Computer Security: Best Practices for Home Computing Presented by Student Help Desk Merced Community College.

Slides:



Advertisements
Similar presentations
Four Things You Should Do to Your Computer Today Don Yarman OLC IT Division OLC Chapter Conferences Spring 2007.
Advertisements

Viruses & Spyware A Module of the CYC Course – Computer Security
Keep Your PC Safe (Windows 7, Vista or XP) Nora Lucke 02/05/2012 Documents - security.
Secure and Web Browsing Sébastien Dellabella – Computer Security Team.
Your Definitive Lockdown Guide
June 2008 Surf Safely with a Clean Computer Roger Thornburn.
Review Ch. 3 – Connecting to the Worlds Information © 2010, 2006 South-Western, Cengage Learning.
Securing Your Computer 1,2,3 The Basics Just the facts……..  In 2003, Symantec documented 2,636 new computer vulnerabilities, an average of seven per.
SMC2804WBRP-G Barricade™ g 2.4GHz 54Mbps Wireless Cable/DSL Broadband Router with USB Print Server SMC2804WBRP-G
CY-SWR1100 Dual Band Wireless N Router
Desktop Value - Introducing Windows XP Service Pack 2 with Advanced Security Technologies Presenter: James K. Murray Title: Information Technologies Consultant.
Grass Valley Learning Center Surf the Net Safely Roger Thornburn.
® Microsoft Office 2010 Browser and Basics.
Services Course Windows Live SkyDrive Participant Guide.
What is Spyware? Where did it come from?.
10 Things You Can do to Secure Your PC Presented by Peter Nowak OIS Client Services Manager.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Configuring your Home Network Configuring your Home Network Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
Simple ways to secure Wireless Computers Jay Ferron, ADMT, CISM, CISSP, MCSE, MCSBA, MCT, NSA-IAM, TCI.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
Don’t Lose Your Identity – Protect Yourself from Spyware Dan Frommer Sherry Minton.
1 Configuring Linksys Wireless Router Prof. Valencia Community College.
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
TAX-AIDE Network Router Setup Network Printer Setups July SMT/TCS Training - Dallas1.
Securing Your Home Computer Presenter: Donnie Green Date: February 11, 2009 National Aeronautics and Space Administration
2851A_C01. Microsoft Windows XP Service Pack 2 Security Technologies Bruce Cowper IT Pro Advisor Microsoft Canada.
Ten Things You Should Do to Your Computer Today Don Yarman & Jim Mann OLC IT Division Small Libraries Conference May 2006.
Adware Spyware Anti-Virus Presented by: Forrest Fosheim Network Coordinator Southwest Telecommunications Coop.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
Security for Seniors SeniorNet Help Desk
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.
TUTORIAL # 2 INFORMATION SECURITY 493. LAB # 4 (ROUTING TABLE & FIREWALLS) Routing tables is an electronic table (file) or database type object It is.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Learning In A Techno World How Safe is Your Cyberspace?
Windows Internet Explorer 9 Chapter 1 Introduction to Internet Explorer.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
IT security By Tilly Gerlack.
Securing Your Home Computer Securing Your Home Computer Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
 Physical protection and Simple measures  Passwords  Firewalls  Anti-Virus, Spyware and Malware  Web browsers   Patches  Wireless  Encryption.
Introduction to Firewalls TEC 236. What is a Firewall? A firewall is hardware, software, or a combination of both that is used to prevent unauthorized.
Microsoft Internet Explorer and the Internet Using Microsoft Explorer 5.
Secure Wireless Home Networks Area 2 SIR Presentation Nov. 18, 2004 Dean Steichen Br. 8.
Safer Online Shopping and Practices Presenter: Brian Moats Students Active In Leadership.
Internet Security and Your Computer Welcome to Boot Camp.
Information Security 493. Lab # 4 (Routing table & firewalls) Routing tables is an electronic table (file) or database type object that is stored in a.
Internet safety By Suman Nazir
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Vulnerabilities in Operating Systems Michael Gaydeski COSC December 2008.
Cyber Security: Today’s Threats and Mitigations Jonathan Homer, Cyber Security Analyst Idaho National Laboratory.
NETWORK SECURITY LAB 1170 REHAB ALFALLAJ CT1406. Introduction There are a number of technologies that exist for the sole purpose of ensuring that the.
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
Computer Security Keeping you and your computer safe in the digital world.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Windows Vista Configuration MCTS : Network Security.
What they are and how to protect against them
How to Install Norton Antivirus in your Computer
Home Computer Security
Lesson #8 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer.
Internet Basics.
Information Security Session October 24, 2005
Connecting Remotely Winter 2014.
Presentation transcript:

Computer Security: Best Practices for Home Computing Presented by Student Help Desk Merced Community College

This document was adopted from a presentation made available by the University of Wisconsin Computer Security: Best Practices for Home Computing - Student Help Desk, Merced Community College 2 Defining the Problem Symantec documented 2,636 new vulnerabilities in 2003, an average of seven per day. In 2003, 70% of vulnerabilities were classified as easy to exploit. Threats to privacy and confidentiality were the fastest growing threat, with 519% growth in volume of submissions within the top ten. The average un-patched computer lasts less than 20 min. before being compromised

This document was adopted from a presentation made available by the University of Wisconsin Computer Security: Best Practices for Home Computing - Student Help Desk, Merced Community College 3 Presentation Topics Home PC Security Home Network Security Security Windows XP Service Pack 2 Q and A

Best Practices for Securing your Home Windows Computer

This document was adopted from a presentation made available by the University of Wisconsin Computer Security: Best Practices for Home Computing - Student Help Desk, Merced Community College 5 Step 1: Antivirus Each computer should have an antivirus product installed on it and configured to auto update We recommend Norton AntiVirus 2006/7 for home machines, not the Internet Security Package Many ISPs provide customers with Antivirus software as a part of their services Free alternative: AVG from Grisoft

This document was adopted from a presentation made available by the University of Wisconsin Computer Security: Best Practices for Home Computing - Student Help Desk, Merced Community College 6 Step 2: Windows Update Windows Update fixes security holes in your operating system It should be set to automatically download and install updates Found in Control Panel / System, or by right clicking My Computer and selecting Properties

This document was adopted from a presentation made available by the University of Wisconsin Computer Security: Best Practices for Home Computing - Student Help Desk, Merced Community College 7 Step 3: Install Malware Protection Malware tracks your web surfing, causes pop-up windows, slows down your computer, and other evil deeds. Common ways on to your computer: Web ActiveX pop ups (Internet Explorer ONLY) Kazaa and other file sharing applications Many other free utilities Two Free Scanners: Lavasoft Ad-Aware SE: Spybot Search and Destroy:

This document was adopted from a presentation made available by the University of Wisconsin Computer Security: Best Practices for Home Computing - Student Help Desk, Merced Community College 8 Step 4: Use a Safer Client Most viruses target Microsoft Outlook Express Using a different client avoids most of those threats Mozilla Thunderbird Imports mail and addresses from OE Excellent Spam controls Plugins and Themes It's Free!!

This document was adopted from a presentation made available by the University of Wisconsin Computer Security: Best Practices for Home Computing - Student Help Desk, Merced Community College 9 Step 5: Use a Safer Web Browser Internet Explorer has many unpatched vulnerabilities Mozilla Firefox: Only use IE for sites that require it, like the windows update web site Not vulnerable to ActiveX Malware Tabbed Browsing Pop up Blocking Many excellent extensions and themes Fast and Free!!

Best Practices for Securing your Home Network

This document was adopted from a presentation made available by the University of Wisconsin Computer Security: Best Practices for Home Computing - Student Help Desk, Merced Community College 11 Step 1: Install Router or Gateway Protects your PC: Makes it unseen on the Internet Wired Internet Only: Linksys BEFSR41 4 port 10/100 Ethernet Wired/Wireless Internet: Linksys WRT54G 4 port 10/100, Wireless g (54Mbps)

This document was adopted from a presentation made available by the University of Wisconsin Computer Security: Best Practices for Home Computing - Student Help Desk, Merced Community College 12 Step 2: Software Firewall If you are using a router / gateway this is not essential Can be intrusive and take a while to train it, frequently very cryptic in its questions Firewall Options: Built-in Windows Firewall (SP2 version recommended) Only stops inbound traffic, does not check outbound Zone Alarm: Free version available, checks inbound and outbound traffic Sygate Personal Firewall: Free version available, checks inbound and outbound traffic

This document was adopted from a presentation made available by the University of Wisconsin Computer Security: Best Practices for Home Computing - Student Help Desk, Merced Community College 13 Step 3: Wireless Security You should change the password on your router Enable Wireless Encryption (WEP and WPA) Encrypts transmissions between PC and router Makes the wireless network non-public Not foolproof, you should change your key every 3-4 mos. Change your SSID (Wireless Network Name) Additional security steps are to enable MAC based authentication and turn off SSID broadcasting (advanced)

This document was adopted from a presentation made available by the University of Wisconsin Computer Security: Best Practices for Home Computing - Student Help Desk, Merced Community College 14 Overview of Best Practices PC Security Anti-Virus should be installed and current Windows updates should download & install automatically Malware checking and removal Use a more secure client Use a more secure web browser Home Network Security Broadband-connected PC's should be behind a gateway/router, even if there is only one computer Software Firewall Use Wireless Encryption (WEP/WPA)

This document was adopted from a presentation made available by the University of Wisconsin Computer Security: Best Practices for Home Computing - Student Help Desk, Merced Community College 15 General Security Use a Spam Filter in your Program Built in to Thunderbird Outlook Express: Norton AntiSpam Do not open attachments you are not expecting Do not notify people that they sent you a virus, it was most likely forged anyway Do not use HTML It can contain hidden tracking information Be Very Cautious when clicking on web links in s

This document was adopted from a presentation made available by the University of Wisconsin Computer Security: Best Practices for Home Computing - Student Help Desk, Merced Community College 16 Phishing / Scams No reputable company will ask you for passwords, credit cards, or any personal info via If it sounds too good to be true, it probably is You cannot get the money out of Nigeria, period.

Windows XP Service Pack 2 Overview

This document was adopted from a presentation made available by the University of Wisconsin Computer Security: Best Practices for Home Computing - Student Help Desk, Merced Community College 18 WinXP Service Pack 2 Generally has been trouble free for home users Availability (270mb download): Windows Update web site

This document was adopted from a presentation made available by the University of Wisconsin Computer Security: Best Practices for Home Computing - Student Help Desk, Merced Community College 19 Windows XP Security Center Security Center: PC Security Status at a glance Gives status of Firewall, Auto Updates, Virus Protection

This document was adopted from a presentation made available by the University of Wisconsin Computer Security: Best Practices for Home Computing - Student Help Desk, Merced Community College 20 New Wireless Interface Wireless Connections are much easier to set up

This document was adopted from a presentation made available by the University of Wisconsin Computer Security: Best Practices for Home Computing - Student Help Desk, Merced Community College 21 Internet Explorer Improvements Pop-up Blocking now standard Improved plug-in handling and security Improved browsing security We still recommend Firefox

This document was adopted from a presentation made available by the University of Wisconsin Computer Security: Best Practices for Home Computing - Student Help Desk, Merced Community College 22 Outlook Express Improvements More secure default settings and isolation of potentially unsafe attachments Won't download images in HTML by default Bug fixes We still recommend Thunderbird

This document was adopted from a presentation made available by the University of Wisconsin Computer Security: Best Practices for Home Computing - Student Help Desk, Merced Community College 23 Questions? Call Student Help Desk at Merced Community College Website: Click on the Help Link on the bottom of any page at and go to Student Help Deskwww.mccd.edu