desktop security 8 9 07
TRANSCRIPT
![Page 1: Desktop Security 8 9 07](https://reader036.vdocument.in/reader036/viewer/2022062405/5554eac2b4c905bb2a8b49f8/html5/thumbnails/1.jpg)
Desktop Security & Backup
Adam King
August 9th, 2007
a program of
![Page 2: Desktop Security 8 9 07](https://reader036.vdocument.in/reader036/viewer/2022062405/5554eac2b4c905bb2a8b49f8/html5/thumbnails/2.jpg)
NPower is…
A network of local nonprofit technology assistance providers that share a common mission, vision and service values.
» Mission: To ensure all nonprofits can use technology to better serve their communities.
» Vision: A thriving nonprofit sector in which all organizations
can use technology to help create healthy, vibrant communities.
![Page 3: Desktop Security 8 9 07](https://reader036.vdocument.in/reader036/viewer/2022062405/5554eac2b4c905bb2a8b49f8/html5/thumbnails/3.jpg)
LASince 2003
SeattleSince 1999
PortlandSince 2002
ColoradoSince 2003
ArizonaSince 2003
Charlotte RegionSince 2003
IndianaSince 2002
MichiganSince 2001
DCSince 2004
NYSince 2001
AtlantaSince 2001
PASince 2003
TexasSince 2007
The NPower network
![Page 4: Desktop Security 8 9 07](https://reader036.vdocument.in/reader036/viewer/2022062405/5554eac2b4c905bb2a8b49f8/html5/thumbnails/4.jpg)
NPower Michigan Services
• Technology Purchasing Guide: www.npowermichigan.org/resources/
• TechTrek: group technology assessment and planning
• Consulting
• Scheduled Support
![Page 5: Desktop Security 8 9 07](https://reader036.vdocument.in/reader036/viewer/2022062405/5554eac2b4c905bb2a8b49f8/html5/thumbnails/5.jpg)
Managed Services
• Help desk• Security (anti-spyware and anti-virus)• Windows patches and updates• System monitoring• Remote login assistance• Budgeting and planning
• $40 per desktop / $100 per server
Additional: IT project management (of either volunteers or IT professionals) at $75 per hour. On-site technician rates vary.
![Page 6: Desktop Security 8 9 07](https://reader036.vdocument.in/reader036/viewer/2022062405/5554eac2b4c905bb2a8b49f8/html5/thumbnails/6.jpg)
Desktop Security & Backup
• Viruses, Spyware, & Adware
• Firewalls
• Wireless Security
• Creating Strong Passwords
• Backup, Backup, Backup
![Page 7: Desktop Security 8 9 07](https://reader036.vdocument.in/reader036/viewer/2022062405/5554eac2b4c905bb2a8b49f8/html5/thumbnails/7.jpg)
Viruses
• A computer program that can copy itself and infect a computer without permission of the user
• Viruses, Worms, Trojan Horses = MALWARE
![Page 8: Desktop Security 8 9 07](https://reader036.vdocument.in/reader036/viewer/2022062405/5554eac2b4c905bb2a8b49f8/html5/thumbnails/8.jpg)
Viruses
• How viruses spread: Internet downloads Removable media Across the network Email attachments
![Page 9: Desktop Security 8 9 07](https://reader036.vdocument.in/reader036/viewer/2022062405/5554eac2b4c905bb2a8b49f8/html5/thumbnails/9.jpg)
Viruses
• Protecting your system Antivirus software
1. Standardization
2. Definitions
3. Subscriptions
Be smart about email attachments• Unknown senders
• Known senders
Firewall
![Page 10: Desktop Security 8 9 07](https://reader036.vdocument.in/reader036/viewer/2022062405/5554eac2b4c905bb2a8b49f8/html5/thumbnails/10.jpg)
Viruses
• Recovering from a virus attack Run a full system scan (in Safe Mode if
necessary) Run an “autofix” tool Replace infected files Reformat hard drive
![Page 11: Desktop Security 8 9 07](https://reader036.vdocument.in/reader036/viewer/2022062405/5554eac2b4c905bb2a8b49f8/html5/thumbnails/11.jpg)
Antivirus Software
![Page 12: Desktop Security 8 9 07](https://reader036.vdocument.in/reader036/viewer/2022062405/5554eac2b4c905bb2a8b49f8/html5/thumbnails/12.jpg)
Spyware/Adware
Software that covertly gathers user information through your Internet connection without your knowledge, usually for advertising purposes; typically bundled as a hidden component of freeware or shareware programs
• Unwanted pop-up ads and slowed computer performance
• Third party cookies added to your system
• Trick you into buying something
• Personal information can be stolen
• One of the fastest growing threats to computer users
![Page 13: Desktop Security 8 9 07](https://reader036.vdocument.in/reader036/viewer/2022062405/5554eac2b4c905bb2a8b49f8/html5/thumbnails/13.jpg)
Spyware/Adware
• Protecting yourself and your PC: Proactive software
• Windows Defender (www.microsoft.com)
• Internet security suites
Scanning software• Spybot, Adaware (www.download.com)
• Can also be run in Safe Mode
Avoid dubious Internet software downloads (especially toolbars)
![Page 14: Desktop Security 8 9 07](https://reader036.vdocument.in/reader036/viewer/2022062405/5554eac2b4c905bb2a8b49f8/html5/thumbnails/14.jpg)
Firewall
• Firewall is a barrier to prevent intruders from “hacking”, or breaking into, your computer
![Page 15: Desktop Security 8 9 07](https://reader036.vdocument.in/reader036/viewer/2022062405/5554eac2b4c905bb2a8b49f8/html5/thumbnails/15.jpg)
Firewall
• Filters incoming traffic
• Blocks remote access
• Secures the communication ports your computer uses unless you open them
![Page 16: Desktop Security 8 9 07](https://reader036.vdocument.in/reader036/viewer/2022062405/5554eac2b4c905bb2a8b49f8/html5/thumbnails/16.jpg)
Firewall
• Can be a hardware device or a software program
![Page 17: Desktop Security 8 9 07](https://reader036.vdocument.in/reader036/viewer/2022062405/5554eac2b4c905bb2a8b49f8/html5/thumbnails/17.jpg)
Firewall
• What kind of Firewall do you need? Hardware firewall absolutely required!
• Basic router with built-in firewall capabilities okay for simple connection to internet
• Advanced firewall device required for specific needs (i.e. VPN or hosting your own email)
Software firewall is supplemental• Exception: Laptop with wireless that often connects to
strange wifi networks
![Page 18: Desktop Security 8 9 07](https://reader036.vdocument.in/reader036/viewer/2022062405/5554eac2b4c905bb2a8b49f8/html5/thumbnails/18.jpg)
Wireless Security
• Make sure your wireless network isn’t wide open!
Change default password on the router or access point
Secure the connection– WEP – crackable!
– WPA – best option
![Page 19: Desktop Security 8 9 07](https://reader036.vdocument.in/reader036/viewer/2022062405/5554eac2b4c905bb2a8b49f8/html5/thumbnails/19.jpg)
Wireless Security
• Change default password
![Page 20: Desktop Security 8 9 07](https://reader036.vdocument.in/reader036/viewer/2022062405/5554eac2b4c905bb2a8b49f8/html5/thumbnails/20.jpg)
Wireless Security
• Secure the connection
![Page 21: Desktop Security 8 9 07](https://reader036.vdocument.in/reader036/viewer/2022062405/5554eac2b4c905bb2a8b49f8/html5/thumbnails/21.jpg)
Strong Passwords
• 6 to 8 characters long using lower/upper case letters, numbers, and symbols (Microsoft recommends 14…)
4 characters – 14 million possible passwords – 2 seconds
8 characters – 200 trillion possible passwords – 1 year
9 characters – 13 quadrillion possible passwords – 70 years
10 characters – 840 quadrillion possible passwords – 4000 years
• Avoid words in the dictionary (easier to guess)
• Use a sentence that means something to you Every Sunday I go to church at 9 E$igtc@9
• Change passwords regularly
![Page 22: Desktop Security 8 9 07](https://reader036.vdocument.in/reader036/viewer/2022062405/5554eac2b4c905bb2a8b49f8/html5/thumbnails/22.jpg)
Backup
• Scary Statistics: A computer hard drive fails every 15 seconds Over 2000 laptops are stolen or lost everyday 1 in 5 computers suffer hard drive failure during
their normal useful life Eventually, 100% of all hard drives will fail
Source: Realty Times
![Page 23: Desktop Security 8 9 07](https://reader036.vdocument.in/reader036/viewer/2022062405/5554eac2b4c905bb2a8b49f8/html5/thumbnails/23.jpg)
Backup
• My Documents• Shared files• Database files• Email files• Accounting data• Organizational
pictures
• Music• Personal files &
pictures
What to Backup? What to Not Backup?
![Page 24: Desktop Security 8 9 07](https://reader036.vdocument.in/reader036/viewer/2022062405/5554eac2b4c905bb2a8b49f8/html5/thumbnails/24.jpg)
Backup
• Central file storage location:
Server or networked PC
![Page 25: Desktop Security 8 9 07](https://reader036.vdocument.in/reader036/viewer/2022062405/5554eac2b4c905bb2a8b49f8/html5/thumbnails/25.jpg)
Backup
• Tape Backup
Pros
•Easy to archive (many years)
•Many tapes = many backups
•Easy to take offsite
Cons
•Slower
•Device + Many Tapes = Expensive
•Large capacity tapes also expensive
•Must replace tapes regularly for reliability
![Page 26: Desktop Security 8 9 07](https://reader036.vdocument.in/reader036/viewer/2022062405/5554eac2b4c905bb2a8b49f8/html5/thumbnails/26.jpg)
Backup
• External Hard Drive
Pros
•Inexpensive
•LARGE capacity
Cons
•Fewer “points of failure”
•Sometimes difficult to take offsite
4 external drives -- 1 week each -- rotate -- offsite
![Page 27: Desktop Security 8 9 07](https://reader036.vdocument.in/reader036/viewer/2022062405/5554eac2b4c905bb2a8b49f8/html5/thumbnails/27.jpg)
Backup
• For tape and hard drive backups – need some sort of automatic backup software
• Using the NTBackup program Start All Programs Accessories System
Tools Backup
![Page 28: Desktop Security 8 9 07](https://reader036.vdocument.in/reader036/viewer/2022062405/5554eac2b4c905bb2a8b49f8/html5/thumbnails/28.jpg)
Backup
• Internet
Pros
•Automatic and incremental
•Versioning
•Affordable option
•Offsite
Cons
•Relies on your Internet connection
•Initial backup is slow
•Recurring fee
![Page 29: Desktop Security 8 9 07](https://reader036.vdocument.in/reader036/viewer/2022062405/5554eac2b4c905bb2a8b49f8/html5/thumbnails/29.jpg)
Backup
• Other Internet backup providers: Connected.com Carbonite.com IBackup.com
![Page 30: Desktop Security 8 9 07](https://reader036.vdocument.in/reader036/viewer/2022062405/5554eac2b4c905bb2a8b49f8/html5/thumbnails/30.jpg)
Backup
• Disk Imaging Software that creates an exact image of your hard
drive Needs additional hard drive (built-in or external) $50-60
![Page 31: Desktop Security 8 9 07](https://reader036.vdocument.in/reader036/viewer/2022062405/5554eac2b4c905bb2a8b49f8/html5/thumbnails/31.jpg)
Desktop Security & Backup
• Protect yourself from: Viruses Spyware
• Firewalls
• Wireless Security
• Creating Strong Passwords
• Backup methods