcome to Boot Camp.
Keeping Your Computer Safe and Running Efficiently.
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
Internet Safety Topic 2 Malware Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other dangerous software exists, such.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Windows Vista Configuration MCTS : Productivity Applications.
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
ITS220 – How To Prevent Your PC From Infected by Virus presented by Desmond Ho.
Unit 4 IT Security.
HARDENING CLIENT COMPUTERS
Home Computer Security
Lecture-16(B) Taking Protective Measures
Information Security Session November 11, 2004
Information Security Session October 24, 2005
Minimizing Online Risks
Presentation transcript:

Securing Your Home Computer Securing Your Home Computer Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM

Questions How many of you have more than one computer at home? How do you connect to the Internet (DSL, cable, dialup)? Do you have children at home and if so, what ages? Have you ever been hit by a virus? What are you using to read your ?

Agenda Backups Anti-virus protection and spam Patch management (for software) Cable modem, routers and firewalls Filtering Social engineering Questions

To Backup or Not to Backup? That Shouldn’t Even Be a Question! Do you backup your computer? Do you backup your data? How often? Two Good Reasons to Backup: Protect data from hardware and software failures Protect data from hardware and software failures Protect from outside threats – viruses etc… Protect from outside threats – viruses etc…

Anti-virus Anti-virus software protects you from bad things like viruses, worms and trojans. What software are you using? (Some computers come with anti-virus software) Norton Anti-Virus Norton Anti-Virus Norton Anti-Virus Norton Anti-Virus McAfee Anti-Virus McAfee Anti-Virus McAfee Anti-Virus McAfee Anti-Virus Panda (free sometimes) Panda (free sometimes) Panda (free) (free) Computer Associates with Firewall (free) Computer Associates with Firewall (free) Computer Associates with Firewall Computer Associates with Firewall

Is Your Anti-Virus Software Configured Properly? Anti-Virus software Update your software at least once a day Update your software at least once a day Update your subscription as required Update your subscription as required Does your virus protection software: Check your ? Check your ? Both incoming and outgoing? Both incoming and outgoing?

/ Spam

You’ve got mail! Are you safe or are you a target? Let’s explore some security issues….

Do not read with an attachment Do not read with an attachment unless you know it’s coming If not sure, call and ask the sender Use an anti-virus program to check both Use an anti-virus program to check both incoming and outgoing incoming and outgoing Watch out for HTML s Watch out for HTML s Do not use auto preview pane (next slide) Do not use auto preview pane (next slide)

Spam Do not reply back – “remove me from your list” Check what software you have on your computer – is it adding you to a spammer’s list with your permission? Create an address you will use for spam

Spam Removal Software Spam Killer - McAfee Spam Killer - McAfee Mail Washer – mailwasher.net Mail Washer – mailwasher.net (free) Mail Washer – mailwasher.net Outlook 2003 AOL and other ISPs offer spam blockers as a service

What to Patch and Why Update (patch) software that has bugs in it Operating systems (Windows) Operating systems (Windows) Browsers (Internet Explorer, Netscape) Browsers (Internet Explorer, Netscape) Applications (Word, Excel, etc.) Applications (Word, Excel, etc.)

Windows Update Service WindowsUpdate Windows: Critical Security Updates, Security Rollups, Service Packs Updates Desktops and Laptops with the Automatic Update Client This works for the operating system and browser only – to update Office you must go the Office update service

Cable Modems, Routers and Firewalls Firewalls They: Protect your home from the bad guys Keep your information private Make you less of a target By: Making them work harder to get your info Stopping viruses like Blaster Hiding your computer from the world

Routers and Firewalls Change the default password on your router Wireless users should: Enable WEP on router and wireless workstation Use MAC address filtering

Firewall Protection 1.Implement a hardware firewall (checks incoming traffic at the network before it gets to your computer) Default – Blocks on Incoming 2.Personal software firewall on your computer blocks outgoing (lets you know what is leaving your computer) 3.XP firewall only protects from external traffic not from your computer Firewall Home Network Internet

Software Firewalls for Home Use McAfee Firewall McAfee Firewall Symantec’s Norton Personal Firewall Symantec’s Norton Personal Firewall Zone AlarmZone Alarm (Free) Zone Alarm Computer Associates with Firewall (free) Computer Associates with Firewall (free) Blocking Pop-up - Use the Google Toolbar (Free) Google Toolbar Google Toolbar

What is My Child Doing ? Control Where Your Child Goes Net Nanny Net Nanny Cyber Sitter Cyber Sitter Cyber Patrol Cyber Patrol

Problems With Software Programs You Install Read the license Understand what it does Understand what it does Check for spyware Check for spyware Question programs like: Imesh Imesh Gator Gator Kazza Kazza Morphis Morphis

Spyware Spyware is software that reports where you go and what you do on your computer Software to test for and remove spyware Spy Cop Spy Cop Spy Cop Spy Cop Ad-Aware – Lavasoft – (Free) Ad-Aware – Lavasoft – (Free) Ad-Aware – Lavasoft Ad-Aware – Lavasoft

Weak Passwords Your computer password is the foundation of your computer security No Password = No Security No Password = No Security Old Passwords & Same Password = Little Security

Social Engineering Does not require technical knowledge Easier and faster Human nature is to help Don’t forget phone calls SPYWARE

Things to Remember About Social Engineering Do not give out information over the phone Never give your password to anyone The ‘good guys’ have their own password with system privileges that will allow them to work on your account

Sample Below is a sample of a fraudulent e- mail that's been sent to Citibank customers. It purports to be from Citibank, but it is not. Its intent is to get you to enter sensitive information about your account and to then use this information to commit fraud.

Think about the cost of: BackupAnti-virusRouter/Firewall Blocking/tracking programs like Net Nanny Versus The cost of doing nothing!

4 Things To Do Get a Hardware and Software Firewall Get Anti-Virus Software – Update Daily Patch ALL Your Software Think Before You Open

Questions