Security At Home


Published on

Information Security tips for the home

Published in: Education, Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • Introduction 1 min Good Afternoon Job responsiblities include updating the Security at home web site and ITM/S web site. I also do a scanning of new web applications to find weaknesses in our system.
  • Introduction – 1 min Child Online Safety – 8 mins Phishing and Pharming Scams -7 mins Spyware Protection Virus and Worm Protection Patches and Updates 1 min Conclusion
  • How many people here are parents? How many people have heard of Do you know what your child is doing online?
  • Show copies of parents and child pledge forms will have them available if anyone wants one at the end of the session
  • Computer Internet theft now surpasses money generated from drug crime worldwide
  • Go to
  • Most ISP’s will provide anti-virus software for free
  • Security At Home

    1. 1. Internet Security at Home Angela Samuels
    2. 2. Topics <ul><li>Child Online Safety </li></ul><ul><li>Phishing and Pharming Scams </li></ul><ul><li>Spyware Protection </li></ul><ul><li>Virus and Worm Protection </li></ul><ul><li>Patches and Updates </li></ul>
    3. 3. Child Online Safety <ul><li>Statistics of Online Activity </li></ul><ul><li>61% of 13 to 17 year olds have a personal profile on sites such as Myspace or Friendster. </li></ul><ul><li>33% of 13- to- 17-year-olds reported that their parents or guardians know “very little” or “nothing” about what they do on the Internet </li></ul><ul><li>14% have actually met face-to-face with a person they had known only through the Internet </li></ul>Source:
    4. 4. Child Online Safety <ul><li>Online Resources </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li>Recommended Software by PC magazine </li></ul><ul><li> </li></ul>
    5. 5. To-Do List <ul><li>Educate yourself and your children about the risk of online communication with strangers </li></ul><ul><li>Define family rules of computer use and post those rules for all to see </li></ul><ul><li>Have your children sign a pledge form </li></ul><ul><li>Keep the line of communication open between you and your kids </li></ul>
    6. 6. Example of House Rules <ul><li>Be careful when communicating online </li></ul><ul><li>Never share personal information online </li></ul><ul><li>Respect other people’s rights </li></ul><ul><li>Tell your parents if something online makes you feel uncomfortable </li></ul>
    7. 7. Information Security: Today’s Threats <ul><li>All of these are daily growing threats. </li></ul><ul><ul><li>1 in 5 Americans were the target of a phishing ploy last year, costing US banks and creditors roughly $1.2 Billion - news </li></ul></ul><ul><ul><li>Viruses are increasingly used for more corrupt purposes – it’s not just for fame or fun anymore </li></ul></ul><ul><ul><ul><li>Written for profit </li></ul></ul></ul><ul><ul><ul><li>Data theft also an increasing goal </li></ul></ul></ul>
    8. 8. Scams <ul><li>As a computer user you are threatened by: </li></ul><ul><ul><ul><li>Phishing – Deceptive emails falsely representing a legitimate enterprise that attempt to lure a user into sharing personal or financial information for the purposes of identity theft. </li></ul></ul></ul><ul><ul><ul><ul><li>Example: A scammer posing as a online book store, wanting a user to login their account to restore their account. </li></ul></ul></ul></ul><ul><ul><ul><li>Pharming – forged emails that look as though they came from a somewhere or someone other than the actual source. </li></ul></ul></ul><ul><ul><ul><ul><li>Example: An email sent by a scammer or virus that appears to come from a friend or associate. </li></ul></ul></ul></ul>
    9. 9. Tips on Phishing Scams <ul><li>Never reply to email messages that request personal information </li></ul><ul><li>Don’t click on suspicious links </li></ul><ul><li>Make sure the Web sites use encryption </li></ul>
    10. 10. Spyware <ul><ul><ul><li>Software that covertly gathers user information through a user’s Internet connection without your consent. Primarily used for advertisements. </li></ul></ul></ul><ul><li>What Spyware can do it? </li></ul><ul><ul><li>Bombard you with ads </li></ul></ul><ul><ul><li>Change your settings </li></ul></ul><ul><ul><li>Collect personal information </li></ul></ul><ul><ul><li>Slow down or crash your computer </li></ul></ul><ul><li>Possible Spyware sites </li></ul><ul><ul><li>Screensavers </li></ul></ul><ul><ul><li>Free program downloads site </li></ul></ul>
    11. 11. Viruses and Worms <ul><ul><ul><li>A program or piece of code that is loaded onto a computer and runs without the users knowledge. </li></ul></ul></ul><ul><ul><ul><ul><li>Trojan horse – a destructive program masquerading as a friendly application. </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Worm – a self-replicating program designed to send itself to as many email recipients, or computers on a network, as possible. </li></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>Example: Yamanner arrives in a Yahoo mailbox b earing the subject header &quot;New Graphic Site.&quot; Once the message is opened, the computer becomes infected and the worm spreads itself to people on the Yahoo e-mail contact list. The harvested e-mail addresses are also sent to a remote online server (June 06 </li></ul></ul></ul></ul></ul>
    12. 12. Three things to keep safe online <ul><li>Use an Internet Firewall </li></ul><ul><ul><li>Guard against Intruders </li></ul></ul><ul><li>Get Computer Updates </li></ul><ul><ul><li>Keep your software current </li></ul></ul><ul><li>Use an Up-to-Date Antivirus Software </li></ul><ul><ul><li>Keep antivirus software updated </li></ul></ul>
    13. 13. Information Security: Today’s Threats <ul><li>Solution ?? </li></ul><ul><li>Knowledge. </li></ul><ul><li>The best home security system in the world cannot stop you from leaving your front door wide open. </li></ul>
    14. 14. Security at home for Chrysler Group colleagues <ul><li>The latest articles on Internet Security </li></ul><ul><li>Download Free Norton Antivirus Software </li></ul><ul><li>Articles about Spam and Phishing </li></ul>
    15. 15. Global Information Security