computer & internet security

35
COMPUTER & INTERNET SECURITY A LOOK INTO COMMON PRACTICES OF: SECURING YOUR PERSONAL COMPUTER FROM KNOWN THREATS SAFELY NAVIGATING AND USING THE INTERNET SECURING YOUR ONLINE ACCOUNTS

Upload: gerard-lamusse

Post on 15-Dec-2014

356 views

Category:

Education


0 download

DESCRIPTION

Some Terminology Computer Security Type of threats Security measures Internet Security

TRANSCRIPT

Page 1: Computer & internet Security

COMPUTER & INTERNETSECURITY

A LOOK INTO COMMON PRACTICES OF:

• SECURING YOUR PERSONAL COMPUTER FROM KNOWN THREATS

• SAFELY NAVIGATING AND USING THE INTERNET

• SECURING YOUR ONLINE ACCOUNTS

Page 2: Computer & internet Security

OVERVIEWWHAT WE WILL COVER

1. Some Terminology

2. Computer Securityi. Type of threats

ii. Security measures

3. Break

4. Internet Securityi. Browser security

ii. Web browsing

iii. Online accountsSPEAKER: GERARD LAMUSSE

Page 3: Computer & internet Security

!OVERVIEWWHAT WE WON’T COVER

• Enterprise security

• Server security

• Active cyber security

• Kitchen security

SPEAKER: GERARD LAMUSSE

Page 4: Computer & internet Security

SPEAKER: GERARD LAMUSSE

SOME TERMINOLOGY

• Computer security

• Security types

• Hacker vs. Cracker

• Script kiddie

• Virus

• Worm

• Key logging

• Malware

• Trojan

• Spyware/adware

• Phishing

• Quarantine

Page 5: Computer & internet Security

TERMINOLOGYCONTINUED

COMPUTER SECURITY

• Computer Security means protecting our computer system and the information they contain against unwanted access, damage, destruction or modification

SECURITY TYPES

• Hardware security

• Software security

• Anti-virus

• Firewall

• Network security

SPEAKER: GERARD LAMUSSE

Page 6: Computer & internet Security

TERMINOLOGYCONTINUED

HACKER

• A person who accesses a computer or network illegally.

• Various types

• Black

• Grey

• White

CRACKER

• A person who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious action.

SPEAKER: GERARD LAMUSSE

Page 7: Computer & internet Security

TERMINOLOGYCONTINUED

SCRIPT KIDDIE

• Often are teenagers that use prewritten hacking and cracking programs to break into computers

• Same intent as a cracker

VIRUS

• Can replicate itself and spread from one computer to another.

• Does damage by altering programs or the operating system itself.

SPEAKER: GERARD LAMUSSE

Page 8: Computer & internet Security

TERMINOLOGYCONTINUED

WORM

• Spreads itself over a network and other means.

• Replicates on host invisibly

• Aim: To use up available memory and system resources.

KEY LOGGING

• The action of recording keys struck on a keyboard.

• User unaware of this types password and account details

• Information sent via malware.

SPEAKER: GERARD LAMUSSE

Page 9: Computer & internet Security

TERMINOLOGYCONTINUED

MALWARE

• Malicious software

• Gather sensitive information

• Gain access to private computer systems.

TROJAN

• Form of malware

• A program claiming to rid your computer of viruses but instead introduces viruses, to your computer

SPEAKER: GERARD LAMUSSE

Page 10: Computer & internet Security

TERMINOLOGYCONTINUED

SPYWARE

• Similar to Trojan horse.

• Co-exists with other software

• Records actions performed by user and relaying this information to its author

ADWARE

• Legitmate alternative offered to consumers who do not wish to pay for software

• Displays adverts within program

• Tracks browsing habits to serve related advertisements

• Has a bad reputation as a result of spyware.SPEAKER: GERARD LAMUSSE

Page 11: Computer & internet Security

TERMINOLOGYCONTINUED

PHISHING

• The fraudulent practice of sending e-mails purporting to be from legitimate companies in order to induce individuals to reveal personal information.

QUARANTINE

• To move an undesired file such as a virus-infected file or spyware to an encrypted folder.

SPEAKER: GERARD LAMUSSE

Page 12: Computer & internet Security

SPEAKER: GERARD LAMUSSE

COMPUTER SECURITY

i. Type of threats

ii. Security measures

Page 13: Computer & internet Security

COMPUTER SECURITYTYPES OF THREATS

SPEAKER: GERARD LAMUSSE

Malicious Code

Natural Threats

Humans

Page 14: Computer & internet Security

COMPUTER SECURITYSECURITY MEASURES

SPEAKER: GERARD LAMUSSE

4 Main types of security measure

1. Data Backup

2. Antivirus

3. Anti-spyware

4. Firewall

MALICIOUS CODE

1. Rip data to DVDs• Cheap, but takes time.

2. External secondary storage• Cheaper per Gigabyte

• 2x 500Gb from R7003. Upload and store to Cloud Storage

• Always available, monthly/yearly costs• www.drive.google.com• www.justcload.com• www.mypcbackup.com

Page 15: Computer & internet Security

COMPUTER SECURITYSECURITY MEASURES

SPEAKER: GERARD LAMUSSE

4 Main types of security measure

1. Data Backup

2. Antivirus

3. Anti-spyware

4. Firewall

MALICIOUS CODE

A utility program that we use to protect a computer against viruses by identifying and removing

computer viruses found in the computer memory, computer storage and on incoming e-mail files.

Microsoft Security EssentialsFor windows 7 & earlier or

Windows DefenderFor Windows 8

AVAST FREE for mac

Page 16: Computer & internet Security

COMPUTER SECURITYSECURITY MEASURES

SPEAKER: GERARD LAMUSSE

4 Main types of security measure

1. Data Backup

2. Antivirus

3. Anti-spyware

4. Firewall

MALICIOUS CODE

WHY?Not all anti-virus will prevent installation of spyware!

Much more common today than viruses.

Recommended

Malwarebytes Anti-Malware

Page 17: Computer & internet Security

COMPUTER SECURITYSECURITY MEASURES

SPEAKER: GERARD LAMUSSE

4 Main types of security measure

1. Data Backup

2. Antivirus

3. Anti-spyware

4. Firewall

MALICIOUS CODE

Two types, hardware and software firewalls.Your router functions as a hardware firewall, while

Windows includes a software firewall.

How it works?

Page 18: Computer & internet Security

COMPUTER SECURITYSECURITY MEASURES

SPEAKER: GERARD LAMUSSE

Problems and solutions:

1. Children

2. Thieves

HUMANS

Applies to teens as well.Problems they pose:

• Accidental data deletion• Corrupt system files

• Installation of spyware or viruses• Accidental natural disaster

Preventing or Safe guarding against children threats:• Backup data

• Save your data before…• Set up limited user accounts

• Set up parental controls

RECOMMENDATION:K9 Web Protection

Page 19: Computer & internet Security

SPEAKER: GERARD LAMUSSE

SECURING AND SETTING UP USER ACCOUNTS

Figure 1.Windows 7 Control Panel

Page 20: Computer & internet Security

SPEAKER: GERARD LAMUSSE

SECURING AND SETTING UP USER ACCOUNTS

Figure 2.Manage Accounts screen

in Windows 7

Page 21: Computer & internet Security

SPEAKER: GERARD LAMUSSE

SECURING AND SETTING UP USER ACCOUNTS

Figure 3.Create New Account screen

Page 22: Computer & internet Security

SPEAKER: GERARD LAMUSSE

SECURING AND SETTING UP USER ACCOUNTS

Figure 4.New user has been created

Page 23: Computer & internet Security

COMPUTER SECURITYSECURITY MEASURES

SPEAKER: GERARD LAMUSSE

Problems and solutions:

1. Children

2. Thieves

HUMANS

Applies to teens as well.Problems they pose:

• Accidental data deletion• Corrupt system files

• Installation of spyware or viruses• Accidental natural disaster

Preventing or Safe guarding against children threats:• Backup data

• Set up limited user accounts• Set up parental controls

RECOMMENDATION:K9 Web Protection

Page 24: Computer & internet Security

COMPUTER SECURITYSECURITY MEASURES

SPEAKER: GERARD LAMUSSE

Problems and solutions:

1. Children

2. Thieves

HUMANS

Threat:• Loss of data

• Stolen computer and other valuables• Damage to property

Solutions???• If they want to get in they will find a way

• Backup your data!!!• Lockup and password secure your accounts.

RECOMMENDATION:K9 Home Protection

Page 25: Computer & internet Security

COMPUTER & INTERNETSECURITY

15min

Page 26: Computer & internet Security

SPEAKER: GERARD LAMUSSE

INTERNET SECURITY

i. Browser security

ii. Web browsing

iii. Online accounts

Page 27: Computer & internet Security

SPEAKER: GERARD LAMUSSE

INTERNET SECURITYFIRST: PASSWORDS

i. What defines a strong password

ii. What is NOT a good password

Page 28: Computer & internet Security

INTERNET SECURITYGOOD PASSWORDS

SPEAKER: GERARD LAMUSSE

What makes a password a strong password

i. Is at least eight characters long.

ii. Does not contain your user name, real name, or company name.

iii. Does not contain a complete word.

iv. Is significantly different from previous passwords.

v. Contains characters from each of the following four categories:

Page 29: Computer & internet Security

INTERNET SECURITYGOOD PASSWORDS

SPEAKER: GERARD LAMUSSE

Character category Examples

Uppercase letters A, B, C

Lowercase letters a, b, c

Numbers 0, 1, 2, 3, 4, 5, 6, 7, 8, 9

Symbols found on the keyboard and spaces

` ~ ! @ # $ % ^ & * ( ) _ - + = { } [ ] \ | : ; " ' < > , . ? /

Page 30: Computer & internet Security

INTERNET SECURITYBAD PASSWORDS

SPEAKER: GERARD LAMUSSE

What makes a password a bad password

i. Dictionary words.

ii. Names, surnames, contact details, registration numbers

iii. Not long enough

iv. Simply contains simple ‘!’ ‘1’ ‘?’ ‘01’ at the end

Page 31: Computer & internet Security

INTERNET SECURITYPASSWORD OVERVIEW

SPEAKER: GERARD LAMUSSE

• Create an acronym from an easy-to-remember piece of information. For example, pick a phrase that is meaningful to you, such as My son's birthday is 12 December, 2004. Using that phrase as your guide, you might use Msbi12/Dec,4 for your password.

Page 32: Computer & internet Security

INTERNET SECURITYPASSWORD OVERVIEW

SPEAKER: GERARD LAMUSSE

• Substitute numbers, symbols, and misspellings for letters or words in an easy-to-remember phrase. For example, My son's birthday is 12 December, 2004 could become Mi$un's Brthd8iz 12124 (it's OK to use spaces in your password).

• Relate your password to a favourite hobby or sport. For example, ‘I love to play badminton’ could become ILuv2PlayB@dm1nt()n.

Page 33: Computer & internet Security

INTERNET SECURITYPASSWORD OVERVIEW

SPEAKER: GERARD LAMUSSE

Highly Recommended

• Use secure, unique passwords for every Internet site or service is one of the best security practices out there.

• Use a single master password for storage of all passwords, then never user it again!

• LastPass

• How secure is your password? Try

Page 34: Computer & internet Security

SPEAKER: GERARD LAMUSSE

INTERNET SECURITY

i. Browser security

ii. Web browsing

iii. Online accounts

Page 35: Computer & internet Security

THE ENDTHANKS

SPEAKER: GERARD LAMUSSE