PC Security 101 Keeping your data and your computer safe.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

PC Security 101 Keeping your data safe. Security is a real concern Identity theft is a hot topic in the news. Data theft is a very real and serious issue.
Windows XP Tutorial Securing Windows. Introduction This presentation will guide you through basic security principles for Windows XP.
Thank you to IT Training at Indiana University Computer Malware.
SECURITY CHECK Protecting Your System and Yourself Source:
INTERNET SAFETY FOR EVERYONE A QUICK AND EASY CRASH COURSE.
9/20/07 STLSecurity is Everyone's Responsibility 1 FHDA Technology Security Awareness.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Using Anti-virus Software A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.
P.E.O. Salt Lake City Reciprocity Meeting Keeping Safe Using Technology April 8, 2010 Presented by Rebecca Conant (Y) P.E.O. Salt Lake City Reciprocity.
Securing Your Home Computer Presenter: Donnie Green Date: February 11, 2009 National Aeronautics and Space Administration
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Protect Your Computer from Viruses and Other Threats! 1. Use antivirus software. 2. Run Windows updates. 3. Use a strong password. 4. Only install reputable.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Security 101 Harper P. Johnson Information Technology Services Director of Information Security.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Learning In A Techno World How Safe is Your Cyberspace?
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
1.1 System Performance Security Module 1 Version 5.
Staying Safe Online Keep your Information Secure.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Securing Your Home Computer Securing Your Home Computer Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Computer Security Preventing and Detecting Unauthorized Use of Your Computer.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 5 1 Downloading and Storing Data Using FTP and Other Services to Transfer and.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Safer Online Shopping and Practices Presenter: Brian Moats Students Active In Leadership.
Internet Security and Your Computer Welcome to Boot Camp.
Internet Safety Internet Safety LPM
Computer Skills and Applications Computer Security.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
W elcome to our Presentation. Presentation Topic Virus.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Network System Security - Task 2. Russell Johnston.
ITS220 – How To Prevent Your PC From Infected by Virus presented by Desmond Ho.
What they are and how to protect against them
Malware and Computer Maintenance
Information Security Session November 11, 2004
Internet Safety for Everyone
Information Security Session October 24, 2005
CYBERSAFETY & Personal information
Internet Safety for Everyone
Internet Safety for Everyone
Internet Safety for Everyone
Presentation transcript:

PC Security 101 Keeping your data and your computer safe

Security is a real concern Identity theft is a hot topic in the news. Data theft is a very real and serious issue. Malicious programs allow users to capture logins, passwords, credit card information, personal, and business data. We have found some of these programs in home directories in our schools.

How does it all work? Users install malicious programs from floppy disks, CDs or thumb drives to avoid detection on the network. Programs install quickly and easily when logged in as an administrator. Local administrator passwords are easy to crack with software found on the Internet. Novell passwords are not easy to crack.

How does it all work? Once installed, these programs begin to capture data. The data can be stored on the machine, or even ed to another user. Keystrokes can be captured, gathering your logins and passwords to websites, what you type in a document or , as well as any information you enter on a form.

How does it all work? Screenshots can be captured, showing what you are seeing on the screen. Malicious users can use what they have captured to login as you and have access to all of your programs, files and data.

What can you do? Do not allow students to use your computer, if possible. **This is especially important in high schools and middle schools** Be sure to logout when you leave your computer, even for a brief time. Logout and turn off computers at the end of each day. Do not allow others to use your computer when you are logged in. Be aware of where you are saving documents. Do not save sensitive information to a shared folder.

What can you do? Change your password frequently. Do not allow other colleagues to login with your password. This is against board policy, as well as a really bad idea! Select hard to guess passwords with letters, numbers and other characters. Be aware of what students are doing on the computers. Enforce policies regarding misuse of computers. Report any suspicious activities to your supervisor and your technology support staff.

The Law State and Federal laws prohibit unauthorized access, additions, deletions, or changes to a network, password disclosure and numerous other activities. Violations of state and federal codes may result in fines and imprisonment. Copyright is a very serious issue. Violations may result in very large fines. Students should be educated on laws and ethics. Be sure to read the Douglas County Acceptable Use Policy on our staff home page: htm htm htm

The Law Georgia Code: bin/pub/ocode/ocgsearch?docname=OCo de/G/16/9/93 bin/pub/ocode/ocgsearch?docname=OCo de/G/16/9/93http:// bin/pub/ocode/ocgsearch?docname=OCo de/G/16/9/93 Federal Code: me/1030NEW.htm me/1030NEW.htm me/1030NEW.htm

More troubling news… Spyware/AdwareSpyware/Adware slows down our computer and compromises security. Spyware/Adware PhishingPhishing scams look so real that we are tempted to fall for them. Phishing New worms and viruses surface every day. worms and viruses worms and viruses

What about my home computer? The first line of defense is to monitor your inbox! –Do not open from unknown/unexpected addresses, particularly with attachments. –Opening spam verifies that your account is a live account. spam –If you have a “report as spam” option with your ISP, use it. –Enable filtering, if your ISP provides it. (Junk/Spam folders)

What about my home computer? –Use your work for work and have a personal account for personal . –Create an extra account that you will use when asked to provide an address on a website. This account will fill up with junk and should only be used for this purpose. –If you feel compelled to forward s to a large group, use the BCC feature to hide addresses. Encourage your friends to do the same.

What about my home computer? Use anti-spyware programs on your home computers to detect and delete malicious programs. –Update definitions and scan your PC once a week or at the very least, monthly. –AdAware, SpywareBlaster, and Spybot Search and Destroy are free for personal use and quite effective! Use anti-virus software on your home computers to protect against viruses, worms, and trojans. –Many ISPs now offer free anti-virus software. Comcast and AOL offer McAfee. Check with your ISP for further details.

What about my home computer? Use a firewall if you have high-speed internet service (broadband or DSL) –A router/gateway is a hardware firewall that will provide protection. –Software firewalls include: Windows firewall, built into Windows XP and ZoneAlarm, free products. –McAfee may be provided by your ISP. –Norton Internet Security is another product that works well. ** A word of caution: Be careful configuring software firewalls! You may completely block your internet connection! **

Home Networks If you’re like many high-speed internet users, you may have a wireless router installed at home. Here are a few security tips for wireless networks: –Turn on WEP encryption. If you’re unsure how to do this, check the manufacturer’s website. –Use MAC filtering to allow only certain PCs to access your network. –Turn off your router when not in use for extended periods.

We use locks to protect our homes, cars, and other valuables. Protect your personal and school data by taking steps to keep it secure.

Resources mspxhttp:// mspx Numerous videos on various security topics may be found here. mspx AdAware free download Spybot Search and Destroy free download SpywareBlaster free download AVG Anti-virus free download xpert/bowman_03july28.mspxhttp:// xpert/bowman_03july28.mspx Wireless security for home networks xpert/bowman_03july28.mspx