Your SlideShare is downloading. ×
Computer & internet Security
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Computer & internet Security

371
views

Published on

Some Terminology …

Some Terminology
Computer Security
Type of threats
Security measures
Internet Security

Published in: Education, Technology

0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
371
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
45
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • Just to be aware of the two.Hacker types: Not in todays scope.
  • VIRUSNeeds you to actually do something before it infects your computer. This action could be opening an email attachment or going to a particular web page.
  • Worms - Worms propagate without user intervention. Once the victim computer has been infected the worm will attempt to find and infect other computers.
  • MALWARE:Can seem like a normal program but used or programmed by attackers to disrupt computer operation.Trojan horses - A Trojan horse program is software that claims to be one thing while in fact doing something different behind the scenes. victims computer.Used a lot by script kiddies, to hack and play around with a
  • Spyware:they have the capability to monitor your keystrokes, scan files on the hard drive, snoop other applications, such as chat programs or word processors, install other spyware programs, read cookiesSymptoms: If you notice any changes to your Web browser that you did not make such as extra toolbars or different homepage settings, as well as changes to your security settings and favourites list, you could have spyware running on your system. Other signs of a spyware infection include pop-up ads which aren't related to a Web site you're viewing; usually spyware advertisements are adult content in nature and are not displayed in the same fashion as legitimate ads you would normally see on your favourite Web sites. You may also see advertisements when you're not browsing the Web.Adware- When you stop running the software, the ads should disappear. This allows consumers to try the software before they buy and you always have the option of disabling the ads by purchasing a registration key.
  • Phishing:The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site, however, is bogus and set up only to steal the user’s information.Quarantine simply keeps the detected object in a safe location and is usually encrypted so other malware apps won't detect it. Always quarantine before deleting. You don't want to delete an important system file or delete something that your AV is erroneously flagging as malicious.
  • Computer Security means protecting our computer system and the information they contain against unwanted access, damage, destruction or modification
  • Malicious Code:The most likely of the three Consists of those threats which I have just mentioned, such as viruses and malware.Humans: Second most likely to threaten your computer. Theft Children / people playing around where they should not, such as system files and such. Could accidently delete Important files.Natural Threats: Include power surge, lightning, water damage, eg. floods 
  • DVDs and CDsPro: They're cheap. CD-Rs and DVD-Rs are extremely inexpensive these days. Con: They're not always reliable. Despite the low cost, there's a big problem with optical media--they occasionally don't burn right. Buffer underruns and other problems mean that out of every batch of CD-Rs or DVD-Rs, occasionally one or two might be bad. If that's the disc that had your important files on it, your data backup is lost. |Slower to burn than copying to secondary storage.External hard drivesPro: Cheaper per Gigabyte. | Faster to read and write data | There are no ongoing costs eg. In relation to cloud storage | Much more reliable and secure than DVDs and cloud computing, because you have the responsibility over them.Cons: If they fail, and you don’t have redundant data backups, your data is lost! | You physically need the hard drive with you to make and retrieve backupsCloud StoragePro: Online backup is becoming very affordable | Access your files from anywhere | Share your files with friends and family | Online backup takes care of your file security | Your files are safeCons: Initial backup can be slow | You have ongoing costs | You have to trust - As you send your files to a relatively unknown third-party, you have to trust that they treat your files with care and utmost security. Once you send your files over, they still remain your control, but they are no longer only on your computer. Many providers do have the option to encrypt files locally, so that your files can only be seen by the owner of the encryption key – and that would be you.
  • Why Wouldn’t You Run an Antivirus?Some people believe that antivirus software is heavy and slows down your computer. This was certainly true in the past. Older Norton and McAfee antivirus software suites were infamous for slowing down your computer more than actual viruses would. They’re full of notifications and advertisementsto remind you of paying for the subscription and buy more expensive security suites, just as adware annoys you with requests to buy products.This isn’t true anymore. Computers have become so fast that antivirus software don’t weigh them down like they used to. There are also more efficient security suites that are much lighter on resources. The free Microsoft Security Essentials for Windows 7 or the included Windows Defender on Windows 8 are lightweight antivirus programs created by Microsoft. They don’t try to sell you anything at all. There’s no reason not to use them – unless you just want to brag online that you’re too smart for an antivirus.RECOMMEND - MACYou Should Still Be CarefulAn antivirus is only a single layer of security. No antivirus program is perfect, as all the antivirus tests show nothing catches all malware all of the time. if you don’t exercise caution, you may become infected by malware even if you’re using an antivirus Be careful about the files you download and run, keep your software updated, uninstall vulnerable software like Java, and more – but don’t drop your antivirus defences completely just because you’re being careful. Malware isn’t what it used to be – much of it is created by organized crime to capture financial information and other sensitive data. Antivirus software helps you stay ahead of the bad guys by a little bit more, and it’s worth using.If you own a mac AVAST
  • As mentioned earlier:Spyware is a type of malware that damages your computer system. Spyware is NOT a computer virus in the traditional sense, but is unwanted and harmful nonetheless. It works by getting into your computer system for the purpose of taking partial control over your use, or collecting personal information without your knowledge. It often ends up on your computer after downloading and installing free software so be very careful what software you download, and which websites you download from.Recommends
  • A firewall works as a barrier, or a shield, between your PC and cyber space. When you are connected to the Internet, you are constantly sending and receiving information in small units called packets. The firewall filters these packets to see if they meet certain criteria set by a series of rules, and thereafter blocks or allows the data. This way, hackers cannot get inside and steal information such as bank account numbers and passwords from you. How it works?2 images.
  • Children: WHY:Because they are in a learning phase, and need to be limited to what they do on a computer system. Children need to be able to explorer freely without worrying about breaking something.Result: Like I mentioned before children can accidently delete your presentation for work, or all his brother’s research done for an assignment!Safeguard: Save your data before… If accidental shutdown could mean loss of data busy working on.
  • Windows 7/vistaClick on the Start button. This is the small round button () in the lower left corner of your screen that has a Windows flag on it.  Click on the Control Panel menu option.  When the control panel opens you will see a screen similar to Figure 1 below.Click on the Add or remove user accounts control panel option as shown by the red arrow in figure 1.  You will now be in the Manage Accounts control panel as shown in Figure 2 below.
  • Windows 7/vistaThis screen shows all the accounts currently on your computer. To create a new account, click on the Create a new account option as shown by the red arrow above.  You will now be at the Create New Account screen.
  • Windows 7/vistaIn the New account name field enter the name of the new account that you would like to create. This could be a person's first name, full name, or whatever other designation you would like to give. You then need to decide which of the two types of accounts you would like to create. An Administrator account has full access to the computer and can make all changes, install software, and create and delete accounts. The other type of account is Standard user and has limited privileges as to what settings and changes it can make to the computer. It is suggested that for all users, you set them as a Standard User account and have one administrator account that you can logon to as needed. This will protect your computer from malware and other harmful activities.When you have finished selecting a name and the type of account you wish to setup, you should click on the Create Account button.  Your new account will have been created and you will see it listed in the Manage Accounts screen.
  • Windows 7/vistaAs you can see our new user, named Test Account, has been created.Now when you start Windows 7 or Vista, you will see the additional account listed in the logon screen. That user can then select their login name and login into their profile so they can access their private data.
  • Children: WHY:Because they are in a learning phase, and need to be limited to what they do on a computer system. Children need to be able to explorer freely without worrying about breaking something.Result: Like I mentioned before children can accidently delete your presentation for work, or all his brother’s research done for an assignment!
  • Thiefs: Solutions:AS mentioned before, backup your data, and store the backups in a secure location, either using online backups, or secondary backup stored in a safe.
  • Internet Security:Is your browser giving your identity away. How reliable are the websites you browse Are your accounts secure.
  • Internet Security:Is your browser giving your identity away. How reliable are the websites you browse Are your accounts secure.
  • Help yourself remember your strong password by following these tips:Substitute numbers, symbols, and misspellings for letters or words in an easy-to-remember phrase. For example, My son's birthday is 12 December, 2004 could become Mi$un's Brthd8iz 12124 (it's OK to use spaces in your password).Relate your password to a favorite hobby or sport. For example, I love to play badminton could become ILuv2PlayB@dm1nt()n.
  • Help yourself remember your strong password by following these tips:
  • Cover: Browser historyJava applets.Paypal Facebook friends Bank accounts Spam
  • Cover: Browser historyJava applets.Paypal Facebook friends Bank accounts Spam
  • Transcript

    • 1. COMPUTER & INTERNETSECURITYA LOOK INTO COMMON PRACTICES OF:• SECURING YOUR PERSONAL COMPUTER FROM KNOWN THREATS• SAFELY NAVIGATING AND USING THE INTERNET• SECURING YOUR ONLINE ACCOUNTS
    • 2. OVERVIEWWHAT WE WILL COVER1. Some Terminology2. Computer Securityi. Type of threatsii. Security measures3. Break4. Internet Securityi. Browser securityii. Web browsingiii. Online accountsSPEAKER: GERARD LAMUSSE
    • 3. !OVERVIEWWHAT WE WON’T COVER• Enterprise security• Server security• Active cyber security• Kitchen securitySPEAKER: GERARD LAMUSSE
    • 4. SOME TERMINOLOGY• Computer security• Security types• Hacker vs.Cracker• Script kiddie• Virus• WormSPEAKER: GERARD LAMUSSE• Key logging• Malware• Trojan• Spyware/adware• Phishing• Quarantine
    • 5. TERMINOLOGYCONTINUEDCOMPUTER SECURITY• Computer Security meansprotecting our computer systemand the information they containagainst unwanted access,damage, destruction ormodificationSECURITY TYPES• Hardware security• Software security• Anti-virus• Firewall• Network securitySPEAKER: GERARD LAMUSSE
    • 6. TERMINOLOGYCONTINUEDHACKER• A person who accesses acomputer or network illegally.• Various types• Black• Grey• WhiteCRACKER• A person who accesses acomputer or network illegally buthas the intent of destroyingdata, stealing information, orother malicious action.SPEAKER: GERARD LAMUSSE
    • 7. TERMINOLOGYCONTINUEDSCRIPT KIDDIE• Often are teenagers that useprewritten hacking and crackingprograms to break intocomputers• Same intent as a crackerVIRUS• Can replicate itself and spreadfrom one computer to another.• Does damage by alteringprograms or the operatingsystem itself.SPEAKER: GERARD LAMUSSE
    • 8. TERMINOLOGYCONTINUEDWORM• Spreads itself over a networkand other means.• Replicates on host invisibly• Aim: To use up availablememory and system resources.KEY LOGGING• The action of recording keysstruck on a keyboard.• User unaware of this typespassword and account details• Information sent via malware.SPEAKER: GERARD LAMUSSE
    • 9. TERMINOLOGYCONTINUEDMALWARE• Malicious software• Gather sensitive information• Gain access to private computersystems.TROJAN• Form of malware• A program claiming to rid yourcomputer of viruses but insteadintroduces viruses, to yourcomputerSPEAKER: GERARD LAMUSSE
    • 10. TERMINOLOGYCONTINUEDSPYWARE• Similar to Trojan horse.• Co-exists with other software• Records actions performed byuser and relaying thisinformation to its authorADWARE• Legitmate alternative offered toconsumers who do not wish to payfor software• Displays adverts within program• Tracks browsing habits to serverelated advertisements• Has a bad reputation as a result ofspyware.SPEAKER: GERARD LAMUSSE
    • 11. TERMINOLOGYCONTINUEDPHISHING• The fraudulent practice ofsending e-mails purporting to befrom legitimate companies inorder to induce individuals toreveal personal information.QUARANTINE• To move an undesired file suchas a virus-infected file orspyware to an encrypted folder.SPEAKER: GERARD LAMUSSE
    • 12. COMPUTER SECURITYi. Type of threatsii. Security measuresSPEAKER: GERARD LAMUSSE
    • 13. COMPUTER SECURITYTYPES OF THREATSSPEAKER: GERARD LAMUSSEMaliciousCodeNaturalThreatsHumans
    • 14. COMPUTER SECURITYSECURITY MEASURESSPEAKER: GERARD LAMUSSE4 Main types of security measure1. Data Backup2. Antivirus3. Anti-spyware4. FirewallMALICIOUS CODE1. Rip data to DVDs• Cheap, but takes time.2. External secondary storage• Cheaper per Gigabyte• 2x 500Gb from R7003. Upload and store to Cloud Storage• Always available, monthly/yearly costs• www.drive.google.com• www.justcload.com• www.mypcbackup.com
    • 15. COMPUTER SECURITYSECURITY MEASURESSPEAKER: GERARD LAMUSSE4 Main types of security measure1. Data Backup2. Antivirus3. Anti-spyware4. FirewallMALICIOUS CODEA utility program that we use to protect a computer againstviruses by identifying and removing computer viruses foundin the computer memory, computer storage and on incominge-mail files.Microsoft Security EssentialsFor windows 7 & earlier orWindows DefenderFor Windows 8AVAST FREE for mac
    • 16. COMPUTER SECURITYSECURITY MEASURESSPEAKER: GERARD LAMUSSE4 Main types of security measure1. Data Backup2. Antivirus3. Anti-spyware4. FirewallMALICIOUS CODEWHY?Not all anti-virus will prevent installation of spyware!Much more common today than viruses.RecommendedMalwarebytes Anti-Malware
    • 17. COMPUTER SECURITYSECURITY MEASURESSPEAKER: GERARD LAMUSSE4 Main types of security measure1. Data Backup2. Antivirus3. Anti-spyware4. FirewallMALICIOUS CODETwo types, hardware and software firewalls.Your router functions as a hardware firewall, while Windowsincludes a software firewall.How it works?
    • 18. COMPUTER SECURITYSECURITY MEASURESSPEAKER: GERARD LAMUSSEProblems and solutions:1. Children2. ThievesHUMANSApplies to teens as well.Problems they pose:• Accidental data deletion• Corrupt system files• Installation of spyware or viruses• Accidental natural disasterPreventing or Safe guarding against children threats:• Backup data• Save your data before…• Set up limited user accounts• Set up parental controlsRECOMMENDATION:K9 Web Protection
    • 19. SECURING AND SETTING UP USERACCOUNTSSPEAKER: GERARD LAMUSSEFigure 1.Windows 7 Control Panel
    • 20. SECURING AND SETTING UP USERACCOUNTSSPEAKER: GERARD LAMUSSEFigure 2.Manage Accounts screenin Windows 7
    • 21. SECURING AND SETTING UP USERACCOUNTSSPEAKER: GERARD LAMUSSEFigure 3.Create New Account screen
    • 22. SECURING AND SETTING UP USERACCOUNTSSPEAKER: GERARD LAMUSSEFigure 4.New user has been created
    • 23. COMPUTER SECURITYSECURITY MEASURESSPEAKER: GERARD LAMUSSEProblems and solutions:1. Children2. ThievesHUMANSApplies to teens as well.Problems they pose:• Accidental data deletion• Corrupt system files• Installation of spyware or viruses• Accidental natural disasterPreventing or Safe guarding against children threats:• Backup data• Set up limited user accounts• Set up parental controlsRECOMMENDATION:K9 Web Protection
    • 24. COMPUTER SECURITYSECURITY MEASURESSPEAKER: GERARD LAMUSSEProblems and solutions:1. Children2. ThievesHUMANSThreat:• Loss of data• Stolen computer and other valuables• Damage to propertySolutions???• If they want to get in they will find a way• Backup your data!!!• Lockup and password secure your accounts.RECOMMENDATION:K9 Home Protection
    • 25. COMPUTER & INTERNETSECURITY
    • 26. INTERNET SECURITYi. Browser securityii. Web browsingiii. Online accountsSPEAKER: GERARD LAMUSSE
    • 27. INTERNET SECURITYFIRST: PASSWORDSi. What defines a strong passwordii. What is NOT a good passwordSPEAKER: GERARD LAMUSSE
    • 28. INTERNET SECURITYGOOD PASSWORDSSPEAKER: GERARD LAMUSSEWhat makes a password a strong passwordi. Is at least eight characters long.ii. Does not contain your user name, real name, or company name.iii. Does not contain a complete word.iv. Is significantly different from previous passwords.v. Contains characters from each of the following four categories:
    • 29. INTERNET SECURITYGOOD PASSWORDSSPEAKER: GERARD LAMUSSECharacter category ExamplesUppercase letters A, B, CLowercase letters a, b, cNumbers 0, 1, 2, 3, 4, 5, 6, 7, 8, 9Symbols found on thekeyboard and spaces` ~ ! @ # $ % ^ & * ( ) _ - + = { } [] | : ; " < > , . ? /
    • 30. INTERNET SECURITYBAD PASSWORDSSPEAKER: GERARD LAMUSSEWhat makes a password a bad passwordi. Dictionary words.ii. Names, surnames, contact details, registration numbersiii. Not long enoughiv. Simply contains simple ‘!’ ‘1’ ‘?’ ‘01’ at the end
    • 31. INTERNET SECURITYPASSWORD OVERVIEWSPEAKER: GERARD LAMUSSE• Create an acronym from an easy-to-remember piece of information.For example, pick a phrase that is meaningful to you, such as Mysons birthday is 12 December, 2004. Using that phrase as your guide,you might use Msbi12/Dec,4 for your password.
    • 32. INTERNET SECURITYPASSWORD OVERVIEWSPEAKER: GERARD LAMUSSE• Substitute numbers, symbols, and misspellings for letters or words inan easy-to-remember phrase. For example, My sons birthday is 12December, 2004 could become Mi$uns Brthd8iz 12124 (its OK to usespaces in your password).• Relate your password to a favourite hobby or sport. For example, ‘Ilove to play badminton’ could become ILuv2PlayB@dm1nt()n.
    • 33. INTERNET SECURITYPASSWORD OVERVIEWSPEAKER: GERARD LAMUSSEHighly Recommended• Use secure, unique passwords for every Internet site or service is oneof the best security practices out there.• Use a single master password for storage of all passwords, thennever user it again!• LastPass• How secure is your password? Try
    • 34. INTERNET SECURITYi. Browser securityii. Web browsingiii. Online accountsSPEAKER: GERARD LAMUSSE
    • 35. THE ENDTHANKSSPEAKER: GERARD LAMUSSE