by steven bertke

21
By Steven Bertke PC Security

Upload: iolana

Post on 26-Feb-2016

25 views

Category:

Documents


2 download

DESCRIPTION

PC Security. By Steven Bertke. Contents. Physical protection and Simple measures Passwords Firewalls Anti-Virus, Spyware and Malware Web browsers Email Patches Wireless Encryption Software. Physical Protection. Laptops: Multi-Purpose Hard-Shell Backpack Tracking software - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: By Steven Bertke

By Steven Bertke

PC Security

Page 2: By Steven Bertke

Contents Physical protection and Simple measures Passwords Firewalls Anti-Virus, Spyware and Malware Web browsers Email Patches Wireless Encryption Software

Page 3: By Steven Bertke

Laptops: Multi-Purpose Hard-Shell Backpack Tracking software STOP Security plate Desktops: Lock your computer, i.e. ctrl+alt+del ->

lock Lock the door Password protect everything Password protected screensaver

Physical Protection

Page 4: By Steven Bertke

Things not to do: Don’t choose a simple password like your pets

name 123 Don’t include your name or anyone in your

families name Don’t include your birthday Don’t use common words Don’t keep the same password for a long period

of time Don’t use the same password for every single

thing that requires one.

Passwords

Page 5: By Steven Bertke

Over 7 characters Upper/Lowercase + Digits e.g. AhJtKthr207 Anny helped John take Kate to her recital Add a date or number on the end e.g. 20th

of the 7th

Make up words e.g. BloopShmear2000 or JuckNanYuck160

Different language

Passwords

Page 6: By Steven Bertke

The SUPR tests The Strong test: Is the password as strong

(meaning length and content) as the rules allow?

The Unique test: Is the password unique and unrelated to any of your other passwords?

The Practical test: Can you remember it without having to write it down?

The Recent test: Have you changed it recently? Keep them guessing!

Passwords

Page 7: By Steven Bertke

What is a firewall? Hardware = Router Software = Windows XP ect Differences Up to you to decide!

Firewalls

Page 8: By Steven Bertke

What is a virus?

What is spyware?

What is malware?

Anti-Virus ect

Page 9: By Steven Bertke

Crucial for securing your PC!

Why?

Anti-Virus ect

Page 10: By Steven Bertke

Anti-Virus examples: AVG Norton Kapersky BitDefender Avast!

Anti-Virus ect

Page 11: By Steven Bertke

Anti-Spyware examples: Spybot Search and Destroy SUPERAntiSpyware Spy Sweeper Ad-Aware Pro Macafee Virus Scan and Anti Spyware ..and many more. Choose which ever you prefer Update your AV(Anti-Virus) and Anti-Spyware!

Anti-Virus ect

Page 12: By Steven Bertke

Major weakness in computers defences Choose a safe and reliable browser Stay away from Internet Explorer! Mozilla Firefox Firefox add-ons No-Script WOT(Web of Trust) ... and many more! Google “Firefox add-ons”

Web Browsers

Page 13: By Steven Bertke

Email Clients

Google Mail

Mozilla Thunderbird

Email

Page 14: By Steven Bertke

KRESV tests; The Know test: Is the email from someone that you

know? The Received test: Have you received email from

this sender before? The Expect test: Were you expecting email with an

attachment from this sender? The Sense test: Does the email from the sender

make sense. Does the subject line and attachment add up?

The Virus test: Does this email contain a virus? Scan the email for a virus

Email

Page 15: By Steven Bertke

What is a patch? Importance of fixing vulnerabilities Update your OS Web browsers Anti-virus ect Any internet dependant application Do it regularly !

Patches

Page 16: By Steven Bertke

Protect your wireless network Drive by hackers Change your networks name Wi-Fi network encryption WEP = NO! WPA2 ect = YES!! Hide your SSID

Wireless

Page 17: By Steven Bertke

Honeypots: Probably to good to be true If you must use them: Don’t sign into your financial accounts! Type as little private information as possible

Wireless

Page 18: By Steven Bertke

What is it? Examples of software Windows Bitlocker/Bitlocker to go Truecrypt How can it help? Windows Bitlocker; Good for USB storage

devices Truecrypt; Good for hidden volumes

Encryption Software

Page 19: By Steven Bertke

Hidden volumes = hidden locked container Create a file Choose how big you want the “container” to be Name the file Give it a password Put it where you want Mount it with Truecrypt Now becomes like an extra hard drive Put stuff in it Unmount it

Encryption Software

Page 20: By Steven Bertke

Conclusion

Keep it safe!

Page 21: By Steven Bertke

Questions