Presentation is loading. Please wait.

Presentation is loading. Please wait.

Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.

Similar presentations


Presentation on theme: "Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers."— Presentation transcript:

1 Nathan J. Gibson, CISSP-CISM-CCNA-MCSA

2 Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers

3 Personal Data Identity Theft Bank Account Information Hard Drive Space Pornography Storage Hide stolen information Distribute copyrighted material CPU cycles Cracking code Writing Software Robot Computer Attack other sites Profit from large BotNet

4 E-mail Greeting Cards Chain Letters Hoax WebPages Phishing Blogs CDs, Jump Drives, Floppy Disk Instant Messengers PDAs

5 Fake Greeting Cards Appear to come from a friend Links in e-mail point to malicious sites Automatically Downloads malicious files Chain Letters Bill Gates is tracking this e-mail Religious Emails Sue needs your help emails Forward to Everyone you Know!!!!

6

7 Hoax E-mails Diplomat Husband died and left me $100 Million $198.4 Million Lost in 2006 alone Date Line To catch an ID Thief http://www.msnbc.msn.com/id/17805134/ Investment E-mails Hoax Virus Alert E-mails Good Times Virus

8 Teenagers like to make friends Messenger Skilled in extracting information Blogs To much sensitive information MySpace - 500 people tested 80% release sensitive information Pictures reveal a lot of information and motivate attackers

9 AntiVirus AntiSpyware Firewalls Updates Safe Browsing Habits Common Sense and Knowledge Rules

10 Antivirus Free protection is available McAfee: http://it.ouhsc.edu/services/desktopmgmnt/antivirussoftware.asp AVG : http://free.grisoft.com/ Install Scan Immediately Configure Daily Automatic Updates At least Weekly Scans

11 Anti Spyware Again Free Protection for all Spybot S & D : http://www.safer-networking.org/en/download/index.html Configure Automatic Updates At least Weekly Scans

12 Firewall Windows XP SP2 comes with a built in Firewall Turn on/Configure Dont Ignore Warnings Periodically Check Exceptions

13

14

15

16

17

18 Updates Configure to Automatically Update and Install Check Software vendor sites for updates periodically Dont postpone/ignore computer notifications.

19

20

21

22 Safe Browsing Habits Active X Set Internet Explorer Settings Think before clicking Yes Java Prompts Certificates Dont except certificates from people you dont trust SSL/Https Internet Explorer Phishing Tools

23

24 Okay! Okay! I understand not to click on everything. But my computer doesnt give me that prompt. Configure your security level

25

26

27

28

29 Certificates – SSL – HTTPS Secure & Confidential Internet Requires a degree of Trust What is Phishing? www.bankofthewest.com vs. www.bankofthevvest.com How can I be sure the site I am browsing is legit?

30 DOES THIS PROVE MY IDENTITY?

31 STATE LICENSE HERE -- This really proves my Identity

32

33

34

35

36 Your in Luck, Built in Phishing Help!

37

38

39 Search Engine & Website Information McAfee Site Advisor - Free Malicious Downloads Spam e-mail Site Phishing Sites Links to other known bad sites http://www.siteadvisor.com/download/ie.html

40

41 Common Sense and Knowledge If it is too good to be true….. Research e-mails and websites www.snopes.com http://hoaxbusters.ciac.org/ Advise Family Members Block them if you have to Criminal Act???? Mail Fraud(18 USC S1341)

42 How to keep your kids safe on the internet 1. Parenting Communicating 2. Technology Enforcing and Monitoring

43 Step 1: Establish a contract Times that are allowed Activities that are allowed Punishment for rule violation Computer should be in an open space and not in their room

44 Step 2: Separate user accounts for you and your kids You should have more rights than them to restrict and monitor their activity Each child should have their own account and password Trace unauthorized activity to a specific person

45

46

47

48

49

50

51

52 Step 3: Controlling Internet Activity There are bad sites on the internet Some legit and education sites can be flagged because of certain content

53

54

55

56

57

58

59

60

61 Uninstall Chat programs you dont want them to use Create an e-mail with your ISP for them You can monitor and view e-mail Block other e-mail sites(e.g. hotmail, yahoo, etc.) Key Loggers Messengers E-mail Blogs Browser History Programs

62 Configure your modems/routers to disable internet activity during certain hours Consult your ISP Technical support; they will gladly help you

63 QUESTIONS/COMMENTS


Download ppt "Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers."

Similar presentations


Ads by Google