Home PC Security & Internet Browser Tips Todd W. Jorns Senior Director for Educational Technology Illinois Community College Board.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Windows XP Tutorial Securing Windows. Introduction This presentation will guide you through basic security principles for Windows XP.
Thank you to IT Training at Indiana University Computer Malware.
Ways to keep your PC running smoothly  Reboot at least once a week  Make sure fan is free of dust and debris  Defragment your PC once a month  Run.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Internet Safety Topic 2 Malware This presentation by Tim Fraser Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other.
SECURITY CHECK Protecting Your System and Yourself Source:
PC Security 101 Keeping your data and your computer safe.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
How to avoid Viruses and Malware on your Computer Use a firewall Using a firewall is like locking the front door to your house—it helps keep intruders.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
Don’t Lose Your Identity – Protect Yourself from Spyware Dan Frommer Sherry Minton.
What is spyware? Supervisor dr. lo’ay tawalbeh Search By Mahmoud al-ashram Soufyan al-qblawe.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.
 Lesson 05: Computer Maintenance. Keep Software Up-To-Date Patches Security Holes Improves Software Stability Improves Software Performance Adds.
Working From Your Home Computer Safely: The Ten Commandments Stephen Jones, GSEC, A+ With special thanks to Balakrishnan Ramachandran.
How It Applies In A Virtual World
Securing Your Home Computer Presenter: Donnie Green Date: February 11, 2009 National Aeronautics and Space Administration
Threats to I.T Internet security By Cameron Mundy.
Internet safety By Lydia Snowden.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Security for Seniors SeniorNet Help Desk
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Learning In A Techno World How Safe is Your Cyberspace?
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Staying Safe Online Keep your Information Secure.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Securing Your Home Computer Securing Your Home Computer Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
How to remove spyware from your PC using Spybot S&D? A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
PC Maintenance How to keep your computer healthy.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
INTERNET SAFETY FOR KIDS
Internet Security and Your Computer Welcome to Boot Camp.
Keeping Your Computer Safe and Running Efficiently.
Computer Skills and Applications Computer Security.
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
W elcome to our Presentation. Presentation Topic Virus.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Internet Safety Topic 2 Malware Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other dangerous software exists, such.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
Computer Security Keeping you and your computer safe in the digital world.
Unit 4 IT Security.
Protect Your Computer Against Harmful Attacks!
Information Security Session November 11, 2004
Information Security Session October 24, 2005
HOW DO I KEEP MY COMPUTER SAFE?
Presentation transcript:

Home PC Security & Internet Browser Tips Todd W. Jorns Senior Director for Educational Technology Illinois Community College Board

Topics User Accounts Passwords Windows Updates Anti-Virus Software Anti-Spyware Software Browsers

Logging On to Windows Do not run Windows as an Administrator Increases vulnerabilities Trojan Horse: a program that does something else than it appears to do May reformat your hard drive, delete files, create another user with administrative control Instead: Create a User Account

Creating a User

Passwords Pick a good password for all accounts— it’s your first and sometimes only defense Password dangers: Cracking Social Engineering

Passwords: Good Characteristics Length Number of characters Longer is better and harder to guess Width Types of characters Should include at least three of Uppercase letters Lowercase letters Numbers Special characters (e.g. ? #) Depth Challenging meaning Phonetic: Imukat2 for I’m a cat, too Mnemonic: FM2tM for Fly Me to the Moon

Update Windows: Early & Often Updates close known vulnerabilities that are targeted by hackers Options for updates: Automatically download and install Manually download and install To configure: Control Panel | System | Automatic Updates

Check Office Updates MS makes updates available on its web page Users should check here at least once per month:

Anti-Virus Software A virus is: Program or programming code that replicates; Transmitted as attachments to an note or in a downloaded file, or may be present on a diskette, CD, or thumb drive. A virus might: Immediately affect you or lie dormant; Be benign and playful or devastatingly harmful.

Anti-Virus Software: Key issues Most AV software can be configured to automatically update itself Daily is best if possible After expiration, no updates will occur Why? New viruses every day! Scan your computer automatically Configure the software to run at a time when no one will be on the computer At least once a week If you use IM, try to find software that scans for IM viruses

Anti-Virus: Free software Online: Housecall - Panda ActiveScan Downloadable: AVG Free - avast! Home Edition -

Spyware: What is it? Strictly defined, spyware consists of computer software that gathers and reports information about a computer user without the user's knowledge or consent. From Wikipedia, the free encyclopedia

Spyware: Problems Installs without user’s informed consent Invades privacy and steals bandwidth Often causes system instability Crashes Hanging Slowing May modify shared files Causing other applications to fail Making spyware difficult to remove Interrupting Internet connectivity

Spyware: Remedies Numerous Anti-spyware programs and removal tools Spybot Search and Destroy: Adaware: MS Anti-Spyware: Various Anti-Virus programs

Spyware: Prevention Spyblaster: Disabling Active-X Using only reputable sources for software Updating Software to fix known vulnerabilities Windows operating systems Browser software

Most frequently used tool One of the most vulnerable tools “out of the box” Issues HTML Attachments

Attachments Never open any unsolicited attachments Do not trust attachments from known parties Scan all attachments Executable code Macros Never open attachments that are programs (.bat,.chm,.cmd,.com,.exe,.hta,.ocx,.pif,.scr,.shs,.vbe,.vbs, or.wsf).

How to see file extensions In ME, 2000, and XP: Open My Computer Choose Tools | Folder Options Choose the View Tab Uncheck: Hide file extensions for known file types Click OK

Spam Never respond to spam Signals a “live” address May be added to list and sold Consequence: MORE spam!

Phishing The act of sending an to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identify theft Microsoft, your bank, AOL, PayPal will never send you announcements about updates---and neither will most businesses. If unsure, use the telephone!

Web: The World Wide Web World Wide Web brought color, pictures, and motion to the Internet Browser: Software application used to access the World Wide Web Internet Explorer Firefox Opera Popularity of WWW means that it’s a favorite for malicious activities

Web: Making it safer Consider disabling AutoComplete anyone at your computer will be able to easily see where you've been on the Web worse yet, anyone at your computer will be able to easily impersonate you at Web sites that require you to input information In IE Select Tools and choose "Internet Options..." Click the "Advanced" tab. Scroll down and uncheck the box next to "Use inline AutoComplete for Web addresses".

Web: Signals of secure site Look for a site that uses a secure channel for transmission of credit card information Key clues: https Locked padlock

Test Browser Security Jason’s Toolbox: Online test of browser security Leads you through each step toolbox.com/BrowserSecurity/ toolbox.com/BrowserSecurity/

The Internet: A huge network When you connect to the Internet, your computer is connected to all the other computers---and the good and bad users behind them Understanding a little about that communication will help you to understand the need for something called a Firewall

IP Addresses IP or Internet addresses are like addresses for buildings If you know the address of a building, you can locate it and send it information If you know the address for a computer, you can send it information Fortunately, we don’t have to remember the numbers because of an Internet service called Domain Name System which translates for us!

Firewalls: Filters for packets A firewall is a piece of software or hardware, which stands between two networks or computers and controls access between them Controls the traffic flow in and out of networks or computers based on IP Addresses and Port numbers

Router (Hardware ) Hides your computer from the Internet Internet address is given to your router Computer receives a private Internet address The harder you are to find, the harder it will be for someone—or something—to hurt you! A must for broadband (cable/dsl) Internet connections Key: Change the default password!

Personal Firewalls (software) Watches information going in and out of the computer – but you decide Will allow you to monitor programs Allow only programs of which you are sure Watch for outgoing programs (e.g.,spyware) Know how to shutdown Internet connectivity

Personal Firewalls - Software Zone Alarm oducts/znalm/freeDownload.jsp oducts/znalm/freeDownload.jsp Sygate Personal Firewall

Test Your System HackerWacker: ShieldsUp:

Online Resource

Questions Todd W. Jorns (217)