Safety Plano Library June 4 Main


Published on

Basic Presentation about Computer Security

Published in: Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • Safety Plano Library June 4 Main

    1. 1. What happened to my Computer? Scott Meech
    2. 2. Ever felt like this guy?
    3. 3. Computers Hate Me <ul><li>No they don’t… </li></ul><ul><li>They are just not made very user friendly! </li></ul>
    4. 4. What is a Computer Virus?
    5. 5. What is a Computer Virus? <ul><li>A computer virus is a malicious program that spreads from computer to computer. </li></ul>
    6. 6. How scary are they?
    7. 7. How many viruses are out there?
    8. 8. Viruses, Worms, Trojan Horses <ul><li>Have you heard other names for malicious computer programs? </li></ul><ul><ul><li>Viruses, Worms, Trojan Horses </li></ul></ul><ul><li>There are technical differences between each of these, but all of them attempt to run on your computer without your knowledge. </li></ul>
    9. 9. Current Virus Status North America
    10. 10. What happens to your Computer?
    11. 11. Viruses are Serious… but… <ul><li>Most of the time it isn’t a virus… </li></ul>
    12. 12. 10 Most Dangerous Things Users Do Online
    13. 13. 10 Most Dangerous Things Users Do Online <ul><li>1. Clicking on email attachments from unknown senders </li></ul><ul><li>2. Installing unauthorized applications </li></ul><ul><li>3. Turning off or disabling automated security tools </li></ul><ul><li>4. Opening HTML or plain-text messages from unknown senders </li></ul>
    14. 14. 10 Most Dangerous Things Users Do Online <ul><li>5. Surfing gambling, porn, or other legally-risky sites </li></ul><ul><li>6. Giving out passwords, tokens, or smart cards </li></ul><ul><li>7. Random surfing of unknown, untrusted Websites </li></ul><ul><li>8. Attaching to an unknown, untrustworthy WiFi network </li></ul>
    15. 15. 10 Most Dangerous Things Users Do Online <ul><li>9. Filling out Web scripts, forms, or registration pages </li></ul><ul><li>10. Participating in chat rooms or social networking sites </li></ul>
    16. 16. Malware <ul><li>The most general name for a malicious computer program is malware. </li></ul><ul><li>You may have heard computer programs called software. </li></ul><ul><li>The word malware comes from Malicious software. </li></ul>
    17. 17. Adware <ul><li> </li></ul>
    18. 18. Example Adware <ul><li>TopMoxie </li></ul><ul><li>123 Messenger </li></ul><ul><li>180 Solutions </li></ul><ul><ul><li>180SearchAssistant </li></ul></ul><ul><ul><li>Zango </li></ul></ul><ul><li>Bonzi Buddy </li></ul><ul><li>BlockChecker </li></ul><ul><li>ClipGenie </li></ul><ul><li>Comet Cursor </li></ul><ul><li>Crazy Girls </li></ul><ul><li>Cydoor </li></ul><ul><li>Daemon Tools - ( Now when downloaded from the daemon tools official site, software comes bundled with the &quot;Daemon Tools WhenUSave Toolbar but can be unchecked during installation. ) </li></ul><ul><li>Direct Revenue </li></ul><ul><ul><li>Aurora </li></ul></ul><ul><li>Ebates MoneyMaker </li></ul><ul><li>ErrorSafe </li></ul><ul><li>Gator </li></ul><ul><li>Hotbar </li></ul><ul><li>Mirar Toolbar </li></ul><ul><li>Oemji Toolbar </li></ul><ul><li>Xango Toolbar </li></ul><ul><li>PornDigger ! </li></ul><ul><li>Smiley Central </li></ul><ul><li>WeatherBug </li></ul><ul><li>WhenU </li></ul><ul><li>WinFixer </li></ul><ul><li>Tag A saurus </li></ul>
    19. 19. Hoaxes <ul><li>http:// / </li></ul><ul><li> </li></ul>
    20. 20. Spoofing <ul><li>Someone who has your email address stored somewhere on her or his computer, becomes infected by a worm that uses spoofing. </li></ul><ul><li>The worm searches for email addresses on the infected computer and sends itself to them. </li></ul><ul><li>The worm inserts one of the email addresses it finds in the &quot;From:&quot; field of the virus emails it sends. In other words, it may use your address in the &quot;From:&quot; field, which tricks unwary recipients into thinking that the virus came from your computer. </li></ul>
    21. 21. Phishing – Top 5 <ul><li>Regions Bank: your account! </li></ul><ul><li>Regions Bank: official information! </li></ul><ul><li>Official Information! </li></ul><ul><li>Notice: Confirm Your Online Banking Records! </li></ul><ul><li>Confirm Your Details! </li></ul>
    22. 22. Ebay Example
    23. 23. Looks Safe to Me <ul><li>Do not download anything that you are not 100% sure of … even if it looks professional and safe! </li></ul>
    24. 24. Secure Purchasing <ul><li>Lock Icon on Bottom of Browser </li></ul><ul><li>Phishing Protection Plug-In for Firefox </li></ul>
    25. 25. Downloadable Toolbars Who are they targeting with these?
    26. 26. Screensavers and Games for Free <ul><li>Free </li></ul><ul><li>You Win … Click Here… </li></ul><ul><li>Hit this and win a free IPod… </li></ul>
    27. 27. What can you Do?
    28. 28. Perform Basic Computer Safety Maintenance <ul><li>Use an Internet “firewall” </li></ul><ul><li>Update your computer </li></ul><ul><li>Use up-to-date antivirus software </li></ul><ul><ul><li>Pay for McAfee or use VGA </li></ul></ul>
    29. 29. Use an Internet Firewall <ul><li>A firewall is software or hardware that creates a protective barrier between your computer and potentially damaging content on the Internet or network. </li></ul><ul><li>The firewall helps to guard your computer against malicious users, and also against malicious software such as computer viruses and worms. </li></ul>
    30. 30. Use an Internet Firewall <ul><li>Microsoft Windows XP helps to provide more security in the form of a firewall that is known as the Internet Connection Firewall (ICF). </li></ul><ul><li>Windows XP Service Pack 2 (SP2) includes the new Windows Firewall, which replaces the ICF. </li></ul>
    31. 31. Others? <ul><li>Lavasoft Personal Firewall </li></ul><ul><li>TuxGuardian </li></ul><ul><li>ZoneAlarm </li></ul>
    32. 32. Get Professional Help … Pay for it sometimes
    33. 33. Google It <ul><li>Type in whatever error your getting into Google and Troubleshoot </li></ul>
    34. 34. Use Anti-Virus Software <ul><li>PC- cillin </li></ul><ul><li>Windows Live OneCare </li></ul><ul><li>ZoneAlarm AntiVirus </li></ul><ul><li>BullGuard </li></ul><ul><li>AVG Anti-Virus </li></ul><ul><li>AOL Active Virus Shield </li></ul><ul><li>McAfee VirusScan </li></ul><ul><li>Norton AntiVirus </li></ul><ul><li>Panda Antivirus </li></ul>
    35. 35. Prevent Adware <ul><li>Ad-Aware by Lavasoft </li></ul><ul><li>CounterSpy by Sunbelt Software </li></ul><ul><li>Spybot Search & Destroy by Patrick Kolla </li></ul><ul><li>SpySweeper by Webroot </li></ul><ul><li>Spyware Doctor by PCTools </li></ul><ul><li>AVG Anti- Spyware by Grisoft (formerly Ewido) </li></ul><ul><li>Trend Micro Anti-Spyware (formerly SpySubtract by Intermute) </li></ul>