SlideShare a Scribd company logo
1 of 35
Avoiding the Dark Alleys of the Internet Extension in the Connected Age NC Cooperative Extension March 24, 2009 Presented by Greg Parmer Alabama Cooperative Extension System
[object Object]
Security Topics ,[object Object],[object Object],[object Object],[object Object],[object Object]
Updates/Patches Why “if it ain’t broke, don’t fix it” doesn’t apply here!
Updates/Patches ,[object Object],[object Object],[object Object]
@Risk Example ,[object Object],[object Object],[object Object],[object Object],[object Object]
MS Windows Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Virus Protection Software ,[object Object],[object Object],[object Object],[object Object],[object Object]
Windows Firewall ,[object Object],Only unblock programs that you trust
Windows Updates ,[object Object],[object Object],[object Object],[object Object]
Security Center ,[object Object],[object Object],[object Object],[object Object]
Security Center Click on the shield to fix the problem You don’t want the  RED   or   Yellow   shield
Limited Accounts ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Limited Accounts ,[object Object],[object Object]
Passwords? How to stop the sharing madness
Passwords ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Managing Passwords ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Safely Using Email Avoid hoaxes and phishing attempts
Hoaxes ,[object Object],[object Object],[object Object],[object Object]
Phishing Clues  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Viruses  &  Trojans ,[object Object],[object Object]
Don’t Become A Victim ,[object Object],[object Object]
Surfing Read the Warnings
S is for secure ,[object Object],[object Object],[object Object],[object Object],[object Object]
Read  &  Heed
Plain-text Protocols
Secure Protocol
Home Routers Insurance that works for you!
Home Routers ,[object Object],[object Object],[object Object]
One Internet Connection
Firewall Protection ,[object Object],[object Object],[object Object]
Access Restrictions ,[object Object],[object Object],[object Object],[object Object],[object Object]
Secure Wireless ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Other References ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Thank You Greg Parmer gparmer @ auburn.edu

More Related Content

What's hot

Protecting Windows Networks From Malware
Protecting Windows Networks From MalwareProtecting Windows Networks From Malware
Protecting Windows Networks From Malware
Rishu Mehra
 
Os x security basics for keeping your mac safe final
Os x security basics for keeping your mac safe   finalOs x security basics for keeping your mac safe   final
Os x security basics for keeping your mac safe final
Khürt Williams
 

What's hot (19)

RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITERUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
 
Web server security techniques by Khawar Nehal
Web server security techniques by Khawar NehalWeb server security techniques by Khawar Nehal
Web server security techniques by Khawar Nehal
 
Network security primer
Network security primerNetwork security primer
Network security primer
 
Where To Start When Your Environment is Fucked
Where To Start When Your Environment is FuckedWhere To Start When Your Environment is Fucked
Where To Start When Your Environment is Fucked
 
10 things I’ve learnt about web application security
10 things I’ve learnt about web application security10 things I’ve learnt about web application security
10 things I’ve learnt about web application security
 
Derby con 2014
Derby con 2014Derby con 2014
Derby con 2014
 
WORDPRESS SECURITY: HOW TO AVOID BEING HACKED
WORDPRESS SECURITY: HOW TO AVOID BEING HACKEDWORDPRESS SECURITY: HOW TO AVOID BEING HACKED
WORDPRESS SECURITY: HOW TO AVOID BEING HACKED
 
Building an Intranet with WordPress
Building an Intranet with WordPressBuilding an Intranet with WordPress
Building an Intranet with WordPress
 
Digital Enemies
Digital EnemiesDigital Enemies
Digital Enemies
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 
Cybersafety basics
Cybersafety basicsCybersafety basics
Cybersafety basics
 
Protecting Windows Networks From Malware
Protecting Windows Networks From MalwareProtecting Windows Networks From Malware
Protecting Windows Networks From Malware
 
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A  ....Salwan public schoolDev Abhijet Gagan Chaitanya VII-A  ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
 
Os x security basics for keeping your mac safe final
Os x security basics for keeping your mac safe   finalOs x security basics for keeping your mac safe   final
Os x security basics for keeping your mac safe final
 
Understanding The Known: OWASP A9 Using Components With Known Vulnerabilities
Understanding The Known: OWASP A9 Using Components With Known VulnerabilitiesUnderstanding The Known: OWASP A9 Using Components With Known Vulnerabilities
Understanding The Known: OWASP A9 Using Components With Known Vulnerabilities
 
Data Breach: Hot Topics in Information Security Trends Webinar Recording
Data Breach: Hot Topics in Information Security Trends Webinar RecordingData Breach: Hot Topics in Information Security Trends Webinar Recording
Data Breach: Hot Topics in Information Security Trends Webinar Recording
 
Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirus
 
10 Essential Information Security Tips for Everyone
10 Essential Information Security Tips for Everyone10 Essential Information Security Tips for Everyone
10 Essential Information Security Tips for Everyone
 
Joomla Security
Joomla SecurityJoomla Security
Joomla Security
 

Viewers also liked

Introduction to moodle
Introduction to moodleIntroduction to moodle
Introduction to moodle
John Dorner
 

Viewers also liked (20)

Podcasting And NCSU iTunes
Podcasting And  NCSU iTunesPodcasting And  NCSU iTunes
Podcasting And NCSU iTunes
 
Intro to Google Docs
Intro to Google DocsIntro to Google Docs
Intro to Google Docs
 
eXtension People and Open ID
eXtension People and Open IDeXtension People and Open ID
eXtension People and Open ID
 
Getting Started With A Blog
Getting Started With A BlogGetting Started With A Blog
Getting Started With A Blog
 
Participating in eXtension Communities of Practice
Participating in eXtension Communities of PracticeParticipating in eXtension Communities of Practice
Participating in eXtension Communities of Practice
 
Facebook
FacebookFacebook
Facebook
 
Basics of_creating_online_learning_modules
 Basics of_creating_online_learning_modules Basics of_creating_online_learning_modules
Basics of_creating_online_learning_modules
 
Using Clickers For Instant Feedback Robin Brekke
Using Clickers For Instant Feedback Robin BrekkeUsing Clickers For Instant Feedback Robin Brekke
Using Clickers For Instant Feedback Robin Brekke
 
Why use Facebook or MySpace in Extension
Why use Facebook or MySpace in ExtensionWhy use Facebook or MySpace in Extension
Why use Facebook or MySpace in Extension
 
Introduction to moodle
Introduction to moodleIntroduction to moodle
Introduction to moodle
 
Having Conversations Through Twitter
Having Conversations Through TwitterHaving Conversations Through Twitter
Having Conversations Through Twitter
 
Stop broadcasting and_have_a_conversation
Stop broadcasting and_have_a_conversationStop broadcasting and_have_a_conversation
Stop broadcasting and_have_a_conversation
 
Extension in the Connected Age
Extension in the Connected AgeExtension in the Connected Age
Extension in the Connected Age
 
Participating in eXtension Communities of Practice
Participating in eXtension Communities of PracticeParticipating in eXtension Communities of Practice
Participating in eXtension Communities of Practice
 
Getting Started With A Blog
Getting Started With A BlogGetting Started With A Blog
Getting Started With A Blog
 
Introduction To Using Skype In Extension
Introduction To Using Skype In ExtensionIntroduction To Using Skype In Extension
Introduction To Using Skype In Extension
 
Marketing possibilities with_the_use_of_social
Marketing possibilities with_the_use_of_socialMarketing possibilities with_the_use_of_social
Marketing possibilities with_the_use_of_social
 
Using Social Media for Learning, Teaching and Marketing
Using Social Media for Learning, Teaching and MarketingUsing Social Media for Learning, Teaching and Marketing
Using Social Media for Learning, Teaching and Marketing
 
Using Ning in Education
Using Ning in EducationUsing Ning in Education
Using Ning in Education
 
Drinking from a firehose
Drinking from a firehoseDrinking from a firehose
Drinking from a firehose
 

Similar to Dark Alleys/Internet Security

Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4
leahg118
 
302 Content Server Security Challenges And Best Practices
302   Content Server Security   Challenges And Best Practices302   Content Server Security   Challenges And Best Practices
302 Content Server Security Challenges And Best Practices
phanleson
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
amiinaaa
 
Email Effective Security Practices: 10 Concrete Steps to Consider
Email Effective Security Practices: 10 Concrete Steps to ConsiderEmail Effective Security Practices: 10 Concrete Steps to Consider
Email Effective Security Practices: 10 Concrete Steps to Consider
webhostingguy
 
Web security programming_ii
Web security programming_iiWeb security programming_ii
Web security programming_ii
googli
 
Web Security Programming I I
Web  Security  Programming  I IWeb  Security  Programming  I I
Web Security Programming I I
Pavu Jas
 
Web security programming_ii
Web security programming_iiWeb security programming_ii
Web security programming_ii
googli
 

Similar to Dark Alleys/Internet Security (20)

Internet security
Internet securityInternet security
Internet security
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4
 
Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft
Watch Your Back: Let’s Talk Web Safety and Personal Identity TheftWatch Your Back: Let’s Talk Web Safety and Personal Identity Theft
Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft
 
302 Content Server Security Challenges And Best Practices
302   Content Server Security   Challenges And Best Practices302   Content Server Security   Challenges And Best Practices
302 Content Server Security Challenges And Best Practices
 
Oracle UCM Security: Challenges and Best Practices
Oracle UCM Security: Challenges and Best PracticesOracle UCM Security: Challenges and Best Practices
Oracle UCM Security: Challenges and Best Practices
 
How to Secure Web Apps — A Web App Security Checklist
How to Secure Web Apps — A Web App Security ChecklistHow to Secure Web Apps — A Web App Security Checklist
How to Secure Web Apps — A Web App Security Checklist
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Email Effective Security Practices: 10 Concrete Steps to Consider
Email Effective Security Practices: 10 Concrete Steps to ConsiderEmail Effective Security Practices: 10 Concrete Steps to Consider
Email Effective Security Practices: 10 Concrete Steps to Consider
 
Secure programming with php
Secure programming with phpSecure programming with php
Secure programming with php
 
Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application Security
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)
 
Joomla Security
Joomla  SecurityJoomla  Security
Joomla Security
 
demo1
demo1demo1
demo1
 
Web security programming_ii
Web security programming_iiWeb security programming_ii
Web security programming_ii
 
Web Security Programming I I
Web  Security  Programming  I IWeb  Security  Programming  I I
Web Security Programming I I
 
Web security programming_ii
Web security programming_iiWeb security programming_ii
Web security programming_ii
 
The Safest Way To Interact Online
The Safest Way To Interact OnlineThe Safest Way To Interact Online
The Safest Way To Interact Online
 
Digital Immunity -The Myths and Reality
Digital Immunity -The Myths and RealityDigital Immunity -The Myths and Reality
Digital Immunity -The Myths and Reality
 
Active Testing
Active TestingActive Testing
Active Testing
 

More from John Dorner

More from John Dorner (11)

Local development environment
Local development environmentLocal development environment
Local development environment
 
Creating Your Online Learning Network
Creating Your Online Learning NetworkCreating Your Online Learning Network
Creating Your Online Learning Network
 
Intro to social_networking
Intro to social_networkingIntro to social_networking
Intro to social_networking
 
2010 NCAEFCS State Meeting Technology Session
2010 NCAEFCS State Meeting Technology Session2010 NCAEFCS State Meeting Technology Session
2010 NCAEFCS State Meeting Technology Session
 
2010 NCAEFCS State Meeting Technology Session
2010 NCAEFCS State Meeting Technology Session2010 NCAEFCS State Meeting Technology Session
2010 NCAEFCS State Meeting Technology Session
 
File Sharing
File SharingFile Sharing
File Sharing
 
Test Presentation
Test PresentationTest Presentation
Test Presentation
 
Feeding Frenzy
Feeding FrenzyFeeding Frenzy
Feeding Frenzy
 
Social Bookmarking
Social BookmarkingSocial Bookmarking
Social Bookmarking
 
Working Together
Working TogetherWorking Together
Working Together
 
Getting Faster, Better and Smarter with Online Tools
Getting Faster, Better and Smarter with Online ToolsGetting Faster, Better and Smarter with Online Tools
Getting Faster, Better and Smarter with Online Tools
 

Recently uploaded

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 

Dark Alleys/Internet Security