Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Computer & internet Security
1. COMPUTER & INTERNET
SECURITY
A LOOK INTO COMMON PRACTICES OF:
• SECURING YOUR PERSONAL COMPUTER FROM KNOWN THREATS
• SAFELY NAVIGATING AND USING THE INTERNET
• SECURING YOUR ONLINE ACCOUNTS
2. OVERVIEW
WHAT WE WILL COVER
1. Some Terminology
2. Computer Security
i. Type of threats
ii. Security measures
3. Break
4. Internet Security
i. Browser security
ii. Web browsing
iii. Online accounts
SPEAKER: GERARD LAMUSSE
3. !OVERVIEW
WHAT WE WON’T COVER
• Enterprise security
• Server security
• Active cyber security
• Kitchen security
SPEAKER: GERARD LAMUSSE
5. TERMINOLOGY
CONTINUED
COMPUTER SECURITY
• Computer Security means
protecting our computer system
and the information they contain
against unwanted access,
damage, destruction or
modification
SECURITY TYPES
• Hardware security
• Software security
• Anti-virus
• Firewall
• Network security
SPEAKER: GERARD LAMUSSE
6. TERMINOLOGY
CONTINUED
HACKER
• A person who accesses a
computer or network illegally.
• Various types
• Black
• Grey
• White
CRACKER
• A person who accesses a
computer or network illegally but
has the intent of destroying
data, stealing information, or
other malicious action.
SPEAKER: GERARD LAMUSSE
7. TERMINOLOGY
CONTINUED
SCRIPT KIDDIE
• Often are teenagers that use
prewritten hacking and cracking
programs to break into
computers
• Same intent as a cracker
VIRUS
• Can replicate itself and spread
from one computer to another.
• Does damage by altering
programs or the operating
system itself.
SPEAKER: GERARD LAMUSSE
8. TERMINOLOGY
CONTINUED
WORM
• Spreads itself over a network
and other means.
• Replicates on host invisibly
• Aim: To use up available
memory and system resources.
KEY LOGGING
• The action of recording keys
struck on a keyboard.
• User unaware of this types
password and account details
• Information sent via malware.
SPEAKER: GERARD LAMUSSE
9. TERMINOLOGY
CONTINUED
MALWARE
• Malicious software
• Gather sensitive information
• Gain access to private computer
systems.
TROJAN
• Form of malware
• A program claiming to rid your
computer of viruses but instead
introduces viruses, to your
computer
SPEAKER: GERARD LAMUSSE
10. TERMINOLOGY
CONTINUED
SPYWARE
• Similar to Trojan horse.
• Co-exists with other software
• Records actions performed by
user and relaying this
information to its author
ADWARE
• Legitmate alternative offered to
consumers who do not wish to pay
for software
• Displays adverts within program
• Tracks browsing habits to serve
related advertisements
• Has a bad reputation as a result of
spyware.SPEAKER: GERARD LAMUSSE
11. TERMINOLOGY
CONTINUED
PHISHING
• The fraudulent practice of
sending e-mails purporting to be
from legitimate companies in
order to induce individuals to
reveal personal information.
QUARANTINE
• To move an undesired file such
as a virus-infected file or
spyware to an encrypted folder.
SPEAKER: GERARD LAMUSSE
14. COMPUTER SECURITY
SECURITY MEASURES
SPEAKER: GERARD LAMUSSE
4 Main types of security measure
1. Data Backup
2. Antivirus
3. Anti-spyware
4. Firewall
MALICIOUS CODE
1. Rip data to DVDs
• Cheap, but takes time.
2. External secondary storage
• Cheaper per Gigabyte
• 2x 500Gb from R700
3. Upload and store to Cloud Storage
• Always available, monthly/yearly costs
• www.drive.google.com
• www.justcload.com
• www.mypcbackup.com
15. COMPUTER SECURITY
SECURITY MEASURES
SPEAKER: GERARD LAMUSSE
4 Main types of security measure
1. Data Backup
2. Antivirus
3. Anti-spyware
4. Firewall
MALICIOUS CODE
A utility program that we use to protect a computer against
viruses by identifying and removing computer viruses found
in the computer memory, computer storage and on incoming
e-mail files.
Microsoft Security Essentials
For windows 7 & earlier or
Windows Defender
For Windows 8
AVAST FREE for mac
16. COMPUTER SECURITY
SECURITY MEASURES
SPEAKER: GERARD LAMUSSE
4 Main types of security measure
1. Data Backup
2. Antivirus
3. Anti-spyware
4. Firewall
MALICIOUS CODE
WHY?
Not all anti-virus will prevent installation of spyware!
Much more common today than viruses.
Recommended
Malwarebytes Anti-Malware
17. COMPUTER SECURITY
SECURITY MEASURES
SPEAKER: GERARD LAMUSSE
4 Main types of security measure
1. Data Backup
2. Antivirus
3. Anti-spyware
4. Firewall
MALICIOUS CODE
Two types, hardware and software firewalls.
Your router functions as a hardware firewall, while Windows
includes a software firewall.
How it works?
18. COMPUTER SECURITY
SECURITY MEASURES
SPEAKER: GERARD LAMUSSE
Problems and solutions:
1. Children
2. Thieves
HUMANS
Applies to teens as well.
Problems they pose:
• Accidental data deletion
• Corrupt system files
• Installation of spyware or viruses
• Accidental natural disaster
Preventing or Safe guarding against children threats:
• Backup data
• Save your data before…
• Set up limited user accounts
• Set up parental controls
RECOMMENDATION:
K9 Web Protection
19. SECURING AND SETTING UP USER
ACCOUNTS
SPEAKER: GERARD LAMUSSE
Figure 1.
Windows 7 Control Panel
20. SECURING AND SETTING UP USER
ACCOUNTS
SPEAKER: GERARD LAMUSSE
Figure 2.
Manage Accounts screen
in Windows 7
21. SECURING AND SETTING UP USER
ACCOUNTS
SPEAKER: GERARD LAMUSSE
Figure 3.
Create New Account screen
22. SECURING AND SETTING UP USER
ACCOUNTS
SPEAKER: GERARD LAMUSSE
Figure 4.
New user has been created
23. COMPUTER SECURITY
SECURITY MEASURES
SPEAKER: GERARD LAMUSSE
Problems and solutions:
1. Children
2. Thieves
HUMANS
Applies to teens as well.
Problems they pose:
• Accidental data deletion
• Corrupt system files
• Installation of spyware or viruses
• Accidental natural disaster
Preventing or Safe guarding against children threats:
• Backup data
• Set up limited user accounts
• Set up parental controls
RECOMMENDATION:
K9 Web Protection
24. COMPUTER SECURITY
SECURITY MEASURES
SPEAKER: GERARD LAMUSSE
Problems and solutions:
1. Children
2. Thieves
HUMANS
Threat:
• Loss of data
• Stolen computer and other valuables
• Damage to property
Solutions???
• If they want to get in they will find a way
• Backup your data!!!
• Lockup and password secure your accounts.
RECOMMENDATION:
K9 Home Protection
28. INTERNET SECURITY
GOOD PASSWORDS
SPEAKER: GERARD LAMUSSE
What makes a password a strong password
i. Is at least eight characters long.
ii. Does not contain your user name, real name, or company name.
iii. Does not contain a complete word.
iv. Is significantly different from previous passwords.
v. Contains characters from each of the following four categories:
29. INTERNET SECURITY
GOOD PASSWORDS
SPEAKER: GERARD LAMUSSE
Character category Examples
Uppercase letters A, B, C
Lowercase letters a, b, c
Numbers 0, 1, 2, 3, 4, 5, 6, 7, 8, 9
Symbols found on the
keyboard and spaces
` ~ ! @ # $ % ^ & * ( ) _ - + = { } [
] | : ; " ' < > , . ? /
30. INTERNET SECURITY
BAD PASSWORDS
SPEAKER: GERARD LAMUSSE
What makes a password a bad password
i. Dictionary words.
ii. Names, surnames, contact details, registration numbers
iii. Not long enough
iv. Simply contains simple ‘!’ ‘1’ ‘?’ ‘01’ at the end
31. INTERNET SECURITY
PASSWORD OVERVIEW
SPEAKER: GERARD LAMUSSE
• Create an acronym from an easy-to-remember piece of information.
For example, pick a phrase that is meaningful to you, such as My
son's birthday is 12 December, 2004. Using that phrase as your guide,
you might use Msbi12/Dec,4 for your password.
32. INTERNET SECURITY
PASSWORD OVERVIEW
SPEAKER: GERARD LAMUSSE
• Substitute numbers, symbols, and misspellings for letters or words in
an easy-to-remember phrase. For example, My son's birthday is 12
December, 2004 could become Mi$un's Brthd8iz 12124 (it's OK to use
spaces in your password).
• Relate your password to a favourite hobby or sport. For example, ‘I
love to play badminton’ could become ILuv2PlayB@dm1nt()n.
33. INTERNET SECURITY
PASSWORD OVERVIEW
SPEAKER: GERARD LAMUSSE
Highly Recommended
• Use secure, unique passwords for every Internet site or service is one
of the best security practices out there.
• Use a single master password for storage of all passwords, then
never user it again!
• LastPass
• How secure is your password? Try
Just to be aware of the two.Hacker types: Not in todays scope.
VIRUSNeeds you to actually do something before it infects your computer. This action could be opening an email attachment or going to a particular web page.
Worms - Worms propagate without user intervention. Once the victim computer has been infected the worm will attempt to find and infect other computers.
MALWARE:Can seem like a normal program but used or programmed by attackers to disrupt computer operation.Trojan horses - A Trojan horse program is software that claims to be one thing while in fact doing something different behind the scenes. victims computer.Used a lot by script kiddies, to hack and play around with a
Spyware:they have the capability to monitor your keystrokes, scan files on the hard drive, snoop other applications, such as chat programs or word processors, install other spyware programs, read cookiesSymptoms: If you notice any changes to your Web browser that you did not make such as extra toolbars or different homepage settings, as well as changes to your security settings and favourites list, you could have spyware running on your system. Other signs of a spyware infection include pop-up ads which aren't related to a Web site you're viewing; usually spyware advertisements are adult content in nature and are not displayed in the same fashion as legitimate ads you would normally see on your favourite Web sites. You may also see advertisements when you're not browsing the Web.Adware- When you stop running the software, the ads should disappear. This allows consumers to try the software before they buy and you always have the option of disabling the ads by purchasing a registration key.
Phishing:The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site, however, is bogus and set up only to steal the user’s information.Quarantine simply keeps the detected object in a safe location and is usually encrypted so other malware apps won't detect it. Always quarantine before deleting. You don't want to delete an important system file or delete something that your AV is erroneously flagging as malicious.
Computer Security means protecting our computer system and the information they contain against unwanted access, damage, destruction or modification
Malicious Code:The most likely of the three Consists of those threats which I have just mentioned, such as viruses and malware.Humans: Second most likely to threaten your computer. Theft Children / people playing around where they should not, such as system files and such. Could accidently delete Important files.Natural Threats: Include power surge, lightning, water damage, eg. floods
DVDs and CDsPro: They're cheap. CD-Rs and DVD-Rs are extremely inexpensive these days. Con: They're not always reliable. Despite the low cost, there's a big problem with optical media--they occasionally don't burn right. Buffer underruns and other problems mean that out of every batch of CD-Rs or DVD-Rs, occasionally one or two might be bad. If that's the disc that had your important files on it, your data backup is lost. |Slower to burn than copying to secondary storage.External hard drivesPro: Cheaper per Gigabyte. | Faster to read and write data | There are no ongoing costs eg. In relation to cloud storage | Much more reliable and secure than DVDs and cloud computing, because you have the responsibility over them.Cons: If they fail, and you don’t have redundant data backups, your data is lost! | You physically need the hard drive with you to make and retrieve backupsCloud StoragePro: Online backup is becoming very affordable | Access your files from anywhere | Share your files with friends and family | Online backup takes care of your file security | Your files are safeCons: Initial backup can be slow | You have ongoing costs | You have to trust - As you send your files to a relatively unknown third-party, you have to trust that they treat your files with care and utmost security. Once you send your files over, they still remain your control, but they are no longer only on your computer. Many providers do have the option to encrypt files locally, so that your files can only be seen by the owner of the encryption key – and that would be you.
Why Wouldn’t You Run an Antivirus?Some people believe that antivirus software is heavy and slows down your computer. This was certainly true in the past. Older Norton and McAfee antivirus software suites were infamous for slowing down your computer more than actual viruses would. They’re full of notifications and advertisementsto remind you of paying for the subscription and buy more expensive security suites, just as adware annoys you with requests to buy products.This isn’t true anymore. Computers have become so fast that antivirus software don’t weigh them down like they used to. There are also more efficient security suites that are much lighter on resources. The free Microsoft Security Essentials for Windows 7 or the included Windows Defender on Windows 8 are lightweight antivirus programs created by Microsoft. They don’t try to sell you anything at all. There’s no reason not to use them – unless you just want to brag online that you’re too smart for an antivirus.RECOMMEND - MACYou Should Still Be CarefulAn antivirus is only a single layer of security. No antivirus program is perfect, as all the antivirus tests show nothing catches all malware all of the time. if you don’t exercise caution, you may become infected by malware even if you’re using an antivirus Be careful about the files you download and run, keep your software updated, uninstall vulnerable software like Java, and more – but don’t drop your antivirus defences completely just because you’re being careful. Malware isn’t what it used to be – much of it is created by organized crime to capture financial information and other sensitive data. Antivirus software helps you stay ahead of the bad guys by a little bit more, and it’s worth using.If you own a mac AVAST
As mentioned earlier:Spyware is a type of malware that damages your computer system. Spyware is NOT a computer virus in the traditional sense, but is unwanted and harmful nonetheless. It works by getting into your computer system for the purpose of taking partial control over your use, or collecting personal information without your knowledge. It often ends up on your computer after downloading and installing free software so be very careful what software you download, and which websites you download from.Recommends
A firewall works as a barrier, or a shield, between your PC and cyber space. When you are connected to the Internet, you are constantly sending and receiving information in small units called packets. The firewall filters these packets to see if they meet certain criteria set by a series of rules, and thereafter blocks or allows the data. This way, hackers cannot get inside and steal information such as bank account numbers and passwords from you. How it works?2 images.
Children: WHY:Because they are in a learning phase, and need to be limited to what they do on a computer system. Children need to be able to explorer freely without worrying about breaking something.Result: Like I mentioned before children can accidently delete your presentation for work, or all his brother’s research done for an assignment!Safeguard: Save your data before… If accidental shutdown could mean loss of data busy working on.
Windows 7/vistaClick on the Start button. This is the small round button () in the lower left corner of your screen that has a Windows flag on it. Click on the Control Panel menu option. When the control panel opens you will see a screen similar to Figure 1 below.Click on the Add or remove user accounts control panel option as shown by the red arrow in figure 1. You will now be in the Manage Accounts control panel as shown in Figure 2 below.
Windows 7/vistaThis screen shows all the accounts currently on your computer. To create a new account, click on the Create a new account option as shown by the red arrow above. You will now be at the Create New Account screen.
Windows 7/vistaIn the New account name field enter the name of the new account that you would like to create. This could be a person's first name, full name, or whatever other designation you would like to give. You then need to decide which of the two types of accounts you would like to create. An Administrator account has full access to the computer and can make all changes, install software, and create and delete accounts. The other type of account is Standard user and has limited privileges as to what settings and changes it can make to the computer. It is suggested that for all users, you set them as a Standard User account and have one administrator account that you can logon to as needed. This will protect your computer from malware and other harmful activities.When you have finished selecting a name and the type of account you wish to setup, you should click on the Create Account button. Your new account will have been created and you will see it listed in the Manage Accounts screen.
Windows 7/vistaAs you can see our new user, named Test Account, has been created.Now when you start Windows 7 or Vista, you will see the additional account listed in the logon screen. That user can then select their login name and login into their profile so they can access their private data.
Children: WHY:Because they are in a learning phase, and need to be limited to what they do on a computer system. Children need to be able to explorer freely without worrying about breaking something.Result: Like I mentioned before children can accidently delete your presentation for work, or all his brother’s research done for an assignment!
Thiefs: Solutions:AS mentioned before, backup your data, and store the backups in a secure location, either using online backups, or secondary backup stored in a safe.
Internet Security:Is your browser giving your identity away. How reliable are the websites you browse Are your accounts secure.
Internet Security:Is your browser giving your identity away. How reliable are the websites you browse Are your accounts secure.
Help yourself remember your strong password by following these tips:Substitute numbers, symbols, and misspellings for letters or words in an easy-to-remember phrase. For example, My son's birthday is 12 December, 2004 could become Mi$un's Brthd8iz 12124 (it's OK to use spaces in your password).Relate your password to a favorite hobby or sport. For example, I love to play badminton could become ILuv2PlayB@dm1nt()n.
Help yourself remember your strong password by following these tips:
Cover: Browser historyJava applets.Paypal Facebook friends Bank accounts Spam
Cover: Browser historyJava applets.Paypal Facebook friends Bank accounts Spam