SlideShare a Scribd company logo
1 of 38
Computer Security
Opening Question
What is Internet / Computer Security?
• Brainstorm ideas
Today’s Agenda
• Internet Security – Fact / Fiction
• Anti-Virus, Malware, Spyware – what’s the
difference? How do I get rid of them?
– Free vs. Purchased Programs
• Passwords – how to create strong passwords
What is a Computer Virus?
Let’s watch a video from
How Stuff Works
Internet Security Myths
Taken from:
http://techchunks.com/technology/top-
10-internet-safety-myths-debunked/
1. Web is safe as I’ve never been hit by
malware
According to the Sophos report, many web
users may not even know if they are under
constant malware attack. The attacks are
designed to steal personal information and
passwords or use your machine for
distributing spam, malware or inappropriate
content without your knowledge.
2. Only p0rn sites are dangerous
If you think only p0rn and g@mbling sites are
home to hackers, here’s a reason to worry. The
majority of infected sites are websites that
you trust and visit almost daily. The report
says, hijacked trusted sites represent more
than 83% of malware hosting sites.
3. Only naive users get hit by viruses
Being a computer expert is not a sure shot
formula to prevent you from falling victim to
any cyber attack. Many attacks happen silently
without any user involvement. Malware from
drive-by downloads happens automatically
without any user action, other than visiting
the site. Therefore, it doesn’t matter what
level of computer expertise you may have.
4. I can only get infected if I download
files
Most malware infections now occur through a “drive-
by” download. Hackers inject the malicious code into
the actual Web page content, then it downloads and
executes automatically within the browser as a by-
product of simply viewing the Web page.
The malware is typically part of a professional exploit
kit marketed and sold to hackers that leverages known
exploits in the browser, operating system or plug-ins to
infect the computer and download more malware. And
this happens without a user having to do anything
other than visit a hijacked Web site.
5. Firefox, or Chrome, is more secure
than Internet Explorer
There is no fool-proof browser that can prevent you
from falling prey to hackers’ trap. All browsers are
equally at risk because all browsers are essentially an
execution environment for JavaScript, which is the
programming language of the Web and therefore used
by all malware authors to initiate an attack
In addition, many exploits leverage plug-ins such as
Adobe Acrobat reader software, which runs across all
browsers. Although the more popular browsers may
get more publicity about unpatched exploits, it’s the
unpublicized exploits you should be most concerned
about.
6. Lock icon in the browser means it’s
secure
When the lock icon appears in the browser, many of us
believe we are opening a secure site. This is because the
lock icon indicates there is an SSL encrypted connection
between the browser and the server to protect the
interception of personal sensitive information. However,
the report says it does not provide any security from
malware.
In fact, it’s the opposite because most Web security
products are completely blind to encrypted connections:
it’s the perfect vehicle for malware to infiltrate a machine.
There have been many cases where hackers emulate bank,
credit card sites complete with spoofed SSL certificates that
are difficult for a user to identify as fraudulent.
7. Installing Antivirus Software is
Sufficient
Antivirus software is a commonly known
requirement for Internet security. However, the
myth that antivirus installed is all that is needed
for protection is dangerous for Internet surfers.
Installing antivirus software is the start of
Internet security. Constant installation of the
latest virus definition files is required. Most
reputable antivirus software has monthly updates
for definition files. Download them to ensure the
computer can recognize newest threats.
8. Nothing Valuable is on the
Computer
Even a laptop used for minor editing and writing
can lead to stolen information. Although the user
can often forget about it, casual use of a
computer can also lead to identity theft. If the
computer has a network card, and it’s used for
Internet connectivity, it can lead to a breach on
the machine’s security. Some users only use a
computer for email retrieval. Email is a point for
hackers to send phishing emails that can lead to
the theft of passwords for banking and finance
websites.
9. Hackers Only Target Specific People
This is a common thought for home users.
Several scripts are available that allow others
to find security holes on a computer. These
people are called “script kiddies.” Script
kiddies run common programs that find the
security issues on machines that don’t have
the latest security patches. For the best
protection, purchase an antivirus program
that protects against all types of hack attacks.
What happens when a computer has a
virus
This shaky video shows a virus in action
So, where do we start?
• Make sure your Operating System (OS) is up-
to-date
– Windows Automatic Updates
• Update your browser and all plug-ins (Flash,
Java, PDF Reader, etc.)
• Install Firewall
– Windows comes with a firewall program (Security
Centre in XP / Action Centre in Vista & 7)
– Most routers/modems have built-in firewalls
Firewall
• Firewalls prevent malware from reaching your
machine through your network. They don't
prevent things you control, like downloads or
email, but rather stop attempts to connect to
or infiltrate your machine without your
knowledge or participation.
Anti-virus
• Anti-virus programs scan for viruses and
related malware by examining the files on
your system for patterns of data that have
been identified as being viruses. On some
regular basis the database of patterns the
programs use is updated to contain the latest
information on known viruses.
Anti-spyware
• Anti-spyware programs monitor your system
as you use it for behaviours that are known to
be spyware-related. For example, an anti-
spyware program might trap attempts to
change your browser home page, or attempts
to install software that starts automatically.
Phishing
• The bad guys, or "phishers", create an email that looks
VERY much like an official email from some important
entity, like eBay, MSN, Paypal, or perhaps a bank. The
email asks you to visit some site that also looks very
official and proper. At that site you're then prompted
to enter all your personal information, typically in the
guise of "verification".
• Legitimate businesses never ask you for your private
information via email.
• Never click a link in the email itself. If you need to
check, type the address yourself into the browser /
search engine
Keylogger
• A keylogger is spyware that “logs” or records
your keystrokes or other activites on your
machine. When you type in your user name and
password to a website, the keystrokes are
recorded, the information is saved, and these are
made available to the hacker that put the
keylogger on your computer. Keylogger programs
can even take screen captures as you click your
mouse, rendering many (if not most) attempts at
bypassing keyloggers ineffective.
Internet Security Suites
• "Internet security suites" are, in essence,
bundles of two or more of the basics above, and
typically also include additional security software
or shortcuts as well. For example, one extremely
popular internet security suite contains all three:
anti-virus, anti-spyware and a firewall, as well as
calling out "phishing" protection, keylogger
protection, website reputation information, email
and download monitoring, spam filtering,
parental controls and even throws in some PC
performance tools to boot.
To Do List
• Install an Anti-Virus / Anti-Spyware Program
– Microsoft Security Essentials, AVG Anti-Virus,
Avast Free Antivirus, Avira Antivirus, Notron
AntiVirus 2012
CNET
• CNET is a website that has lots of software
free to download
– Be aware while all software is free to download,
some are trail versions of paid software which
expire after period of time
• http://download.cnet.com/windows/security-
software/
To Pay or Not To Pay
• Free
– No Technical Support
– Some of Ads
– Gets same protection update (virus definitions) as paid
versions
– Customize level of protection using a variety of programs
• Paid
– More features including parental controls, identity thief
protection, and real-time monitoring
– All-In-One – one program does everything (also, one
program does everything and no program is perfect)
– The more a program does, the more resources is uses
If Virus kill my computer…
…you’ll have to take your computer to a
professional
OR
You can try and do it yourself.
Passwords
• Most security breaches are from easily
hackable passwords.
o Think of leaked photos, massive security
• All the software & hardware won’t make a
difference if you’ve got a bad password
Password - Don’t
• Don’t use a dictionary word (a word that can
be found in the dictionary, like “book” or
“computer”)
• Don’t use the same password for everything
• Avoid writing down passwords
– If you have to write down your password, don’t
tape on the monitor, under the keyboard, or on
top of the desktop
Password - Do
• Include numbers, capital letters, & non-
alphanumeric characters (e.g. &, %, #,!)
• choose a memorable catchphrase, quotation, or
easy-to-remember saying, and take the first letter
from each word.
– If the Shoe Fits, Wear It: itsfwi
– I think, therefore I am: ittia
• Lengthen your password by adding the website
name or computer software name to the base
phrase
– For gmail: itsfwiGmail
Password - Do
• Swap one or more of the password letters
with a non-alphabetic character, and then
purposely including uppercase and lowercase
letters within the password
– itsfwiGm@il
• If you are using different passwords for
differents websites, you can do yourself a
favor by rotating portions of your passwords
every few weeks
Password Managers
• A password manager is software that helps a
user organize passwords and PIN codes.
• Typically, the software has a local database
that holds the encrypted password data for
secure logon onto computers, networks, web
sites, and application data files.
• Access all passwords using a Master
Password/Passphrase
Popular Password Managers
• KeePass
• LastPass
• 1Password
• RoboForm
• SplashID
five best password managers
Password Managers
• What are the positive reasons for using a
password manager?
• What are the negative reasons for using a
password manager?
Rating a Password
OK Password Better Password Excellent Password
LadyGagaIsBizarre LGGiB LGGiBgm@il
doctorhouseisajerk DHiaJ! DHiaJ!gm@il
Ihateliverandonions IhLaOforDinner 1hLafDgm@il
Allblacksrugby ABRworldcup2011 ABRwc2011gm@il
kitty 1Kitty 1Ki77y
Create the Best Possible Password
• Using the “Password – Do’s” create 3
password for different logins (email,
computer, and bank)
• Using the “Password – Don’t” think of the top
10 worst possible passwords
Top 25 Worst Passwords
1) password
2) 123456
3) 12345678
4) qwerty
5) abc123
6) monkey
7) 1234567
8) letmein
9) trustno1
10)dragon
11)baseball
12)111111
13)iloveyou
14)master
15)sunshine
16)ashley
17)bailey
18)passw0rd
19)shadow
20)123123
21)654321
22)superman
23)qazwsx
24)michael
25)Football
Mobile Security
• Smart Phones can get viruses as well!
• Open (non-secure) Wi-Fi hotspots can be very
dangerous
• Never connect to “Free Wireless” networks.
Breeding ground for hackers, virus, and
criminals
• Never do any banking over open Wi-Fi.
Final Thoughts
• Don’t mean to scare
• If you follow some simple rules while on the
Internet the likelihood of getting any virus goes
down dramatically
• Keep programs up-to-date, run your antivirus &
anti-spyware programs regularly
• Don’t download files from unknown sources
• Be careful of files ending in “.exe”
• Be aware of what sites you’re visiting

More Related Content

What's hot

[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATSJazzyNF
 
Internet Threats
Internet ThreatsInternet Threats
Internet ThreatsLeelet1121
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Securitydkp205
 
Internet Security in Web 2.0
Internet Security in Web 2.0 Internet Security in Web 2.0
Internet Security in Web 2.0 Arjunsinh Sindhav
 
Internet Threats
Internet ThreatsInternet Threats
Internet ThreatsRonalyn_Cao
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's typesAakash Baloch
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESShyam Kumar Singh
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its typesJatin Kumar
 
Basic Internet Security
Basic Internet SecurityBasic Internet Security
Basic Internet Securitymfaheemakhtar
 
Hacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksHacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksSrikanth VNV
 

What's hot (20)

[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
 
Computer security
Computer securityComputer security
Computer security
 
Internet Security in Web 2.0
Internet Security in Web 2.0 Internet Security in Web 2.0
Internet Security in Web 2.0
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Adware
AdwareAdware
Adware
 
What is malware
What is malwareWhat is malware
What is malware
 
Viruses and Spyware
Viruses and SpywareViruses and Spyware
Viruses and Spyware
 
Online safety and malwares
Online safety and malwaresOnline safety and malwares
Online safety and malwares
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 
Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
 
Computer security
Computer securityComputer security
Computer security
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Basic Internet Security
Basic Internet SecurityBasic Internet Security
Basic Internet Security
 
Hacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksHacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer Networks
 
Internet threats
Internet threatsInternet threats
Internet threats
 

Similar to Internet security

Computers.ppt
Computers.pptComputers.ppt
Computers.pptSdhrYdv1
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PCthatfunguygeek
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4leahg118
 
Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)Satyendra Arora
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentationAmjad Bhutto
 
IT Security Seminar Cougar CPS
IT  Security  Seminar  Cougar  CPSIT  Security  Seminar  Cougar  CPS
IT Security Seminar Cougar CPScougarcps
 
Tips to remove malwares
Tips to remove malwaresTips to remove malwares
Tips to remove malwaresanthnyq
 
The 10 Commandments of Computer Security
The 10 Commandments of Computer SecurityThe 10 Commandments of Computer Security
The 10 Commandments of Computer SecurityTechvera
 
Viruses and antiviruses
Viruses and antivirusesViruses and antiviruses
Viruses and antivirusesSarhad Baez
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.Khalil Jubran
 
It security,malware,phishing,information theft
It security,malware,phishing,information theftIt security,malware,phishing,information theft
It security,malware,phishing,information theftDeepak John
 
information about virus
information about virusinformation about virus
information about virustoshan badiye
 

Similar to Internet security (20)

Computers.ppt
Computers.pptComputers.ppt
Computers.ppt
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4
 
Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
IT Security Seminar Cougar CPS
IT  Security  Seminar  Cougar  CPSIT  Security  Seminar  Cougar  CPS
IT Security Seminar Cougar CPS
 
Tips to remove malwares
Tips to remove malwaresTips to remove malwares
Tips to remove malwares
 
Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety
 
The 10 Commandments of Computer Security
The 10 Commandments of Computer SecurityThe 10 Commandments of Computer Security
The 10 Commandments of Computer Security
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Viruses and antiviruses
Viruses and antivirusesViruses and antiviruses
Viruses and antiviruses
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
anti_virus
anti_virusanti_virus
anti_virus
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
It security,malware,phishing,information theft
It security,malware,phishing,information theftIt security,malware,phishing,information theft
It security,malware,phishing,information theft
 
information about virus
information about virusinformation about virus
information about virus
 
Cyber security
Cyber securityCyber security
Cyber security
 

Recently uploaded

4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvRicaMaeCastro1
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationdeepaannamalai16
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...DhatriParmar
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseCeline George
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1GloryAnnCastre1
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research DiscourseAnita GoswamiGiri
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptxmary850239
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfPrerana Jadhav
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptxDhatriParmar
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 

Recently uploaded (20)

4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
 
Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentation
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 Database
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research Discourse
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdf
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 

Internet security

  • 2. Opening Question What is Internet / Computer Security? • Brainstorm ideas
  • 3. Today’s Agenda • Internet Security – Fact / Fiction • Anti-Virus, Malware, Spyware – what’s the difference? How do I get rid of them? – Free vs. Purchased Programs • Passwords – how to create strong passwords
  • 4. What is a Computer Virus? Let’s watch a video from How Stuff Works
  • 5. Internet Security Myths Taken from: http://techchunks.com/technology/top- 10-internet-safety-myths-debunked/
  • 6. 1. Web is safe as I’ve never been hit by malware According to the Sophos report, many web users may not even know if they are under constant malware attack. The attacks are designed to steal personal information and passwords or use your machine for distributing spam, malware or inappropriate content without your knowledge.
  • 7. 2. Only p0rn sites are dangerous If you think only p0rn and g@mbling sites are home to hackers, here’s a reason to worry. The majority of infected sites are websites that you trust and visit almost daily. The report says, hijacked trusted sites represent more than 83% of malware hosting sites.
  • 8. 3. Only naive users get hit by viruses Being a computer expert is not a sure shot formula to prevent you from falling victim to any cyber attack. Many attacks happen silently without any user involvement. Malware from drive-by downloads happens automatically without any user action, other than visiting the site. Therefore, it doesn’t matter what level of computer expertise you may have.
  • 9. 4. I can only get infected if I download files Most malware infections now occur through a “drive- by” download. Hackers inject the malicious code into the actual Web page content, then it downloads and executes automatically within the browser as a by- product of simply viewing the Web page. The malware is typically part of a professional exploit kit marketed and sold to hackers that leverages known exploits in the browser, operating system or plug-ins to infect the computer and download more malware. And this happens without a user having to do anything other than visit a hijacked Web site.
  • 10. 5. Firefox, or Chrome, is more secure than Internet Explorer There is no fool-proof browser that can prevent you from falling prey to hackers’ trap. All browsers are equally at risk because all browsers are essentially an execution environment for JavaScript, which is the programming language of the Web and therefore used by all malware authors to initiate an attack In addition, many exploits leverage plug-ins such as Adobe Acrobat reader software, which runs across all browsers. Although the more popular browsers may get more publicity about unpatched exploits, it’s the unpublicized exploits you should be most concerned about.
  • 11. 6. Lock icon in the browser means it’s secure When the lock icon appears in the browser, many of us believe we are opening a secure site. This is because the lock icon indicates there is an SSL encrypted connection between the browser and the server to protect the interception of personal sensitive information. However, the report says it does not provide any security from malware. In fact, it’s the opposite because most Web security products are completely blind to encrypted connections: it’s the perfect vehicle for malware to infiltrate a machine. There have been many cases where hackers emulate bank, credit card sites complete with spoofed SSL certificates that are difficult for a user to identify as fraudulent.
  • 12. 7. Installing Antivirus Software is Sufficient Antivirus software is a commonly known requirement for Internet security. However, the myth that antivirus installed is all that is needed for protection is dangerous for Internet surfers. Installing antivirus software is the start of Internet security. Constant installation of the latest virus definition files is required. Most reputable antivirus software has monthly updates for definition files. Download them to ensure the computer can recognize newest threats.
  • 13. 8. Nothing Valuable is on the Computer Even a laptop used for minor editing and writing can lead to stolen information. Although the user can often forget about it, casual use of a computer can also lead to identity theft. If the computer has a network card, and it’s used for Internet connectivity, it can lead to a breach on the machine’s security. Some users only use a computer for email retrieval. Email is a point for hackers to send phishing emails that can lead to the theft of passwords for banking and finance websites.
  • 14. 9. Hackers Only Target Specific People This is a common thought for home users. Several scripts are available that allow others to find security holes on a computer. These people are called “script kiddies.” Script kiddies run common programs that find the security issues on machines that don’t have the latest security patches. For the best protection, purchase an antivirus program that protects against all types of hack attacks.
  • 15. What happens when a computer has a virus This shaky video shows a virus in action
  • 16. So, where do we start? • Make sure your Operating System (OS) is up- to-date – Windows Automatic Updates • Update your browser and all plug-ins (Flash, Java, PDF Reader, etc.) • Install Firewall – Windows comes with a firewall program (Security Centre in XP / Action Centre in Vista & 7) – Most routers/modems have built-in firewalls
  • 17. Firewall • Firewalls prevent malware from reaching your machine through your network. They don't prevent things you control, like downloads or email, but rather stop attempts to connect to or infiltrate your machine without your knowledge or participation.
  • 18. Anti-virus • Anti-virus programs scan for viruses and related malware by examining the files on your system for patterns of data that have been identified as being viruses. On some regular basis the database of patterns the programs use is updated to contain the latest information on known viruses.
  • 19. Anti-spyware • Anti-spyware programs monitor your system as you use it for behaviours that are known to be spyware-related. For example, an anti- spyware program might trap attempts to change your browser home page, or attempts to install software that starts automatically.
  • 20. Phishing • The bad guys, or "phishers", create an email that looks VERY much like an official email from some important entity, like eBay, MSN, Paypal, or perhaps a bank. The email asks you to visit some site that also looks very official and proper. At that site you're then prompted to enter all your personal information, typically in the guise of "verification". • Legitimate businesses never ask you for your private information via email. • Never click a link in the email itself. If you need to check, type the address yourself into the browser / search engine
  • 21. Keylogger • A keylogger is spyware that “logs” or records your keystrokes or other activites on your machine. When you type in your user name and password to a website, the keystrokes are recorded, the information is saved, and these are made available to the hacker that put the keylogger on your computer. Keylogger programs can even take screen captures as you click your mouse, rendering many (if not most) attempts at bypassing keyloggers ineffective.
  • 22. Internet Security Suites • "Internet security suites" are, in essence, bundles of two or more of the basics above, and typically also include additional security software or shortcuts as well. For example, one extremely popular internet security suite contains all three: anti-virus, anti-spyware and a firewall, as well as calling out "phishing" protection, keylogger protection, website reputation information, email and download monitoring, spam filtering, parental controls and even throws in some PC performance tools to boot.
  • 23. To Do List • Install an Anti-Virus / Anti-Spyware Program – Microsoft Security Essentials, AVG Anti-Virus, Avast Free Antivirus, Avira Antivirus, Notron AntiVirus 2012
  • 24. CNET • CNET is a website that has lots of software free to download – Be aware while all software is free to download, some are trail versions of paid software which expire after period of time • http://download.cnet.com/windows/security- software/
  • 25. To Pay or Not To Pay • Free – No Technical Support – Some of Ads – Gets same protection update (virus definitions) as paid versions – Customize level of protection using a variety of programs • Paid – More features including parental controls, identity thief protection, and real-time monitoring – All-In-One – one program does everything (also, one program does everything and no program is perfect) – The more a program does, the more resources is uses
  • 26. If Virus kill my computer… …you’ll have to take your computer to a professional OR You can try and do it yourself.
  • 27. Passwords • Most security breaches are from easily hackable passwords. o Think of leaked photos, massive security • All the software & hardware won’t make a difference if you’ve got a bad password
  • 28. Password - Don’t • Don’t use a dictionary word (a word that can be found in the dictionary, like “book” or “computer”) • Don’t use the same password for everything • Avoid writing down passwords – If you have to write down your password, don’t tape on the monitor, under the keyboard, or on top of the desktop
  • 29. Password - Do • Include numbers, capital letters, & non- alphanumeric characters (e.g. &, %, #,!) • choose a memorable catchphrase, quotation, or easy-to-remember saying, and take the first letter from each word. – If the Shoe Fits, Wear It: itsfwi – I think, therefore I am: ittia • Lengthen your password by adding the website name or computer software name to the base phrase – For gmail: itsfwiGmail
  • 30. Password - Do • Swap one or more of the password letters with a non-alphabetic character, and then purposely including uppercase and lowercase letters within the password – itsfwiGm@il • If you are using different passwords for differents websites, you can do yourself a favor by rotating portions of your passwords every few weeks
  • 31. Password Managers • A password manager is software that helps a user organize passwords and PIN codes. • Typically, the software has a local database that holds the encrypted password data for secure logon onto computers, networks, web sites, and application data files. • Access all passwords using a Master Password/Passphrase
  • 32. Popular Password Managers • KeePass • LastPass • 1Password • RoboForm • SplashID five best password managers
  • 33. Password Managers • What are the positive reasons for using a password manager? • What are the negative reasons for using a password manager?
  • 34. Rating a Password OK Password Better Password Excellent Password LadyGagaIsBizarre LGGiB LGGiBgm@il doctorhouseisajerk DHiaJ! DHiaJ!gm@il Ihateliverandonions IhLaOforDinner 1hLafDgm@il Allblacksrugby ABRworldcup2011 ABRwc2011gm@il kitty 1Kitty 1Ki77y
  • 35. Create the Best Possible Password • Using the “Password – Do’s” create 3 password for different logins (email, computer, and bank) • Using the “Password – Don’t” think of the top 10 worst possible passwords
  • 36. Top 25 Worst Passwords 1) password 2) 123456 3) 12345678 4) qwerty 5) abc123 6) monkey 7) 1234567 8) letmein 9) trustno1 10)dragon 11)baseball 12)111111 13)iloveyou 14)master 15)sunshine 16)ashley 17)bailey 18)passw0rd 19)shadow 20)123123 21)654321 22)superman 23)qazwsx 24)michael 25)Football
  • 37. Mobile Security • Smart Phones can get viruses as well! • Open (non-secure) Wi-Fi hotspots can be very dangerous • Never connect to “Free Wireless” networks. Breeding ground for hackers, virus, and criminals • Never do any banking over open Wi-Fi.
  • 38. Final Thoughts • Don’t mean to scare • If you follow some simple rules while on the Internet the likelihood of getting any virus goes down dramatically • Keep programs up-to-date, run your antivirus & anti-spyware programs regularly • Don’t download files from unknown sources • Be careful of files ending in “.exe” • Be aware of what sites you’re visiting