Helpdesk Disinfection Seminiar PowerPoint


Published on

  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Helpdesk Disinfection Seminiar PowerPoint

  1. 1. Helpdesk Disinfection and Acceptable Use Seminar Information Technology Helpdesk Updated: 5/7/2007
  2. 2. Course Description <ul><li>Welcome to the Helpdesk Virus Disinfection and Acceptable Use Seminar. The purpose of this seminar is to: </li></ul><ul><ul><li>Help you use information resources such as e-mail and the Internet safely to protect your computer from becoming infected by malware. </li></ul></ul><ul><ul><li>Train you to perform routine maintenance on your computer to remove these threats. The Disinfection Agent will go into more depth during the appointment. </li></ul></ul>
  3. 3. Disinfection and Acceptable Use Exam <ul><li>The secondary purpose of this seminar is to prepare you for the examination that follows. </li></ul><ul><ul><li>The exam consists of twenty-five questions. </li></ul></ul><ul><ul><li>Once you have completed the exam, the Disinfection Agent will walk you through the questions you have missed and explain why. </li></ul></ul>
  4. 4. What is the Helpdesk Disinfection Service? <ul><li>This service is provided only as an educational service by the Valdosta State University Information Technology Helpdesk. You will, thus, need to be present for the entirety of the appointment. </li></ul><ul><li>A Disinfection Agent will talk you through the downloading, installing, updating, and running of standard anti-malware software. The client will be asked to run the actions on their computers themselves as the Helpdesk will not actively initiate any of the programs. </li></ul><ul><li>As this is not a technical repair service, the Disinfection Agent is not authorized to actually interact with a computer directly. Instead, he or she will be providing instructions only. If you need repair assistance from a technician, please contact the Valdosta State University Tech Shop in Langdale Hall at 229-219-1398. </li></ul>
  5. 5. Helpdesk / Tech Shop Comparison <ul><li>Helpdesk </li></ul><ul><ul><li>Educational service </li></ul></ul><ul><ul><li>The Disinfection Agent cannot touch your computer </li></ul></ul><ul><ul><li>You must fulfill the requirements of the Disinfection Seminar </li></ul></ul><ul><ul><li>Can only instruct in the use of standard anti-malware programs to correct the issue </li></ul></ul><ul><li>Tech Shop </li></ul><ul><ul><li>Technical repair service </li></ul></ul><ul><ul><li>You may drop off the computer </li></ul></ul><ul><ul><li>A fee will be assessed </li></ul></ul><ul><ul><li>Can deal with other hardware and software issues and repair damage caused by malware </li></ul></ul>
  6. 6. What is Malware? <ul><li>To begin learning how to protect your computer, you must first have some background understanding of the potential threats to your computer. </li></ul><ul><li>Malware – Malware (short for “malicious software”) is any type of software designed to be transmitted to a computer without the owner’s consent. It is designed to cause damage to or steal information from the owner’s computer. </li></ul>
  7. 7. What can malware do to my computer? <ul><li>Malware infections can: </li></ul><ul><ul><li>Damage the functionality of hardware and software. </li></ul></ul><ul><ul><li>Slow down your computer or Internet connection. </li></ul></ul><ul><ul><li>Prevent a computer from connecting to the Internet. </li></ul></ul><ul><ul><li>Compromise confidential or private information. </li></ul></ul><ul><ul><li>Cause your computer to be quarantined from campus services such as the Valdosta State University wireless network, Hallnet. </li></ul></ul><ul><ul><li>Spread these infections to other computers on the network. </li></ul></ul>
  8. 8. What Types of Malware Exist? <ul><li>Viruses – Viruses spread through data transferred from an infected computer either by across a computer network or using a physical source such as a floppy disk or CD-ROM. </li></ul><ul><li>Worms – Worms are similar to viruses, but does not require user interaction to spread. </li></ul><ul><li>Trojan Horses – Trojan horses appear as legitimate files, but when opened, infect a computer. They often reside in files downloaded from the Internet or e-mail attachments. </li></ul><ul><li>Spyware – Spyware infections collect data from a computer without the owner’s consent. </li></ul><ul><li>Adware – Adware infections display advertising in various forms, such as pop-ups, on a computer without the owner’s consent. </li></ul>
  9. 9. How do I Protect my Computer? <ul><li>Protection software: </li></ul><ul><ul><li>Keep an updated personal firewall. </li></ul></ul><ul><ul><li>Keep your antivirus and spyware removal software updated. </li></ul></ul><ul><ul><li>Run your antivirus and spyware removal software regularly. </li></ul></ul><ul><li>Good habits: </li></ul><ul><ul><li>Avoid peer-to-peer file sharing software. </li></ul></ul><ul><ul><li>Do not open suspicious e-mails or attachments. </li></ul></ul><ul><ul><li>Only visit trusted web sites. </li></ul></ul><ul><ul><li>Do not interact with online advertisements. </li></ul></ul><ul><ul><li>Avoid rogue anti-malware programs. </li></ul></ul>Protection and removal software alone is NOT enough to protect your computer, as even the most reputable protection can be bypassed or disabled. The best form of protection comes from developing a strong understanding and good habits when accessing information resources such as the Internet and e-mail.
  10. 10. Personal Firewall <ul><li>Personal Firewall - A personal firewall is a program that is installed on your computer to prevent intrusions from programs and other computers. </li></ul><ul><li>Valdosta State University recommends PC-cillin, a package including both a personal firewall and antivirus software. </li></ul><ul><li>PC-cillin is verified to be compatible with Valdosta State University Services including: </li></ul><ul><ul><ul><li>Registration and Advising </li></ul></ul></ul><ul><ul><ul><li>The wireless network </li></ul></ul></ul><ul><ul><ul><li>Online classes </li></ul></ul></ul><ul><ul><ul><li>Campus e-mail </li></ul></ul></ul>
  11. 11. Antivirus <ul><li>Antivirus - Antivirus software is used to detect and deal with viruses, worms, and Trojan horses. This is normally done by removing the infection from the file, but if this action fails, the antivirus software may quarantine or delete the infected files to prevent the infection from spreading to other files. </li></ul><ul><li>Once again, Valdosta State University recommends the use of PC-cillin. </li></ul>
  12. 12. PC-cillin Assistance <ul><li>For instructions on how to download, install, run and update PC-cillin visit the Anti-Virus and Spyware page. </li></ul>
  13. 13. Anti-Spyware <ul><li>Anti-Spyware – Anti-Spyware software is used to detect, clean, and prevent spyware and adware programs from infecting your computer. Anti-Spyware programs clean your computer by removing infected files and, in some cases, by preventing the files from being downloaded in the first place. </li></ul><ul><li>Valdosta State University recommends using Windows Defender, Spybot Search & Destroy, and Lavasoft Ad-Aware SE Personal. </li></ul>
  14. 14. Anti-Spyware Assistance <ul><li>For instructions on how to download, install, run and update Spybot Search & Destroy, Windows Defender, and Ad-Aware SE Personal visit the Anti-Virus and Spyware page. </li></ul>
  15. 15. What is Peer-to-Peer file-sharing? <ul><li>Peer-to-Peer file-sharing involves the use of software that allows you to download from other users on the network, rather than from a trusted source. Peer-to-peer file-sharing is the most common source of malware infections, as it is impossible to either verify whether the files are authentic and unmodified or to track down the source of the file. </li></ul>
  16. 16. Avoid Peer-to-Peer Software <ul><li>Peer-to-Peer software is one of the most prevalent ways that malware spreads. </li></ul><ul><li>As you cannot verify the legitimacy of the download, you cannot tell if the download has been tampered with to include malware. </li></ul><ul><li>It is best to avoid downloading anything from Peer-to-Peer software. </li></ul><ul><li>Examples of Peer-to-Peer software include Limewire, Kazaa, Bearshare, and any BitTorrent client. </li></ul>
  17. 17. Suspicious Emails and Attachments <ul><li>Suspicious emails or attachments are another prevalent way that malware spreads. Emails are also another way online scams spread. </li></ul><ul><li>If you receive any email from an address you don’t recognize be careful if you open it. Do not open any attachments or click on any links in the email until you have verified that the email is genuine and not a threat. </li></ul>
  18. 18. Only Visit Trusted Websites <ul><li>There are multitudes of websites that anybody can visit. You should always be alert to what websites you browse. </li></ul><ul><li>When downloading programs download directly from that companies website instead of someone’s personal website as you do not know if that person has tampered with the program. </li></ul>
  19. 19. Do Not Interact With Online Advertisements <ul><li>If you get any online advertisements do not close it by clicking close or cancel in the advertisement as this could allow malware to infect your computer. </li></ul><ul><li>Instead close the pop-up by clicking on the close “X” button in the top right hand corner of the pop-up. </li></ul><ul><li>If there is no close “X” button hit Alt + F4 buttons. </li></ul>
  20. 20. Rogue Anti-Malware Programs <ul><li>Rogue anti-malware programs claim to be anti-virus/spyware programs but are really malware in themselves. </li></ul><ul><li>These are usually installed by the user clicking on a pop-up saying that their computer is infected or the user is looking for anti-malware software and mistakenly downloads a rogue one. </li></ul><ul><li>These programs will continually tell the user that they are infected with malware and that the user should buy their product to remove the malware. These programs are nothing more than a scam and buying the program will not remove the rogue program, nor will it remove any actual spyware on the computer. </li></ul>
  21. 21. Your Appointment <ul><li>When you come in for your Disinfection appointment, you will take a 25 question test which you must pass before a Disinfection Technician can assist you in any further actions at your computer. </li></ul><ul><li>After you have passed the test and completed your disinfection you should have the tools and knowledge to keep your computer clean. </li></ul>