Starting up a Security Class for Students Created by: Beth Byrnes Larry James Zac Reimer For Information Services University of Nebraska-Lincoln.

Slides:



Advertisements
Similar presentations
Operational Risks Task 13. What is CNP? CNP stands for Card Not Present and is when you order or pay for something online as you are not in front of the.
Advertisements

Grass Valley Learning Center Surf the Net Safely Roger Thornburn.
Basic Computer Cleanup Larry James ResNet Manager.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
SECURITY CHECK Protecting Your System and Yourself Source:
Computer Maintenance & Safety Spring Internet Safety Keeping your computer safe What is a computer virus? A computer program that can copy itself.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
Viruses and Spyware. What is a Virus? A virus can be defined as a computer program that can reproduce by changing other programs to include a copy of.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
Identity Theft and Safe Computing Keeping yourself You by good habits and good technology.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
P.E.O. Salt Lake City Reciprocity Meeting Keeping Safe Using Technology April 8, 2010 Presented by Rebecca Conant (Y) P.E.O. Salt Lake City Reciprocity.
Security Advice Georgie Pepper Campsmount Acadamy.
Alisha horsfield.  Computer virus is something that copies itself to computer software.  Virus can delete the hosts important documents which includes.
Threats to I.T Internet security By Cameron Mundy.
How to maintain your computer
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Keeping Information Safe Task 4. Basic security measures Passwords Change password on regular basis Do not use names or words easily linked to yourself.
Safe Internet Use Mark Wheatley CSI Onsite
Learning In A Techno World How Safe is Your Cyberspace?
Malware Fighting Spyware, Viruses, and Malware Ch 4.
Basic Computer Cleanup Larry James ResNet Manager.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Staying Safe Online Keep your Information Secure.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
 Physical protection and Simple measures  Passwords  Firewalls  Anti-Virus, Spyware and Malware  Web browsers   Patches  Wireless  Encryption.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Computer Security By Joey Pawoll. Introduction to computer security Have you been wondering how to be safe online? Well look no further! This powerpoint.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
SharePoint document libraries I: Introduction to sharing files Sharjah Higher Colleges of Technology presents:
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
Safer Online Shopping and Practices Presenter: Brian Moats Students Active In Leadership.
 You always need to have the latest anti- virus software so that you can prevent picking up unwanted virus’.  To prevent receiving junk mail, being.
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
INTERNET SAFETY FOR KIDS
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Small Business Security Keith Slagle April 24, 2007.
Keeping Your Computer Safe and Running Efficiently.
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
Computer Security Keeping you and your computer safe in the digital world.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Internet Safety.
Managing Windows Security
Three steps to prevent Malware infection
Unit 4 IT Security.
How to use the internet safely and How to protect my personal data?
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Presentation transcript:

Starting up a Security Class for Students Created by: Beth Byrnes Larry James Zac Reimer For Information Services University of Nebraska-Lincoln

Identifying the Need In spite of required applications, constant issues with spyware, trojans and other malware. Already doing one on one instruction during pick-up. Spending all our time doing clean-up on Windows computers. No current resource for students to get the basics Something needs to be done to reach more people.

Creating the Class What ‘has to’ be in the class? Try to keep it under an hour Get a good space to have it Advertise Get input from: –Computer Help Center –University Networking –University Network Security –University Housing –ResNet Student Workers

Security For Beginners How to keep your computer safe on the Internet

Main Topics Microsoft Updates AntiVirus Firewalls Anti-Spyware Physical Security Passwords Best Practices

Microsoft Updates Should update from “Windows Update” to “Microsoft Update”. Should be set to “auto”. Decide if any “optional” updates are needed. Ex. Windows Media Player. Should be able to un-install any updates that cause problems.

AntiVirus Sophos – UNL has Campus-wide License and a local update server. McAfee Symantec/Norton Trendmicro AVG – no longer available ‘free’ Avast Kapersky (highly rated) Many others

What’s the BEST AntiVirus? All AV programs have Pros and Cons Typical Pros –Automatic updates of virus files –Automatic handling of infections –Quarantine of infected files

What’s the BEST AntiVirus? Typical Cons –Can be resource hogs –May not find new variants –May not be able to clean/quarantine/delete viruses it finds

What’s the BEST Antivirus? Remember: “Any AntiVirus is better than NO AntiVirus.”

Firewalls On or off campus, the Windows firewall should be all you need. But it has to be on.

Firewalls Firewalls are ‘built-in’ to packages like: –Norton Security Center –McAfee Security Center –Windows Live OneCare (requires special exception on the UNL ResNet.)

Firewalls There are lots of free ‘stand alone’ firewalls available. –ZoneAlarm –OnlineArmor –Comodo –Sunbelt –PCTools Firewall Plus

Anti-Spyware/Anti-Malware Windows Defender is ‘built-in’ to Windows Vista. For XP, it’s getting less useful as time goes by.

Anti-Spyware/Anti-Malware Many available free to download –SuperAntiSpyware Preferences>Scanning control check two boxes –“Close Browsers before scanning” –“Terminate memory threats before quarantining” –SpywareBlaster –Spybot Search and Destroy Don’t install “Tea Timer”

Physical Security Keep your dorm room locked. –Even if you’re gone for “just a minute”. Keep hold of your laptop when you’re out and about. Use a ‘good’ password. With a different one for the ‘admin’ account.

Passwords What’s a ‘good’ password? –Not your name. –Not your unlid number. –Not ‘huskers’ or ‘huskerfan’. –Not your birthday. –Not anything someone could guess.

Passwords A good password is a random string of letters, numbers and characters that you can remember easily.

Best Practices Don’t open from someone you don’t know. Don’t open attachments if you’re not sure what they are and what they’ll do. Keep your Browser Security level set to “Medium High”. Regularly scheduled manual updates and scans. Keep abreast of changes, new security tools and practices. And if you get a pop-up that says something like “Exploits have been detected on your computer. Click here to download a program that will fix them.” DON’T DO IT!

Phishing You might get an from your credit card company, your bank, ebay, paypal, or someone else asking you to ‘update’ or ‘confirm’ your account information. Especially your password and/or account number. They may want you to reply to the or will have a web link for you to click. This is Phishing. They’re trying to get you to give them your account/identity.

Phishing No legitimate business does this. –Ebay doesn’t do this. –Paypal doesn’t do this. –Visa doesn’t do this. –Nobody does this. Even if you think it is real, don’t reply to the , don’t click on the link. It may say ‘paypal.com’, but probably goes to a bogus site. Contact the company by typing the correct URL into the address bar of your Browser.

What if your computer is still infected? What do you do if your Anti-Virus or Anti-Spyware finds something that it can’t clean, can’t quarantine and can’t delete? Or worse yet, if it finds them and says it has cleaned/quarantined/deleted them, but when you scan again, they’re still there?

What if your computer is still infected? Bring it to the folks at the ResNet office or the Computer Help Center. We can help. ResNet office is in the back of the Sandoz Computer Lab Computer Help Center is in the 501 Building

What We’ve Learned Don’t schedule anything after the class Smaller classes are better Put the details on the ResNet website for later reference The class is as dynamic as keeping a computer secure.