Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

The Internet = A World of Opportunities Look whats at your fingertips A way to communicate with friends, family, colleagues Access to information and.
How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Developed by Technology Services 1:1 Laptop Initiative
Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Primary Threats to Computer Security
Security at Home The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
Internet Safety Topic 2 Malware This presentation by Tim Fraser Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other.
SECURITY CHECK Protecting Your System and Yourself Source:
7 Effective Habits when using the Internet Philip O’Kane 1.
PC Security 101 Keeping your data and your computer safe.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Use computer and internet safely Dave Dai Computer security Malware Virus: a program that copies itself and infect a computer without permission.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.
P.E.O. Salt Lake City Reciprocity Meeting Keeping Safe Using Technology April 8, 2010 Presented by Rebecca Conant (Y) P.E.O. Salt Lake City Reciprocity.
How It Applies In A Virtual World
Alisha horsfield.  Computer virus is something that copies itself to computer software.  Virus can delete the hosts important documents which includes.
Threats to I.T Internet security By Cameron Mundy.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Security for Seniors SeniorNet Help Desk
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Staying Safe Online Keep your Information Secure.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
IT security By Tilly Gerlack.
Securing Your Home Computer Securing Your Home Computer Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
Lecture Computer Security Ports, Firewalls, Passwords, and Malware.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Types of Electronic Infection
Safer Online Shopping and Practices Presenter: Brian Moats Students Active In Leadership.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Internet Security and Your Computer Welcome to Boot Camp.
Internet Safety Internet Safety LPM
 Keeps data and equipment functioning  Lack of security can expose confidential information and reduce network resources  Can degrade.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
W elcome to our Presentation. Presentation Topic Virus.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
COMPUTER MALWARE. Malware is a general term for any type of unwanted software that does mischief or permanent damage to your computer. Malware is created.
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
Internet Safety Topic 2 Malware Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other dangerous software exists, such.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
Managing Windows Security
Malware and Computer Maintenance
Personal spaces.
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
Protect Your Computer Against Harmful Attacks!
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Presentation transcript:

Nathan J. Gibson, CISSP-CISM-CCNA-MCSA

Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers

Personal Data Identity Theft Bank Account Information Hard Drive Space Pornography Storage Hide stolen information Distribute copyrighted material CPU cycles Cracking code Writing Software Robot Computer Attack other sites Profit from large BotNet

Greeting Cards Chain Letters Hoax WebPages Phishing Blogs CDs, Jump Drives, Floppy Disk Instant Messengers PDAs

Fake Greeting Cards Appear to come from a friend Links in point to malicious sites Automatically Downloads malicious files Chain Letters Bill Gates is tracking this Religious s Sue needs your help s Forward to Everyone you Know!!!!

Hoax s Diplomat Husband died and left me $100 Million $198.4 Million Lost in 2006 alone Date Line To catch an ID Thief Investment s Hoax Virus Alert s Good Times Virus

Teenagers like to make friends Messenger Skilled in extracting information Blogs To much sensitive information MySpace people tested 80% release sensitive information Pictures reveal a lot of information and motivate attackers

AntiVirus AntiSpyware Firewalls Updates Safe Browsing Habits Common Sense and Knowledge Rules

Antivirus Free protection is available McAfee: AVG : Install Scan Immediately Configure Daily Automatic Updates At least Weekly Scans

Anti Spyware Again Free Protection for all Spybot S & D : Configure Automatic Updates At least Weekly Scans

Firewall Windows XP SP2 comes with a built in Firewall Turn on/Configure Dont Ignore Warnings Periodically Check Exceptions

Updates Configure to Automatically Update and Install Check Software vendor sites for updates periodically Dont postpone/ignore computer notifications.

Safe Browsing Habits Active X Set Internet Explorer Settings Think before clicking Yes Java Prompts Certificates Dont except certificates from people you dont trust SSL/Https Internet Explorer Phishing Tools

Okay! Okay! I understand not to click on everything. But my computer doesnt give me that prompt. Configure your security level

Certificates – SSL – HTTPS Secure & Confidential Internet Requires a degree of Trust What is Phishing? vs. How can I be sure the site I am browsing is legit?

DOES THIS PROVE MY IDENTITY?

STATE LICENSE HERE -- This really proves my Identity

Your in Luck, Built in Phishing Help!

Search Engine & Website Information McAfee Site Advisor - Free Malicious Downloads Spam Site Phishing Sites Links to other known bad sites

Common Sense and Knowledge If it is too good to be true….. Research s and websites Advise Family Members Block them if you have to Criminal Act???? Mail Fraud(18 USC S1341)

How to keep your kids safe on the internet 1. Parenting Communicating 2. Technology Enforcing and Monitoring

Step 1: Establish a contract Times that are allowed Activities that are allowed Punishment for rule violation Computer should be in an open space and not in their room

Step 2: Separate user accounts for you and your kids You should have more rights than them to restrict and monitor their activity Each child should have their own account and password Trace unauthorized activity to a specific person

Step 3: Controlling Internet Activity There are bad sites on the internet Some legit and education sites can be flagged because of certain content

Uninstall Chat programs you dont want them to use Create an with your ISP for them You can monitor and view Block other sites(e.g. hotmail, yahoo, etc.) Key Loggers Messengers Blogs Browser History Programs

Configure your modems/routers to disable internet activity during certain hours Consult your ISP Technical support; they will gladly help you

QUESTIONS/COMMENTS