In the old days... You Your computer. Then came... The Network.

Slides:



Advertisements
Similar presentations
Keep Your PC Safe (Windows 7, Vista or XP) Nora Lucke 02/05/2012 Documents - security.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Thank you to IT Training at Indiana University Computer Malware.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Welcome Overview of this Session Introduction The Migration –Active Directory (replacing Novell) – & Calendar – from iPlanet to Outlook –Network.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
James Tam Computer Security Concepts covered Malicious computer programs Malicious computer use Security measures.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
Protecting Yourself Online. VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One in every 200 containing.
Computer Viruses. Where the name came from This is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
evidence. Safety To stay safe on the internet there are many points you need to follow. The first point is to change your password regularly, you.
Internet Security In the 21st Century Presented by Daniel Mills.
Working From Your Home Computer Safely: The Ten Commandments Stephen Jones, GSEC, A+ With special thanks to Balakrishnan Ramachandran.
Internet safety By Lydia Snowden.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Protect Your Computer from Viruses and Other Threats! 1. Use antivirus software. 2. Run Windows updates. 3. Use a strong password. 4. Only install reputable.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Protecting Your Computer & Your Information
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
IT security By Tilly Gerlack.
Securing Your Home Computer Securing Your Home Computer Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Installing SIGNZ on a stand- alone machine. These slides will guide you through the installation of the SIGNZ ‘server’ and ‘client’ components on one machine.
By Alexander smart. What is a viruses ? A Computer Virus is a software program that is designed to copy itself over and over again. Viruses do NOT damage.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 5 1 Downloading and Storing Data Using FTP and Other Services to Transfer and.
Etiquette – a list of rules that we observe Phishing - sending an to a user falsely claiming to be a legitimate company to scam the user into providing.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Viruses Hacking Backups Computer safety... Viruses A computer virus is a piece of program code that makes copies of itself by attaching itself to another.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
XP Practical PC, 3e Chapter 6 1 Protecting Your Files.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Small Business Security Keith Slagle April 24, 2007.
Keeping Your Computer Safe and Running Efficiently.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
A Computer Virus is a software program that is designed to copy itself over and over again and to attach itself to other programs. They don’t affect hardware,
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Home Computer Security Sponsored by NASA HQ ITCD Special Projects Training Presented by your Computer Training Center.
Any criminal action perpetrated primarily through the use of a computer.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Computer Security Sample security policy Dr Alexei Vernitski.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
Staff Induction Log On Credentials & Security Resources Web Applications / Software LanSchool Projectors / Cameras / Printing Laptops / WiFi.
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
Virus Removal Support Services. H OW TO K EEP Y OUR C OMPUTER F REE F ROM V IRUS T HREAT ? Virus can attack your PC any time without any.
ITS220 – How To Prevent Your PC From Infected by Virus presented by Desmond Ho.
Common Methods Used to Commit Computer Crimes
Unit 4 IT Security.
Unit 4 IT Security.
Home Computer Security
Unit 4 IT Security.
Things To Avoid: 1-Never your password to anyone.
Unit 4 IT Security Kerris Davies.
What are Computers? C Use this tutorial alongside the numbers coded in your workbook and answer the related questions in each section.
Presentation transcript:

In the old days... You Your computer

Then came... The Network

Then came... The worldwide, really fast network

Then came...

Oh My!!!

Computer Self-Defense Deb Coates/Floyd Davenport ISU Extension IT February 10, 2005

What we’re going to talk about Basic protections Updates Spam, Viruses and other bad things Backups Social engineering Cleaning your computer Other things

Also... Everything we talk about will affect how well your computer operates Many things go on behind the scenes to protect your computer However...

You need to be Aware Alert Cautious Protective

Be Your Own Rottweiler No One Loves Your Data Like You Do

Basic Protections Use Strong Passwords Don’t be an administrator Know where you are

Basic Protections Use Strong passwords –Uppercase, lowercase, numbers –Don’t use dictionary words –Change your password regularly –Passphrases –More than 15 characters –Shhh, Don’t tell anyone

JJ!x317 1nCrED!ble 1 love THE king 0f ducks! in MontreAL Strong Passwords GoodNot Good Bob Mykids happy2

Basic Protections Don’t be an administrator –‘Least Privilege’ principle –Think before you act –Loaded gun with no safety

Basic Protections Know where you are –Does the web site use SSL encryption? –Check Security & Privacy information –Who are you sending that information to? –Ask questions

Updates Windows XP –Automatic Windows Updates –Regular Software updates (MCA) Hardware –University support standards –Reliability

Updates: What we do for you Bulk licensing –MCA (MS Office, Windows) –McAfee VirusScan Group purchases –Hardware –Filemaker

Spam and Viruses and Spyware 10 out of 14 messages are Spam 1 in 50 messages contains a virus At least 20% of all computers someone bothered to scan have some form of spyware on them Stats from and

Spam: What is it? Unsolicited commercial

Spam: What we do for you Perl MX filtering at the mail server Greylisting Domain and banning (can’t send mail to...)

Spam: What you can do Filter your Be careful who you give your to Throw it out

Viruses: What are they? Programs created specifically to infect computers and replicate itself Some viruses will damage data and programs Others ‘only’ replicate themselves, but use computer processing and network bandwidth to do it.

Viruses: What we do for you Bulk Licensing for Virus software Virus Scanning at the mail server Automatic updates Blocking infected computers

Viruses: What you can do Use Virus software Keep it up to date Make sure it’s turned on Don’t open attachments –Unless you’re expecting them –Unless you know who they’re from –We really mean it...

Spyware: What is it? Software that tracks what you do and reports it to others Spyware can come as part of a free software download Spyware will sometimes say--do you want me to install this now?

Spyware: What we do for you Warnings Spybot on Scout Spybot and Adware available for no charge

Spyware: What you can do Read the fine print Know what you’re clicking on Don’t click on banner ads

Backups Bad things will happen--What can you afford to lose? Back up early and often Consider the reliability and security of your backups When your computer leaves your hands it should be backed up It’s your data, no one loves it like you do

Backups: Today Use removable media (CDs, DVDs) Back up and My Documents regularly Back up pictures and presentations when you add, update, change them If you don’t have a CD/DVD burner on your computer, see ‘Updates’

Backups: Coming Soon Two tier solution –Enterprise file server File storage Regular central backups Version tracking –Office/Individual External hard drives

Social engineering The people side of security Or, I bet I can get you to give me your password

Social engineering Be smart If it looks too good to be true, it probably is When in doubt, check it out –Contact EIT –Go to the webpage directly –Find and store the contacts for important places yourself

When Computers Go Away When you are permanently separated from a computer –Computer replacement –Job change Save appropriate data, then wipe everything Ask that your account be removed immediately and change your password

Other things Physical access bypasses security Firewalls can limit exposure Virtual Private Networks (VPNs) protect roaming users Belong to the IASTATE domain –Remote assistance –Admin password reset –Group security policies

In conclusion Take basic precautions Stay up to date Don’t open attachments Back up your data Think who and why A little paranoia is healthy

What stands between your computer and total systems meltdown? You

Be Your Own Rottweiler