Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Internet Security Zoaib Mirza Promote Education www.promoteeducation.com
Topic of Discussions <ul><li>About Me </li></ul><ul><li>What defines an incident?  </li></ul><ul><li>General Statistics </...
About Me <ul><li>Instructional Associate / Distance Technology Specialist – DePaul University </li></ul><ul><li>Visiting P...
What defines an incident? <ul><li>A computer security incident covers a large range of violations, including: </li></ul><u...
General Statistics 137,529 82,094 52,658 21,756 Incidents 2003 2002 2001 2000 Year   http://www.cert.org/stats/ 2000-2003
General Threats <ul><li>Virus  - A computer virus is a computer program that can copy itself and infect a computer without...
Types of Threats <ul><li>Trojan horse  – A Trojan horse is a program that unlike a virus contains or installs a malicious ...
Types of Threats <ul><li>Phishing  - phishing is a criminal activity using “social engineering” techniques which is manipu...
Best Practices <ul><li>Install Operating system Updates and Patches </li></ul><ul><li>Install Anti-Virus and Spyware Prote...
Free Tools <ul><li>Microsoft Baseline Security Analyzer </li></ul><ul><ul><li>http://www.microsoft.com/ technet/security/t...
Conclusion <ul><li>Secure your computer like you would secure your home.  </li></ul><ul><li>Do not respond to any emails o...
Questions and Answers
Game - Questions <ul><li>You cannot stop me, I can come in your machine in many ways, can you guess the type of threat I a...
Game - Questions <ul><li>If I am an unknown email and showing up in your mailbox almost everyday, who am I?  </li></ul><ul...
Game - Answers <ul><li>If I am an unknown email and showing up in your mailbox almost everyday, who am I? </li></ul><ul><u...
Game - Answers <ul><li>If I am an infected file on your computer, who am I? </li></ul><ul><ul><li>Answer: Virus </li></ul>...
Game - Answers <ul><li>If I look innocent and harmless but when executed can harm your computer, who am I? </li></ul><ul><...
Bibliography and References <ul><li>http://www.cert.org/stats/ </li></ul><ul><li>http://is.depaul.edu/security/information...
Upcoming SlideShare
Loading in …5
×

Promote Education Internet Security

569 views

Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Promote Education Internet Security

  1. 1. Internet Security Zoaib Mirza Promote Education www.promoteeducation.com
  2. 2. Topic of Discussions <ul><li>About Me </li></ul><ul><li>What defines an incident? </li></ul><ul><li>General Statistics </li></ul><ul><li>General Threats </li></ul><ul><li>Best Practices </li></ul><ul><li>Free Tools </li></ul><ul><li>Conclusion </li></ul><ul><li>Q&A </li></ul><ul><li>Game </li></ul><ul><li>Bibliography and References </li></ul>
  3. 3. About Me <ul><li>Instructional Associate / Distance Technology Specialist – DePaul University </li></ul><ul><li>Visiting Professor – DePaul University </li></ul><ul><ul><li>Introduction to Computer Productivity </li></ul></ul><ul><ul><li>Database Design and Implementation for Small Business Applications </li></ul></ul><ul><ul><li>Internet Applications for Small Businesses </li></ul></ul><ul><ul><li>Management of Information Technology </li></ul></ul><ul><li>CEO and founder of www.promoteeducation.com </li></ul>
  4. 4. What defines an incident? <ul><li>A computer security incident covers a large range of violations, including: </li></ul><ul><ul><li>Harassment, </li></ul></ul><ul><ul><li>Denial/Interruption of Service, </li></ul></ul><ul><ul><li>Malware Infection (worm, virus), </li></ul></ul><ul><ul><li>Unauthorized Access, </li></ul></ul><ul><ul><li>Misuse of Data or Services, </li></ul></ul><ul><ul><li>Copyright Infringement, </li></ul></ul><ul><ul><li>Spam </li></ul></ul>
  5. 5. General Statistics 137,529 82,094 52,658 21,756 Incidents 2003 2002 2001 2000 Year   http://www.cert.org/stats/ 2000-2003
  6. 6. General Threats <ul><li>Virus - A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. </li></ul><ul><ul><li>Example an infected file. </li></ul></ul><ul><li>Worm - A computer worm is a self-replicating computer program. It uses a network to send copies of itself to other nodes (computer terminals on the network) and it may do so without any user intervention. Unlike a virus, it does not need to attach itself to an existing program. Worms always harm the network (if only by consuming bandwidth), whereas viruses always infect or corrupt files on a targeted computer. </li></ul><ul><ul><li>For example, a worm could send out copies of itself to everyone listed in your e-mail address book, and their computers would then do the same, which causes a domino effect of heavy network traffic that can slow down business networks and the Internet as a whole. When new worms are unleashed, they spread very quickly. They clog networks and possibly cause a long wait for you (and everyone else) to view Web pages on the Internet. </li></ul></ul>
  7. 7. Types of Threats <ul><li>Trojan horse – A Trojan horse is a program that unlike a virus contains or installs a malicious program (sometimes called the payload or 'trojan'). Trojan horses may appear to be useful or interesting programs (or at the very least harmless) to an unsuspecting user, but are actually harmful when executed. </li></ul><ul><ul><li>Examples include various implementations of weather alerting programs, computer clock setting software, Software that you download for free, and peer to peer file sharing utilities. </li></ul></ul><ul><li>Spam - Spamming is the abuse of electronic messaging systems to send unsolicited bulk messages, which are generally undesired. The most widely recognized form of spam is email spam. Spam is also called junk mail. </li></ul><ul><ul><li>Example: Emails for unknown senders </li></ul></ul>
  8. 8. Types of Threats <ul><li>Phishing - phishing is a criminal activity using “social engineering” techniques which is manipulating people into performing actions or revealing confidential information. Phishers attempt to fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication. </li></ul><ul><ul><li>eBay and PayPal are two of the most targeted companies, and online banks are also common targets. </li></ul></ul><ul><ul><li>Phishing is typically carried out using email or an instant message, and often directs users to give details at a website, although phone contact has been used as well. </li></ul></ul>
  9. 9. Best Practices <ul><li>Install Operating system Updates and Patches </li></ul><ul><li>Install Anti-Virus and Spyware Protection </li></ul><ul><li>Use a Host Based Firewall </li></ul><ul><li>Create a strong password </li></ul><ul><li>Use caution when opening email attachments </li></ul><ul><li>Never share personal information </li></ul><ul><li>Do not respond to Spam </li></ul><ul><li>Back up Files </li></ul><ul><li>Do not Share Folders </li></ul><ul><li>Use a Spyware program </li></ul>
  10. 10. Free Tools <ul><li>Microsoft Baseline Security Analyzer </li></ul><ul><ul><li>http://www.microsoft.com/ technet/security/tools/mbsahome.mspx </li></ul></ul><ul><li>Microsoft Windows Update </li></ul><ul><ul><li>http://update.microsoft.com/windowsupdate/v6/default.aspx?ln=en-us </li></ul></ul><ul><li>Trend Micro for virus scan </li></ul><ul><ul><li>http://housecall.trendmicro.com/ </li></ul></ul>
  11. 11. Conclusion <ul><li>Secure your computer like you would secure your home. </li></ul><ul><li>Do not respond to any emails or messages if you do not know the sender. </li></ul><ul><li>Always keep your computer up to date. </li></ul><ul><li>Do now share any important information via chatting or emails. </li></ul><ul><li>Do not download any free software on your computer. Make sure it is from an authentic website. E.g. http://www.download.com/ </li></ul>
  12. 12. Questions and Answers
  13. 13. Game - Questions <ul><li>You cannot stop me, I can come in your machine in many ways, can you guess the type of threat I am, and what are you doing to do about it </li></ul><ul><li>muhuaaahahahahahah! </li></ul>
  14. 14. Game - Questions <ul><li>If I am an unknown email and showing up in your mailbox almost everyday, who am I? </li></ul><ul><li>If I am a fake url link or while chatting you get a link from me on your chat screen asking for personal information, who am I? </li></ul><ul><li>If I am an infected file on your computer, who am I? </li></ul><ul><li>If I am an infected file on your network computer and have clog networks, who am I? </li></ul><ul><li>If I look innocent and harmless but when executed can harm your computer, who am I? </li></ul>
  15. 15. Game - Answers <ul><li>If I am an unknown email and showing up in your mailbox almost everyday, who am I? </li></ul><ul><ul><li>Answer: Spam </li></ul></ul><ul><ul><li>Action: Use Spam filters, users using yahoo should set up their spam setting from low to medium or high </li></ul></ul><ul><li>If I am a fake url link or while chatting you get a link from me on your chat screen asking for personal information, who am I? </li></ul><ul><ul><li>Answer: Phisher </li></ul></ul><ul><ul><li>Action: Do not click on any unknown link, respond to any unknown user or share any personal information </li></ul></ul>
  16. 16. Game - Answers <ul><li>If I am an infected file on your computer, who am I? </li></ul><ul><ul><li>Answer: Virus </li></ul></ul><ul><ul><li>Action: Use an antivirus software to scan the file </li></ul></ul><ul><li>If I am an infected file on your network computer and have clog networks, who am I? </li></ul><ul><ul><li>Answer: Worm </li></ul></ul><ul><ul><li>Action: Unplug the computer from the internet and scan the whole computer using an antivirus software </li></ul></ul>
  17. 17. Game - Answers <ul><li>If I look innocent and harmless but when executed can harm your computer, who am I? </li></ul><ul><ul><li>Answer: Trojan </li></ul></ul><ul><ul><li>Action: Uninstall any unknown or free application downloaded from an unauthentic website </li></ul></ul>
  18. 18. Bibliography and References <ul><li>http://www.cert.org/stats/ </li></ul><ul><li>http://is.depaul.edu/security/information_security/software.asp </li></ul><ul><li>http://en.wikipedia.org/wiki/Main_Page </li></ul>

×