“How to Protect Yourself”

Slides:



Advertisements
Similar presentations
Keep Your PC Safe (Windows 7, Vista or XP) Nora Lucke 02/05/2012 Documents - security.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
KEEP YOUR COMPUTE SAFE AND HOW TO FIX IT 1. OBJECTIVE Keep your computer safe. -Not about spam, phishing or browser hijacks Designed for the non-geek.
Ch 11 Managing System Reliability and Availability 1.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
Security for Seniors SeniorNet Help Desk
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
IT Security for Users By Matthew Moody.
1.1 System Performance Security Module 1 Version 5.
Staying Safe Online Keep your Information Secure.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
IT security By Tilly Gerlack.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
How to Install Malwarebytes Anti- Malware Software Khushbu Shah ENG 393 May 4 th, 2010.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Sniper Corporation. Sniper Corporation is an IT security solution company that has introduced security products for the comprehensive protection related.
Remove [Browser Hijackers] For more information regarding [Browser Hijackers] Please Visit:
Computer Security Keeping you and your computer safe in the digital world.
Max Secure Software founded in Jan 2003 develops innovative privacy, security, protection and performance solutions for Internet users. The company is.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
For more information on Rouge, visit:
Windows Tutorial 5 Protecting Your Computer
Chapter 40 Internet Security.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Viruses & Destructive Programs
Joseph J. Malone Security for Seniors Joseph J. Malone
Managing Windows Security
Trend Micro Consumer 2010 Easy. Fast. Smart.
Three steps to prevent Malware infection
What they are and how to protect against them
Edexcel GCSE Cyber security threats Computer Science 1CP1
Class Name: Online Safety & Privacy Basics
Unit 4 IT Security.
Class 2 - Transitional Internet Basics
Information Security.
Lesson 3 Safe Computing.
Unit 4 IT Security.
How to build a good reputation online
Business Risks of Insecure Networks
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Call AVG Antivirus Support | Fix Your PC
Norton technical support Norton.com/Setup | Norton Setup and Install with Product Key Norton Antvirus Activation For protection against.
Information Technology Services Education and Awareness Team
Risk of the Internet At Home
Information Security Session October 24, 2005
Staying safe on the internet
Part 3.
Cybersecurity Am I concerned?
9 ways to avoid viruses and spyware
Information Technology Services Education and Awareness Team
Cybersecurity and Cyberhygiene
What are Computers? C Use this tutorial alongside the numbers coded in your workbook and answer the related questions in each section.
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Presentation transcript:

“How to Protect Yourself” Computer Viruses “How to Protect Yourself” Disclaimer: The content of this presentation is offered as suggested best practices. There is no guarantee that this information will work in all computer environments nor in all circumstances. As with any computer recovery procedure there is an inherent risk of data loss. Any liability for use or misuse of the application of these practices is solely the users’ responsibility.

Agenda Malware Threat Landscape Sources of Malware Infections Preventing Malware Infections Removing Malware Helpful Links Major Focus is going be on things you can do to Prevent

Malware Definition Short for Malicious Software Viruses, Worms, Trojans, and Spyware Mal is Spanish for Bad . . . Think Badware

Malware Threat Landscape One Million New Threats Daily - CNN 30,000 New Websites Hacked Every Day Mobile Phone Attacks Escalating https Secure May Not Be Secure Law Enforcement is Stressed

Sources of Malware Infections Email Attachments (PDF, Zip, Word, EXE, etc.) Email Links – Phising Attacks Website Drive Bye’s USB Sticks and USB Drives Remote Access Trojan (RAT)

Phising Attacks General Phising Attacks - Lure Anyone Spear Phising Attacks – Targeted Social Engineering – Collect Data About You Send You Email From Someone Trust Phone You About an Urgent Event

Spear Phising Attack Attachment

Hacked Website – Drive Bye Click Here for 50% Off Coupon

Ransom Ware – Bit Coins

Scam/Fake Ware

Preventing Malware Tasks Apply Software Updates ASAP Install Anti-Virus How to Check a Website or a File How to Check a Websites Reputation Scan a File with Your Anti-Virus Software Change DNS Servers – Family Protect Backup Up Your Computer Research Website Using Negative Words Family Protect is OpenDNS free Service

Preventing Malware Infections Apply Software Updates Automatically Use Strong Passwords – https://www.grc.com/haystack.htm Install a Good Anti-Virus Product Turn-on Smart Filter to Check Websites Check http://phishtank.com Listings Smart filter is Located in Privacy Tab of IE Rea time Scanning Microsoft Security Essentials Win 7

Check a Saved Attachment or File Go to virustotal.com

Checking a Websites Reputation Check Website Reputation

Create 2nd Admin User Account Create Additional User Administrator Account Give it any User Name (Tulip) and Password https://www.youtube.com/watch?v=FdjGbZvY1dg

Changing Your DNS Domain Name Servers

Changing Your DNS (Domain Name Servers )

Changing Your DNS Click on Change adapter settings

Change DNS Server 2. Left click on Properties 1. Right click on Ethernet or Wireless Connection 2. Left click on Properties

Changing DNS Servers 1. Right Click on Internet Protocol 4 (TCP/IPv4) to highlight it. 2. Left click on Properties box

Family Protect DNS Servers Change DNS Servers Family Protect DNS Servers Click on Radio Button “Use the following DNS server addresses” Enter the Preferred DNS server 208.67.220.123 Enter the Alternate DNS server 208.67.222.123 Click OK

Backing Up Your Computer 1. Plug in USB Hard Drive 3. Click Backup and Restore 2. Click Start Button 4. Click Control Panel

Backing Up Your Computer

Mobile Phones VirusTotal.com Website Checker Android – Lookout Anti-Virus IPhone -Trend Micro/McAfee Security Backup Smart Phone – ICloud/Lookout Sync with Desktop

Virus Recovery Steps Using System Restore Full Anti-Virus Scan Safe Mode Restore System from Backup Drive Hiring a Virus Removal Service Rebuild Your Computer

Virus Recovery Steps 1. Use System Restore Restart your System in Safe Mode Log into 2nd Admin User Account (Tulip) You Tube Video https://www.youtube.com/watch?v=PelCQxOj6tE Log into Regular Account When Complete

Virus Recovery Steps 2. Restore Not Working? Restart Computer In Safe Mode (handout) Open Your Anti-Virus Product Do a Full Virus Scan in Safe Mode Delete or Quarantine File(s) Restart Your System Follow Instructions of you’re a/V Program

Virus Recover Steps 3. Virus Scan Not Working? Re-image from Your USB Backup Drive Restore Your PC Using System Image Overwrites Every All Data on Your PC See Handout for Instructions

4. Backup System Image Restore Not Working? Virus Recover Steps 4. Backup System Image Restore Not Working? Hire Virus Remote Removal Service Take Computer to Local Shop Rebuild Computer – You Lose All Data Data Recovery Experts Expensive

https://www.microsoft.com/security/portal/mmpc/default.aspx

Key Points Review Don’t Click it – Mouse Over It Save Attachments – Scan for Virus Check Website or File – Virus Total Check Websites Reputation/Phishtank Not Expecting an Email – Use Caution Keep All Software Up to Date – Critical Use Real-Time Anti-Virus/Firewall Protection

Friendly Persuaders Persuaded 25 coworkers to give him their Top Secret Passwords

FBI’s Top 10 Cyber Criminals

Helpful Links http://www.virsustotal.com Scan Website or Saved File URL Address Description http://www.virsustotal.com Scan Website or Saved File http://www.brightcloud.com/to ols/url-ip-lookup.php Check Web Reputation https://www.grc.com/haystack.htm Check Your Password Strength http://windows.microsoft.com/en-us/windows/back-up-files#1TC=windows-7 How to backup Your Computer https://www.youtube.com/watch?v=PelCQxOj6tE https://www.microsoft.com/security/portal/mmpc/default.aspx System Restore Win 7 video Microsoft Security Protection https://www.phishtank.com Check 3 million phishing sites

Mailing Address P.O. Box 443 Bartlesville, OK 74005-0443 Voice of the Martyrs www.persecution.com Mailing Address P.O. Box 443 Bartlesville, OK 74005-0443 www.frontlinerevelation.org