Securing Your Home Computer Presenter: Donnie Green Date: February 11, 2009 National Aeronautics and Space Administration www.nasa.gov.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Internet Safety Topic 2 Malware This presentation by Tim Fraser Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
How to avoid Viruses and Malware on your Computer Use a firewall Using a firewall is like locking the front door to your house—it helps keep intruders.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Free Software Alternatives: Avast! Anti-virus
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.
1 Computer Security: Protect your PC and Protect Yourself.
Internet safety By Lydia Snowden.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
IT Security for Users By Matthew Moody.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
1.1 System Performance Security Module 1 Version 5.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Types of Electronic Infection
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
By: Gloria Watkins.  Use antivirus software and keep it up-to-date. You should check for new definition updates daily. Most antivirus software can.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Internet Security and Your Computer Welcome to Boot Camp.
What is Spam? d min.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Home Computer Security Sponsored by NASA HQ ITCD Special Projects Training Presented by your Computer Training Center.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Internet Safety Topic 2 Malware Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other dangerous software exists, such.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
Cyber Security: Today’s Threats and Mitigations Jonathan Homer, Cyber Security Analyst Idaho National Laboratory.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
Computer Security Keeping you and your computer safe in the digital world.
For more information on Rouge, visit:
Windows Tutorial 5 Protecting Your Computer
Managing Windows Security
Three steps to prevent Malware infection
Unit 4 IT Security.
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Call AVG Antivirus Support | Fix Your PC
Risk of the Internet At Home
Presentation transcript:

Securing Your Home Computer Presenter: Donnie Green Date: February 11, 2009 National Aeronautics and Space Administration

2 Outline Background The Need For Protection Ten Things To Secure Your Computer Firewalls User Account Passwords Antivirus Software System Scans Software Updates Safe Browsing Freeware Security WiFi Security Links

3 Background Every system connected to the Internet is susceptible to a wide array of threats. These threats include: –Viruses/Worms/Trojans –Spyware/Malware –Denial of Service attacks –Unauthorized access –Phishing –SPAM Each year security professionals see an increase in the complexity of attacks and the cost (time and money) to recover from a successful compromise

4 The Need For Protection So how do you protect yourself from hackers and their attempts to compromise your system and steal your information? We have come up with 10 things you can do to protect yourself from most Internet threats. Deceptive Dialogs Fake Antivirus Ebay Phishing Scam Fake Windows security alert Valentine’s Day virus

5 Ten Things To Secure Your Computer Firewalls User Accounts Passwords Antivirus software System Scans Software Updates Safe Browsing Freeware Security WiFi Security

6 Firewalls Ensure your system is equipped with a personal firewall –Windows XP/VISTA operating system firewallXPVISTA –Third party personal firewalls (e.g., ZoneAlarm, Norton, BitDefender)ZoneAlarmNortonBitDefender Keep third party personal firewalls subscriptions current and configure them to receive updates automatically. Also, enable firewalls embedded in your network router and wireless router. –Enabling the router firewall adds another level of protection –Be mindful of how you configure it because it can add complexity

7 User Accounts Create a Limited (XP)/Standard (VISTA) user account with limited privilegesXPVISTA The Limited/Standard account –Limits installation of programs and modification of security settings; those that can be install are installed in the user context » Reduces the risk of a threat installing malicious programs on your system –Limits one user from doing anything that can affect other users of the computer The Administrator account is the first account configured when installing Windows XP/Vista –This account has privileges to install and modify anything on your system –Should only be used to install/remove programs, modify settings, and troubleshoot problems –A HIGH security risk if your computer is compromised when you are logged in with this account

8 Passwords Passwords are the keys to the city and should be strong A Strong Password containsStrong Password –12+ characters –At least one special character –At least one character from each of the other three character sets: uppercase, lowercase, numerals Passwords should be changed at least annually When creating a password:creating a password –Avoid using dictionary words –Never use a blank password Test the strength of your password here.here

9 Antivirus Software Antivirus software is a computer program that can detect, prevent, quarantine, and remove malicious programs from your computer Purchase and install antivirus software that detects the latest viruses and malware, allows automatic updates, permits customizable system scans –Most Internet security vendors offer Security Suites (RECOMMENDED) which include antivirus, anti-spyware, anti-spam, IM security, and firewall software – benefits: cost, single vendor, good tool integrationSecurity Suites –NASA HQ offers FREE antivirus software to NASA HQ employees. Call the IT Help Desk to request Home Use Software (PC or Mac) Configure antivirus software to: 1) auto-protect, 2) perform automatic updates, 3) scan all file types, 4) scan attachments, and 5) scan the system daily

10 System Scans System scans are a function of your antivirus software and should be run on a regular basis Configure your antivirus software to scan all files and folders at some regular interval (daily) –By default, some antivirus software is only configured to run on a subset files and folders –Configure these scans during times of least productivity

11 Software Updates Software bugs and vulnerabilities are continuously being discovered and could make your system susceptible to compromise. Keeping your system updated is a great way to ensure you are running the latest secure version of software. To avoid running vulnerable software: –Configure the Windows XP/VISTA operating system to automatically download and install software/security updatesautomatically download and install software/security updates –Configure all non-Windows software (e.g., personal firewall, antivirus, photo authoring tools, games) to check for new updates and install them when they become available

12 Safe Browsing There are many sites on the Internet attempt to steal your information by downloading malicious software in the background, fooling you into entering private information onto fake websites, and To protect yourself: –Install a Internet Security suite that scans attachments and your system (opt: rates sites) –Ensure “secure” sites use HTTPS and have the SSL icon at the bottom of the page –Do not open suspicious error dialogs from within in the browser or accept free deals –Disable use of remembering passwords for sites –Disable use of remembering what you entered in forms –Always clear your private data when you close your browser –Block pop-ups –Set Internet zone security level

13 Freeware Freeware is software offered free of charge that can be downloaded from the Internet. BEWARE of “free” software as many sites package freeware with viruses, trojans, keyloggers, adware, and other malicious programs\ Only download freeware programs from reputable websites; also perform Internet searches to see if other users have reported problems with the software Always use antivirus software to scan the software prior to execution or installation

14 Security is a popular way for hackers to deliver and spread viruses and malware to a computer To ensure you do not infect your computer or others: –Only open attachments that come from a trusted source and that are expected –Scan attachments prior to opening –Delete unwanted and suspicious messages such as spam –Never send confidential information through (e.g., SSN, credit card number and CVN) –Always type URLs into your browser instead of clicking on the link

15 WiFi Security Wireless networks are susceptible to the same vulnerabilities as the a wired network but in some ways more vulnerable to snooping. Wireless networks are, by default, unencrypted and can be used by anyone who can pick up the signal. To improve the security of your wireless network, use encryption (WEP, WPA-PSK, WPA2)improve the security of your wireless network –Any encryption is better than none, but WPA2 is the best –Configure the WPA2 passphrase using the principles from slide Strong Password

16 Links Windows Automatic Updates: Strong Passwords: Password Checker: Home Computer Security: Phishing: Windows Firewall: 2f68b9cfa1c01033.mspx#EGhttp://windowshelp.microsoft.com/Windows/en-US/Help/bfe523a9-7eec-4d3f-add1- 2f68b9cfa1c01033.mspx#EG Limited account: Standard account: 8a e mspxhttp://windowshelp.microsoft.com/Windows/en-US/Help/68a1c4fd-b3f6-4cb9-93a1- 8a e mspx Internet Security Suites:

17 Questions & Answers

18 SignOffPage