GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Thank you to IT Training at Indiana University Computer Malware.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
SPYWARE Presented by The State Security Office November 17, 2004.
SECURITY CHECK Protecting Your System and Yourself Source:
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Acceptable Use Policy –The Acceptable Use Policy defines the rules of the machine and internet connection you are on. –Specific policies differ by machine.
Computer Maintenance & Safety Spring Internet Safety Keeping your computer safe What is a computer virus? A computer program that can copy itself.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
Viruses, Worms, Spyware, and Other Perils of an On- Line World Computer Services Tech Talk September 23, 2003.
AgendaAgenda Examining Use Behaviors Phishing Quiz Threats to Information Security Practicing Avoidance Behavior Resources.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
1 Computer Security: Protect your PC and Protect Yourself.
Viruses & Destructive Programs
Chapter Nine Maintaining a Computer Part III: Malware.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Online Safety Workshop Stephanie Rojas, IMG Krystle Donnelly, IMG Cyndi Backstrom, UNLV OIT.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Protect Your Computer from Viruses and Other Threats! 1. Use antivirus software. 2. Run Windows updates. 3. Use a strong password. 4. Only install reputable.
Security for Seniors SeniorNet Help Desk
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Protecting Your Computer & Your Information
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Staying Safe Online Keep your Information Secure.
DBS Form 6 As Computer Applications Project Spy ware By L6D Wong Chiu Hung.
 We all know we need to stay safe while using the Internet, but we may not know just how to do that. In the past, Internet safety was mostly about.
Computer Security By: MacKenzie Olson. To be safer and more secure online, make these seven practices part of your online routine.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Computer Security By Joey Pawoll. Introduction to computer security Have you been wondering how to be safe online? Well look no further! This powerpoint.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Computer Skills and Applications Computer Security.
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Internet safety By Suman Nazir
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
W elcome to our Presentation. Presentation Topic Virus.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Cybersecurity Test Review Introduction to Digital Technology.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
Computer Security Keeping you and your computer safe in the digital world.
Managing Windows Security
Information Security Session October 24, 2005
Information Security Session October 23, 2006
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Presentation transcript:

GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk

Agenda Get Control Web site 5 steps to secure your computer: –Virus protection –Software updates –Password security –Spyware detection –Firewall protection Other Security concerns & resources

Get Control on the Web OR and click on Computer & Network Security

Viruses: Disguised programming code that causes unexpected or undesirable events. Often self-replicate, spread to other users Can be destructive, alter & destroy files Can execute immediately/on specific date Many exploit user’s address books Step 1: Virus protection

How do you get infected? File sharing software Weak password “Worm” via Unpatched OS File sent via or instant messenger

Step 1: Virus protection FREE Symantec AntiVirus software Mac & PC-compatible To download, visit:  Computer & Network Security  “Download Symantec/Norton AntiVirus software”

Step 1: Virus protection Keep virus definitions updated Run a scan once a week Don't open unexpected attachments Always scan files you receive from others Turn your Macro security to High in MS Office applications

Step 1: Virus protection A word on junk & viruses Subject lines & social engineering viruses more common now Both may appear to come from known and trusted addresses Poor grammar, strange attachments

Viruses: Think you have one? Check the Get Control Web site Consult your UNITS rep/local tech Check virus hoax Web sites Call HELP (4357)

Windows windowsupdate.microsoft.comWindows Update windowsupdate.microsoft.com office.microsoft.com/productupdates/Keep Microsoft Office updated office.microsoft.com/productupdates/ Baseline Security Analyzer (ask your local tech support) tools/mbsahome.mspx Step 2: Software updates

Mac OS X: Updates are available Software updates: System Preferences  Software Update (set to run automatically) Office security updates:

Step 2: Software updates Don’t forget to update other apps, especially those that connect to the Internet: Eudora & other software Firefox & other Web browsers Spybot – Search & Destroy & other anti-spyware software Security alerts and patches and version updates can be found on the software company’s Web site

Step 3: Password security Strong system password/phrase –As long as possible (8+ characters) –Use symbols: %^*.,! –E.g., “w.ld!*c,at5” (NOT “wildcat”) It only takes a few seconds to crack a short, alphanumeric password Don’t leave Administrator account passwords blank Change passwords routinely

Step 4: Spyware detection What is spyware? –Any type of technology that collects and transmits information about a person or their browsing, often for advertising purposes

Malware maliciously attacks your computer or is used for illegal purposes. Includes so-called key loggers that record everything from passwords to credit card numbers. Adware collects information about your browsing habits, geographic location, and possibly the contents of your computer. Adware is usually legal. The two major “flavors” of spyware Step 4: Spyware detection

Installed without your knowledge Bundled with software you install Shareware/freeware programs File sharing programs May not work if spyware removed Spyware-esque tracking cookies are picked up from Web sites; often unsavory ones! Spyware can be very difficult to remove

Step 4: Spyware detection Suspicious behavior: Machine running very slowly Lots of unfamiliar programs in Windows Task Manager (Ctrl + Alt + Del) Unusual Web browser activity Contact local tech support if you see anything strange Don’t try to manually remove any components yourself

Step 4: Spyware detection Spyware removal Spybot - Search & Destroy:spybot.safer-networking.de Free for University & home use Has updates just like antivirus program Scans computer for known spyware Backs up files it removes

Spybot – Search & Destroy

Step 5: Firewall protection Protects your PC from unauthorized access by an individual (hacker) or a program Enables you to specify which network ports (“doors”) are open Mac OS X & Windows XP* have built-in (native) firewalls –* Built-in to Windows XP Professional and XP Home SP2

Step 5: Firewall protection Once it’s up, keep it up! XP firewall prompts you if a new program wants access You can also configure manually:

Step 5: Firewall protection Manual configuration of Mac OS X firewall

Other Security Concerns “Phishing” scams Identity theft Junk Illegal file sharing and copyright violation Online harassment See the Get Control Web sitewww.it.northwestern.edu/getcontrol/

Virus resources (Symantec Security Response) (Computer Virus Protection at Northwestern) (F-Secure Corporation) (Virus Bulletin) (Computer Emergency Response Team at Carnegie Mellon University)

Privacy & Security  NUIT Computer Usage Policies & Guidelines   Edit Your Directory Information   Security and Privacy for Home users 

Questions? Don’t forget to visit the Get Control Web Site!

Next Tech Talk Safe Keeping An introduction to backing up your information Backup, archiving, and more! Date: TBA (see our Web site for details) Same locations, Noon – 1 p.m. Please register online: