Computer / Internet Security


Published on

Computer class created and taught in 2012.

Published in: Education, Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Computer / Internet Security

  1. 1. Computer / Internet SecurityWest Haven Public
  2. 2. Computer / Internet Security• Use of internet services are unavoidable▫ Job applications, school applications, taxes, credit,banking, DMV forms, personal communication(email), social networking (facebook), shopping,research, entertainment• All parts of your life potentially have an onlinecounterpart
  3. 3. Computer / Internet Security• Everything you do online…▫ Every account you make▫ Every purchase▫ Every job application• Creates data about you
  4. 4. Computer / Internet Security• Not always a bad thing… BUT▫ Danger in losing control of your data (accounts)▫ Danger in over sharing▫ Danger in important data being destroyed(photos, records, documents)
  5. 5. Good NewsIt’s easy to stay safe and protect yourself
  6. 6. Computer / Internet SecurityGoals• Secure your data• Keep what’s privatePRIVATE• Prevent attack/ intrusion• Prepare for the worst,prevent loss
  7. 7. Computer / Internet SecurityGoals Action• Secure your data• Keep what’s private PRIVATE• Prevent attack/ intrusion• Prepare for the worst, preventloss• Use better password practices• Be aware of what/how youshare• Be proactive- use protectivesoftware- be vigilant• BACKUP, BACKUP, BACKUP
  8. 8. Data?• Your data is anything on your computer orinformation stored in online accounts▫ Documents, files, photos▫ Online shopping sites▫ Banking, credit card▫ Social networking profiles• Data that you own/control• Private (banking info)• Public (online profiles)
  9. 9. Why bother?• Whether public (online profiles) or private(financial info) you need to stay in control• Ensure that only authorized people can accessyour data, accounts, filesWeb-based accounts and services are increasinglyimportant
  10. 10. Dangers•Breaches can come from▫ Leaked/ stolen data Leaked by a company or organization Stolen via virus on a computer you use▫ Targeted attacks▫ Automated attacks- cracks
  11. 11. Dangers• Virus, Malware, Spyware, Adware, Trojans▫ Software created to steal information, changesettings, destroy files, take control of your system▫ Most commonly contracted online unbeknownstto the user Email attachments, malicious websites, softwaredownloads, toolbars
  12. 12. Secure Your Data• Biggest step is use better passwordpractices▫ more difficult to guess▫ Harder to crack (longer in length)▫ Make it easier to deal with if username/passwordsare leaked
  13. 13. Better Passwords• Dont use passwords that are based on personalinformation that can be easily accessed orguessed.▫ It may be easier than you think to guess your pet’sname, birthday, child’s name, favoritecolor, mother’s maiden name, etc.▫ “password” “love” are extremely common andeasily guessed
  14. 14. 25 Worst Passwords of 20111. password2. 1234563.123456784. qwerty5. abc1236. monkey7. 12345678. letmein9. trustno110. dragon11. baseball12. 11111113. iloveyou14. master15. sunshine16. ashley17. bailey18. passw0rd19. shadow20. 12312321. 65432122. superman23. qazwsx24. michael25. football
  15. 15. Better Passwords• Dont use words that can be found in anydictionary of any language.▫ A single word, spelled correctly, is easy to checkagainst a dictionary▫ Single words are also short, easy to break usingrandom guesses.
  16. 16. Stronger Passwords• Use both lowercase and capital letters.• Use a combination of letters, numbers, andspecial characters.▫ Maine96knees@MtSnow• Develop a mnemonic for remembering complexpasswords.
  17. 17. Stronger Passwords• Use passphrases when you can.▫ Longer in length- harder to guess/ crack▫ Easier to remember▫ puppytograndmasforsummervacation
  18. 18. Stronger Passwords• Use different passwords on different systems▫ If you use the same password at one site that isbroken into- then attackers can access your data atother sites using that same username/password.
  19. 19. Use differentpasswords ondifferent systems
  20. 20. Keep what’s private PRIVATE• Be aware of what you share• When creating an account consider who you aregiving your data to• Any site asking for banking, social security, orlogin information for a different site should beclosely examined.
  21. 21. Keep what’s private PRIVATE• When creating accounts consider what you areentering and how it will be used• You decide your comfort level with what youshare
  22. 22. Email• Email is more like a postcard than a letter• Chances are no one other than the recipient willsee it BUT it is possible for others see its contentalong the way (just like a postcard)• Do not email: credit card #, logins/passwords
  23. 23. Web Addresses- URL
  24. 24. URL (Uniform Resource Locator)The address that connects you with a website.Parts of the URL = protocol [Hypertext Transfer Protocol]www. = World Wide Webgoogle = domain = domain typeDomain = = generally nonprofit = higher = U.S. government agency
  25. 25. Browsing the Web- Secure Sites• Any site asking for sensitive info should beencrypted (Banks, Insurance, etc.)• Encrypted site addresses begin with▫ ENCRYPTED▫ NOT encrypted
  26. 26. Browsing the Web- Secure Sites
  27. 27. Browsing the Web• As you browse the web- websites collect infoabout you• Your web browser keeps a history and collectscookies from websites• Use your browser settings to:▫ Clear your browser cache/history/cookies▫ Limit 3rd party cookies
  28. 28. Keep what’s private PRIVATE• If you have WiFi at home, set a password▫ Keep your neighbors off your network (unless youwant them there)▫ Refer to the directions that came with yourRouter/Modem/Wifi
  29. 29. Prevent attack/ intrusion• A Virus will get in through an open door or youunwillingly open the door yourself
  30. 30. Anti-Virus• A program that scans your files and activelymonitors to prevent infection• Once installed, anti-virus monitors for virusactivity, quarantines, and deletes• Be sure to frequently run the virus scan• Be sure that “definitions” are updated
  31. 31. Anti-Virus• Free▫ AVG▫ Avast▫ Microsoft Security Essentials• Commercial▫ McAffee▫ Symantec Norton▫ Bit Defender
  32. 32. Prevent attack/ intrusion• Be vigilant• Don’t download email attachments that youdon’t trust• If something from someone you trust lookssuspicious check with them before opening
  33. 33. Prevent attack/ intrusion• Scareware▫ Virus/Malware that looks like an anti-virusprogram▫ Popup while browsing the web• Know what Anti-virus you have and how to use it
  34. 34. Fake Anti-Virus Warning
  35. 35. Prepare for the worst• Backup your important files▫ Keep duplicate copies• Worst case scenario: you will still have what’simportant to you• Keep your backup current
  36. 36. Prepare for the worst• Backup files locally▫ Copy to cdr▫ Flash drive▫ external hard drive• Paper copies▫ tax returns▫ Important photos
  37. 37. Prepare for the worst• Cloud storage- files copied to a secure site overthe internet▫ Be sure that service is reputable, safe, stable▫ Backup regularly
  38. 38. Resources•• Cirella, - 2012-03-01