SlideShare a Scribd company logo
1 of 21
Windows Security
Larry MacPhee
e-Learning@NAU
Why Security Matters
• Public nuisance
• Loss of productivity
– The cost of spam!
• Loss of data
• Identity theft
• Credit card fraud
• Erosion of trust
Focus on Prevention
• Prevention is easy
– 6 steps
• Cure is hard
1. Use an Anti-Virus tool
50,000+ Windows Viruses
New viruses up 400% from last year
Download Sophos Anti-Virus from ITS
a. Keep your
virus definitions
up to date
b. Scan while
you sleep
c. Automate
the process
2. Guard Against Spyware
NAU recommends Spybot
Find and remove
3. Filter Spam
Manage your NAU e-mail
Customize your filters
No more Viagra!
4. Beware the phish hook
Something phishy?
• Urgent e-mail requires your immediate action
• Plays on fear of compromised security
• Usually doesn’t refer to you by name
• Asks you to confirm your identity
• Asks you to enter your password
• Message may contain typos
• May use a suspicious URL
More reading
5. Apply Security Updates
a. Start/Windows Update
b. Choose Express Install
c. Install Priority Updates
Note: NAU pushes out
security updates to
campus machines
Express Install
Bypass non-critical updates
Automatic Updates
a. Start/Control Panel
b. System
c. System Properties
d. Automatic Updates
6. Browse Securely
• Look for the lock symbol and https://
• Use the VPN for wireless transactions
• Use hard to guess passwords
• Change passwords frequently
• Read your credit card statements
• Don’t approve save of credit card info
Why so vulnerable?
• 90% of computers run Windows
• Many dislike Microsoft and Bill Gates
• Windows is not very secure
• MS is slow to patch security holes
• Hard to regulate and enforce
• Lots of novices online
Is my computer compromised?
• Slower than normal performance
• System crashes
• Pop-up ads
• Home page has changed
• Browser crashes
• Possibly no symptoms!
Be afraid!
• You might be a zombie!
• You might have a keystroke logger
• You might be a DDOS pawn
• You might be a notorious spammer!
Remedies
• Disconnect from the network (temporarily)
• Boot up from a System Restore CD
• Run anti-virus software
• Run anti-spyware software
• Run disk, hardware check utilities
• Wipe the drive and reinstall everything!
• Get a Mac? Learn Linux?
Coming Soon!
• Microsoft Free Computing Environments (MFCE)
• Costs and Benefits
• The Open Source Movement
Macintosh
Linux
Open Office
Acknowledgements
• Stephanie McCarthy - Graphics
• “Big Dave” Dennehey - Technical Consulting

More Related Content

Similar to security.ppt

eSecurity! Keeping your Business and Customers Safe
eSecurity! Keeping your Business and Customers SafeeSecurity! Keeping your Business and Customers Safe
eSecurity! Keeping your Business and Customers SafeAVG Technologies AU
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcareNicholas Davis
 
Secure Yourself, Practice what we preach - BSides Austin 2015
Secure Yourself, Practice what we preach - BSides Austin 2015Secure Yourself, Practice what we preach - BSides Austin 2015
Secure Yourself, Practice what we preach - BSides Austin 2015Michael Gough
 
Enterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entitiesEnterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entitiesQuick Heal Technologies Ltd.
 
Virus Precautions
Virus PrecautionsVirus Precautions
Virus PrecautionsBilal Arif
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and EthicsMohsin Riaz
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProRonald Soh
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security PracticeBrian Pichman
 
Simplitfy - Guarding your Data
Simplitfy - Guarding your DataSimplitfy - Guarding your Data
Simplitfy - Guarding your DataErick Solms
 
Staying safe on the internet
Staying safe on the internetStaying safe on the internet
Staying safe on the internetArthur Landry
 
Keeping Secrets on the Internet of Things - Mobile Web Application Security
Keeping Secrets on the Internet of Things - Mobile Web Application SecurityKeeping Secrets on the Internet of Things - Mobile Web Application Security
Keeping Secrets on the Internet of Things - Mobile Web Application SecurityKelly Robertson
 
Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1Marcos De Pedro
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptxCharithraaAR
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfMansoorAhmed57263
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptOoXair
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Abzetdin Adamov
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBCapyn
 
Thoughts on Defensive Development for Sitecore
Thoughts on Defensive Development for SitecoreThoughts on Defensive Development for Sitecore
Thoughts on Defensive Development for SitecorePINT Inc
 

Similar to security.ppt (20)

eSecurity! Keeping your Business and Customers Safe
eSecurity! Keeping your Business and Customers SafeeSecurity! Keeping your Business and Customers Safe
eSecurity! Keeping your Business and Customers Safe
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcare
 
Secure Yourself, Practice what we preach - BSides Austin 2015
Secure Yourself, Practice what we preach - BSides Austin 2015Secure Yourself, Practice what we preach - BSides Austin 2015
Secure Yourself, Practice what we preach - BSides Austin 2015
 
Enterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entitiesEnterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entities
 
Virus Precautions
Virus PrecautionsVirus Precautions
Virus Precautions
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
 
Simplitfy - Guarding your Data
Simplitfy - Guarding your DataSimplitfy - Guarding your Data
Simplitfy - Guarding your Data
 
Staying safe on the internet
Staying safe on the internetStaying safe on the internet
Staying safe on the internet
 
Keeping Secrets on the Internet of Things - Mobile Web Application Security
Keeping Secrets on the Internet of Things - Mobile Web Application SecurityKeeping Secrets on the Internet of Things - Mobile Web Application Security
Keeping Secrets on the Internet of Things - Mobile Web Application Security
 
Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Real Business Threats!
Real Business Threats!Real Business Threats!
Real Business Threats!
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Thoughts on Defensive Development for Sitecore
Thoughts on Defensive Development for SitecoreThoughts on Defensive Development for Sitecore
Thoughts on Defensive Development for Sitecore
 

More from Bernad Bear

Materi Keamanan Siber Prinsip Keamanan Jaringan.pptx
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptxMateri Keamanan Siber Prinsip Keamanan Jaringan.pptx
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptxBernad Bear
 
Lesson 13 - Visualisasi dan Informasi.ppt
Lesson 13 - Visualisasi dan Informasi.pptLesson 13 - Visualisasi dan Informasi.ppt
Lesson 13 - Visualisasi dan Informasi.pptBernad Bear
 
Pertemuan-7-Proses_Desain interaksi manusia dan komputer.ppt
Pertemuan-7-Proses_Desain interaksi manusia dan komputer.pptPertemuan-7-Proses_Desain interaksi manusia dan komputer.ppt
Pertemuan-7-Proses_Desain interaksi manusia dan komputer.pptBernad Bear
 
Pengenalan Teknik Komputer.pptx
Pengenalan Teknik Komputer.pptxPengenalan Teknik Komputer.pptx
Pengenalan Teknik Komputer.pptxBernad Bear
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptxBernad Bear
 
Persentasi SMU9.pptx
Persentasi SMU9.pptxPersentasi SMU9.pptx
Persentasi SMU9.pptxBernad Bear
 
_KONSEP DASAR SISTEM INFORMASI.ppt
_KONSEP DASAR SISTEM INFORMASI.ppt_KONSEP DASAR SISTEM INFORMASI.ppt
_KONSEP DASAR SISTEM INFORMASI.pptBernad Bear
 
RPS TIK1072 Komputer dan Masyarakat.doc
RPS TIK1072  Komputer dan Masyarakat.docRPS TIK1072  Komputer dan Masyarakat.doc
RPS TIK1072 Komputer dan Masyarakat.docBernad Bear
 
slide-11_otomata.pptx
slide-11_otomata.pptxslide-11_otomata.pptx
slide-11_otomata.pptxBernad Bear
 

More from Bernad Bear (11)

Materi Keamanan Siber Prinsip Keamanan Jaringan.pptx
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptxMateri Keamanan Siber Prinsip Keamanan Jaringan.pptx
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptx
 
Lesson 13 - Visualisasi dan Informasi.ppt
Lesson 13 - Visualisasi dan Informasi.pptLesson 13 - Visualisasi dan Informasi.ppt
Lesson 13 - Visualisasi dan Informasi.ppt
 
Pertemuan-7-Proses_Desain interaksi manusia dan komputer.ppt
Pertemuan-7-Proses_Desain interaksi manusia dan komputer.pptPertemuan-7-Proses_Desain interaksi manusia dan komputer.ppt
Pertemuan-7-Proses_Desain interaksi manusia dan komputer.ppt
 
Relasi.ppt
Relasi.pptRelasi.ppt
Relasi.ppt
 
Pengenalan Teknik Komputer.pptx
Pengenalan Teknik Komputer.pptxPengenalan Teknik Komputer.pptx
Pengenalan Teknik Komputer.pptx
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Persentasi SMU9.pptx
Persentasi SMU9.pptxPersentasi SMU9.pptx
Persentasi SMU9.pptx
 
_KONSEP DASAR SISTEM INFORMASI.ppt
_KONSEP DASAR SISTEM INFORMASI.ppt_KONSEP DASAR SISTEM INFORMASI.ppt
_KONSEP DASAR SISTEM INFORMASI.ppt
 
12017098.ppt
12017098.ppt12017098.ppt
12017098.ppt
 
RPS TIK1072 Komputer dan Masyarakat.doc
RPS TIK1072  Komputer dan Masyarakat.docRPS TIK1072  Komputer dan Masyarakat.doc
RPS TIK1072 Komputer dan Masyarakat.doc
 
slide-11_otomata.pptx
slide-11_otomata.pptxslide-11_otomata.pptx
slide-11_otomata.pptx
 

Recently uploaded

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 

Recently uploaded (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 

security.ppt

  • 2. Why Security Matters • Public nuisance • Loss of productivity – The cost of spam! • Loss of data • Identity theft • Credit card fraud • Erosion of trust
  • 3. Focus on Prevention • Prevention is easy – 6 steps • Cure is hard
  • 4. 1. Use an Anti-Virus tool 50,000+ Windows Viruses New viruses up 400% from last year Download Sophos Anti-Virus from ITS
  • 5. a. Keep your virus definitions up to date b. Scan while you sleep c. Automate the process
  • 6. 2. Guard Against Spyware NAU recommends Spybot
  • 8. 3. Filter Spam Manage your NAU e-mail
  • 10. 4. Beware the phish hook
  • 11. Something phishy? • Urgent e-mail requires your immediate action • Plays on fear of compromised security • Usually doesn’t refer to you by name • Asks you to confirm your identity • Asks you to enter your password • Message may contain typos • May use a suspicious URL More reading
  • 12. 5. Apply Security Updates a. Start/Windows Update b. Choose Express Install c. Install Priority Updates Note: NAU pushes out security updates to campus machines
  • 14. Automatic Updates a. Start/Control Panel b. System c. System Properties d. Automatic Updates
  • 15. 6. Browse Securely • Look for the lock symbol and https:// • Use the VPN for wireless transactions • Use hard to guess passwords • Change passwords frequently • Read your credit card statements • Don’t approve save of credit card info
  • 16. Why so vulnerable? • 90% of computers run Windows • Many dislike Microsoft and Bill Gates • Windows is not very secure • MS is slow to patch security holes • Hard to regulate and enforce • Lots of novices online
  • 17. Is my computer compromised? • Slower than normal performance • System crashes • Pop-up ads • Home page has changed • Browser crashes • Possibly no symptoms!
  • 18. Be afraid! • You might be a zombie! • You might have a keystroke logger • You might be a DDOS pawn • You might be a notorious spammer!
  • 19. Remedies • Disconnect from the network (temporarily) • Boot up from a System Restore CD • Run anti-virus software • Run anti-spyware software • Run disk, hardware check utilities • Wipe the drive and reinstall everything! • Get a Mac? Learn Linux?
  • 20. Coming Soon! • Microsoft Free Computing Environments (MFCE) • Costs and Benefits • The Open Source Movement Macintosh Linux Open Office
  • 21. Acknowledgements • Stephanie McCarthy - Graphics • “Big Dave” Dennehey - Technical Consulting