Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Internet Security


Published on

An introduction for internet and computer security. Some of Windows-based examples are used.

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Internet Security

  1. 1. PC/Internet Security Dec 12, 2007
  2. 2. Password Common security solution
  3. 3. Password <ul><li>No reason to share password because you can: </li></ul><ul><ul><li>Share files/folders </li></ul></ul><ul><ul><li>Remote Desktop </li></ul></ul><ul><ul><li>E-mail Proxy </li></ul></ul>
  4. 5. Managing Passwords <ul><li>Choosing a good pass phrase </li></ul><ul><ul><li>“ 1wb1DCH” </li></ul></ul><ul><ul><li> </li></ul></ul><ul><li>Use different passwords for different systems </li></ul><ul><li>Password Managers </li></ul><ul><ul><li>Password Safe </li></ul></ul><ul><ul><ul><li>http:// </li></ul></ul></ul><ul><ul><li>Others </li></ul></ul><ul><ul><ul><li> </li></ul></ul></ul>
  5. 6. Safely Using Email Avoid hoaxes and phishing attempts
  6. 7. Hoaxes <ul><li>Trickery </li></ul><ul><li>Please forward </li></ul><ul><li>Usually harmless </li></ul><ul><li>Waste time and resources </li></ul>
  7. 8. Phishing Clues <ul><li>Return address appears to be legitimate </li></ul><ul><li>Warns of consequences unless urgent action is taken </li></ul><ul><li>No personal info or account name/number in message </li></ul><ul><li>Name of link doesn’t match destination </li></ul><ul><ul><li>Name of link: </li></ul></ul><ul><ul><li>Destination of link: http:// </li></ul></ul><ul><li>Link is not secure (HTTPS) </li></ul><ul><li> </li></ul><ul><li>http:// /wiki/Phishing </li></ul><ul><li> </li></ul>
  8. 9. Don’t Become A Victim <ul><li>“ Google” a sentence from the message to see if it’s a hoax or phishing attempt </li></ul><ul><li>Never click on web links and be mindful of HTTPS </li></ul><ul><li>Only open attachments which are in expected messages (just because you know the sender doesn’t mean the message is legitimate) </li></ul>
  9. 10. Protecting You and Your Operating System
  10. 11. Ways to Secure MS Windows <ul><li>Install virus protection software </li></ul><ul><li>Turn on the Windows firewall </li></ul><ul><li>Turn on Windows updates </li></ul><ul><li>Use spyware/adware prevention software </li></ul><ul><li>Use Windows Security Center </li></ul><ul><li>Use limited accounts </li></ul>
  11. 12. Virus Protection Software <ul><li>Install & routinely update virus protection software </li></ul><ul><ul><li>McAfee </li></ul></ul><ul><ul><li>Trend Micro </li></ul></ul><ul><ul><li>Sophos </li></ul></ul><ul><ul><li>AVG </li></ul></ul><ul><ul><ul><li>Free for non-commercial use </li></ul></ul></ul><ul><ul><ul><li>Download at </li></ul></ul></ul><ul><ul><li>Symantec (Norton) </li></ul></ul><ul><ul><ul><li>Resource intensive </li></ul></ul></ul>
  12. 13. Windows Firewall <ul><li>Choose “On” </li></ul><ul><li>Only unblock programs that you trust </li></ul>
  13. 14. Windows Updates <ul><li>Select “Automatic (recommended)” </li></ul><ul><li>Select “Everyday” </li></ul><ul><li>Choose an appropriate time </li></ul><ul><li>Leave computer on! (check sleep/hibernate) </li></ul>
  14. 15. Spyware/Malware Prevention Software <ul><li>Preventative—combine w/ Reactive </li></ul><ul><ul><li>Windows Defender </li></ul></ul><ul><ul><ul><li> </li></ul></ul></ul><ul><ul><li>AVG Anti-Spyware </li></ul></ul><ul><ul><ul><li> </li></ul></ul></ul><ul><li>Reactive (run once a week) </li></ul><ul><ul><li>Spybot </li></ul></ul><ul><ul><ul><li> </li></ul></ul></ul><ul><ul><li>Adaware </li></ul></ul><ul><ul><ul><li> </li></ul></ul></ul>
  15. 16. Security Center <ul><li>Ensures: </li></ul><ul><ul><li>Firewall is on </li></ul></ul><ul><ul><li>Automatic updates are installed </li></ul></ul><ul><ul><li>Virus protection installed & up-to-date </li></ul></ul>
  16. 17. Security Center Click on the shield to fix the problem You don’t want the RED or Yellow shield
  17. 18. Limited Accounts <ul><li>Prohibited from installing software </li></ul><ul><ul><li>Prevents installation of malware/viruses </li></ul></ul><ul><ul><li>User has access to currently installed software </li></ul></ul><ul><li>Prohibited from accessing Administrator’s documents & settings </li></ul><ul><ul><li>Prevents changes to administrator password </li></ul></ul><ul><ul><li>Prevents access to Administrator’s Documents, Desktop, etc. </li></ul></ul><ul><li>Create/modify system accounts under “Control Panel/User Accounts” </li></ul>
  18. 19. Limited Accounts <ul><li>Easily switch between accounts </li></ul><ul><li>Leave programs running while others login (windows-L) </li></ul>
  19. 20. Home Networking Everyone Needs a Router!
  20. 21. Home Networking Routers <ul><li>One internet connection, multiple computers </li></ul><ul><li>Firewall protection </li></ul><ul><li>Access restrictions </li></ul>
  21. 22. One Internet Connection
  22. 23. Firewall Protection <ul><li>One-way valve that lets you out, but doesn’t let intruders in </li></ul><ul><ul><li>Prevents unauthorized access to your computer(s) </li></ul></ul><ul><ul><li>Hides your computer(s) from the internet while still allowing access to the internet </li></ul></ul><ul><li>Justification: Attacks on AU (week of 5/28-6/02) </li></ul><ul><ul><li>90,540 blocked </li></ul></ul><ul><ul><li>25,147 suspicious </li></ul></ul><ul><ul><li>3,893 possibly successful </li></ul></ul>
  23. 24. Access Restrictions <ul><li>Control when a computer can access the internet </li></ul><ul><ul><li>Deny/Allow by website or keyword </li></ul></ul><ul><li>Multiple configurations </li></ul><ul><ul><li>Everyday or only on school days etc. </li></ul></ul><ul><ul><li>All the time, or only between 4p.m. & 10p.m, etc. </li></ul></ul>
  24. 25. Secure Wireless <ul><li>Most routers can be configured w/a CD </li></ul><ul><li>What can be done manually? </li></ul><ul><ul><li>Change the SSID (wireless network name) </li></ul></ul><ul><ul><li>Disable SSID Broadcast (make it invisible) </li></ul></ul><ul><ul><li>Require a password to join the wireless network </li></ul></ul><ul><ul><li>Restrict by MAC address </li></ul></ul>
  25. 26. Questions? Thank You! Greg Parmer , Jonas Bowersock , Anne Adrian