Protect Your Computer Protect Your Work Computing & Communications.

Slides:



Advertisements
Similar presentations
Keep Your PC Safe (Windows 7, Vista or XP) Nora Lucke 02/05/2012 Documents - security.
Advertisements

Windows XP Tutorial Securing Windows. Introduction This presentation will guide you through basic security principles for Windows XP.
Thank you to IT Training at Indiana University Computer Malware.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
SECURITY CHECK Protecting Your System and Yourself Source:
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
Viruses, Worms, Spyware, and Other Perils of an On- Line World Computer Services Tech Talk September 23, 2003.
SIRT Contact Orientation Security Incident Response Team Departmental Security Contacts April 16, 2004.
Protecting Yourself Online. VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One in every 200 containing.
Security Awareness: Applying Practical Security in Your World Chapter 6: Total Security.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Security. Physical security Protection from fire/water Protection from dust and extremes of temperature.
GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.
1 Computer Security: Protect your PC and Protect Yourself.
Desktop Security: Worms and Viruses Brian Arkills, C&C NDC-Sysmgt.
Securing Your Home Computer Presenter: Donnie Green Date: February 11, 2009 National Aeronautics and Space Administration
Threats to I.T Internet security By Cameron Mundy.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Ten Things You Should Do to Your Computer Today Don Yarman & Jim Mann OLC IT Division Small Libraries Conference May 2006.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Security for Seniors SeniorNet Help Desk
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Viruses.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Learning In A Techno World How Safe is Your Cyberspace?
Networking Security Chapter 8 powered by dj. Chapter Objectives  Explain various security threats  Monitor security in Windows Vista  Explain basic.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Staying Safe Online Keep your Information Secure.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
1. Self Awareness You should only access your accounts and private informations from a safe location (only at home as necessary if at all possible) where.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
C OMPUTER V IRUSES Julia White. W HAT ARE COMPUTER VIRUSES ? Computer viruses are small software programs that are designed to spread from one computer.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
By: Gloria Watkins.  Use antivirus software and keep it up-to-date. You should check for new definition updates daily. Most antivirus software can.
Malware & Phishing By: mackenzie olson. Internet fraudsters send out spam, pop-ups, appealing websites, and desirable downloads.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Small Business Security Keith Slagle April 24, 2007.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
What is Spam? d min.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
NetTech Solutions Protecting the Computer Lesson 10.
A Computer Virus is a software program that is designed to copy itself over and over again and to attach itself to other programs. They don’t affect hardware,
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
By Kyle Bickel.  Securing a host computer is making sure that your computer is secure when it’s connected to the internet  This be done by several protective.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Security Awareness Our security depends on you. What IT Security Protects ECU Campus network and everything attached to it Information –personal data.
Home Computer Security
Protect Your Computer Against Harmful Attacks!
Information Security Session November 11, 2004
Information Security Session October 24, 2005
9 ways to avoid viruses and spyware
Presentation transcript:

Protect Your Computer Protect Your Work Computing & Communications

We Are All Networked Now!  We connect to networks to do our work.  Read  Use administrative applications  Browse Web sites  Standalone (not networked) computers are rare.

Networked Computers are Vulnerable  Physical locks and a password-protected screensaver are not enough.  Attacks happen through the network:  Through operating system weaknesses  In attachments  Through shares and peer-to-peer programs

Attacked If You Do…  Open an unknown attachment  Believe everything your read, such as messages that promise wealth if you open an attachment  Believe that your bank account was compromised because an “from your bank” said so  Download an unknown program from the Web (such as a free screensaver)  Trade lots of unknown files, such as with peer-to-peer programs like Kazaa  Share your password with others

Attacked If You Don’t…  Run an anti-virus program  Keep up with anti-virus data updates  Keep up with operating system updates (patches)  Change default passwords (such as password for the administrator account)  Run a firewall either on your computer or on your network

Once Infected, Your Computer is Dangerous Your computer...  Could be used to attack and infect other computers  Could be used to send out thousands of spam messages in your name  Could burden or disrupt campus networks with high volumes of messages  Could cause all of the University’s to be blocked by major service providers (AOL, Yahoo, Hotmail etc.)

Infected Computers May Be Blocked  C&C watches UW networks for infected computers  If infected computers are not cleaned up promptly, their network access may be blocked to protect other UW computers  When the computer is cleaned up, you can request that your network access be unblocked

What C&C Is Doing  Scanning UW for viruses  Removes around 1.6 million viruses a month from UW  But not all goes through C&C central systems  Limiting network access or disabling the network wall ports of infected computers  Working with support staff to respond to attacks

A Well Managed Computer Is A Secure Computer

Who Manages Your Computer?  Generally, people are in one of three situations:  Network-managed workstations  Supported workstations  Do-it-yourself  What you do depends on which situation you are in.

Network-Managed Workstations  Software is installed and operating system updates are done through the network.  Example: Nebula (  Your role  Do not install or change anything without explicit permission.  Do not change computer settings, such as turning the firewall on or off.  Do not shut down the computer. Log out instead so that updates can be done while you are gone.

Supported Workstations  A specific person comes and does software installs and OS updates  Your role  Discuss with your support person what you should do and what you should not do.  Should you run a firewall?  When are operating system and anti-virus data updated and how are the updates initiated (automatic, manual, etc.)?

Do-It-Yourself  You have no assigned support person. You and your friends must do it on your own.  In case of Windows XP, Service Pack 2 (SP2) is your friend. Use the new “Security Center”  Security management is your responsibility  Operating system updates  Software updates  Anti-virus program (get it from the UWICK)  Firewall  Anti-spyware program

Which Situation Are You In? Your situationYour Role Network-Managed Workstations Do not change anything without explicit permission Supported WorkstationsTalk to your support person about what your role is Do-it-YourselfGet patches from OS Vendor

Managing a Computer  Every computer needs management!  BEFORE YOU CONNECT – Things to do before you connect a new or rebuilt computer to UW Networks  HAVE PROTECTION – Establish a security routine  BE PREPARED – Be prepared for possible trouble  BE SKEPTICAL – Don’t be fooled into helping attackers

BEFORE YOU CONNECT BEFORE connecting to any network, take the following steps:  Apply operating system updates  Install anti-virus program  Reset default passwords  Turn off file sharing  Turn on a firewall The UWICK the anti-virus program.

HAVE PROTECTION  Establish a security routine.  Automate your operating system updates  Automate your anti-virus updates  Use the XP SP2 Security Center to manage your security settings  Regularly do software updates  Regularly run an anti-spyware program  Run a firewall  Do not use accounts with administrator rights to do your daily work

BE PREPARED  Be ready for failures and infections.  Backup your files regularly  Be prepared to rebuild  Have installation CDs and software  Have a plan for getting OS updates  In case of infection  Obtain the most recent anti-virus updates  Run scan/reboot/scan/reboot… until fixed  You may have to rebuild your system  Plan for upgrading  Support is fading for Win98 and MacOS8, Win2K or XP without any service packs

BE SKEPTICAL  Do not open unexpected attachments  Do not download unknown programs from the Web (such as free screensavers)  Do not trade lots of unknown files, such as with peer- to-peer programs like Kazaa  Do not share your password with anyone  Do not “shoot the cockroach to get a free iPod” – do not click on pop-up “free offers”  Do not believe in amazing offers and unlikely stories

Which Situation Are You In? Your situationYour Role Network-Managed Workstations Do not change anything without explicit permission Supported WorkstationsTalk to your support person about what your role is Do-it-YourselfGet patches from OS Vendor Again...

Our Greatest Vulnerabilities  Unmanaged computers  Spyware, “Spam-Bots” and Viruses  Social Engineering  Visitors Computers  Donated, unsupported software

Unmanaged Computers  Computers that are not receiving regular, systematic care  Personal computers  Home computers  Older computers kept around “for whoever needs them”  The UWICK has anti-virus software

Spyware, “Spam-Bots” and Viruses  Spyware can disclose personal information such as passwords, credit card numbers, SSN, or PHI to third parties  “Spam-Bots” infect computers and relay thousands of spam s through them, causing all of UW to become “blacklisted” by other providers  Viruses can destroy data, open computers to outside control and cause network outages

Social Engineering  Attackers try to tempt or fool users into running malicious programs on their computer  Opening an infected attachment will run the file it contains  Do not download and install unknown software  Cute screensavers can bring along nasty viruses and spyware  Looking authentic is not the same as being authentic  Microsoft never sends out fixes by  Banks never send out asking you to verify your account data online  Be suspicious of anyone who asks for your credit card number, Social Security number, or PIN number  C&C consultants never ask for your password

Visitors’ Computers  Visitors’ infected computers will try to attack other computers once they connect to our networks  Salesmen  Visiting professors or speakers  Visitors often not aware of security issues  You are responsible if you help them connect  Is their operating system up-to-date?  Are they running anti-virus software?  Is their computer behaving oddly

Donated and Unsupported Software  Distributing software without good information on how to properly manage it is dangerous  If you provide software for students or staff, you are responsible for security issues  May require updates after installation to be secure  Example: SQL Server 2000 is susceptible to the Slammer worm unless it is updated (patched)  Do not recommend software you have not carefully evaluated  Much shareware comes with hidden spyware or viruses

Summary  Every computer connecting to UW networks should be managed  Be cautious  Be suspicious  Work together A Well Managed Computer Is a Secure Computer

C&C Security Team