internet security

Post on 21-Nov-2014

2.416 Views

Category:

Technology

0 Downloads

Preview:

Click to see full reader

DESCRIPTION

An introduction for internet and computer security. Some of Windows-based examples are used.

TRANSCRIPT

PC/Internet SecurityPC/Internet Security

Dec 12, 2007

PasswordPasswordCommon security

solution

PasswordPassword

» No reason to share password because you can:• Share files/folders• Remote Desktop• E-mail Proxy

Managing PasswordsManaging Passwords» Choosing a good passphrase

• “1wb1DCH”http://www.aces.edu/extconnections/2006/10/

» Use different passwords for different systems

» Password Managers• Password Safe

http://passwordsafe.sourceforge.net• Others

http://www.lifehack.org/articles/technology/10-free-ways-to-track-all-your-passwords.html

Safely Using EmailSafely Using EmailAvoid hoaxes and phishing

attempts

HoaxesHoaxes» Trickery» Please forward» Usually harmless» Waste time and resources

Phishing Clues Phishing Clues » Return address appears to be legitimate» Warns of consequences unless urgent action is taken» No personal info or account name/number in message» Name of link doesn’t match destination

• Name of link: https://www.firstnational.com• Destination of link: http://

www.sargonas.com/firstnational/login.htm» Link is not secure (HTTPS)

http://www.aces.edu/extconnections/2006/12http://www.wikipedia.org/wiki/Phishinghttp://jdorner.blogspot.com/2007/03/every-now-and-then-i-come-across.html

Don’t Become A VictimDon’t Become A Victim

» “Google” a sentence from the message to see if it’s a hoax or phishing attempt

» Never click on web links and be mindful of HTTPS

» Only open attachments which are in expected messages (just because you know the sender doesn’t mean the message is legitimate)

Protecting You and Your Operating System

Protecting You and Your Operating System

Ways to Secure MS WindowsWays to Secure MS Windows

» Install virus protection software» Turn on the Windows firewall» Turn on Windows updates» Use spyware/adware prevention

software» Use Windows Security Center» Use limited accounts

Virus Protection SoftwareVirus Protection Software» Install & routinely update virus protection

software• McAfee• Trend Micro• Sophos• AVG

• Free for non-commercial use• Download at www.downloads.com

• Symantec (Norton)• Resource intensive

Windows FirewallWindows Firewall» Choose

“On”» Only unblock

programs that you trust

Windows UpdatesWindows Updates

» Select “Automatic (recommended)”

» Select “Everyday”» Choose an

appropriate time» Leave computer

on! (check sleep/hibernate)

Spyware/MalwarePrevention Software

Spyware/MalwarePrevention Software

» Preventative—combine w/ Reactive• Windows Defender

http://www.microsoft.com/athome/security/spyware/software/default.mspx

• AVG Anti-Spywarewww.downloads.com

» Reactive (run once a week)• Spybot

www.downloads.com• Adaware

www.downloads.com

Security CenterSecurity Center

» Ensures:• Firewall is on• Automatic

updates are installed

• Virus protection installed & up-to-date

Security CenterSecurity Center

You don’t want the RED or Yellow shield

Click on the shield to fix the problem

Limited AccountsLimited Accounts» Prohibited from installing software

• Prevents installation of malware/viruses• User has access to currently installed

software» Prohibited from accessing Administrator’s

documents & settings• Prevents changes to administrator

password• Prevents access to Administrator’s

Documents, Desktop, etc.» Create/modify system accounts under

“Control Panel/User Accounts”

Limited AccountsLimited Accounts

» Easily switch between accounts

» Leave programs running while others login (windows-L)

Home NetworkingHome NetworkingEveryone Needs a Router!

Home Networking RoutersHome Networking Routers» One internet connection,

multiple computers» Firewall protection» Access restrictions

One Internet ConnectionOne Internet Connection

Firewall ProtectionFirewall Protection» One-way valve that lets you out, but doesn’t

let intruders in• Prevents unauthorized access to your

computer(s)• Hides your computer(s) from the internet while

still allowing access to the internet

» Justification: Attacks on AU (week of 5/28-6/02)

• 90,540 blocked• 25,147 suspicious• 3,893 possibly successful

Access RestrictionsAccess Restrictions

» Control when a computer can access the internet

• Deny/Allow by website or keyword

» Multiple configurations

• Everyday or only on school days etc.

• All the time, or only between 4p.m. & 10p.m, etc.

Secure WirelessSecure Wireless» Most routers can be configured w/a

CD» What can be done manually?

• Change the SSID (wireless network name)

• Disable SSID Broadcast (make it invisible)

• Require a password to join the wireless network

• Restrict by MAC address

Questions?Questions?

Thank You!Greg Parmer, Jonas Bowersock, Anne Adrian

top related