computer & internet security
DESCRIPTION
Some Terminology Computer Security Type of threats Security measures Internet SecurityTRANSCRIPT
COMPUTER & INTERNETSECURITY
A LOOK INTO COMMON PRACTICES OF:
• SECURING YOUR PERSONAL COMPUTER FROM KNOWN THREATS
• SAFELY NAVIGATING AND USING THE INTERNET
• SECURING YOUR ONLINE ACCOUNTS
OVERVIEWWHAT WE WILL COVER
1. Some Terminology
2. Computer Securityi. Type of threats
ii. Security measures
3. Break
4. Internet Securityi. Browser security
ii. Web browsing
iii. Online accountsSPEAKER: GERARD LAMUSSE
!OVERVIEWWHAT WE WON’T COVER
• Enterprise security
• Server security
• Active cyber security
• Kitchen security
SPEAKER: GERARD LAMUSSE
SPEAKER: GERARD LAMUSSE
SOME TERMINOLOGY
• Computer security
• Security types
• Hacker vs. Cracker
• Script kiddie
• Virus
• Worm
• Key logging
• Malware
• Trojan
• Spyware/adware
• Phishing
• Quarantine
TERMINOLOGYCONTINUED
COMPUTER SECURITY
• Computer Security means protecting our computer system and the information they contain against unwanted access, damage, destruction or modification
SECURITY TYPES
• Hardware security
• Software security
• Anti-virus
• Firewall
• Network security
SPEAKER: GERARD LAMUSSE
TERMINOLOGYCONTINUED
HACKER
• A person who accesses a computer or network illegally.
• Various types
• Black
• Grey
• White
CRACKER
• A person who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious action.
SPEAKER: GERARD LAMUSSE
TERMINOLOGYCONTINUED
SCRIPT KIDDIE
• Often are teenagers that use prewritten hacking and cracking programs to break into computers
• Same intent as a cracker
VIRUS
• Can replicate itself and spread from one computer to another.
• Does damage by altering programs or the operating system itself.
SPEAKER: GERARD LAMUSSE
TERMINOLOGYCONTINUED
WORM
• Spreads itself over a network and other means.
• Replicates on host invisibly
• Aim: To use up available memory and system resources.
KEY LOGGING
• The action of recording keys struck on a keyboard.
• User unaware of this types password and account details
• Information sent via malware.
SPEAKER: GERARD LAMUSSE
TERMINOLOGYCONTINUED
MALWARE
• Malicious software
• Gather sensitive information
• Gain access to private computer systems.
TROJAN
• Form of malware
• A program claiming to rid your computer of viruses but instead introduces viruses, to your computer
SPEAKER: GERARD LAMUSSE
TERMINOLOGYCONTINUED
SPYWARE
• Similar to Trojan horse.
• Co-exists with other software
• Records actions performed by user and relaying this information to its author
ADWARE
• Legitmate alternative offered to consumers who do not wish to pay for software
• Displays adverts within program
• Tracks browsing habits to serve related advertisements
• Has a bad reputation as a result of spyware.SPEAKER: GERARD LAMUSSE
TERMINOLOGYCONTINUED
PHISHING
• The fraudulent practice of sending e-mails purporting to be from legitimate companies in order to induce individuals to reveal personal information.
QUARANTINE
• To move an undesired file such as a virus-infected file or spyware to an encrypted folder.
SPEAKER: GERARD LAMUSSE
SPEAKER: GERARD LAMUSSE
COMPUTER SECURITY
i. Type of threats
ii. Security measures
COMPUTER SECURITYTYPES OF THREATS
SPEAKER: GERARD LAMUSSE
Malicious Code
Natural Threats
Humans
COMPUTER SECURITYSECURITY MEASURES
SPEAKER: GERARD LAMUSSE
4 Main types of security measure
1. Data Backup
2. Antivirus
3. Anti-spyware
4. Firewall
MALICIOUS CODE
1. Rip data to DVDs• Cheap, but takes time.
2. External secondary storage• Cheaper per Gigabyte
• 2x 500Gb from R7003. Upload and store to Cloud Storage
• Always available, monthly/yearly costs• www.drive.google.com• www.justcload.com• www.mypcbackup.com
COMPUTER SECURITYSECURITY MEASURES
SPEAKER: GERARD LAMUSSE
4 Main types of security measure
1. Data Backup
2. Antivirus
3. Anti-spyware
4. Firewall
MALICIOUS CODE
A utility program that we use to protect a computer against viruses by identifying and removing
computer viruses found in the computer memory, computer storage and on incoming e-mail files.
Microsoft Security EssentialsFor windows 7 & earlier or
Windows DefenderFor Windows 8
AVAST FREE for mac
COMPUTER SECURITYSECURITY MEASURES
SPEAKER: GERARD LAMUSSE
4 Main types of security measure
1. Data Backup
2. Antivirus
3. Anti-spyware
4. Firewall
MALICIOUS CODE
WHY?Not all anti-virus will prevent installation of spyware!
Much more common today than viruses.
Recommended
Malwarebytes Anti-Malware
COMPUTER SECURITYSECURITY MEASURES
SPEAKER: GERARD LAMUSSE
4 Main types of security measure
1. Data Backup
2. Antivirus
3. Anti-spyware
4. Firewall
MALICIOUS CODE
Two types, hardware and software firewalls.Your router functions as a hardware firewall, while
Windows includes a software firewall.
How it works?
COMPUTER SECURITYSECURITY MEASURES
SPEAKER: GERARD LAMUSSE
Problems and solutions:
1. Children
2. Thieves
HUMANS
Applies to teens as well.Problems they pose:
• Accidental data deletion• Corrupt system files
• Installation of spyware or viruses• Accidental natural disaster
Preventing or Safe guarding against children threats:• Backup data
• Save your data before…• Set up limited user accounts
• Set up parental controls
RECOMMENDATION:K9 Web Protection
SPEAKER: GERARD LAMUSSE
SECURING AND SETTING UP USER ACCOUNTS
Figure 1.Windows 7 Control Panel
SPEAKER: GERARD LAMUSSE
SECURING AND SETTING UP USER ACCOUNTS
Figure 2.Manage Accounts screen
in Windows 7
SPEAKER: GERARD LAMUSSE
SECURING AND SETTING UP USER ACCOUNTS
Figure 3.Create New Account screen
SPEAKER: GERARD LAMUSSE
SECURING AND SETTING UP USER ACCOUNTS
Figure 4.New user has been created
COMPUTER SECURITYSECURITY MEASURES
SPEAKER: GERARD LAMUSSE
Problems and solutions:
1. Children
2. Thieves
HUMANS
Applies to teens as well.Problems they pose:
• Accidental data deletion• Corrupt system files
• Installation of spyware or viruses• Accidental natural disaster
Preventing or Safe guarding against children threats:• Backup data
• Set up limited user accounts• Set up parental controls
RECOMMENDATION:K9 Web Protection
COMPUTER SECURITYSECURITY MEASURES
SPEAKER: GERARD LAMUSSE
Problems and solutions:
1. Children
2. Thieves
HUMANS
Threat:• Loss of data
• Stolen computer and other valuables• Damage to property
Solutions???• If they want to get in they will find a way
• Backup your data!!!• Lockup and password secure your accounts.
RECOMMENDATION:K9 Home Protection
COMPUTER & INTERNETSECURITY
15min
SPEAKER: GERARD LAMUSSE
INTERNET SECURITY
i. Browser security
ii. Web browsing
iii. Online accounts
SPEAKER: GERARD LAMUSSE
INTERNET SECURITYFIRST: PASSWORDS
i. What defines a strong password
ii. What is NOT a good password
INTERNET SECURITYGOOD PASSWORDS
SPEAKER: GERARD LAMUSSE
What makes a password a strong password
i. Is at least eight characters long.
ii. Does not contain your user name, real name, or company name.
iii. Does not contain a complete word.
iv. Is significantly different from previous passwords.
v. Contains characters from each of the following four categories:
INTERNET SECURITYGOOD PASSWORDS
SPEAKER: GERARD LAMUSSE
Character category Examples
Uppercase letters A, B, C
Lowercase letters a, b, c
Numbers 0, 1, 2, 3, 4, 5, 6, 7, 8, 9
Symbols found on the keyboard and spaces
` ~ ! @ # $ % ^ & * ( ) _ - + = { } [ ] \ | : ; " ' < > , . ? /
INTERNET SECURITYBAD PASSWORDS
SPEAKER: GERARD LAMUSSE
What makes a password a bad password
i. Dictionary words.
ii. Names, surnames, contact details, registration numbers
iii. Not long enough
iv. Simply contains simple ‘!’ ‘1’ ‘?’ ‘01’ at the end
INTERNET SECURITYPASSWORD OVERVIEW
SPEAKER: GERARD LAMUSSE
• Create an acronym from an easy-to-remember piece of information. For example, pick a phrase that is meaningful to you, such as My son's birthday is 12 December, 2004. Using that phrase as your guide, you might use Msbi12/Dec,4 for your password.
INTERNET SECURITYPASSWORD OVERVIEW
SPEAKER: GERARD LAMUSSE
• Substitute numbers, symbols, and misspellings for letters or words in an easy-to-remember phrase. For example, My son's birthday is 12 December, 2004 could become Mi$un's Brthd8iz 12124 (it's OK to use spaces in your password).
• Relate your password to a favourite hobby or sport. For example, ‘I love to play badminton’ could become ILuv2PlayB@dm1nt()n.
INTERNET SECURITYPASSWORD OVERVIEW
SPEAKER: GERARD LAMUSSE
Highly Recommended
• Use secure, unique passwords for every Internet site or service is one of the best security practices out there.
• Use a single master password for storage of all passwords, then never user it again!
• LastPass
• How secure is your password? Try
SPEAKER: GERARD LAMUSSE
INTERNET SECURITY
i. Browser security
ii. Web browsing
iii. Online accounts
THE ENDTHANKS
SPEAKER: GERARD LAMUSSE