Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computer Security The wild west of the Internet. Discussion Topics Exploits Cyber Attacks Links Computer Maintenance Backups Passwords.

Similar presentations


Presentation on theme: "Computer Security The wild west of the Internet. Discussion Topics Exploits Cyber Attacks Links Computer Maintenance Backups Passwords."— Presentation transcript:

1 Computer Security The wild west of the Internet

2 Discussion Topics Exploits Cyber Attacks Links Computer Maintenance Backups Passwords

3 Exploits What are exploits? How many lines of code make up Win7? How many lines of code make up an app like Facebook? How many lines of code are in your new car? An IPhone has more computing power than NASP had for Apollo 11 Hackers study the code and look for ways to make it misbehave They use the coding error to take over your computer A black market exists where exploits are bought and sold A hacker can make good money creating and exploit and selling it.

4 Cyber Attacks Phishing Attacks send you an email link to a malicious web site. Clicking on the link allows them to execute a program on your computer. Worms and viruses are often contained in a document or application. Free applications will often also install malware. Who hasn’t received an email from Nigeria? The hackers main goal is to make money. There are numerous schemes they use to accomplish this. They try to steal critical identity information credit card numbers, social security and bank information or try gain control of your computer.

5 Cyber Attacks Public Wi-Fi spots will allow a hacker to see the stream of data to and from your computer. Hackers use social engineering. They may call you at home and tell you they are Microsoft or your computer manufacturer.

6 Cyber Attacks Ransomware can encrypt your entire hard drive and offer to sell you the decryption key for hundreds of dollars. Hackers want control of your computer. They install a root kit that to gain administrative privileges that allow them to do anything they want. You probably won’t even know they are there. They use your computer as part of a big network of slave computers (Botnets) they use to attack major web sites and demand ransom or simply disrupt them. What can you do about it????????

7 Links When you click on a link in an email or a web page, your computer sends a request for a web page to a web site some where in the world. The web page that returns can do many things. If you have Java Script enabled (and many of us do) the new web page can run a program that takes advantage of an unpatched exploit on your computer. The new page may contain ads, pop ups, and other links that can cause problems. This is but one example of a pop-up on your screen.

8 Links Never provide personal, account, or passwords to a page you do not trust. If you are using a sensitive site, such as a bank, brokerage, or shopping site, make sure your connection is a secure https:// connection. This is usually shown as a green bar or gold key in the address bar. Public Wi-Fi are usually not secure and it is never a good idea to use a sensitive site on a public hot spot without a Virtual Private Network (VPN) Try to use only trusted websites.

9 Windows updates (Patches) Select the automatic update mode. Keep the antivirus software up to date Windows has Windows Essentials A/V application It updates automatically and scans your computer. Commercial antivirus (A/V) are on a new computer Usually free for some period of time Some Internet service providers free A/V. Do not run more than one A/V, they don’t play well together PRC installs MS Defender. Computer Maintenance

10 Windows Update Settings

11 Computer Maintenance Check the updates on the applications you use! Applications may also need to be updated Apps have a “check for updates” selection in the menu Be careful when you install new applications Check that the application is compatible with your operating system Memory space and special equipment may be required Read the agreement carefully, often they will install software you don’t want and change your search engine in your browsers. If your computer is not behaving as you expect, re-boot it Peoples Resource repairs client computers.

12 Computer Backup Computers keep all of the code and data on a hard disk inside the computer. All hard disks (HD) will eventually fail. They just wear out or have a malfunction. Malware can also deny access or scramble the information on your hard disk. Once this happens there is often little that can be done to recover your precious pictures and documents unless you back your data up. The following are options to do this: External USB hard drive USB flash drive A backup service such as Carbonite Write critical data to a DVD It is a good idea to keep all data in the default folders such as My Documents

13 Passwords A user ID and password is used to gain access to your account on many sites. It is very important you make a practice of using a strong password. Here are some simple but effective strategies. Use a pass phrase. Something like “Stardust…60187” This password is long enough (16 char) to be strong and it contains upper and lower case, numbers and special characters. Make the number you will remember like an old zip code or phone number. Maybe Stardust is your favorite song. You will need to keep a list of your passwords. You can always write them down and keep them in your wallet. There are also password vaults such as KeyPass or password managers such as Last Pass.. Sensitive sites should have unique passwords Sites you don’t care about could reuse a simple password.

14 There is Hope! A lot of research is being done to improve security Biometrics are being improved so you may one day use a finger print or your face to log in. Second factor authentication is being used more on applications like banking Operating System security has already improved immensely and will continue to improve Companies are beginning to get serious about security of their web sites and servers. New methods (SQRL Gibson Research) are being developed to provide simply but secure log ins

15

16 Sneaky Install

17

18 RankPassword 1123456 2password 312345678 4qwerty 5abc123 6123456789 7111111 81234567 9iloveyou 10adobe123 11123123 12admin 131234567890 14letmein 15photoshop 161234 17monkey 18shadow 19sunshine 2012345 21password1 22princess 23azerty

19

20

21

22 Education Grant Pet Insurance Option Federal Student Loan Borrower Service TrackR Bravo Sasha Prosperity Life Insurance :insuranceQuotes...Auto: Joe Tirio AccountantsWorld News Chicago Tribune USAA Magazine

23

24

25 Advanced System Protector Browse for the Cause Browser Safeguard Buzz Search Bonanza Deals Search Protect Severe Weather Alerts My Search Dial, Deal Ply Internet Helper My PC Backup, AVG Toolbar My Search Deal Optimizer Pro PC Fix speed PC Health Kit RegClean Pro PC speed UP Software Update Sweet Patches Tidy Network Tube Dimmer Updater Web Ex Enhanced Scorpion Saver Save Sense Norton McAfee Removed From 1 Computer!

26 Home Networks

27

28

29


Download ppt "Computer Security The wild west of the Internet. Discussion Topics Exploits Cyber Attacks Links Computer Maintenance Backups Passwords."

Similar presentations


Ads by Google