Internet Security and Your Computer Welcome to Boot Camp.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
The Internet = A World of Opportunities
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Teach a man (person) to Phish Recognizing scams, spams and other personal security attacks July 17 th, 2013 High Tea at IT, Summer, 2013.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
P.E.O. Salt Lake City Reciprocity Meeting Keeping Safe Using Technology April 8, 2010 Presented by Rebecca Conant (Y) P.E.O. Salt Lake City Reciprocity.
1 Computer Security: Protect your PC and Protect Yourself.
Quiz Review.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Alisha horsfield.  Computer virus is something that copies itself to computer software.  Virus can delete the hosts important documents which includes.
Security Issues: Phishing, Pharming, and Spam
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Security for Seniors SeniorNet Help Desk
© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Learning In A Techno World How Safe is Your Cyberspace?
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Securing Your Home Computer Securing Your Home Computer Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
 Physical protection and Simple measures  Passwords  Firewalls  Anti-Virus, Spyware and Malware  Web browsers   Patches  Wireless  Encryption.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
PROTECTION ON THE INTERNET NADIA SNOW VIRUS Is a file made to do harm or criminal activity there are many types: -worms -Trojan horse -Spyware How they.
Safer Online Shopping and Practices Presenter: Brian Moats Students Active In Leadership.
Viruses According to Microsoft.com, viruses are “small software programs...that interfere with computer operation” Harm data, spread to others through.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
What is Spam? d min.
Introduction to Desktop Security Protecting your computer and your data.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Introduction to Network Security. Acknowledgements.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
Return to the PC Security web page Lesson 4: Increasing Web Browser Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Windows Vista Configuration MCTS : Productivity Applications.
Windows Tutorial 5 Protecting Your Computer
What they are and how to protect against them
Unit 4 IT Security.
Home Computer Security
Protect Your Computer Against Harmful Attacks!
Minimizing Online Risks
Presentation transcript:

Internet Security and Your Computer Welcome to Boot Camp

OR How to surf the web safely Without becoming paranoid

Subjects We’ll cover viruses, worms, trojan horses, spyware virus scanners, firewalls, spyware blockers protection, browser protection home network security, wireless security keeping kids safe in “chat rooms”

The good, the bad and the ugly

The Ugly

Welcome to Internet Boot Camp Listen up recruits Internet security basic training is about to start!

Your computer is like your house Are you connected to the Internet without using a virus scanner a firewall and a spy-ware blocker? You might as well leave your front door open 24/7

Your computer is like your house Virus scanner Police officer

Your computer is like your house Virus scanner Firewall Police officer Door guard

Your computer is like your house Virus scanner Firewall Spy-ware blocker Police officer Door guard Security guard

Your computer is like your house Virus scanner Firewall Spy-ware blocker Browser settings Police officer Door guard Security guard Another guard

Your computer is like your house Virus scanner Firewall Spy-ware blocker Browser settings Virus/Worm/Trojan Police officer Door guard Security guard Another guard Criminals

Your computer is like your house Virus scanner Firewall Spy-ware blocker Browser settings Virus/Worm/Trojan Spy-ware Police officer Door guard Security guard Another guard Criminals Thief

Your computer is like your house Virus scanner Firewall Spy-ware blocker Browser settings Virus/Worm/Trojan Spy-ware Spam Police officer Door guard Security guard Another guard Criminals Thief Junk mail

Meet The Enemy virus

Meet The Enemy virus worm

Meet The Enemy virus worm trojan horse

Meet The Enemy virus worm trojan horse spam

Meet The Enemy virus worm trojan horse spam spy-ware

Meet the Allies Virus scanning software

Meet the Allies Virus scanning software Firewall hardware/software

Meet the Allies Virus scanning software Firewall hardware/software scanning software virus/spam

Meet the Allies Virus scanning software Firewall hardware/software scanning software virus/spam Spy-ware blocking software

Meet the Allies Virus scanning software Firewall hardware/software scanning software virus/spam Spy-ware blocking software Pop-up blocking software

Meet the Allies Virus scanning software Firewall hardware/software scanning software virus/spam Spy-ware blocking software Pop-up blocking software Operating system updates

Meet the Allies Virus scanning software Firewall hardware/software scanning software virus/spam Spy-ware blocking software Pop-up blocking software Operating system updates Browser security settings

friend or foe? Don’t let the enemy use your to launch their attacks

Securing

Use an virus scanner

Securing Use an virus scanner Block images in HTML messages

Securing Use an virus scanner Block images in HTML messages View messages in plain text / block HTML

Securing Use an virus scanner Block images in HTML messages View messages in plain text / block HTML Use spam blocking software or ISP blocking

Securing Use an virus scanner Block images in HTML messages View messages in plain text / block HTML Use spam blocking software or ISP blocking Set up spoof account(s)

Securing Use an virus scanner Block images in HTML messages View messages in plain text / block HTML Use spam blocking software or ISP blocking Set up spoof account(s) Update software regularly

Securing Never open attachments from “?” sender

Securing Never open attachments from “?” sender Never “unsubscribe” from spam

Securing Never open attachments from “?” sender Never “unsubscribe” from spam Never click on links in spam / junk mail

Securing Never open attachments from “?” sender Never “unsubscribe” from spam Never click on links in spam / junk mail Never give information reply to “?” mail

Securing Never open attachments from “?” sender Never “unsubscribe” from spam Never click on links in spam / junk mail Never give information reply to “?” mail Never give real address to websites

Securing Never open attachments from “?” sender Never “unsubscribe” from spam Never click on links in spam / junk mail Never give information reply to “?” mail Never give real address to websites Beware of “phishing”

Eliminating Spy-ware The enemy has spies everywhere “All spies will be shot on sight”

Eliminating Spy-ware Download and install AD-AWARE

Eliminating Spy-ware Download and install AD-AWARE Download and install Spybot Search & Destroy

Eliminating Spy-ware Download and install AD-AWARE Download and install Spybot Search & Destroy Always use a firewall that monitors incoming and outgoing internet traffic

Web Browser who’s in control The web browser. Your gateway to the internet and a hackers gateway to your computer Secure that browser soldier!

Securing the browser Always use a firewall incoming/outgoing

BROSDBAND DSL/CABLE

Securing the browser Always use a firewall incoming/outgoing XP must be on SP2

Securing the browser Always use a firewall incoming/outgoing XP must be on SP2 Security settings as high as you can tolerate

Securing the browser Always use a firewall incoming/outgoing XP must be on SP2 Security settings as high as you can tolerate IE must be latest version / updated regularly (windows update)

Securing the browser Always use a firewall incoming/outgoing XP must be on SP2 Security settings as high as you can tolerate IE must be latest version / updated regularly Disable Active-X controls

Never enable activeX to download a file. You don’t need it to download files. This is a trick to get you to enable activeX

Home network security Let’s not be sharing information with the enemy

Securing a home network Always use a firewall

Securing a home network Always use a firewall Never share the OS hard drive

Securing a home network Always use a firewall Never share the OS hard drive Don’t share drives / share folders

Securing a home network Always use a firewall Never share the OS hard drive Don’t share drives / share folders Enable encryption on wireless (WEP)

Securing a home network Always use a firewall Never share the OS hard drive Don’t share drives / share folders Enable encryption on wireless (WEP) Hide SSID on wireless

Securing a home network Always use a firewall Never share the OS hard drive Don’t share drives / share folders Enable encryption on wireless (WEP) Hide SSID on wireless Change passwords on routers and modems

The 10 security commandments Thou shalt use and regularly update an anti- virus program Thou shalt use a firewall program Thou shalt run Windows Update regularly Thou shalt not open attachments Thou shalt not share hard drives

The 10 security commandments Thou shalt not give out personal information to non-trusted sites Thou shalt use an scanning program Thou shalt use a spy-ware blocking program Thou shalt use encryption on wireless networks Thou shalt use common sense

Chat room security Education is the answer

Chat Room Security Never share any personal information

Chat Room Security Never share any personal information Never give out address

Chat Room Security Never share any personal information Never give out address Never plan to meet anyone

Chat Room Security Never share any personal information Never give out address Never plan to meet anyone Never go to a web page from chat room

Chat Room Security Never share any personal information Never give out address Never plan to meet anyone Never go to a web page from chat room Never trust anyone on-line

Chat Room Security Never share any personal information Never give out address Never plan to meet anyone Never go to a web page from chat room Never trust anyone on-line Always use a spoof identity

Chat Room Security Never share any personal information Never give out address Never plan to meet anyone Never go to a web page from chat room Never trust anyone on-line Always use a spoof identity Chat room security could be life & death

Happy Surfing Congratulations! You’ve graduated from Security Boot Camp