SlideShare a Scribd company logo
Understanding Computers
     Viruses, Spam, Backups and more




      ACS
    Company
  IT Committee
    LOGO
It’s all about Risk
     Management
Objectives

§ Viruses and Trojans      Malware
§ Spyware
§ Phishing
§ Flaming
§ How do you protect yourself?
§ Spam
§ Backups
§ Recommendations
Viruses and Trojans

§ Definition
  ›   A program that replicates itself with malicious
      intent. It usually remains hidden in another
      program and depends on a person to activate it.
  ›   Viruses only damage software and cannot
      destroy hard drives, monitors, or anything else
      like that as commonly rumored.
  ›   Exploit weaknesses in Operating Systems and
      programmes
Viruses and Trojans

§ Definition
  ›   Whoever thought to name a virus, a virus was
      certainly on the right track.

  ›   Think of a human Virus – it serves no
      purpose, it uses a host to multiply and then
      leaves the host useless, it is highly
      contagious, but can be immunized against.
Viruses


§ At its peak infection rate in 2004, about 1 in 12 emails on
  the Internet were MyDoom Viruses

§ It is estimated that PC Viruses cost businesses
  approximately $55 Billion in damages in 2003.
  This amount doubles EACH Year.
  Thus $220 Billion in 2005 - $220,000,000,000.00

§ In the US alone, ID theft cost banks $1 billion a year.
  Nearly 10,000 victims had home loans - totalling about
  $300 million - taken out in their name and another
  68,000 had new credit cards issued in their name"
Spyware

§ Definition
  ›   Software that tracks a user's personal
      information and passes it on to third parties,
      without the user's authorisation or knowledge
  ›   Personal information includes Passwords,
      sites visited, even Banking and Credit Card
      Information
Malware

§ You can get them from…
  ›    E-Mails and attachments (eg Word
      Document)
  ›   Files from insecure sources
  ›   “Cover Disks”
  ›    Web surfing
Phishing

§ The act of “getting” a username and password
  by means of deception.
§ “Bank Records” emails
      Always type web address
§ Phone calls
  Freddo Frogs.
      Never give your password
§ Password Saving
      Just Don’t!!
§ If you feel your password has been
  compromised – CHANGE IT!
Phishing

§ 5.7 Billion - Number of phishing emails sent
  each month

    $1,200 - Average loss to each person
    sucessfully phished

    13,228 - Average number of unique phishing
    attacks per month

    3,431 - Average number of phishing web sites
    each month

§   Source: www.mailfrontier.com
Flaming


§ Sending many or large emails to one address.

§ Can be both Real or Perceived
  (dependant on tolerance threshold)

§ Denial of Service in its worst examples
Spam

§ Definition
  ›   Spam is a collective term referring to mass
      email forwarded messages, junk email, email
      hoaxes, etc.
  ›   Spam bogs down the Internet with unwanted
      junk email making it slower for us to
      download files or access WebPages.
Spam

§ How to protect yourself
  ›   Don’t use common e-mail addresses
       § don’t use e-mail addresses such as
         ›   CEO@, manager@
       § consider not using
         ›   admin@, sales@, info@
  ›   NEVER respond to spam.
  ›   Don’t click ‘unsubscribe’ at the bottom of
      spam
  ›   Minimise the number of e-mail addresses on
      a web site
How do you protect
                                     yourself?
§   Cast Iron Option
    ›   Don’t let machines talk to the
        Internet or receive
        e-mails etc. ie Completely stand
        alone
    ›   Pro – Good security
    ›   Con – Can’t do anything… Extreme
        limit to productivity
How do you protect
                                      yourself?
§   Cotton Wool / Band-Aid Option
    ›   This is the soft option – don’t do
        anything and hope that nothing
        happens
        The Cotton wool is used to ‘mop up
        the mess’
    ›   Pro – easy to administer
    ›   Con – Wide open to attack
How do you protect
                                       yourself?
§   Rubber Option
    ›   Put something solid but flexible
        between your resources and the
        potential source of risk
    ›   Pro – Allows modern work flows
    ›   Con – Some administration
        required
It’s not has hard as you
                                     may think
§ Software
  ›   Run Anti-Virus software
  ›   Run Anti-Spyware software
  ›   Run Anti-Spam software
       § These all compare everything to known
        signatures
       § If something is detected, it is automatically dealt
        with
  ›   Update, Update, Update (Automatically)
It’s not has hard as you
                                     may think
§ Hardware
  ›   Router
       § A router that directs traffic dependent on where it
         comes from and it’s type
       § It directs the Black Sheep and the White Sheep
  ›   Firewall
       § A device that looks at the information passing
         between devices, and filters it if required
       § It filters the Sheep from the Goats
It’s not has hard as you
                                           may think
§ Peer to Peer / Workgroup
  ›   All PCs are equal
  ›   One PC may be prime


§ Domain
  ›   Server / Client
  ›   Possibly multiple servers
       §   File,
       §   Application
       §   Email
       §   Authentication
It’s not has hard as you
                                    may think
§ A combination solution of hardware and
  software is often the best

§ It depends on:
  ›   The size of your network
  ›   The value of your information
       § A bank will spend significantly more money on
         security than a 30 bed nursing home
Policies and Procedures

§ Literally, setting rules and policing them
§ If rules can not be set for the systems to
  enforce, set “best practice” guidelines.
§ Passwords MUST be used.
§ Physical Security of Equipment
§ User level security
§ Acceptable Use
 Web Browsing / Sites visited
 Personal Use
 Auditing and Monitoring – Who can see what.
 Netiquette
Backup

The safe storage of important information
§ Paper based or electronic has same
  importance
§ Backup to Disk, Tape or CD
  ›   Archive and backup those archives
§ Test the backup regularly
  ›   Ensure information can be retrieved
Backup

The safe storage of important information
§ Store the backup away from the Network
  ›   If the computer is destroyed is the backup still
      safe
§ Ensure any “restore to” PC can read the
  backup
Recommendations
§ Minimum requirements                  - essentials
  ›   Keep your Systems up to date!
       § All Software Update/ Patches/ Definitions
  ›   Anti-Virus Software
       § eg, CA, Trend, AVG, McAfee, Norton etc
  ›   Anti-Spyware Software
  ›   Firewall or Router
  ›   Policies and Best Practice Procedures.
  ›   Backups
       § Keep both onsite and offsite
       § Backup as often as you feel you can afford to
         replace the data
Recommendations

§ Additional Recommendations - desirables…
  ›   Anti-Spam
       § At the ISP (Internet Service Provider)
       § At your firewall/ Email Server (if you have one)
       § On your PC eg Outlook Junk E-Mail filter
  ›   Professional assistance (internal or outsource)
       §   Internet Service Providers
       §   Computer Suppliers
       §   Trained staff (as long as their skills are up to date)
       §   Purchasing Partners/ Networking Opportunities
Recommendations

Whichever solution(s) you choose to
             implement




   Maintain it!
Other Information

You may not be aware
§ Not-for-profits can purchase most
  hardware and software for a significantly
  reduced price

§ Windows XP is the minimum
  recommended operating system

§ ‘It all worth the effort’    J
Questions to the Panel




Thank you for your time

More Related Content

Similar to ACS Computer Forum

Keep Your Computers Safe And Secure
Keep Your Computers Safe And SecureKeep Your Computers Safe And Secure
Keep Your Computers Safe And Secure
Rob Clement
 
Computer Security
Computer SecurityComputer Security
Computer Security
Frederik Questier
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
Ronald Soh
 
Computer / Internet Security WHPL
Computer / Internet Security WHPLComputer / Internet Security WHPL
Computer / Internet Security WHPL
West Haven Public Library
 
Cybersecurity-Keeping-Your-Computers-Devices-Safe.pptx
Cybersecurity-Keeping-Your-Computers-Devices-Safe.pptxCybersecurity-Keeping-Your-Computers-Devices-Safe.pptx
Cybersecurity-Keeping-Your-Computers-Devices-Safe.pptx
PrinceYdvz
 
Securtiy Issues 17.05.2020.pptx
Securtiy Issues 17.05.2020.pptxSecurtiy Issues 17.05.2020.pptx
Securtiy Issues 17.05.2020.pptx
vatsalrbhatt13
 
7 Things People Do To Endanger Their Networks
7 Things People Do To Endanger Their Networks7 Things People Do To Endanger Their Networks
7 Things People Do To Endanger Their Networks
jaymemcree
 
Online Safety - Malwares
Online Safety - MalwaresOnline Safety - Malwares
Online Safety - Malwares
Arnav Kumar
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
peterhitch
 
Computer & Data Security
Computer & Data SecurityComputer & Data Security
Computer & Data Security
Frederik Questier
 
Lesson 5 protecting yourself on the internet
Lesson 5 protecting yourself on the internetLesson 5 protecting yourself on the internet
Lesson 5 protecting yourself on the internet
San Diego Continuing Education
 
Computer / Internet Security
Computer / Internet SecurityComputer / Internet Security
Computer / Internet Security
David Cirella
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
CharithraaAR
 
Cyber Security
Cyber SecurityCyber Security
Internet Security
Internet SecurityInternet Security
Internet Security
mjelson
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 
Dr. Alan Shark
Dr. Alan SharkDr. Alan Shark
Dr. Alan Shark
NextgovPrime
 
An Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereAn Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & Anywhere
Blake Carver
 
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11mrmwood
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
Kazi Sarwar Hossain
 

Similar to ACS Computer Forum (20)

Keep Your Computers Safe And Secure
Keep Your Computers Safe And SecureKeep Your Computers Safe And Secure
Keep Your Computers Safe And Secure
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
 
Computer / Internet Security WHPL
Computer / Internet Security WHPLComputer / Internet Security WHPL
Computer / Internet Security WHPL
 
Cybersecurity-Keeping-Your-Computers-Devices-Safe.pptx
Cybersecurity-Keeping-Your-Computers-Devices-Safe.pptxCybersecurity-Keeping-Your-Computers-Devices-Safe.pptx
Cybersecurity-Keeping-Your-Computers-Devices-Safe.pptx
 
Securtiy Issues 17.05.2020.pptx
Securtiy Issues 17.05.2020.pptxSecurtiy Issues 17.05.2020.pptx
Securtiy Issues 17.05.2020.pptx
 
7 Things People Do To Endanger Their Networks
7 Things People Do To Endanger Their Networks7 Things People Do To Endanger Their Networks
7 Things People Do To Endanger Their Networks
 
Online Safety - Malwares
Online Safety - MalwaresOnline Safety - Malwares
Online Safety - Malwares
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Computer & Data Security
Computer & Data SecurityComputer & Data Security
Computer & Data Security
 
Lesson 5 protecting yourself on the internet
Lesson 5 protecting yourself on the internetLesson 5 protecting yourself on the internet
Lesson 5 protecting yourself on the internet
 
Computer / Internet Security
Computer / Internet SecurityComputer / Internet Security
Computer / Internet Security
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Dr. Alan Shark
Dr. Alan SharkDr. Alan Shark
Dr. Alan Shark
 
An Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereAn Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & Anywhere
 
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 

Recently uploaded

Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 

Recently uploaded (20)

Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 

ACS Computer Forum

  • 1. Understanding Computers Viruses, Spam, Backups and more ACS Company IT Committee LOGO
  • 2. It’s all about Risk Management
  • 3. Objectives § Viruses and Trojans Malware § Spyware § Phishing § Flaming § How do you protect yourself? § Spam § Backups § Recommendations
  • 4. Viruses and Trojans § Definition › A program that replicates itself with malicious intent. It usually remains hidden in another program and depends on a person to activate it. › Viruses only damage software and cannot destroy hard drives, monitors, or anything else like that as commonly rumored. › Exploit weaknesses in Operating Systems and programmes
  • 5. Viruses and Trojans § Definition › Whoever thought to name a virus, a virus was certainly on the right track. › Think of a human Virus – it serves no purpose, it uses a host to multiply and then leaves the host useless, it is highly contagious, but can be immunized against.
  • 6. Viruses § At its peak infection rate in 2004, about 1 in 12 emails on the Internet were MyDoom Viruses § It is estimated that PC Viruses cost businesses approximately $55 Billion in damages in 2003. This amount doubles EACH Year. Thus $220 Billion in 2005 - $220,000,000,000.00 § In the US alone, ID theft cost banks $1 billion a year. Nearly 10,000 victims had home loans - totalling about $300 million - taken out in their name and another 68,000 had new credit cards issued in their name"
  • 7. Spyware § Definition › Software that tracks a user's personal information and passes it on to third parties, without the user's authorisation or knowledge › Personal information includes Passwords, sites visited, even Banking and Credit Card Information
  • 8. Malware § You can get them from… › E-Mails and attachments (eg Word Document) › Files from insecure sources › “Cover Disks” › Web surfing
  • 9. Phishing § The act of “getting” a username and password by means of deception. § “Bank Records” emails Always type web address § Phone calls Freddo Frogs. Never give your password § Password Saving Just Don’t!! § If you feel your password has been compromised – CHANGE IT!
  • 10. Phishing § 5.7 Billion - Number of phishing emails sent each month $1,200 - Average loss to each person sucessfully phished 13,228 - Average number of unique phishing attacks per month 3,431 - Average number of phishing web sites each month § Source: www.mailfrontier.com
  • 11. Flaming § Sending many or large emails to one address. § Can be both Real or Perceived (dependant on tolerance threshold) § Denial of Service in its worst examples
  • 12. Spam § Definition › Spam is a collective term referring to mass email forwarded messages, junk email, email hoaxes, etc. › Spam bogs down the Internet with unwanted junk email making it slower for us to download files or access WebPages.
  • 13. Spam § How to protect yourself › Don’t use common e-mail addresses § don’t use e-mail addresses such as › CEO@, manager@ § consider not using › admin@, sales@, info@ › NEVER respond to spam. › Don’t click ‘unsubscribe’ at the bottom of spam › Minimise the number of e-mail addresses on a web site
  • 14. How do you protect yourself? § Cast Iron Option › Don’t let machines talk to the Internet or receive e-mails etc. ie Completely stand alone › Pro – Good security › Con – Can’t do anything… Extreme limit to productivity
  • 15. How do you protect yourself? § Cotton Wool / Band-Aid Option › This is the soft option – don’t do anything and hope that nothing happens The Cotton wool is used to ‘mop up the mess’ › Pro – easy to administer › Con – Wide open to attack
  • 16. How do you protect yourself? § Rubber Option › Put something solid but flexible between your resources and the potential source of risk › Pro – Allows modern work flows › Con – Some administration required
  • 17. It’s not has hard as you may think § Software › Run Anti-Virus software › Run Anti-Spyware software › Run Anti-Spam software § These all compare everything to known signatures § If something is detected, it is automatically dealt with › Update, Update, Update (Automatically)
  • 18. It’s not has hard as you may think § Hardware › Router § A router that directs traffic dependent on where it comes from and it’s type § It directs the Black Sheep and the White Sheep › Firewall § A device that looks at the information passing between devices, and filters it if required § It filters the Sheep from the Goats
  • 19. It’s not has hard as you may think § Peer to Peer / Workgroup › All PCs are equal › One PC may be prime § Domain › Server / Client › Possibly multiple servers § File, § Application § Email § Authentication
  • 20. It’s not has hard as you may think § A combination solution of hardware and software is often the best § It depends on: › The size of your network › The value of your information § A bank will spend significantly more money on security than a 30 bed nursing home
  • 21. Policies and Procedures § Literally, setting rules and policing them § If rules can not be set for the systems to enforce, set “best practice” guidelines. § Passwords MUST be used. § Physical Security of Equipment § User level security § Acceptable Use Web Browsing / Sites visited Personal Use Auditing and Monitoring – Who can see what. Netiquette
  • 22. Backup The safe storage of important information § Paper based or electronic has same importance § Backup to Disk, Tape or CD › Archive and backup those archives § Test the backup regularly › Ensure information can be retrieved
  • 23. Backup The safe storage of important information § Store the backup away from the Network › If the computer is destroyed is the backup still safe § Ensure any “restore to” PC can read the backup
  • 24. Recommendations § Minimum requirements - essentials › Keep your Systems up to date! § All Software Update/ Patches/ Definitions › Anti-Virus Software § eg, CA, Trend, AVG, McAfee, Norton etc › Anti-Spyware Software › Firewall or Router › Policies and Best Practice Procedures. › Backups § Keep both onsite and offsite § Backup as often as you feel you can afford to replace the data
  • 25. Recommendations § Additional Recommendations - desirables… › Anti-Spam § At the ISP (Internet Service Provider) § At your firewall/ Email Server (if you have one) § On your PC eg Outlook Junk E-Mail filter › Professional assistance (internal or outsource) § Internet Service Providers § Computer Suppliers § Trained staff (as long as their skills are up to date) § Purchasing Partners/ Networking Opportunities
  • 26. Recommendations Whichever solution(s) you choose to implement Maintain it!
  • 27. Other Information You may not be aware § Not-for-profits can purchase most hardware and software for a significantly reduced price § Windows XP is the minimum recommended operating system § ‘It all worth the effort’ J
  • 28. Questions to the Panel Thank you for your time