SlideShare a Scribd company logo
1 of 8
NETWORK & INTERNET SECURITY


Bev Robb
Teksquisite Consulting, LLC
NETWORK & INTERNET SECURITY
                 Bev Robb, Teksquisite Consulting, LLC




About Me

Bev Robb, owner of Teksquisite Consulting,
a female-owned IT consulting business with
over 18 years of experience in the following:

     Computing in higher education
     Hardware
     Software
     Network security
     Internet security
     Open source
     Web development & design
     Computer training
     Social media consulting

Known in the infosec/tech world as "Teksquisite!"


                       Find Teksquisite Consulting on
NETWORK & INTERNET SECURITY
                  Bev Robb, Teksquisite Consulting, LLC




Agenda

This presentation will cover the following topics:
     Malicious Software
     Types of Security
     Portable Security Tools
     Additional Resources



You might be asking, “Why Is This Important?”

1. Understanding security will broaden your skill set
2. Using these tools will protect yourself from risk
3. Explaining security threats and safeguards add an
   educational element to the customer experience
NETWORK & INTERNET SECURITY
                 Bev Robb, Teksquisite Consulting, LLC




Malicious Software


     Trojan horses

     Virus

     Worms

     Spyware/malware

     Scareware/Ransomware

     Backdoors

     Rootkits, keyloggers, RATs

     APTs, Botnets, Mix & Match
       (a backdoor can install a keylogger)
NETWORK & INTERNET SECURITY
                  Bev Robb, Teksquisite Consulting, LLC




Types of Security


      Firewalls

      Antivirus

      Antispyware/antimalware

      Layered Security
NETWORK & INTERNET SECURITY
                    Bev Robb, Teksquisite Consulting, LLC




Portable Security Tools

      Emsisoft Emergency Kit - contains a collection of programs that can be
      used without a software installation to scan and clean infected computers for
      malware.


      Webroot System Analyzer - quick assessment tool
      [Hardware/OS/Installed Applications] with results delivered in less then two
      minutes.

      Kaspersky Rescue Disk 10 - designed to scan, disinfect and restore
      infected operating systems. It should be used when it is impossible to boot the
      operating system.


      Microsoft Safety Scanner - the Microsoft Safety Scanner is a free
      downloadable security tool that provides on-demand scanning and helps remove
      viruses, spyware, and other malicious software. It works with your existing
      antivirus software.


      F-Secure Easy Clean 1.2 - it is good to have an alternative scanner
      because no antivirus tool will detect 100% of threats.
NETWORK & INTERNET SECURITY
                        Bev Robb, Teksquisite Consulting, LLC




Additional Resources*

technibble.com
   Why You Need to Patch More Than Just the Operating System

   TechNibble's Computer Repair Tools - Includes following tools

          •   Patch My PC - Mass Update 3rd Party Software
          •   GSmartControl - Monitor & Test Hard Drive SMART
          •   Fabar Service Scanner - Internet Connection Problems
          •   Wi-Fi Testing and Mapping Apps

tomsguide.com
   Removing Malware with Kaspersky Rescue Disk

pendrivelinux.com
   YUMI Multiboot USB Creator (Windows)

Coursera
   https://www.coursera.org/category/cs-systems

teksquisiteconsulting.com (my blog)

From the Pro’s: Secunia | Microsoft Security Baseline Analyzer | Sysinternals

* Links provided on OnForce Pros LinkedIn Group
NETWORK & INTERNET SECURITY


Teksquisite Consulting, LLC

PDF Notes Available Upon Request
          E-mail: Teksquisite

More Related Content

What's hot

Intro to Malware Analysis
Intro to Malware AnalysisIntro to Malware Analysis
Intro to Malware Analysiswremes
 
Computer security overview
Computer security overviewComputer security overview
Computer security overviewCAS
 
Network security threats and solutions
Network security threats and solutionsNetwork security threats and solutions
Network security threats and solutionshassanmughal4u
 
Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)Satyendra Arora
 
Seven Effective Habits When Using The Internet
Seven Effective Habits When Using The InternetSeven Effective Habits When Using The Internet
Seven Effective Habits When Using The InternetHelen Dixon
 
Ch08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System VulnerabilitiesCh08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System Vulnerabilitiesphanleson
 
September 2012 Security Vulnerability Session
September 2012 Security Vulnerability SessionSeptember 2012 Security Vulnerability Session
September 2012 Security Vulnerability SessionKaseya
 
CLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYCLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYRc Os
 
Hacking and virus presentation
Hacking and virus presentationHacking and virus presentation
Hacking and virus presentationPhương Anh Pađi
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 
What endpoint protection solutions are available on the market today?
What endpoint protection solutions are available on the market today?What endpoint protection solutions are available on the market today?
What endpoint protection solutions are available on the market today?David Strom
 
Network security desighn principles and authentication
Network security desighn principles and authenticationNetwork security desighn principles and authentication
Network security desighn principles and authenticationEdgar Mwangangi
 
Network Security
Network SecurityNetwork Security
Network Securityforpalmigho
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internetdpd
 
Security Testing for Test Professionals
Security Testing for Test ProfessionalsSecurity Testing for Test Professionals
Security Testing for Test ProfessionalsTechWell
 
How Hard Is It To Hack A Pc
How Hard Is It To Hack A PcHow Hard Is It To Hack A Pc
How Hard Is It To Hack A Pchaimkarel
 
The Safest Way To Interact Online
The Safest Way To Interact OnlineThe Safest Way To Interact Online
The Safest Way To Interact Onlinepcsafe
 
5 Network Security Threats Facing Businesses Today
5 Network Security Threats Facing Businesses Today5 Network Security Threats Facing Businesses Today
5 Network Security Threats Facing Businesses TodayVelocity Network Solutions
 

What's hot (20)

Intro to Malware Analysis
Intro to Malware AnalysisIntro to Malware Analysis
Intro to Malware Analysis
 
Computer security overview
Computer security overviewComputer security overview
Computer security overview
 
Network security threats and solutions
Network security threats and solutionsNetwork security threats and solutions
Network security threats and solutions
 
Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)
 
Seven Effective Habits When Using The Internet
Seven Effective Habits When Using The InternetSeven Effective Habits When Using The Internet
Seven Effective Habits When Using The Internet
 
Ch08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System VulnerabilitiesCh08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System Vulnerabilities
 
September 2012 Security Vulnerability Session
September 2012 Security Vulnerability SessionSeptember 2012 Security Vulnerability Session
September 2012 Security Vulnerability Session
 
CLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYCLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITY
 
Adware
AdwareAdware
Adware
 
Hacking and virus presentation
Hacking and virus presentationHacking and virus presentation
Hacking and virus presentation
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
What endpoint protection solutions are available on the market today?
What endpoint protection solutions are available on the market today?What endpoint protection solutions are available on the market today?
What endpoint protection solutions are available on the market today?
 
Network security desighn principles and authentication
Network security desighn principles and authenticationNetwork security desighn principles and authentication
Network security desighn principles and authentication
 
Network Security
Network SecurityNetwork Security
Network Security
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internet
 
Security Testing for Test Professionals
Security Testing for Test ProfessionalsSecurity Testing for Test Professionals
Security Testing for Test Professionals
 
How Hard Is It To Hack A Pc
How Hard Is It To Hack A PcHow Hard Is It To Hack A Pc
How Hard Is It To Hack A Pc
 
The Safest Way To Interact Online
The Safest Way To Interact OnlineThe Safest Way To Interact Online
The Safest Way To Interact Online
 
Computer and network security
Computer and network securityComputer and network security
Computer and network security
 
5 Network Security Threats Facing Businesses Today
5 Network Security Threats Facing Businesses Today5 Network Security Threats Facing Businesses Today
5 Network Security Threats Facing Businesses Today
 

Viewers also liked

Open Access: The Book C
Open Access: The Book COpen Access: The Book C
Open Access: The Book CMariam Attia
 
Giảm giá 30%
Giảm giá 30%Giảm giá 30%
Giảm giá 30%Trâm Lê
 
Balancing blindfolded
Balancing blindfoldedBalancing blindfolded
Balancing blindfoldedrjhoage
 
Grid proxy architecture for network resources
Grid proxy architecture for network resourcesGrid proxy architecture for network resources
Grid proxy architecture for network resourcesTal Lavian Ph.D.
 
Mark Reilly Resume
Mark Reilly ResumeMark Reilly Resume
Mark Reilly ResumeMark Reilly
 
PPT - Dailyroutines (BIG VIII K13 Unit 6)
PPT - Dailyroutines (BIG VIII K13 Unit 6) PPT - Dailyroutines (BIG VIII K13 Unit 6)
PPT - Dailyroutines (BIG VIII K13 Unit 6) Edy Prasetyono
 
Raytheon Professional Services ( RPS )
Raytheon Professional Services ( RPS )Raytheon Professional Services ( RPS )
Raytheon Professional Services ( RPS )Kenneth Ng
 
High School Summit Information
High School Summit InformationHigh School Summit Information
High School Summit Informationdawnadams
 
Ccabrerc presentaciones powerpointbuscadores
Ccabrerc presentaciones powerpointbuscadoresCcabrerc presentaciones powerpointbuscadores
Ccabrerc presentaciones powerpointbuscadorescarlos67casta
 
Gazette s14 06-06
Gazette s14 06-06Gazette s14 06-06
Gazette s14 06-06npsnewsp
 
Web invite
Web inviteWeb invite
Web invitebrsnc
 
Decreto nº 15.514 de 2006
Decreto nº 15.514 de 2006Decreto nº 15.514 de 2006
Decreto nº 15.514 de 2006Marcus Cabral
 

Viewers also liked (20)

Open Access: The Book C
Open Access: The Book COpen Access: The Book C
Open Access: The Book C
 
Presentation KOROSI BESI
Presentation KOROSI BESIPresentation KOROSI BESI
Presentation KOROSI BESI
 
My Top 5 PRO events in 2014
My Top 5 PRO events in 2014My Top 5 PRO events in 2014
My Top 5 PRO events in 2014
 
The score
The scoreThe score
The score
 
Vacaciones de verano
Vacaciones de veranoVacaciones de verano
Vacaciones de verano
 
Giảm giá 30%
Giảm giá 30%Giảm giá 30%
Giảm giá 30%
 
Balancing blindfolded
Balancing blindfoldedBalancing blindfolded
Balancing blindfolded
 
Grid proxy architecture for network resources
Grid proxy architecture for network resourcesGrid proxy architecture for network resources
Grid proxy architecture for network resources
 
Mark Reilly Resume
Mark Reilly ResumeMark Reilly Resume
Mark Reilly Resume
 
PPT - Dailyroutines (BIG VIII K13 Unit 6)
PPT - Dailyroutines (BIG VIII K13 Unit 6) PPT - Dailyroutines (BIG VIII K13 Unit 6)
PPT - Dailyroutines (BIG VIII K13 Unit 6)
 
Raytheon Professional Services ( RPS )
Raytheon Professional Services ( RPS )Raytheon Professional Services ( RPS )
Raytheon Professional Services ( RPS )
 
Cd luis
Cd luisCd luis
Cd luis
 
High School Summit Information
High School Summit InformationHigh School Summit Information
High School Summit Information
 
Ccabrerc presentaciones powerpointbuscadores
Ccabrerc presentaciones powerpointbuscadoresCcabrerc presentaciones powerpointbuscadores
Ccabrerc presentaciones powerpointbuscadores
 
Gazette s14 06-06
Gazette s14 06-06Gazette s14 06-06
Gazette s14 06-06
 
006 hepatite e
006   hepatite e006   hepatite e
006 hepatite e
 
Web invite
Web inviteWeb invite
Web invite
 
Laura emily tutorial3 presentation
Laura emily tutorial3 presentation Laura emily tutorial3 presentation
Laura emily tutorial3 presentation
 
Tree
TreeTree
Tree
 
Decreto nº 15.514 de 2006
Decreto nº 15.514 de 2006Decreto nº 15.514 de 2006
Decreto nº 15.514 de 2006
 

Similar to Security Presenatation for Onforce Pro Town Hall

How Malware Works - Understanding Software Vulnerabilities
How Malware Works - Understanding Software VulnerabilitiesHow Malware Works - Understanding Software Vulnerabilities
How Malware Works - Understanding Software VulnerabilitiesBunmi Sowande
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundaryDean Iacovelli
 
Emerging Threats to Infrastructure
Emerging Threats to InfrastructureEmerging Threats to Infrastructure
Emerging Threats to InfrastructureJorge Orchilles
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?TechSoup
 
Prevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability ScannerPrevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability ScannerGFI Software
 
It's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityIt's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityLumension
 
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...AVEVA
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesAlireza Ghahrood
 
13. Neville Varnham - PeopleSoft Cyber Security
13. Neville Varnham - PeopleSoft Cyber Security13. Neville Varnham - PeopleSoft Cyber Security
13. Neville Varnham - PeopleSoft Cyber SecurityCedar Consulting
 
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A  ....Salwan public schoolDev Abhijet Gagan Chaitanya VII-A  ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public schoolDevku45
 
Battling Malware In The Enterprise
Battling Malware In The EnterpriseBattling Malware In The Enterprise
Battling Malware In The EnterpriseAyed Al Qartah
 

Similar to Security Presenatation for Onforce Pro Town Hall (20)

How Malware Works - Understanding Software Vulnerabilities
How Malware Works - Understanding Software VulnerabilitiesHow Malware Works - Understanding Software Vulnerabilities
How Malware Works - Understanding Software Vulnerabilities
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
 
Emerging Threats to Infrastructure
Emerging Threats to InfrastructureEmerging Threats to Infrastructure
Emerging Threats to Infrastructure
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
 
Top 10 antiviruses
Top 10 antivirusesTop 10 antiviruses
Top 10 antiviruses
 
Prevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability ScannerPrevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability Scanner
 
It's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityIt's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
PACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of MalwarePACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of Malware
 
Safe Computing At Home And Work
Safe Computing At Home And WorkSafe Computing At Home And Work
Safe Computing At Home And Work
 
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
185
185185
185
 
NetWitness
NetWitnessNetWitness
NetWitness
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
13. Neville Varnham - PeopleSoft Cyber Security
13. Neville Varnham - PeopleSoft Cyber Security13. Neville Varnham - PeopleSoft Cyber Security
13. Neville Varnham - PeopleSoft Cyber Security
 
Hakin9 05 2013
Hakin9 05 2013Hakin9 05 2013
Hakin9 05 2013
 
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A  ....Salwan public schoolDev Abhijet Gagan Chaitanya VII-A  ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
 
Battling Malware In The Enterprise
Battling Malware In The EnterpriseBattling Malware In The Enterprise
Battling Malware In The Enterprise
 

Recently uploaded

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 

Recently uploaded (20)

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 

Security Presenatation for Onforce Pro Town Hall

  • 1. NETWORK & INTERNET SECURITY Bev Robb Teksquisite Consulting, LLC
  • 2. NETWORK & INTERNET SECURITY Bev Robb, Teksquisite Consulting, LLC About Me Bev Robb, owner of Teksquisite Consulting, a female-owned IT consulting business with over 18 years of experience in the following:  Computing in higher education  Hardware  Software  Network security  Internet security  Open source  Web development & design  Computer training  Social media consulting Known in the infosec/tech world as "Teksquisite!" Find Teksquisite Consulting on
  • 3. NETWORK & INTERNET SECURITY Bev Robb, Teksquisite Consulting, LLC Agenda This presentation will cover the following topics:  Malicious Software  Types of Security  Portable Security Tools  Additional Resources You might be asking, “Why Is This Important?” 1. Understanding security will broaden your skill set 2. Using these tools will protect yourself from risk 3. Explaining security threats and safeguards add an educational element to the customer experience
  • 4. NETWORK & INTERNET SECURITY Bev Robb, Teksquisite Consulting, LLC Malicious Software Trojan horses Virus Worms Spyware/malware Scareware/Ransomware Backdoors Rootkits, keyloggers, RATs APTs, Botnets, Mix & Match (a backdoor can install a keylogger)
  • 5. NETWORK & INTERNET SECURITY Bev Robb, Teksquisite Consulting, LLC Types of Security Firewalls Antivirus Antispyware/antimalware Layered Security
  • 6. NETWORK & INTERNET SECURITY Bev Robb, Teksquisite Consulting, LLC Portable Security Tools Emsisoft Emergency Kit - contains a collection of programs that can be used without a software installation to scan and clean infected computers for malware. Webroot System Analyzer - quick assessment tool [Hardware/OS/Installed Applications] with results delivered in less then two minutes. Kaspersky Rescue Disk 10 - designed to scan, disinfect and restore infected operating systems. It should be used when it is impossible to boot the operating system. Microsoft Safety Scanner - the Microsoft Safety Scanner is a free downloadable security tool that provides on-demand scanning and helps remove viruses, spyware, and other malicious software. It works with your existing antivirus software. F-Secure Easy Clean 1.2 - it is good to have an alternative scanner because no antivirus tool will detect 100% of threats.
  • 7. NETWORK & INTERNET SECURITY Bev Robb, Teksquisite Consulting, LLC Additional Resources* technibble.com Why You Need to Patch More Than Just the Operating System TechNibble's Computer Repair Tools - Includes following tools • Patch My PC - Mass Update 3rd Party Software • GSmartControl - Monitor & Test Hard Drive SMART • Fabar Service Scanner - Internet Connection Problems • Wi-Fi Testing and Mapping Apps tomsguide.com Removing Malware with Kaspersky Rescue Disk pendrivelinux.com YUMI Multiboot USB Creator (Windows) Coursera https://www.coursera.org/category/cs-systems teksquisiteconsulting.com (my blog) From the Pro’s: Secunia | Microsoft Security Baseline Analyzer | Sysinternals * Links provided on OnForce Pros LinkedIn Group
  • 8. NETWORK & INTERNET SECURITY Teksquisite Consulting, LLC PDF Notes Available Upon Request E-mail: Teksquisite