Internet Security

1,623 views
1,538 views

Published on

An introduction for internet and computer security. Some of Windows-based examples are used.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,623
On SlideShare
0
From Embeds
0
Number of Embeds
15
Actions
Shares
0
Downloads
174
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Internet Security

  1. 1. PC/Internet Security Dec 12, 2007
  2. 2. Password Common security solution
  3. 3. Password <ul><li>No reason to share password because you can: </li></ul><ul><ul><li>Share files/folders </li></ul></ul><ul><ul><li>Remote Desktop </li></ul></ul><ul><ul><li>E-mail Proxy </li></ul></ul>
  4. 5. Managing Passwords <ul><li>Choosing a good pass phrase </li></ul><ul><ul><li>“ 1wb1DCH” </li></ul></ul><ul><ul><li>http://www.aces.edu/extconnections/2006/10/ </li></ul></ul><ul><li>Use different passwords for different systems </li></ul><ul><li>Password Managers </li></ul><ul><ul><li>Password Safe </li></ul></ul><ul><ul><ul><li>http:// passwordsafe.sourceforge.net </li></ul></ul></ul><ul><ul><li>Others </li></ul></ul><ul><ul><ul><li>http://www.lifehack.org/articles/technology/10-free-ways-to-track-all-your-passwords.html </li></ul></ul></ul>
  5. 6. Safely Using Email Avoid hoaxes and phishing attempts
  6. 7. Hoaxes <ul><li>Trickery </li></ul><ul><li>Please forward </li></ul><ul><li>Usually harmless </li></ul><ul><li>Waste time and resources </li></ul>
  7. 8. Phishing Clues <ul><li>Return address appears to be legitimate </li></ul><ul><li>Warns of consequences unless urgent action is taken </li></ul><ul><li>No personal info or account name/number in message </li></ul><ul><li>Name of link doesn’t match destination </li></ul><ul><ul><li>Name of link: https://www.firstnational.com </li></ul></ul><ul><ul><li>Destination of link: http:// www.sargonas.com/firstnational/login.htm </li></ul></ul><ul><li>Link is not secure (HTTPS) </li></ul><ul><li>http://www.aces.edu/extconnections/2006/12 </li></ul><ul><li>http:// www.wikipedia.org /wiki/Phishing </li></ul><ul><li>http://jdorner.blogspot.com/2007/03/every-now-and-then-i-come-across.html </li></ul>
  8. 9. Don’t Become A Victim <ul><li>“ Google” a sentence from the message to see if it’s a hoax or phishing attempt </li></ul><ul><li>Never click on web links and be mindful of HTTPS </li></ul><ul><li>Only open attachments which are in expected messages (just because you know the sender doesn’t mean the message is legitimate) </li></ul>
  9. 10. Protecting You and Your Operating System
  10. 11. Ways to Secure MS Windows <ul><li>Install virus protection software </li></ul><ul><li>Turn on the Windows firewall </li></ul><ul><li>Turn on Windows updates </li></ul><ul><li>Use spyware/adware prevention software </li></ul><ul><li>Use Windows Security Center </li></ul><ul><li>Use limited accounts </li></ul>
  11. 12. Virus Protection Software <ul><li>Install & routinely update virus protection software </li></ul><ul><ul><li>McAfee </li></ul></ul><ul><ul><li>Trend Micro </li></ul></ul><ul><ul><li>Sophos </li></ul></ul><ul><ul><li>AVG </li></ul></ul><ul><ul><ul><li>Free for non-commercial use </li></ul></ul></ul><ul><ul><ul><li>Download at www.downloads.com </li></ul></ul></ul><ul><ul><li>Symantec (Norton) </li></ul></ul><ul><ul><ul><li>Resource intensive </li></ul></ul></ul>
  12. 13. Windows Firewall <ul><li>Choose “On” </li></ul><ul><li>Only unblock programs that you trust </li></ul>
  13. 14. Windows Updates <ul><li>Select “Automatic (recommended)” </li></ul><ul><li>Select “Everyday” </li></ul><ul><li>Choose an appropriate time </li></ul><ul><li>Leave computer on! (check sleep/hibernate) </li></ul>
  14. 15. Spyware/Malware Prevention Software <ul><li>Preventative—combine w/ Reactive </li></ul><ul><ul><li>Windows Defender </li></ul></ul><ul><ul><ul><li>http://www.microsoft.com/athome/security/spyware/software/default.mspx </li></ul></ul></ul><ul><ul><li>AVG Anti-Spyware </li></ul></ul><ul><ul><ul><li>www.downloads.com </li></ul></ul></ul><ul><li>Reactive (run once a week) </li></ul><ul><ul><li>Spybot </li></ul></ul><ul><ul><ul><li>www.downloads.com </li></ul></ul></ul><ul><ul><li>Adaware </li></ul></ul><ul><ul><ul><li>www.downloads.com </li></ul></ul></ul>
  15. 16. Security Center <ul><li>Ensures: </li></ul><ul><ul><li>Firewall is on </li></ul></ul><ul><ul><li>Automatic updates are installed </li></ul></ul><ul><ul><li>Virus protection installed & up-to-date </li></ul></ul>
  16. 17. Security Center Click on the shield to fix the problem You don’t want the RED or Yellow shield
  17. 18. Limited Accounts <ul><li>Prohibited from installing software </li></ul><ul><ul><li>Prevents installation of malware/viruses </li></ul></ul><ul><ul><li>User has access to currently installed software </li></ul></ul><ul><li>Prohibited from accessing Administrator’s documents & settings </li></ul><ul><ul><li>Prevents changes to administrator password </li></ul></ul><ul><ul><li>Prevents access to Administrator’s Documents, Desktop, etc. </li></ul></ul><ul><li>Create/modify system accounts under “Control Panel/User Accounts” </li></ul>
  18. 19. Limited Accounts <ul><li>Easily switch between accounts </li></ul><ul><li>Leave programs running while others login (windows-L) </li></ul>
  19. 20. Home Networking Everyone Needs a Router!
  20. 21. Home Networking Routers <ul><li>One internet connection, multiple computers </li></ul><ul><li>Firewall protection </li></ul><ul><li>Access restrictions </li></ul>
  21. 22. One Internet Connection
  22. 23. Firewall Protection <ul><li>One-way valve that lets you out, but doesn’t let intruders in </li></ul><ul><ul><li>Prevents unauthorized access to your computer(s) </li></ul></ul><ul><ul><li>Hides your computer(s) from the internet while still allowing access to the internet </li></ul></ul><ul><li>Justification: Attacks on AU (week of 5/28-6/02) </li></ul><ul><ul><li>90,540 blocked </li></ul></ul><ul><ul><li>25,147 suspicious </li></ul></ul><ul><ul><li>3,893 possibly successful </li></ul></ul>
  23. 24. Access Restrictions <ul><li>Control when a computer can access the internet </li></ul><ul><ul><li>Deny/Allow by website or keyword </li></ul></ul><ul><li>Multiple configurations </li></ul><ul><ul><li>Everyday or only on school days etc. </li></ul></ul><ul><ul><li>All the time, or only between 4p.m. & 10p.m, etc. </li></ul></ul>
  24. 25. Secure Wireless <ul><li>Most routers can be configured w/a CD </li></ul><ul><li>What can be done manually? </li></ul><ul><ul><li>Change the SSID (wireless network name) </li></ul></ul><ul><ul><li>Disable SSID Broadcast (make it invisible) </li></ul></ul><ul><ul><li>Require a password to join the wireless network </li></ul></ul><ul><ul><li>Restrict by MAC address </li></ul></ul>
  25. 26. Questions? Thank You! Greg Parmer , Jonas Bowersock , Anne Adrian

×