Home computer security By Stacy Wang

  • 205 views
Uploaded on

 

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
205
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
6
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Home computer security
    • By Stacy Wang
    • Ben Wright
  • 2. Our Goal
    • Audience
    • What
    • Why
    • How
  • 3. Core Topics
    • Password
    • Anti-Virus
    • Spoofing
    • Firewalls
  • 4. password the benefit of using longer passwords
  • 5. Password
    • Password is useful to protect our own information.
    • The Using Dictionary program
      • Access to our files, e-mail, funds or personal account information
      • Will be able to modify these files, or to subscribe to unwanted services for which we have to pay.
  • 6. Password (continue.)
    • Sniffer
      • A technical way of learning passwords to look at the raw data transmitted across the net and decipher its contents.
  • 7. Password (Continue)
    • Help all user to develop a necessary degree of complexity
      • The Length
      • The Width
      • The Depth
      • The Times
      • Password Hashing Function
  • 8. Password Network Security Essentials : Stallings 1.0 13787 Total 0.42 5772 8 0.21 2917 7 0.22 3035 6 0.09 1260 5 0.03 449 4 0.02 212 3 0.006 87 2 0.004 55 1 Fraction of Total Number Length
  • 9. Anti-Virus
    • What is virus?
      • It is something into our computer though network.
      • Can be infect other program by modifying them to include a possibly evolved copy of itself.
    • There are some Virus
      • The Malicious Programs
      • The Trojans Horse
  • 10. better to install and keeping update Anti-Virus Software
    • Here are a few primary indicators that your computer might be infected:
    • Your computer runs more slowly than normal
    • Your computer stops responding or locks up often
    • Your computer crashes and restarts every few minutes
    • Your computer restarts on its own and then fails to run normally
    • Applications on your computer don't work correctly
    • Disks or disk drives are inaccessible
    • You can't print correctly
    • You see unusual error messages
    • You see distorted menus and dialog boxes
  • 11. How do we remove the computer virus?
    • go on Microsoft Download center website, or click “Start” on the right corn of you monitor, then click “Control Panel
    • Click System, and then click the Automatic Updates tab.
    • Click Performance and Maintenance, click System, and then click the Automatic Updates tab.
    • Click the option that you want. Make sure Automatic Updates is not turn
    • If you currently use antivirus software, visit the manufacturer's Web site, update it, and then perform a thorough scan of your system. If you don't currently use antivirus software, subscribe to a service and scan your system immediately.
    • Download, install, and run the Malicious Software Removal Tool (for Microsoft Windows XP or Windows 2000 users). Note that this tool does not prevent viruses from infecting your system; it only helps to remove existing viruses.
  • 12. Phishing - History
    • To steal consumers' personal identity data and financial account credentials 1
    • Around 1995 on AOL
    • Only needed user name
    • Evolving Complexity
    • Being Educated is the best defense
    • Bait and Switch
    1 http://www.AntiPhishing.org
  • 13. Setting the Trap
    • Email and Spam
    • In 2004, 82% of US email was spam¹
    • 2 billion spam emails are sent every day 2
    • ISP’s and Spam filters only work so good.
    • Zombies
    • Targets: eBay, Amazon, CitiBank
    1 http://MessageLabs.com 2004 2 http://mailfrontier.com
  • 14. Spotting a fake
    • “Your account has been suspended.”
    • Ask you to provide private information
    • Not personalized “Valued Customer”
    • Digital signature
    http://survey.mailfrontier.com
  • 15.  
  • 16.  
  • 17.  
  • 18.  
  • 19.  
  • 20. www.PayPai.com
  • 21.  
  • 22.  
  • 23. And the Switch
    • Stealing source
    • Look identical to their real counterparts
    • https://
    • .
  • 24. Help is on the Way Version 2.0 Firefox caught 79% phishing sites
  • 25. Version 7.0
  • 26. Firewalls
    • Designed to monitor / screen network traffic
  • 27. Functions of a Firewall
    • Packet filtering
    • Application proxy
    • NAT (network address translation)
    • Monitoring and logging
  • 28. Transmission Control Protocol and Internet Protocol TCP/IP
    • Packet filtering
      • Read the headers – what and where
      • Cost effective
      • Examine transport like TCP or UDP
      • Weakness: no authentication, application attacks
  • 29. More Defenses
    • Application Proxy
      • Deeper inspection
      • Costly – each application has own rules
  • 30. Added Benefits
    • NAT (Network Address Translation)
      • Communication with firewall
    • Monitoring and logging
      • Track attempts
      • See performance
  • 31. Problems
    • Block unwanted programs!
      • www.Portforward.com
    • Confusing to configure
  • 32. Are you protected?
  • 33. Setting Up Firewall
  • 34. Ports and Configuring