SlideShare une entreprise Scribd logo
1  sur  22
Socastee SC Library
Computer Education
WhiteHouseComputing
Safe Computing
Visualization of the various
routes through a portion of
the Internet
Source:
WWW.Wikipedia.Com
http:WhiteHouseComputing.Blogspot.Com ”
Socastee SC Library
Computer Education
WhiteHouseComputing
Online SecurityOnline Security
Common Computer Security MythsCommon Computer Security Myths
 Myth: “Myth: “There is nothing important on my computer,There is nothing important on my computer,
so no attacker would want to access it”so no attacker would want to access it”
 Reality:Reality:
 ““Internet Background Radiation” – a techie termInternet Background Radiation” – a techie term
that refers to the constant stream of probes andthat refers to the constant stream of probes and
malicious traffic on the internet.malicious traffic on the internet.
 Probes are looking for any machine that can beProbes are looking for any machine that can be
“hijacked” to make money for their hijackers.“hijacked” to make money for their hijackers.
 Spam RobotsSpam Robots (spambot)(spambot)
 ZombiesZombies trained to attack web sites on demand (extortiontrained to attack web sites on demand (extortion
robots)robots)
Socastee SC Library
Computer Education
WhiteHouseComputing
Online SecurityOnline Security
Common Computer Security MythsCommon Computer Security Myths
 Myth:Myth: “The biggest security threats involve hackers“The biggest security threats involve hackers
who target individual computer users”.who target individual computer users”.
 Reality:Reality:
 Many probes are automated. Computers underMany probes are automated. Computers under
program control can probe other computers muchprogram control can probe other computers much
faster than computers under human control can.faster than computers under human control can.
Socastee SC Library
Computer Education
WhiteHouseComputing
Online SecurityOnline Security
Common Computer Security MythsCommon Computer Security Myths
 Myth:Myth: “Paying bills online increases the risk of identity“Paying bills online increases the risk of identity
theft”.theft”.
 Reality:Reality:
 Communication from the browser can be secure encryptedCommunication from the browser can be secure encrypted
 LOOK for the LOCKLOOK for the LOCK
 Either bottom right or just to the right of the addressEither bottom right or just to the right of the address
entry window depending on browser and browserentry window depending on browser and browser
versionversion

AND look forAND look for httpshttps instead ofinstead of httphttp in the addressin the address
 For example:For example: https://WWW.Chase.Comhttps://WWW.Chase.Com
 However – above assumes noHowever – above assumes no keylogerskeylogers onon
your machineyour machine
Socastee SC Library
Computer Education
WhiteHouseComputing
Online SecurityOnline Security
Types of ThreatsTypes of Threats
 AnnoyancesAnnoyances
 SpamSpam
 AdwareAdware
 DangerousDangerous
 SpywareSpyware
 VirusVirus
 PhishingPhishing
 ScarewareScareware
 EnablerEnabler
 TrojanTrojan
 BackdoorBackdoor
M
A
L
W
A
R
E
Socastee SC Library
Computer Education
WhiteHouseComputing
Online SecurityOnline Security
Types of Threats - AnnoyancesTypes of Threats - Annoyances
 Spam – AKA Unwanted, Unsolicited Junk EmailSpam – AKA Unwanted, Unsolicited Junk Email
 Clogs your email inboxClogs your email inbox
 Can be dangerousCan be dangerous
 Can lead you to dangerous websitesCan lead you to dangerous websites
 Example – sites that attempt to exploit unpatched bugs in yourExample – sites that attempt to exploit unpatched bugs in your
browser to insert “browser to insert “backdoorbackdoor” or other malware in your system” or other malware in your system
 Adware – Software that delivers targetedAdware – Software that delivers targeted
advertisements to your computeradvertisements to your computer
Socastee SC Library
Computer Education
WhiteHouseComputing
Online SecurityOnline Security
Types of Threats - DangerousTypes of Threats - Dangerous
 SpywareSpyware “is a type of malware that is installed“is a type of malware that is installed
surreptitiously on personal computers to collectsurreptitiously on personal computers to collect
information about users, their computer orinformation about users, their computer or
browsing habits without their informedbrowsing habits without their informed
consent.”consent.” Wikipedia. (Spyware)Wikipedia. (Spyware)
 Can simply record information about your browsingCan simply record information about your browsing
habits to guide Adware in delivering ads ORhabits to guide Adware in delivering ads OR
 Worst case: Keylogger – can record your keyboardWorst case: Keylogger – can record your keyboard
keystrokes and transmit them over the Internetkeystrokes and transmit them over the Internet
Socastee SC Library
Computer Education
WhiteHouseComputing
Online SecurityOnline Security
Types of Threats - DangerousTypes of Threats - Dangerous
 Virus “AVirus “A computer viruscomputer virus is a computer program thatis a computer program that
can copy itself and infect a computer without thecan copy itself and infect a computer without the
permission or knowledge of the owner.”permission or knowledge of the owner.” WikipediaWikipedia
 How is it spread?How is it spread?
 Email attachmentEmail attachment
 Visiting a malicious website with an unpatched buggy browserVisiting a malicious website with an unpatched buggy browser
 Infected files on any portable media (thumb drives, CDs, floppys, etc)Infected files on any portable media (thumb drives, CDs, floppys, etc)
 Over a network when file sharing is too broadly set upOver a network when file sharing is too broadly set up
Socastee SC Library
Computer Education
WhiteHouseComputing
Online SecurityOnline Security
Types of Threats - DangerousTypes of Threats - Dangerous
 Virus – How Can You Protect Yourself?Virus – How Can You Protect Yourself?
 Install an antivirus program on your computerInstall an antivirus program on your computer
 Two parts of an Antivirus program defenseTwo parts of an Antivirus program defense
 The program itselfThe program itself
 Understands basic look and feel of generic computer virusUnderstands basic look and feel of generic computer virus
 Can also read and understand specific descriptions ofCan also read and understand specific descriptions of
specific virus family and virusspecific virus family and virus
 Descriptions of specific virus and virus familiesDescriptions of specific virus and virus families
 New descriptions need to be downloaded to your computerNew descriptions need to be downloaded to your computer
on a continuing basis.on a continuing basis.
 In commercial software, there is an annual fee forIn commercial software, there is an annual fee for
subscription. When your subscription runs out, NEWsubscription. When your subscription runs out, NEW
descriptions stop being downloaded.descriptions stop being downloaded.
Socastee SC Library
Computer Education
WhiteHouseComputing
Online SecurityOnline Security
Types of Threats - DangerousTypes of Threats - Dangerous
 Virus – How CanVirus – How Can
You ProtectYou Protect
Yourself?Yourself?
 See handout forSee handout for
examples of goodexamples of good
antivirus software.antivirus software.
 For another source goFor another source go
toto WWW.PCMag.ComWWW.PCMag.Com
 Look past “sponsored links”Look past “sponsored links”
which are ads and click onwhich are ads and click on
appropriate articles.appropriate articles.
Select
Reviews here
Enter Antivirus in
the search box here
Socastee SC Library
Computer Education
WhiteHouseComputing
Online SecurityOnline Security
Types of Threats - DangerousTypes of Threats - Dangerous
 Phishing “is the criminally fraudulent process ofPhishing “is the criminally fraudulent process of
attempting to acquire sensitive information suchattempting to acquire sensitive information such
as usernames, passwords and credit card detailsas usernames, passwords and credit card details
by masquerading as a trustworthy entity in anby masquerading as a trustworthy entity in an
electronic communication.”electronic communication.” WikipediaWikipedia
 Fraudulent email scares you into clicking a link in theFraudulent email scares you into clicking a link in the
email taking you to a site that LOOKS like a realemail taking you to a site that LOOKS like a real
bank (for example) but is notbank (for example) but is not
 Fraud site asks for userid password account number etcFraud site asks for userid password account number etc
PhishingPhishing
Socastee SC Library
Computer Education
WhiteHouseComputing
Online SecurityOnline Security
Types of Threats - DangerousTypes of Threats - Dangerous
 Phishing – How to Avoid Being FooledPhishing – How to Avoid Being Fooled
 Avoid following links in emailsAvoid following links in emails
 If you do and the site wants info DO NOT GIVE ITIf you do and the site wants info DO NOT GIVE IT
 Banks, Brokerage Houses, etc WILL NOT ASKBanks, Brokerage Houses, etc WILL NOT ASK
YOU VIA EMAIL TO VERIFY INFORMATIONYOU VIA EMAIL TO VERIFY INFORMATION
 If they seem to be doing that IT IS A FRAUDIf they seem to be doing that IT IS A FRAUD
Socastee SC Library
Computer Education
WhiteHouseComputing
Online SecurityOnline Security
Types of Threats - DangerousTypes of Threats - Dangerous
 ScarewareScareware
 Spyware masquerading as antivirus softwareSpyware masquerading as antivirus software
 Message will pop up while using your browserMessage will pop up while using your browser
 Message will tell you have been infected and need to clickMessage will tell you have been infected and need to click
somewhere on it to download software to get rid of thesomewhere on it to download software to get rid of the
infectioninfection
 Could happen even on a legitimate site it the site has beenCould happen even on a legitimate site it the site has been
compromisedcompromised
 Do not click ANYWHERE on the messageDo not click ANYWHERE on the message
 Start Taskmanager and end browser applicationsStart Taskmanager and end browser applications
Socastee SC Library
Computer Education
WhiteHouseComputing
Online SecurityOnline Security
Types of Threats - DangerousTypes of Threats - Dangerous
 Learn to Recognize Scams of All KindsLearn to Recognize Scams of All Kinds
 Check the web address. type in the web address
exactly as it appears on your statement.
 Look for a https://
 a secure connection However, even scam sites can use
secure connections, so use this rule in conjunction with
the others.
 Check the spelling and grammar.
Socastee SC Library
Computer Education
WhiteHouseComputing
Online SecurityOnline Security
Types of Threats - DangerousTypes of Threats - Dangerous
Four RulesFour Rules
1. Run Windows Update – plug the holes that let the gunk in
For Virus and Spyware gunk that gets in anyway…
2. Install and run Anti Virus software – keep subscription current
3. Install and run AntiSpyware software–keep subscription current
4. Run a Firewall 1. Start
2. Control Panel
3. Security Center
4. Windows Firewall
5. On
Note – assumes you are not running
a different firewall already
Socastee SC Library
Computer Education
WhiteHouseComputing
Online SecurityOnline Security
FirewallsFirewalls
 Prevent unauthorized entry from outsidePrevent unauthorized entry from outside
 Can be hardwareCan be hardware
 Routers include a NAT firewall preventingRouters include a NAT firewall preventing
unauthorized entry from outside but not necessarilyunauthorized entry from outside but not necessarily
reporting or preventing rogue applications inside yourreporting or preventing rogue applications inside your
computer from communicating outboundcomputer from communicating outbound
 Can be software ( Windows firewall, ZoneAlarm)Can be software ( Windows firewall, ZoneAlarm)
 Software firewalls can/will prevent unauthorizedSoftware firewalls can/will prevent unauthorized
outbound communication toooutbound communication too
Socastee SC Library
Computer Education
WhiteHouseComputing
Online SecurityOnline Security
FirewallsFirewalls
 How Secure is Your Firewall?How Secure is Your Firewall?
 Major corporations have their firewalls intentionallyMajor corporations have their firewalls intentionally
probed periodically by a security service to test them.probed periodically by a security service to test them.
 You can do the same thing at the “Shields Up” siteYou can do the same thing at the “Shields Up” site
located at https://www.grc.com/x/ne.dll?bh0bkyd2located at https://www.grc.com/x/ne.dll?bh0bkyd2
 NOTENOTE the above site DOES NOT scan your machinethe above site DOES NOT scan your machine
for malware of any sort. It provides only a test of yourfor malware of any sort. It provides only a test of your
firewall (or lack thereof) and its ability to block intrusion.firewall (or lack thereof) and its ability to block intrusion.
Socastee SC Library
Computer Education
WhiteHouseComputing
Online SecurityOnline Security
FirewallsFirewalls
 LaptopsLaptops
 If you depend on the hardware firewall at home, you need toIf you depend on the hardware firewall at home, you need to
be sure you have a software firewall running on your laptop ifbe sure you have a software firewall running on your laptop if
you take it out of your house to connect from anotheryou take it out of your house to connect from another
location. If you have file and printer sharing turned on (tolocation. If you have file and printer sharing turned on (to
share files with other computers in you house) TURN ITshare files with other computers in you house) TURN IT
OFF before connecting to a public WiFi hotspot or someoneOFF before connecting to a public WiFi hotspot or someone
else’s hard wired LAN because you will beelse’s hard wired LAN because you will be behind their firewallbehind their firewall
sharingsharing youryour files withfiles with themthem
 ON WINDOWS 7: START – CONTROL PANEL - NETWORKON WINDOWS 7: START – CONTROL PANEL - NETWORK
& SHARING CENTER – ADVANCED SHARING – TURN OFF& SHARING CENTER – ADVANCED SHARING – TURN OFF
FILE AND PRINTER SHARINGFILE AND PRINTER SHARING
Socastee SC Library
Computer Education
WhiteHouseComputing
Online SecurityOnline Security
Information SourceInformation Source
 WWW.OnguardOnline.GovWWW.OnguardOnline.Gov
 ““a partnership between the FTC, other federala partnership between the FTC, other federal
agencies, and the technology industry -- offers tips toagencies, and the technology industry -- offers tips to
help you be on guard against Internet fraud, securehelp you be on guard against Internet fraud, secure
your computer, and protect your personalyour computer, and protect your personal
information. “information. “ Federal Trade Commission web siteFederal Trade Commission web site
Socastee SC Library
Computer Education
WhiteHouseComputing
Online SecurityOnline Security
BackupBackup
 Make partial backups practicalMake partial backups practical
 Keep your files organizedKeep your files organized
 Choose Backup MediumChoose Backup Medium
 CD – Holds Max 700 MbCD – Holds Max 700 Mb
 DVD – Holds Max 4.4 Gb single layer 7.9 GbDVD – Holds Max 4.4 Gb single layer 7.9 Gb
double layer. Only new higher end machines todaydouble layer. Only new higher end machines today
will burn double layerwill burn double layer
 External hard drive – holds 1Tb ++External hard drive – holds 1Tb ++
 IfIf CRITICALCRITICAL keep copy off sitekeep copy off site
Socastee SC Library
Computer Education
WhiteHouseComputing
The EndThe End
Socastee SC Library
Computer Education
WhiteHouseComputing
Developments to Watch:
Social Fortress ( WWW.SocialFortress.Com ) see
http://www.teten.com/blog/2012/09/13/social-fortress-publicly-launches-at-techcrunch-
disrupt/
See “Emerging Cyber Threats Report 2013” at http://gtsecuritysummit.com/report.html

Contenu connexe

Tendances

Password hacking
Password hackingPassword hacking
Password hackingAbhay pal
 
Scaling Web 2.0 Malware Infection
Scaling Web 2.0 Malware InfectionScaling Web 2.0 Malware Infection
Scaling Web 2.0 Malware InfectionWayne Huang
 
IT Security Seminar Cougar CPS
IT  Security  Seminar  Cougar  CPSIT  Security  Seminar  Cougar  CPS
IT Security Seminar Cougar CPScougarcps
 
Modern phishing-techniques
Modern phishing-techniquesModern phishing-techniques
Modern phishing-techniquesFarkhad Badalov
 
Tannehill, Dolphins deal Bears third home loss
Tannehill, Dolphins deal Bears third home lossTannehill, Dolphins deal Bears third home loss
Tannehill, Dolphins deal Bears third home lossmarketingsocialmedia09
 
TH3 Professional Developper google hacking
TH3 Professional Developper google hackingTH3 Professional Developper google hacking
TH3 Professional Developper google hackingth3prodevelopper
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Homejaysonstreet
 
How not to make a hacker friendly application
How not to make a hacker friendly applicationHow not to make a hacker friendly application
How not to make a hacker friendly applicationAbhinav Mishra
 
Online safety 101
Online safety 101Online safety 101
Online safety 101Greg Bold
 
Password cracking and brute force tools
Password cracking and brute force toolsPassword cracking and brute force tools
Password cracking and brute force toolszeus7856
 
Rx for Online Harassment: Preparation, Response, Support and Self-Care – ONA19
Rx for Online Harassment: Preparation, Response, Support and Self-Care – ONA19Rx for Online Harassment: Preparation, Response, Support and Self-Care – ONA19
Rx for Online Harassment: Preparation, Response, Support and Self-Care – ONA19Online News Association
 
Information Security Day for Penn State Ag Sciences
Information Security Day for Penn State Ag SciencesInformation Security Day for Penn State Ag Sciences
Information Security Day for Penn State Ag SciencesVince Verbeke
 
Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threatsourav newatia
 
Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeComputer Explorers
 
CYREN_Q1_2015_Trend_Report
CYREN_Q1_2015_Trend_ReportCYREN_Q1_2015_Trend_Report
CYREN_Q1_2015_Trend_ReportChris Taylor
 

Tendances (20)

Security Primer
Security PrimerSecurity Primer
Security Primer
 
Password hacking
Password hackingPassword hacking
Password hacking
 
Scaling Web 2.0 Malware Infection
Scaling Web 2.0 Malware InfectionScaling Web 2.0 Malware Infection
Scaling Web 2.0 Malware Infection
 
Phishing demo
Phishing demoPhishing demo
Phishing demo
 
IT Security Seminar Cougar CPS
IT  Security  Seminar  Cougar  CPSIT  Security  Seminar  Cougar  CPS
IT Security Seminar Cougar CPS
 
Modern phishing-techniques
Modern phishing-techniquesModern phishing-techniques
Modern phishing-techniques
 
Tannehill, Dolphins deal Bears third home loss
Tannehill, Dolphins deal Bears third home lossTannehill, Dolphins deal Bears third home loss
Tannehill, Dolphins deal Bears third home loss
 
TH3 Professional Developper google hacking
TH3 Professional Developper google hackingTH3 Professional Developper google hacking
TH3 Professional Developper google hacking
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Home
 
How not to make a hacker friendly application
How not to make a hacker friendly applicationHow not to make a hacker friendly application
How not to make a hacker friendly application
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPESMALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Online safety 101
Online safety 101Online safety 101
Online safety 101
 
Password cracking and brute force tools
Password cracking and brute force toolsPassword cracking and brute force tools
Password cracking and brute force tools
 
Phishing
PhishingPhishing
Phishing
 
Rx for Online Harassment: Preparation, Response, Support and Self-Care – ONA19
Rx for Online Harassment: Preparation, Response, Support and Self-Care – ONA19Rx for Online Harassment: Preparation, Response, Support and Self-Care – ONA19
Rx for Online Harassment: Preparation, Response, Support and Self-Care – ONA19
 
Information Security Day for Penn State Ag Sciences
Information Security Day for Penn State Ag SciencesInformation Security Day for Penn State Ag Sciences
Information Security Day for Penn State Ag Sciences
 
Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threat
 
Anti phishing
Anti phishingAnti phishing
Anti phishing
 
Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safe
 
CYREN_Q1_2015_Trend_Report
CYREN_Q1_2015_Trend_ReportCYREN_Q1_2015_Trend_Report
CYREN_Q1_2015_Trend_Report
 

En vedette

Hardware
HardwareHardware
Hardwaregopi ch
 
Shashank hardware workshop final
Shashank hardware workshop finalShashank hardware workshop final
Shashank hardware workshop finaltechbed
 
Computer hardware basic -shashank
Computer hardware basic  -shashankComputer hardware basic  -shashank
Computer hardware basic -shashanktechbed
 
Input computer hardware notes for UCEand UACE ICT
Input computer hardware notes for UCEand UACE ICTInput computer hardware notes for UCEand UACE ICT
Input computer hardware notes for UCEand UACE ICTMukalele Rogers
 
Computer Hardware
Computer HardwareComputer Hardware
Computer Hardwarenitinmote
 
Computer hardware component. ppt
Computer hardware component. pptComputer hardware component. ppt
Computer hardware component. pptNaveen Sihag
 
Five Primary Goups of Computer Hardware
Five Primary Goups of Computer HardwareFive Primary Goups of Computer Hardware
Five Primary Goups of Computer Hardwareracel92gorres
 

En vedette (7)

Hardware
HardwareHardware
Hardware
 
Shashank hardware workshop final
Shashank hardware workshop finalShashank hardware workshop final
Shashank hardware workshop final
 
Computer hardware basic -shashank
Computer hardware basic  -shashankComputer hardware basic  -shashank
Computer hardware basic -shashank
 
Input computer hardware notes for UCEand UACE ICT
Input computer hardware notes for UCEand UACE ICTInput computer hardware notes for UCEand UACE ICT
Input computer hardware notes for UCEand UACE ICT
 
Computer Hardware
Computer HardwareComputer Hardware
Computer Hardware
 
Computer hardware component. ppt
Computer hardware component. pptComputer hardware component. ppt
Computer hardware component. ppt
 
Five Primary Goups of Computer Hardware
Five Primary Goups of Computer HardwareFive Primary Goups of Computer Hardware
Five Primary Goups of Computer Hardware
 

Similaire à Computer saftey may 2013

CyberAttack -- Whose side is your computer on?
CyberAttack -- Whose side is your computer on?CyberAttack -- Whose side is your computer on?
CyberAttack -- Whose side is your computer on?Jim Isaak
 
Dark side presentation lwhippedtc515
Dark side presentation lwhippedtc515Dark side presentation lwhippedtc515
Dark side presentation lwhippedtc515lisawhipp
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Joel May
 
The Computer Virus-Interactive
The Computer Virus-InteractiveThe Computer Virus-Interactive
The Computer Virus-InteractiveGronHatchat
 
The Nasty of Computers
The Nasty of ComputersThe Nasty of Computers
The Nasty of ComputersGronHatchat
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGudipudiDayanandam
 
Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Mainsmeech
 
Malware from the Consumer Jungle
Malware from the Consumer JungleMalware from the Consumer Jungle
Malware from the Consumer JungleJason S
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsConnecting Up
 
Viruses ppt finale
Viruses ppt  finaleViruses ppt  finale
Viruses ppt finalemishrasb4
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security9784
 
How spam change the world
How spam change the world How spam change the world
How spam change the world Farhaan Bukhsh
 
Common Security Issues on the Internet
Common Security Issues on the InternetCommon Security Issues on the Internet
Common Security Issues on the InternetBretz Harllynne Moltio
 

Similaire à Computer saftey may 2013 (20)

CyberAttack -- Whose side is your computer on?
CyberAttack -- Whose side is your computer on?CyberAttack -- Whose side is your computer on?
CyberAttack -- Whose side is your computer on?
 
C 7
C 7C 7
C 7
 
Dark side presentation lwhippedtc515
Dark side presentation lwhippedtc515Dark side presentation lwhippedtc515
Dark side presentation lwhippedtc515
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!
 
The Computer Virus-Interactive
The Computer Virus-InteractiveThe Computer Virus-Interactive
The Computer Virus-Interactive
 
The Nasty of Computers
The Nasty of ComputersThe Nasty of Computers
The Nasty of Computers
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
 
Ratzan2
Ratzan2Ratzan2
Ratzan2
 
Ratzan2
Ratzan2Ratzan2
Ratzan2
 
Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Main
 
Malware from the Consumer Jungle
Malware from the Consumer JungleMalware from the Consumer Jungle
Malware from the Consumer Jungle
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Viruses ppt finale
Viruses ppt  finaleViruses ppt  finale
Viruses ppt finale
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrime 1
Cybercrime 1Cybercrime 1
Cybercrime 1
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
 
How spam change the world
How spam change the world How spam change the world
How spam change the world
 
Common Security Issues on the Internet
Common Security Issues on the InternetCommon Security Issues on the Internet
Common Security Issues on the Internet
 

Plus de JimWhite

Computer safety on a mac
Computer safety on a macComputer safety on a mac
Computer safety on a macJimWhite
 
Neat useful things to do on the internet
Neat useful things to do on the internetNeat useful things to do on the internet
Neat useful things to do on the internetJimWhite
 
301 Intro To Internet
301 Intro To Internet301 Intro To Internet
301 Intro To InternetJimWhite
 
Web 2.0 The Art of the Internet Possible
Web 2.0 The Art of the Internet PossibleWeb 2.0 The Art of the Internet Possible
Web 2.0 The Art of the Internet PossibleJimWhite
 
Online Security
Online Security Online Security
Online Security JimWhite
 
Maintaining Your Computer
Maintaining Your ComputerMaintaining Your Computer
Maintaining Your ComputerJimWhite
 
De-Bugging and Tuning Up Your PC
De-Bugging and Tuning Up Your PCDe-Bugging and Tuning Up Your PC
De-Bugging and Tuning Up Your PCJimWhite
 
De-Gunking Your Computer
De-Gunking Your ComputerDe-Gunking Your Computer
De-Gunking Your ComputerJimWhite
 

Plus de JimWhite (8)

Computer safety on a mac
Computer safety on a macComputer safety on a mac
Computer safety on a mac
 
Neat useful things to do on the internet
Neat useful things to do on the internetNeat useful things to do on the internet
Neat useful things to do on the internet
 
301 Intro To Internet
301 Intro To Internet301 Intro To Internet
301 Intro To Internet
 
Web 2.0 The Art of the Internet Possible
Web 2.0 The Art of the Internet PossibleWeb 2.0 The Art of the Internet Possible
Web 2.0 The Art of the Internet Possible
 
Online Security
Online Security Online Security
Online Security
 
Maintaining Your Computer
Maintaining Your ComputerMaintaining Your Computer
Maintaining Your Computer
 
De-Bugging and Tuning Up Your PC
De-Bugging and Tuning Up Your PCDe-Bugging and Tuning Up Your PC
De-Bugging and Tuning Up Your PC
 
De-Gunking Your Computer
De-Gunking Your ComputerDe-Gunking Your Computer
De-Gunking Your Computer
 

Dernier

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Dernier (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

Computer saftey may 2013

  • 1. Socastee SC Library Computer Education WhiteHouseComputing Safe Computing Visualization of the various routes through a portion of the Internet Source: WWW.Wikipedia.Com http:WhiteHouseComputing.Blogspot.Com ”
  • 2. Socastee SC Library Computer Education WhiteHouseComputing Online SecurityOnline Security Common Computer Security MythsCommon Computer Security Myths  Myth: “Myth: “There is nothing important on my computer,There is nothing important on my computer, so no attacker would want to access it”so no attacker would want to access it”  Reality:Reality:  ““Internet Background Radiation” – a techie termInternet Background Radiation” – a techie term that refers to the constant stream of probes andthat refers to the constant stream of probes and malicious traffic on the internet.malicious traffic on the internet.  Probes are looking for any machine that can beProbes are looking for any machine that can be “hijacked” to make money for their hijackers.“hijacked” to make money for their hijackers.  Spam RobotsSpam Robots (spambot)(spambot)  ZombiesZombies trained to attack web sites on demand (extortiontrained to attack web sites on demand (extortion robots)robots)
  • 3. Socastee SC Library Computer Education WhiteHouseComputing Online SecurityOnline Security Common Computer Security MythsCommon Computer Security Myths  Myth:Myth: “The biggest security threats involve hackers“The biggest security threats involve hackers who target individual computer users”.who target individual computer users”.  Reality:Reality:  Many probes are automated. Computers underMany probes are automated. Computers under program control can probe other computers muchprogram control can probe other computers much faster than computers under human control can.faster than computers under human control can.
  • 4. Socastee SC Library Computer Education WhiteHouseComputing Online SecurityOnline Security Common Computer Security MythsCommon Computer Security Myths  Myth:Myth: “Paying bills online increases the risk of identity“Paying bills online increases the risk of identity theft”.theft”.  Reality:Reality:  Communication from the browser can be secure encryptedCommunication from the browser can be secure encrypted  LOOK for the LOCKLOOK for the LOCK  Either bottom right or just to the right of the addressEither bottom right or just to the right of the address entry window depending on browser and browserentry window depending on browser and browser versionversion  AND look forAND look for httpshttps instead ofinstead of httphttp in the addressin the address  For example:For example: https://WWW.Chase.Comhttps://WWW.Chase.Com  However – above assumes noHowever – above assumes no keylogerskeylogers onon your machineyour machine
  • 5. Socastee SC Library Computer Education WhiteHouseComputing Online SecurityOnline Security Types of ThreatsTypes of Threats  AnnoyancesAnnoyances  SpamSpam  AdwareAdware  DangerousDangerous  SpywareSpyware  VirusVirus  PhishingPhishing  ScarewareScareware  EnablerEnabler  TrojanTrojan  BackdoorBackdoor M A L W A R E
  • 6. Socastee SC Library Computer Education WhiteHouseComputing Online SecurityOnline Security Types of Threats - AnnoyancesTypes of Threats - Annoyances  Spam – AKA Unwanted, Unsolicited Junk EmailSpam – AKA Unwanted, Unsolicited Junk Email  Clogs your email inboxClogs your email inbox  Can be dangerousCan be dangerous  Can lead you to dangerous websitesCan lead you to dangerous websites  Example – sites that attempt to exploit unpatched bugs in yourExample – sites that attempt to exploit unpatched bugs in your browser to insert “browser to insert “backdoorbackdoor” or other malware in your system” or other malware in your system  Adware – Software that delivers targetedAdware – Software that delivers targeted advertisements to your computeradvertisements to your computer
  • 7. Socastee SC Library Computer Education WhiteHouseComputing Online SecurityOnline Security Types of Threats - DangerousTypes of Threats - Dangerous  SpywareSpyware “is a type of malware that is installed“is a type of malware that is installed surreptitiously on personal computers to collectsurreptitiously on personal computers to collect information about users, their computer orinformation about users, their computer or browsing habits without their informedbrowsing habits without their informed consent.”consent.” Wikipedia. (Spyware)Wikipedia. (Spyware)  Can simply record information about your browsingCan simply record information about your browsing habits to guide Adware in delivering ads ORhabits to guide Adware in delivering ads OR  Worst case: Keylogger – can record your keyboardWorst case: Keylogger – can record your keyboard keystrokes and transmit them over the Internetkeystrokes and transmit them over the Internet
  • 8. Socastee SC Library Computer Education WhiteHouseComputing Online SecurityOnline Security Types of Threats - DangerousTypes of Threats - Dangerous  Virus “AVirus “A computer viruscomputer virus is a computer program thatis a computer program that can copy itself and infect a computer without thecan copy itself and infect a computer without the permission or knowledge of the owner.”permission or knowledge of the owner.” WikipediaWikipedia  How is it spread?How is it spread?  Email attachmentEmail attachment  Visiting a malicious website with an unpatched buggy browserVisiting a malicious website with an unpatched buggy browser  Infected files on any portable media (thumb drives, CDs, floppys, etc)Infected files on any portable media (thumb drives, CDs, floppys, etc)  Over a network when file sharing is too broadly set upOver a network when file sharing is too broadly set up
  • 9. Socastee SC Library Computer Education WhiteHouseComputing Online SecurityOnline Security Types of Threats - DangerousTypes of Threats - Dangerous  Virus – How Can You Protect Yourself?Virus – How Can You Protect Yourself?  Install an antivirus program on your computerInstall an antivirus program on your computer  Two parts of an Antivirus program defenseTwo parts of an Antivirus program defense  The program itselfThe program itself  Understands basic look and feel of generic computer virusUnderstands basic look and feel of generic computer virus  Can also read and understand specific descriptions ofCan also read and understand specific descriptions of specific virus family and virusspecific virus family and virus  Descriptions of specific virus and virus familiesDescriptions of specific virus and virus families  New descriptions need to be downloaded to your computerNew descriptions need to be downloaded to your computer on a continuing basis.on a continuing basis.  In commercial software, there is an annual fee forIn commercial software, there is an annual fee for subscription. When your subscription runs out, NEWsubscription. When your subscription runs out, NEW descriptions stop being downloaded.descriptions stop being downloaded.
  • 10. Socastee SC Library Computer Education WhiteHouseComputing Online SecurityOnline Security Types of Threats - DangerousTypes of Threats - Dangerous  Virus – How CanVirus – How Can You ProtectYou Protect Yourself?Yourself?  See handout forSee handout for examples of goodexamples of good antivirus software.antivirus software.  For another source goFor another source go toto WWW.PCMag.ComWWW.PCMag.Com  Look past “sponsored links”Look past “sponsored links” which are ads and click onwhich are ads and click on appropriate articles.appropriate articles. Select Reviews here Enter Antivirus in the search box here
  • 11. Socastee SC Library Computer Education WhiteHouseComputing Online SecurityOnline Security Types of Threats - DangerousTypes of Threats - Dangerous  Phishing “is the criminally fraudulent process ofPhishing “is the criminally fraudulent process of attempting to acquire sensitive information suchattempting to acquire sensitive information such as usernames, passwords and credit card detailsas usernames, passwords and credit card details by masquerading as a trustworthy entity in anby masquerading as a trustworthy entity in an electronic communication.”electronic communication.” WikipediaWikipedia  Fraudulent email scares you into clicking a link in theFraudulent email scares you into clicking a link in the email taking you to a site that LOOKS like a realemail taking you to a site that LOOKS like a real bank (for example) but is notbank (for example) but is not  Fraud site asks for userid password account number etcFraud site asks for userid password account number etc PhishingPhishing
  • 12. Socastee SC Library Computer Education WhiteHouseComputing Online SecurityOnline Security Types of Threats - DangerousTypes of Threats - Dangerous  Phishing – How to Avoid Being FooledPhishing – How to Avoid Being Fooled  Avoid following links in emailsAvoid following links in emails  If you do and the site wants info DO NOT GIVE ITIf you do and the site wants info DO NOT GIVE IT  Banks, Brokerage Houses, etc WILL NOT ASKBanks, Brokerage Houses, etc WILL NOT ASK YOU VIA EMAIL TO VERIFY INFORMATIONYOU VIA EMAIL TO VERIFY INFORMATION  If they seem to be doing that IT IS A FRAUDIf they seem to be doing that IT IS A FRAUD
  • 13. Socastee SC Library Computer Education WhiteHouseComputing Online SecurityOnline Security Types of Threats - DangerousTypes of Threats - Dangerous  ScarewareScareware  Spyware masquerading as antivirus softwareSpyware masquerading as antivirus software  Message will pop up while using your browserMessage will pop up while using your browser  Message will tell you have been infected and need to clickMessage will tell you have been infected and need to click somewhere on it to download software to get rid of thesomewhere on it to download software to get rid of the infectioninfection  Could happen even on a legitimate site it the site has beenCould happen even on a legitimate site it the site has been compromisedcompromised  Do not click ANYWHERE on the messageDo not click ANYWHERE on the message  Start Taskmanager and end browser applicationsStart Taskmanager and end browser applications
  • 14. Socastee SC Library Computer Education WhiteHouseComputing Online SecurityOnline Security Types of Threats - DangerousTypes of Threats - Dangerous  Learn to Recognize Scams of All KindsLearn to Recognize Scams of All Kinds  Check the web address. type in the web address exactly as it appears on your statement.  Look for a https://  a secure connection However, even scam sites can use secure connections, so use this rule in conjunction with the others.  Check the spelling and grammar.
  • 15. Socastee SC Library Computer Education WhiteHouseComputing Online SecurityOnline Security Types of Threats - DangerousTypes of Threats - Dangerous Four RulesFour Rules 1. Run Windows Update – plug the holes that let the gunk in For Virus and Spyware gunk that gets in anyway… 2. Install and run Anti Virus software – keep subscription current 3. Install and run AntiSpyware software–keep subscription current 4. Run a Firewall 1. Start 2. Control Panel 3. Security Center 4. Windows Firewall 5. On Note – assumes you are not running a different firewall already
  • 16. Socastee SC Library Computer Education WhiteHouseComputing Online SecurityOnline Security FirewallsFirewalls  Prevent unauthorized entry from outsidePrevent unauthorized entry from outside  Can be hardwareCan be hardware  Routers include a NAT firewall preventingRouters include a NAT firewall preventing unauthorized entry from outside but not necessarilyunauthorized entry from outside but not necessarily reporting or preventing rogue applications inside yourreporting or preventing rogue applications inside your computer from communicating outboundcomputer from communicating outbound  Can be software ( Windows firewall, ZoneAlarm)Can be software ( Windows firewall, ZoneAlarm)  Software firewalls can/will prevent unauthorizedSoftware firewalls can/will prevent unauthorized outbound communication toooutbound communication too
  • 17. Socastee SC Library Computer Education WhiteHouseComputing Online SecurityOnline Security FirewallsFirewalls  How Secure is Your Firewall?How Secure is Your Firewall?  Major corporations have their firewalls intentionallyMajor corporations have their firewalls intentionally probed periodically by a security service to test them.probed periodically by a security service to test them.  You can do the same thing at the “Shields Up” siteYou can do the same thing at the “Shields Up” site located at https://www.grc.com/x/ne.dll?bh0bkyd2located at https://www.grc.com/x/ne.dll?bh0bkyd2  NOTENOTE the above site DOES NOT scan your machinethe above site DOES NOT scan your machine for malware of any sort. It provides only a test of yourfor malware of any sort. It provides only a test of your firewall (or lack thereof) and its ability to block intrusion.firewall (or lack thereof) and its ability to block intrusion.
  • 18. Socastee SC Library Computer Education WhiteHouseComputing Online SecurityOnline Security FirewallsFirewalls  LaptopsLaptops  If you depend on the hardware firewall at home, you need toIf you depend on the hardware firewall at home, you need to be sure you have a software firewall running on your laptop ifbe sure you have a software firewall running on your laptop if you take it out of your house to connect from anotheryou take it out of your house to connect from another location. If you have file and printer sharing turned on (tolocation. If you have file and printer sharing turned on (to share files with other computers in you house) TURN ITshare files with other computers in you house) TURN IT OFF before connecting to a public WiFi hotspot or someoneOFF before connecting to a public WiFi hotspot or someone else’s hard wired LAN because you will beelse’s hard wired LAN because you will be behind their firewallbehind their firewall sharingsharing youryour files withfiles with themthem  ON WINDOWS 7: START – CONTROL PANEL - NETWORKON WINDOWS 7: START – CONTROL PANEL - NETWORK & SHARING CENTER – ADVANCED SHARING – TURN OFF& SHARING CENTER – ADVANCED SHARING – TURN OFF FILE AND PRINTER SHARINGFILE AND PRINTER SHARING
  • 19. Socastee SC Library Computer Education WhiteHouseComputing Online SecurityOnline Security Information SourceInformation Source  WWW.OnguardOnline.GovWWW.OnguardOnline.Gov  ““a partnership between the FTC, other federala partnership between the FTC, other federal agencies, and the technology industry -- offers tips toagencies, and the technology industry -- offers tips to help you be on guard against Internet fraud, securehelp you be on guard against Internet fraud, secure your computer, and protect your personalyour computer, and protect your personal information. “information. “ Federal Trade Commission web siteFederal Trade Commission web site
  • 20. Socastee SC Library Computer Education WhiteHouseComputing Online SecurityOnline Security BackupBackup  Make partial backups practicalMake partial backups practical  Keep your files organizedKeep your files organized  Choose Backup MediumChoose Backup Medium  CD – Holds Max 700 MbCD – Holds Max 700 Mb  DVD – Holds Max 4.4 Gb single layer 7.9 GbDVD – Holds Max 4.4 Gb single layer 7.9 Gb double layer. Only new higher end machines todaydouble layer. Only new higher end machines today will burn double layerwill burn double layer  External hard drive – holds 1Tb ++External hard drive – holds 1Tb ++  IfIf CRITICALCRITICAL keep copy off sitekeep copy off site
  • 21. Socastee SC Library Computer Education WhiteHouseComputing The EndThe End
  • 22. Socastee SC Library Computer Education WhiteHouseComputing Developments to Watch: Social Fortress ( WWW.SocialFortress.Com ) see http://www.teten.com/blog/2012/09/13/social-fortress-publicly-launches-at-techcrunch- disrupt/ See “Emerging Cyber Threats Report 2013” at http://gtsecuritysummit.com/report.html