Networking Public Wifi and Print Sharing

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

DHP-W306AV is a new D-Link Powerline solution features n wireless speeds of up to 300 megabits per second and HomePlug AV data transmission speeds.
7 Effective Habits when using the Internet Philip O’Kane 1.
Some Sample Configurations For Traveling Laptops Several Printer Options Supports Desktop and/or TWO One Configuration for all Sites No Changes from Site.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Wireless setup utility for Portable Printer P-20.
Welcome to Networking! 1. Connect your computer to the network with a cable 2. Copy the Networking folder from the flash drive to the computer or your.
1 NTC TCS Training Dallas 2010 TaxWise Online (TWO) Practical Notes and TWO Wireless.
Security for Seniors SeniorNet Help Desk
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
1 NTC/TCS Training Dallas 2010 TWO Set-ups Wired and Wireless.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Computer Information Use your own login and password if possible. To get a password, you must turn in the AUP sheet handed out at registration or sent.
Warrington U3A Advanced Computer Class PC Maintenance and Security.
Bluetooth By Andrew Breen and Chris Backo. Presentation Overview Bluetooth overview Bluetooth vs. WiFi ProductsInstallationDemonstration Security Issues.
D-Link Confidential WRPD, Aug, DHP-1320 is a new D-Link Powerline solution features n wireless speeds of up to 300 megabits per second and.
{ Active Directory Security Why bother?.   Law #1: Nobody believes anything bad can happen to them, until it does   Law #2: Security only works if.
Setting up a Home Network. Homework re-cap Lets go through the last piece of homework set. You were asked what the individual components listed did as.
Final Union Training TY What’s New In TaxWise Gary Blauth Module NJ 2.3.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Final Essex Training TY What’s New In TaxWise Gary Blauth Module NJ 2.3.
We are here to tell you how to keep you’re computer clear of all bad things. Without a doubt it will help a true Brownie will take all this on board!
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 14 – Windows Security.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Introduction to Networking
1 #UPAugusta Today’s Topics What are Deadly IT Sins? Know them. Fear them. Fix them. #UPAugusta201 6.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
Travis DeBona COSC  What is Malicious Code  Types of Malicious Code  Who’s Behind It  How To Secure My Computer.
Cafanh Seminar Saturday 15, 2015 Speaker: Jean Bernard Choudja.
WHAT ARE THE STEPS TO CONNECT MY HP DESKJET 3520 TO WI-FI?
National Technology Committee Update
Networking and Sharing
Welcome to the CA02 TC Meeting/Training
And Off-Season Storage
Managing Windows Security
The new starbucks Jill E. Farris.
What they are and how to protect against them
Wrap up of CA02 TC Meeting/Training
National Technology Committee Update
Chapter 6 Application Hardening
Cloud Computing By: Vanika Jennings.
Encryption Must Be End to End This is the job of SSL or TLS
Network Operating Systems (NOS)
Technology National Organization, Technology Survey, Computer & Networking Security, & Refresh Program 2017 Regional Meeting.
Networking Public Wifi and Print Sharing
Bob Willis National Technology Committee
Business Risks of Insecure Networks
Chapter 4: Practical Approaches to Security
Answer the questions to reveal the blocks and guess the picture.
Introduction to Computers
Sometimes, you may require or wish to print from your iPhone 6/6s/7 (plus), but it would be little difficult to print from an iPhone 6/6s/7 (Plus) directly,
Windows 94
Technology Survey Results
Risk of the Internet At Home
Internet Security Submitted to Professor Mort Anvari
The Internet of Unsecure Things
INTRODUCTION TO TAX-AIDE TECHNOLOGY
Internet safety By DAGAS YACMAS team.
F-Secure Business Suite
Introduction to Systems Security
Level 2 Diploma Unit 11 IT Security
Operating Systems & Other Hardware
Bethesda Cybersecurity Club
Weakest Link in a Network?
Cybersecurity and Cyberhygiene
And test your signal strengths
Stable connection More secure More vulnerable to hacking Cheap set up costs Generally will have a good quality signal The connection is not as stable.
Get to Know the Internet
Online Computer Security Tips For Parents
SBS 2008 – One year on David Overton
Presentation transcript:

Networking Public Wifi and Print Sharing 2017 TCS SMT Training - Dallas

2016 TCS SMT Training - Dallas The Danger See articles/videos in next slide The ease of use of hacking tools is now such that any bored teenager in a public library can use them. It is easy to steal user IDs and passwords even on secure connections, when connected via Public wifi. 2016 TCS SMT Training - Dallas

2016 TCS SMT Training - Dallas Articles/Videos Man in the Middle attack demonstration http://www.clickorlando.com/news/hacke r-demonstrates-risks-of-using-public-wi- fi http://www.pcworld.com/article/2043095 /heres-what-an-eavesdropper-sees- when-you-use-an-unsecured-wi-fi- hotspot.html Man in the Middle attack theory 2016 TCS SMT Training - Dallas

My network is secure so windows print sharing is ok – NOT GUARANTEED! Very likely that there will be no issues Security breaches are very low probability. “Security by Obscurity” works – in general. If an event occurs the consequences of a breach is high and negative. Huge workload for local volunteers identifying and notifying affected Taxpayers If publicized then very negative for program 2017 TCS SMT Training - Dallas

Alternatives to Windows print sharing Use one computer as a print server only If you only have a USB printer, there are wireless routers that have a USB port in addition to Ethernet ports. This allows the computers to access the printer wirlessly. 2017 TCS SMT Training - Dallas

2017 TCS SMT Training - Dallas “My Network is Secure” Multi-layered security Secure router based network Up to date on Windows Update Microsoft Security Essentials (7), Defender (10), or better 3rd party anti-malware. No File or Print Sharing No use of computers for anything other than Tax Prep. (No downloaded games or widespread browsing) Attachment to network of non-Tax Prep, or personal computers for Tax Prep are our biggest single risk. If possible do not do it. Violation of any of these brings risk 2017 TCS SMT Training - Dallas

2017 TCS SMT Training - Dallas Windows Print Sharing Opens up a sharing connection among networked systems If a single system becomes infected, all systems become infected – this has generally been true over PC history. WannaCry ransomware used the print sharing Ports as a distribution method. (https://en.wikipedia.org/wiki/WannaCry_ransomware_attack) (SMB Port 445 and Port 139) Petya wiper malware also used the sharing ports (http://thehackernews.com/2017/06/petya-ransomware- wiper-malware.html) Using Print Sharing unnecessarily increases our security risks. All security involves a convenience/simplicity vs enhanced security trade off. 2017 TCS SMT Training - Dallas

2017 TCS SMT Training - Dallas Questions ??? 2017 TCS SMT Training - Dallas