2. 6 Steps for Safe Computing
Required
1. Keep Your Operating System Up To Date
2. Install and Update Anti-Virus Software
3. Use Strong Passwords
Strongly Recommended
1. Enable Firewall Protection
2. Install and Use Spyware Removal Tools
3. Back Up Important Files
3. Update your Operating System
• Recent versions of Windows and
Macintosh computers have automatic
software updates.
• Configure your computer to
automatically download the latest
patches and updates.
Most security issues are related to vulnerabilities in the
Operating System. As these flaws are discovered,
software companies release patches and updates to
protect you from security holes.
4. Install and Update Anti-virus Software
How to Get Anti-virus software
• Purchase commercial anti-virus software.
• Free Windows version for home use by
Avast, AVG, MSE etc.
Keep the virus definitions up to date.
If your computer is connected to the Internet or you
share files with anyone, you need anti-virus
software !
5. Set Strong Passwords
• Set Your Computer Password - Do not leave it blank
• Password Tips
– Never share your password.
– Never write your password down.
– Change your password periodically.
• Creating a Strong Password
– Passwords should be 7 characters or longer. The longer the better.
– Passwords should contain at least one alpha character (a-z).
– Passwords should contain at least one non-alpha character.
– Do not choose passwords that contain personal information, like pet’s or
children’s names.
– Try using a pass phrase.
For example, Hpatp0a = “Harry Potter and the Prisoner of Azkaban”.
The easiest way to break into your computer is a weak or blank
password. If your computer is compromised it can be used to attack
other computers on campus or around the world.
6. Personal Firewall Protection
• Enable Your Firewall Protection
– Windows, Macintosh OS X (v. 10.2 and later), and Linux
have built in firewall software.
• Commercial Firewall Software
– If you have an older Operating System or want a more
robust firewall, consider purchasing a commercial version.
• Free Firewall Software for Windows
– ZoneAlarm Firewall for Windows is available for free for
individual home use on your personal computer.
A firewall can protect your computer against hackers and other
security attacks. The latest versions of Windows, Linux and the
Macintosh operating systems have basic built in firewalls.
7. Spyware and How to Avoid It?
• Spyware is often installed by you without your
knowledge by piggybacking on other software or
by tricking you into installing it.
• Some anti-virus software also has anti-spyware
capability.
• Anti-spyware Recommendations for Windows
– Adaware
(http://www.lavasoftusa.com/default.shtml.en)
– Spybot Search and Destroy
(http://www.safer-networking.org/en/home/index.html)
Spyware is software that is downloaded and installed onto
your computer, often without your knowledge. Spyware
monitors and shares your information while you browse the
Internet.
8. Back Up Important Files !
• How Should I Back Up My Files?
– Backup Software: Can be installed easily & regular
backup can be taken.
– Back up to Web Files: SkyDrive has 25GB of space on
Cloud. Powered by Microsoft
– Back up to CD or DVD Writers: All computers have a
built in CD or DVD writer. Burning discs is easy and
inexpensive.
Since no system is completely secure, you should regularly
back up important files. This is also your best defense
against losing files to viruses, software or hardware failure,
or the loss or theft of your computer.
9. Email Safety Tips
1. Do not open unexpected attachments.
2. Use Spam Filters
3. Beware of Spoof Emails or Phishing.
4. Don’t send sensitive data in email.
5. Avoid clicking on links in the body of an email
message.
While these links may not be a phishing attempt, they may not go to the site you
intend. Unless you are completely comfortable that the email is legitimate, it is
best to copy and paste the link or type it in directly in your browser.
10. Spoof Email (Phishing)
Phishing emails are an attempt by thieves to lure you into
divulging personal and financial information, for their profit.
11. Spoof Email (Phishing)
6 Ways to Recognize Phishing
1. Generic Greeting
For example, “Dear Customer”.
2. Sense of urgency.
May include an urgent warning requiring immediate action.
3. Account status threat.
May include a warning that your account will be terminated unless
you reply.
4. Forged email address.
The sender’s email address may be forged, even if it looks
legitimate.
5. Forged links to Web sites.
There is often a link to a Website to “fix” the problem. These are
usually forged.
6. Requests for personal information.
Asking for login and password info, either in email or via the link.