Working From Your Home Computer Safely: The Ten Commandments Stephen Jones, GSEC, A+ With special thanks to Balakrishnan Ramachandran.

Slides:



Advertisements
Similar presentations
Windows XP Tutorial Securing Windows. Introduction This presentation will guide you through basic security principles for Windows XP.
Advertisements

Grass Valley Learning Center Surf the Net Safely Roger Thornburn.
10 Things You Can do to Secure Your PC Presented by Peter Nowak OIS Client Services Manager.
How to Keep Your PC Running Like New Bryan Nowak.
SECURE YOUR COMPUTER or Lose It 1. Activate Anti-virus Software. 2. Firewall it. 3. Windows Service Pack 2 4. Fight Spyware 5. Update it, automate updates.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Configuring your Home Network Configuring your Home Network Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
Data Security Issues in IR Eileen Driscoll Institutional Planning and Research Cornell University
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
Patricia O’Brien30 June 2015 Housekeeping your PC Training Session for XP and VISTA.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
Bullet-Proofing Your Wireless Router By Steve Janss.
KEEP YOUR COMPUTE SAFE AND HOW TO FIX IT 1. OBJECTIVE Keep your computer safe. -Not about spam, phishing or browser hijacks Designed for the non-geek.
MS System Setup Securing A System. Use Automatic Updates For a workstation or server, schedule the updates to occur regularly. –Control panel click on.
Step 1 - Start your PC and place your Windows XP CD in your CD/DVD- ROM drive. Your PC should automatically detect the CD and you will get a message saying.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
1 Computer Security: Protect your PC and Protect Yourself.
Lesson 10 Operating System Customization
Securing Your Home Computer Presenter: Donnie Green Date: February 11, 2009 National Aeronautics and Space Administration
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
Threats to I.T Internet security By Cameron Mundy.
Working with Drivers and Printers Lesson 6. Skills Matrix Technology SkillObjective DomainObjective # Understanding Drivers and Devices Install and configure.
Chapter 7 Installing and Using Windows XP Professional.
Ten Things You Should Do to Your Computer Today Don Yarman & Jim Mann OLC IT Division Small Libraries Conference May 2006.
Use my floppy disk. 1. copy short cut to desktop. 2.run NoAdHOSTS.exe 3. Surf without ad’s. 4.to reverse everything -edit out all url s you want to return.
How to maintain your computer
Security for Seniors SeniorNet Help Desk
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Cyber Patriot Training
© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Learning In A Techno World How Safe is Your Cyberspace?
Warrington U3A Advanced Computer Class PC Maintenance and Security.
IT security By Tilly Gerlack.
Securing Your Home Computer Securing Your Home Computer Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
PC Maintenance How to keep your computer healthy.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
Connecting Computers and Keeping them safe from Hackers and Viruses Bradie Britzmann and Courtney Hughes Britzmann & Hughes.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
Gorman, Stubbs, & CEP Inc. 1 Introduction to Operating Systems Lesson 4 Microsoft Windows XP.
 You always need to have the latest anti- virus software so that you can prevent picking up unwanted virus’.  To prevent receiving junk mail, being.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
Jeny Carrasco and Jai Nayar English 393 Process Manual Assignment 12/08/04 McAfee 7.1 Process Manual.
Small Business Security Keith Slagle April 24, 2007.
Internet Security and Your Computer Welcome to Boot Camp.
SMS Software Distribution. Overview  Explaining How SMS Distributes Software  Managing Distribution Points  Configuring Software Distribution and the.
Keeping Your Computer Safe and Running Efficiently.
Managing Applications, Services, Folders, and Libraries Lesson 4.
NetTech Solutions Protecting the Computer Lesson 10.
IS493 INFORMATION SECURITY TUTORIAL # 1 (S ) ASHRAF YOUSSEF.
Matthew Glenn AP2 Techno for Tanzania This presentation will cover the different utilities on a computer.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Windows Administration How to protect your computer.
Recommended Computing Practices Dean Steichen SIR Branch 8 February 16, 2006.
John Samuels October, Why Now?  Vista Problems  New Features  >4GB Memory Support  Experience.
By Kyle Bickel.  Securing a host computer is making sure that your computer is secure when it’s connected to the internet  This be done by several protective.
Cyber Security: Today’s Threats and Mitigations Jonathan Homer, Cyber Security Analyst Idaho National Laboratory.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
/Reimage-Repair-Tool/ /u/6/b/ /channel/UCo47kkB-idAA-IMJSp0p7tQ /alexwaston14/reimage-system-repair/
For more information on Rouge, visit:
Chapter 6 Application Hardening
Information Security Session November 11, 2004
Information Security Session October 24, 2005
Administering Your Network
Presentation transcript:

Working From Your Home Computer Safely: The Ten Commandments Stephen Jones, GSEC, A+ With special thanks to Balakrishnan Ramachandran

1. Thou Shall Update the Anti- Virus Software On Your Computer Secures you from viruses, spam attachments Secures you from viruses, spam attachments Use McAfee – it’s free Use McAfee – it’s free Always update your virus definitions Always update your virus definitions Schedule a daily scan of your hard drive for viruses Schedule a daily scan of your hard drive for viruses

Exegesis – 1 st Commandment To install McAfee, go to then scroll down to Antivirus. Pick the correct version for your operating system. You’ll need to log in to myUMBC, but then you can install the software. To install McAfee, go to then scroll down to Antivirus. Pick the correct version for your operating system. You’ll need to log in to myUMBC, but then you can install the software. To update McAfee, go to Start, Programs, Network Associates, Viruscan Console, double-click Autoupdate, and then click the update button. It automatically updates if you’re on the Internet at the time indicated; the time for the automatic update can be changed. To update McAfee, go to Start, Programs, Network Associates, Viruscan Console, double-click Autoupdate, and then click the update button. It automatically updates if you’re on the Internet at the time indicated; the time for the automatic update can be changed. To run a scan, follow above steps to get to Viruscan Console, double-click Scan All Fixed Disks. To run a scan, follow above steps to get to Viruscan Console, double-click Scan All Fixed Disks.

2. Thou shall patch your Windows operating system Set your Windows XP/2000 for automatic updates (from Control Panel) Set your Windows XP/2000 for automatic updates (from Control Panel) Updates run in the background without affecting your work Updates run in the background without affecting your work Periodically also check for updates for your Microsoft Office products Periodically also check for updates for your Microsoft Office products

Exegesis – 2 nd Commandment To configure automatic updates in XP, go to Start, Settings, Control Panel, Automatic Updates. Choose to automatically download and install updates and pick a time when you know the computer will be on the Internet. To configure automatic updates in XP, go to Start, Settings, Control Panel, Automatic Updates. Choose to automatically download and install updates and pick a time when you know the computer will be on the Internet. In Windows 2000, follow the steps above to Automatic Updates. Then I recommend choosing to automatically download the updates and automatically install them at a time you know the computer will be on. In Windows 2000, follow the steps above to Automatic Updates. Then I recommend choosing to automatically download the updates and automatically install them at a time you know the computer will be on. For Office updates, open an Office application, go to Help, Check for Updates. The updates occasionally require that you have the installation cds. For Office updates, open an Office application, go to Help, Check for Updates. The updates occasionally require that you have the installation cds.

3. Thou shall use Administrator privileges rarely, but strong passwords always Create separate accounts for the people using the computer and give them User level privileges only. That includes you. Rename the administrator account; don’t let anyone other than you use it, and even then only when software needs to be installed. Disable all system supplied accounts (e.g., Guest). Create separate accounts for the people using the computer and give them User level privileges only. That includes you. Rename the administrator account; don’t let anyone other than you use it, and even then only when software needs to be installed. Disable all system supplied accounts (e.g., Guest). Strong passwords – minimum 9 characters, with alphas (upper and lower case), numerics _and_ special characters (e.g., asterisk). Strong passwords – minimum 9 characters, with alphas (upper and lower case), numerics _and_ special characters (e.g., asterisk).

Exegesis – 3 rd Commandment 1 st Rubric Creating accounts: Log on as administrator. Then Start, settings, control panel, administrative tools, computer management, local users and groups, users. Then click on Action, New User, name the account. Click create and then close. The default privilege level is Users. Then right click on the account and assign a password. Creating accounts: Log on as administrator. Then Start, settings, control panel, administrative tools, computer management, local users and groups, users. Then click on Action, New User, name the account. Click create and then close. The default privilege level is Users. Then right click on the account and assign a password.

Exegesis – 3 rd Commandment Rubric 2 Do you have other people using the computer who will balk at only having limited privileges? Do you have other people using the computer who will balk at only having limited privileges? If so, buy a computer for them and you use the safe one. If so, buy a computer for them and you use the safe one. Can’t afford to buy another computer? Get your department to buy you one. (OIT is now discussing how to require departments to provide an OIT secured computer to persons working from home.) Can’t afford to buy another computer? Get your department to buy you one. (OIT is now discussing how to require departments to provide an OIT secured computer to persons working from home.) Department won’t buy you a computer but other people at home will balk…. Then it’s safe to assume that your home computer will be hacked and you’ll lose everything on it. Ouch! Department won’t buy you a computer but other people at home will balk…. Then it’s safe to assume that your home computer will be hacked and you’ll lose everything on it. Ouch!

Exegesis – 3 rd Commandment Rubric 3 (optional, follow cautiously) Rename the administrator account/disable all system supplied accounts/create a dummy administrator account Rename the administrator account/disable all system supplied accounts/create a dummy administrator account a. Follow the directions to get to Users in the 1 st Rubric. Right click on the administrator account and select rename. Give it an ordinary sounding name. This will slow down hackers. b. Disable all other system supplied accounts (right click, properties, disable this account). c. After renaming the Administrator account, create an account named Administrator. Right click, go to Properties, Member of, Add, Advanced, Find Now, click on Guests, then click ok twice, then highlight Users, then click Remove. Then give it a strong password. This will also slow down hackers.

4. Thou shall use a Firewall Firewalls protect your PC from intrusions and hack attacks Firewalls protect your PC from intrusions and hack attacks Install Service Pack 2 for Windows XP which has a built-in firewall Install Service Pack 2 for Windows XP which has a built-in firewall You can also try Zone Alarm or McAfee Firewall to protect your computer, but this is recommended only if you have time to get them working You can also try Zone Alarm or McAfee Firewall to protect your computer, but this is recommended only if you have time to get them working Check for constant updates Check for constant updates

5. Thou shall install anti-spyware software Spyware is software that sends personal data to the internet without your knowing it Spyware is software that sends personal data to the internet without your knowing it You are normally unaware that it has been installed and that it is running You are normally unaware that it has been installed and that it is running Update anti-spyware software and scan your computer daily Update anti-spyware software and scan your computer daily

Exegesis – 5 th Commandment Currently the best free anti-spyware package, and one of the best free or otherwise, is Ad-Aware. Currently the best free anti-spyware package, and one of the best free or otherwise, is Ad-Aware

6. Thou shall use a router if you using a high-speed (cable, DSL) Internet connection Router is a device that allows you to connect more than 1 computer to your high speed Internet connection Router is a device that allows you to connect more than 1 computer to your high speed Internet connection Most router models act as a Firewall to your entire home network Most router models act as a Firewall to your entire home network It adds an extra layer of security to your software based firewall It adds an extra layer of security to your software based firewall

Exegesis – 6 th Commandment Routers are relatively inexpensive - <$100, frequently ~$50 with rebates Routers are relatively inexpensive - <$100, frequently ~$50 with rebates Linksys routers are fairly easy to set up Linksys routers are fairly easy to set up Best to connect to them with Ethernet cables and not use wireless Best to connect to them with Ethernet cables and not use wireless Want to use wireless? See 7 th Commandment Want to use wireless? See 7 th Commandment

7. Thou shall not provide free wireless internet to thy neighbor If you use the wireless function on a router, the signal can cover a large area, potentially extending 150 feet in all directions (whether or not there are walls). If you use the wireless function on a router, the signal can cover a large area, potentially extending 150 feet in all directions (whether or not there are walls). Read the wireless router manual while setting it up and enforce some measure of security to access your Internet connection. Your neighbors/people driving by on the street can still see the network, but if you use the security provided, it will be very difficult for them to use your internet connection, or, even worse, eaves drop on your network traffic. Again, OUCH! Read the wireless router manual while setting it up and enforce some measure of security to access your Internet connection. Your neighbors/people driving by on the street can still see the network, but if you use the security provided, it will be very difficult for them to use your internet connection, or, even worse, eaves drop on your network traffic. Again, OUCH! If the router offers it, the best method is to use a hardware based access control list. If the router offers it, the best method is to use a hardware based access control list.

8. Thou shall use a VPN whenever applicable VPN is a virtual (i.e., software rather than hardware base), secure connection between your home computer and a server through the internet VPN is a virtual (i.e., software rather than hardware base), secure connection between your home computer and a server through the internet VPN software needs to be installed and enabled at both ends VPN software needs to be installed and enabled at both ends At UMBC, the main function using VPN connectivity are financially related, e.g., PeopleSoft. At UMBC, the main function using VPN connectivity are financially related, e.g., PeopleSoft.

9. Thou shall back up thy files and use good surge protectors/ uninterruptible power supply CD/DVD recorders are now about $75. If you don’t have one, buy one and use it to back up files from your hard drive. CD/DVD recorders are now about $75. If you don’t have one, buy one and use it to back up files from your hard drive. An old adage – when do floppy disks fail? When you need them. An old adage – when do floppy disks fail? When you need them. At a minimum, get a surge protector that really works and isn’t just an extension cord (~$35). Better yet get a UPS (uninterruptible power supply), which is both a surge protector and a line conditioner (power sag/brown out protection). A typical home computer needs one that supplies VA (~$ ). At a minimum, get a surge protector that really works and isn’t just an extension cord (~$35). Better yet get a UPS (uninterruptible power supply), which is both a surge protector and a line conditioner (power sag/brown out protection). A typical home computer needs one that supplies VA (~$ ). is a good site. is a good site.

10. Thou shall always use your computer intelligently Don’t install software from unknown publishers or websites Don’t install software from unknown publishers or websites Don’t give install rights to users who are not very savvy Don’t give install rights to users who are not very savvy Periodically change your passwords Periodically change your passwords Follow Commandments 1-9. Follow Commandments 1-9.

Thank you for your Time. Stephen M Jones Stephen M Jones Manager, Library Computing Services