Information Security Session November 11, 2004

Slides:



Advertisements
Similar presentations
Keep Your PC Safe (Windows 7, Vista or XP) Nora Lucke 02/05/2012 Documents - security.
Advertisements

Windows XP Tutorial Securing Windows. Introduction This presentation will guide you through basic security principles for Windows XP.
10 Things You Can do to Secure Your PC Presented by Peter Nowak OIS Client Services Manager.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
PC Security 101 Keeping your data and your computer safe.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
1 I ntegrated S ite S ecurity for G rids © Members of the ISSeG Collaboration, 2008 See: ISS e G Computer Security: Advice for computer.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
Utility Programs and their Functions. Antivirus Software (Virus Checker) Keep the Computer software healthy and free of virus’ that can harm the function.
1 Computer Security: Protect your PC and Protect Yourself.
Threats to I.T Internet security By Cameron Mundy.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
How to maintain your computer
Protect Your Computer from Viruses and Other Threats! 1. Use antivirus software. 2. Run Windows updates. 3. Use a strong password. 4. Only install reputable.
Security for Seniors SeniorNet Help Desk
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Learning In A Techno World How Safe is Your Cyberspace?
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Staying Safe Online Keep your Information Secure.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Securing Your Home Computer Securing Your Home Computer Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
Why do you need to think about security?  Data loss  System loss  Identity theft.
Microsoft Office 2007 – Illustrated Introductory, Premium Video Edition Understanding Essential Computer Concepts.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
Jan 11 Encryption and Hacking. Your Answer Encryption is used to keep information safe from unauthorised users. The best way to keep the system safe is.
Return to the PC Security web page Lesson 5: Dealing with Malware.
INTERNET SAFETY FOR KIDS
Small Business Security Keith Slagle April 24, 2007.
Keeping Your Computer Safe and Running Efficiently.
NetTech Solutions Protecting the Computer Lesson 10.
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
ITS220 – How To Prevent Your PC From Infected by Virus presented by Desmond Ho.
bitdefender virus protection
Chapter 40 Internet Security.
Joseph J. Malone Security for Seniors Joseph J. Malone
Managing Windows Security
Methods of Securing Data in Windows Networks
Three steps to prevent Malware infection
Chapter 6 Application Hardening
Computer Security Std XI– Chapter 8.
Cyber Security By: Pratik Gandhi.
Antivirus Support Phone Number + 1-(844) One Step IT Solutions December 6, 2017
Computer Security Elaine Munn Introduction to Computer Security.
Internet Basics.
Information Security Session October 24, 2005
Information Security Session October 23, 2006
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
Lesson 2: Epic Security Considerations
Part 3.
Information Security Awareness
Epic Introduction Basics
Computer Security.
Epic Introduction Basics
Lesson 2: Epic Security Considerations
What is Information Security?
Lesson 2: Epic Security Considerations
Epic Introduction Basics
G061 - Network Security.
6. Application Software Security
Presentation transcript:

Information Security Session November 11, 2004 9/19/2018 Information Security Session November 11, 2004 Bill Eaheart Network Security Coordinator DePaul University NIDS with Snort

Information Security at DePaul Who we are Information Services - Business Continuity and Security Group (BCS) Web Site http://is.depaul.edu/security/information_security/ Email Addresses for BCS team Bill Eaheart - weaheart@depaul.edu Eric Pancer – epancer@security.depaul.edu Arlene Yetnikoff – ayetniko@depaul.edu Ed Gregory – egregory@depaul.edu Cheryl Barkby - cbarkby@depaul.edu Maybelline Davis - mdavis@depaul.edu Reporting security incidents security@depaul.edu abuse@depaul.edu 9/19/2018 Information Security

Today Provide practical information General guidelines for secure computing Question and Answer Presentation available on this web page: http://is.depaul.edu/security/information_security/presentations.asp 9/19/2018 Information Security

Securing Windows Systems Windows Update Virus and Spyware Protection Use a Host Based Firewall Account and Password Security File Sharing Peer-to-Peer File Sharing Emails and Downloads Physical Security Backups Microsoft Baseline Security Analyzer 9/19/2018 Information Security

Windows Update Microsoft provides security patches and updates Check for updates at least once per month Security fixes released on the second Tuesday of each month Manual Update Open Internet Explorer  http://windowsupdate.microsoft.com Windows Automatic Updates makes this easy Start  Control Panel  Automatic Updates DePaul makes it even easier Software Update Services (SUS) server 9/19/2018 Information Security

Virus and Spyware Protection Malware (MALicious softWARE) – designed to make life unhappy (virus, trojan horse) Install Anti-virus software Regularly update anti-virus signatures Available products Commercial McAfee Antivirus - http://www.mcafee.com/us/ Norton Antivirus - http://www.symantec.com/ Commercial/Freeware Avast! - http://www.avast.com/ AVG – http://www.grisoft.com/us/us_index.php DePaul makes it even easier McAfee Anti-virus and McAfee ePolicy Orchestrator (ePO) Student download - http://netauth.depaul.edu/virusscan/ Spyware Gathers information without your knowledge Ad-aware - http://www.lavasoftusa.com/ Spybot Search and Destroy - http://www.safer-networking.org/ Spycop - http://www.spycop.com/ 9/19/2018 Information Security

Host Based Firewall Best PC firewalls Windows XP Commercial Products Track incoming and outgoing traffic Allow you to set up rules Windows XP Internet Connection Firewall (ICF) Inspects incoming traffic only Start  Control Panel  Network Connections  Change Windows Firewall settings Commercial Products Sygate Personal Firewall ZoneAlarm Tiny Personal Firewall Norton Personal Firewall BlackIce PC Protection 9/19/2018 Information Security

Account and Password Security All accounts must have strong passwords Weak or no password accounts are an open invitation to hackers If possible do not run your computer as administrator Disable any unused accounts Strong passwords Special characters (*!$+) mixed with letters and numbers Mixed upper- and lower-case letters and Punctuation characters Nonsense words that are easy to pronounce but aren't in any dictionary Eight or more characters Use a password sentence or passphrase I need to visit the Kmart at 4:00  In2vtK@4: My #1 Password! Do not use either of these passwords  9/19/2018 Information Security

File Sharing Some advice – Do not use shared folders  Unprotected shared folders or ones with weak passwords allow hackers to walk right into your computer On DePaul’s network used our Novell network If you must use shared folders - protect access Use a strong password Do not make a share writeable by others Do not share entire drives – C:\ Understand permissions to prevent a malicious user from damaging your data 9/19/2018 Information Security

Peer-to-Peer File Sharing Many peer-to-peer programs like KaZaZ, Limewire, Gnutella and others set up your computer to be a server Disable file sharing for popular programs University of Chicago – http://security.uchicago.edu/peer-to-peer/no_fileshare.shtml Organizatons watch for distribution of copyrighted material - Do not share copyrighted material Unwanted components could be installed, such as Spyware 9/19/2018 Information Security

Emails and Downloads Be suspicious of any attachments sent by email – even if you recognize the sender Never open files from people or sources you are unfamiliar with and did not expect to receive Attachments can contain viruses Scan any downloaded files with your anti-virus 9/19/2018 Information Security

Physical Security Work space Public computers Screen saver or lock the workstation Public computers If in an open area do not walk away from a machine you should log out or lock the machine Remember to log out of a computer when leaving for an extended period of time 9/19/2018 Information Security

Backups Back up all critical files Protects against hardware failure, viruses or compromised computer DePaul makes it easy Personal folder on the N:\ drive Backed up by Information Services Encrypt any sensitive data 9/19/2018 Information Security

Microsoft Security Analyzer Microsoft Baseline Security Analyzer http://www.microsoft.com/technet/security/tools/mbsahome.mspx Free, vulnerability assessment tool for the Microsoft platform Download Software Installation Wizard Scan your computer 9/19/2018 Information Security

The End! Thank you Any questions weaheart@depaul.edu 9/19/2018 Information Security