Internet Security at Home Angela Samuels
Topics Child Online Safety Phishing and Pharming Scams Spyware Protection Virus and Worm Protection Patches and Updates
Child Online Safety Statistics of Online Activity 61% of 13 to 17 year olds have a personal profile on sites such as Myspace or Friendster. 33% of 13- to- 17-year-olds reported that their parents or guardians know “very little” or “nothing” about what they do on the Internet 14% have actually met face-to-face with a person they had known only through the Internet Source: http://www.netsmartz.org/safety/statistics.htm
Child Online Safety Online Resources http://www.netsmartz.org/   http://www.protectyourkids.info/ http://www.safekids.com/ http://www.blogsafety.com/ Recommended Software by PC magazine http://www.safeeyes.com/
To-Do List Educate yourself and your children about the risk of online communication with strangers Define family rules of computer use and post those rules for all to see Have  your children sign a pledge form Keep the line of communication open between you and your kids
Example of House Rules Be careful when communicating online Never share personal information online Respect other people’s rights Tell your parents if something online makes you feel uncomfortable
Information Security:  Today’s Threats All of these are daily  growing  threats.  1 in 5 Americans were the target of a phishing ploy last year, costing US banks and creditors roughly $1.2 Billion  -  CNET.com news Viruses are increasingly used for more corrupt purposes – it’s not just for fame or fun anymore Written for profit Data theft also an increasing goal
Scams As a computer user you are threatened by: Phishing  –  Deceptive emails falsely representing a legitimate enterprise that attempt to lure a user into sharing personal or financial information for the purposes of identity theft.  Example:  A scammer posing as a online book store, wanting a user to login their account to restore their account. Pharming  –  forged emails that look as though they came from a somewhere or someone other than the actual source. Example:  An email sent by a scammer or virus that appears to come from a friend or associate.
Tips on Phishing Scams Never reply to email messages that request personal information Don’t click on suspicious links Make sure the Web sites use encryption
Spyware Software that covertly gathers user information through a user’s Internet connection without your consent.  Primarily used for advertisements.  What Spyware can do it? Bombard you with ads Change your settings Collect personal information Slow down or crash your computer Possible Spyware sites Screensavers Free program downloads site
Viruses and Worms A program or piece of code that is loaded onto a computer and runs without the users knowledge. Trojan horse – a destructive program masquerading as a friendly application. Worm – a self-replicating program designed to send itself to as many email recipients, or computers on a network, as possible. Example: Yamanner arrives in a Yahoo mailbox  b earing the subject header "New Graphic Site." Once the message is opened, the computer becomes infected and the worm spreads itself to people on the Yahoo e-mail contact list. The harvested e-mail addresses are also sent to a remote online server (June 06 cnet.com)
Three things to keep safe online Use an Internet Firewall  Guard against Intruders  Get Computer Updates Keep your software current Use an Up-to-Date Antivirus Software Keep antivirus software updated
Information Security:  Today’s Threats Solution ?? Knowledge. The best home security system in the world cannot stop you from leaving your front door wide open.
Security at home for Chrysler Group colleagues The latest articles on Internet Security Download  Free  Norton Antivirus Software  Articles about Spam and Phishing
Global Information Security

Security At Home

  • 1.
    Internet Security atHome Angela Samuels
  • 2.
    Topics Child OnlineSafety Phishing and Pharming Scams Spyware Protection Virus and Worm Protection Patches and Updates
  • 3.
    Child Online SafetyStatistics of Online Activity 61% of 13 to 17 year olds have a personal profile on sites such as Myspace or Friendster. 33% of 13- to- 17-year-olds reported that their parents or guardians know “very little” or “nothing” about what they do on the Internet 14% have actually met face-to-face with a person they had known only through the Internet Source: http://www.netsmartz.org/safety/statistics.htm
  • 4.
    Child Online SafetyOnline Resources http://www.netsmartz.org/ http://www.protectyourkids.info/ http://www.safekids.com/ http://www.blogsafety.com/ Recommended Software by PC magazine http://www.safeeyes.com/
  • 5.
    To-Do List Educateyourself and your children about the risk of online communication with strangers Define family rules of computer use and post those rules for all to see Have your children sign a pledge form Keep the line of communication open between you and your kids
  • 6.
    Example of HouseRules Be careful when communicating online Never share personal information online Respect other people’s rights Tell your parents if something online makes you feel uncomfortable
  • 7.
    Information Security: Today’s Threats All of these are daily growing threats. 1 in 5 Americans were the target of a phishing ploy last year, costing US banks and creditors roughly $1.2 Billion - CNET.com news Viruses are increasingly used for more corrupt purposes – it’s not just for fame or fun anymore Written for profit Data theft also an increasing goal
  • 8.
    Scams As acomputer user you are threatened by: Phishing – Deceptive emails falsely representing a legitimate enterprise that attempt to lure a user into sharing personal or financial information for the purposes of identity theft. Example: A scammer posing as a online book store, wanting a user to login their account to restore their account. Pharming – forged emails that look as though they came from a somewhere or someone other than the actual source. Example: An email sent by a scammer or virus that appears to come from a friend or associate.
  • 9.
    Tips on PhishingScams Never reply to email messages that request personal information Don’t click on suspicious links Make sure the Web sites use encryption
  • 10.
    Spyware Software thatcovertly gathers user information through a user’s Internet connection without your consent. Primarily used for advertisements. What Spyware can do it? Bombard you with ads Change your settings Collect personal information Slow down or crash your computer Possible Spyware sites Screensavers Free program downloads site
  • 11.
    Viruses and WormsA program or piece of code that is loaded onto a computer and runs without the users knowledge. Trojan horse – a destructive program masquerading as a friendly application. Worm – a self-replicating program designed to send itself to as many email recipients, or computers on a network, as possible. Example: Yamanner arrives in a Yahoo mailbox b earing the subject header "New Graphic Site." Once the message is opened, the computer becomes infected and the worm spreads itself to people on the Yahoo e-mail contact list. The harvested e-mail addresses are also sent to a remote online server (June 06 cnet.com)
  • 12.
    Three things tokeep safe online Use an Internet Firewall Guard against Intruders Get Computer Updates Keep your software current Use an Up-to-Date Antivirus Software Keep antivirus software updated
  • 13.
    Information Security: Today’s Threats Solution ?? Knowledge. The best home security system in the world cannot stop you from leaving your front door wide open.
  • 14.
    Security at homefor Chrysler Group colleagues The latest articles on Internet Security Download Free Norton Antivirus Software Articles about Spam and Phishing
  • 15.

Editor's Notes

  • #2 Introduction 1 min Good Afternoon Job responsiblities include updating the Security at home web site and ITM/S web site. I also do a scanning of new web applications to find weaknesses in our system.
  • #3 Introduction – 1 min Child Online Safety – 8 mins Phishing and Pharming Scams -7 mins Spyware Protection Virus and Worm Protection Patches and Updates 1 min Conclusion
  • #4 How many people here are parents? How many people have heard of myspace.com Do you know what your child is doing online?
  • #6 Show copies of parents and child pledge forms will have them available if anyone wants one at the end of the session
  • #8 Computer Internet theft now surpasses money generated from drug crime worldwide
  • #9 Go to http://secaware.intra.daimlerchrysler.com/WBTWeb/AdvancedEnglish/phishing7.htm
  • #13 Most ISP’s will provide anti-virus software for free