Your SlideShare is downloading. ×
Home computer security By Stacy Wang
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Home computer security By Stacy Wang

226

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
226
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
7
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Home computer security
    • By Stacy Wang
    • Ben Wright
  • 2. Our Goal
    • Audience
    • What
    • Why
    • How
  • 3. Core Topics
    • Password
    • Anti-Virus
    • Spoofing
    • Firewalls
  • 4. password the benefit of using longer passwords
  • 5. Password
    • Password is useful to protect our own information.
    • The Using Dictionary program
      • Access to our files, e-mail, funds or personal account information
      • Will be able to modify these files, or to subscribe to unwanted services for which we have to pay.
  • 6. Password (continue.)
    • Sniffer
      • A technical way of learning passwords to look at the raw data transmitted across the net and decipher its contents.
  • 7. Password (Continue)
    • Help all user to develop a necessary degree of complexity
      • The Length
      • The Width
      • The Depth
      • The Times
      • Password Hashing Function
  • 8. Password Network Security Essentials : Stallings 1.0 13787 Total 0.42 5772 8 0.21 2917 7 0.22 3035 6 0.09 1260 5 0.03 449 4 0.02 212 3 0.006 87 2 0.004 55 1 Fraction of Total Number Length
  • 9. Anti-Virus
    • What is virus?
      • It is something into our computer though network.
      • Can be infect other program by modifying them to include a possibly evolved copy of itself.
    • There are some Virus
      • The Malicious Programs
      • The Trojans Horse
  • 10. better to install and keeping update Anti-Virus Software
    • Here are a few primary indicators that your computer might be infected:
    • Your computer runs more slowly than normal
    • Your computer stops responding or locks up often
    • Your computer crashes and restarts every few minutes
    • Your computer restarts on its own and then fails to run normally
    • Applications on your computer don't work correctly
    • Disks or disk drives are inaccessible
    • You can't print correctly
    • You see unusual error messages
    • You see distorted menus and dialog boxes
  • 11. How do we remove the computer virus?
    • go on Microsoft Download center website, or click “Start” on the right corn of you monitor, then click “Control Panel
    • Click System, and then click the Automatic Updates tab.
    • Click Performance and Maintenance, click System, and then click the Automatic Updates tab.
    • Click the option that you want. Make sure Automatic Updates is not turn
    • If you currently use antivirus software, visit the manufacturer's Web site, update it, and then perform a thorough scan of your system. If you don't currently use antivirus software, subscribe to a service and scan your system immediately.
    • Download, install, and run the Malicious Software Removal Tool (for Microsoft Windows XP or Windows 2000 users). Note that this tool does not prevent viruses from infecting your system; it only helps to remove existing viruses.
  • 12. Phishing - History
    • To steal consumers' personal identity data and financial account credentials 1
    • Around 1995 on AOL
    • Only needed user name
    • Evolving Complexity
    • Being Educated is the best defense
    • Bait and Switch
    1 http://www.AntiPhishing.org
  • 13. Setting the Trap
    • Email and Spam
    • In 2004, 82% of US email was spam¹
    • 2 billion spam emails are sent every day 2
    • ISP’s and Spam filters only work so good.
    • Zombies
    • Targets: eBay, Amazon, CitiBank
    1 http://MessageLabs.com 2004 2 http://mailfrontier.com
  • 14. Spotting a fake
    • “Your account has been suspended.”
    • Ask you to provide private information
    • Not personalized “Valued Customer”
    • Digital signature
    http://survey.mailfrontier.com
  • 15.  
  • 16.  
  • 17.  
  • 18.  
  • 19.  
  • 20. www.PayPai.com
  • 21.  
  • 22.  
  • 23. And the Switch
    • Stealing source
    • Look identical to their real counterparts
    • https://
    • .
  • 24. Help is on the Way Version 2.0 Firefox caught 79% phishing sites
  • 25. Version 7.0
  • 26. Firewalls
    • Designed to monitor / screen network traffic
  • 27. Functions of a Firewall
    • Packet filtering
    • Application proxy
    • NAT (network address translation)
    • Monitoring and logging
  • 28. Transmission Control Protocol and Internet Protocol TCP/IP
    • Packet filtering
      • Read the headers – what and where
      • Cost effective
      • Examine transport like TCP or UDP
      • Weakness: no authentication, application attacks
  • 29. More Defenses
    • Application Proxy
      • Deeper inspection
      • Costly – each application has own rules
  • 30. Added Benefits
    • NAT (Network Address Translation)
      • Communication with firewall
    • Monitoring and logging
      • Track attempts
      • See performance
  • 31. Problems
    • Block unwanted programs!
      • www.Portforward.com
    • Confusing to configure
  • 32. Are you protected?
  • 33. Setting Up Firewall
  • 34. Ports and Configuring

×