Computer Security: How to Protect Your Computer By Roopa Mathur Computer Information Management Irvine Valley College
2 of 62 $ Identity Theft Phishing/ Pharming Spam Keystroke Loggers Spoofing Attacks Fraud Attacks
of 62 Attacks Hijack Attacks
of 62 How To Keep Windows PC free of malware and intruders Use and Web browsers safely Protect a wireless connection Shelter kids Help protect your identity and privacy
of 62 Pop Quiz htmlhttp://onguardonline.gov/quiz/idtheft_quiz. html survey/quiztest.cgihttp://survey.mailfrontier.com/ survey/quiztest.cgi phishing_archive.htmlhttp:// phishing_archive.html
of 62 Reasons of Malware
of 62 Identity Theft RootkitsSpywarePhishing Backdoors Denial of Service WormsViruses Attacks
of 62 Virus TypeExample File infectorCascade MacroMelissa Boot sectorMichelangelo Memory-residentJerusalem PolymorphicMarburg RetroGobi Viruses
of 62 Not attached but spreads by itself Exploit system vulnerability like buffer overflow or flawed protocol Consume system resources Modify system configurations Install backdoor program Create zombie to launch DoS Examples: MyDoom, LoveLetter, Blaster Worms
of 62 Overwhelms system resources Prevents legitimate users from accessing system Distributed DoS attacks Denial of Service
of 62 Denial of Service
of 62 Virus and DoS disrupts but backdoor provides avenue to steal Allows attacker to secretly access system Listen for commands on open ports Backdoors
of 62 Phishing Online scam Tricks user into disclosing personal info like credit cards Uses spoofed s or popups to direct users to fraudulent Web sites
of in sender’s address Cc’d to others – why? Asks user to reply to Web link in message. Asks for personal info. - password. When mouse is over the link, notice that it will redirect the user to a different web page if clicked. Phishing
of 62 Collects personal information Monitors activity without knowledge Keystroke loggerKeystroke logger Spyware
of 62 SpywareAdware Installs a service or program Spawns popups or launches Web browser to specific site Can track surfing habits
of 62 Software to obtain special operating system privileges to perform unauthorized functions and hide all traces of existence Causes no direct damage to the computer but hides presence of other types of malicious software Remove traces of log-in records, log entries, and related processes User can no longer trust operating system Rootkits
of 62 Identity Theft Databases You Social Engineering Phishing Spoofing
of 62 Identity Theft RootkitsSpywarePhishing Backdoors Denial of Service WormsViruses Attacks
of 62 Practical Defenses PasswordsPatch Updates Antivirus Antispyware Anti- spam Firewall Browser Security BackupsRootkitsWireless Security
of 62 Minimum 8 characters Use combination letters, numbers, & special characters Use space or nonprintable characters when available Change every 30 days Not reuse for 12 months Not use for multiple accounts Avoid inexpensive biometric devices Passwords
of 62 Tools Password crackers Online password creators Create & protect secure password list (Adobe Acrobat PDF)secure password list Use password program (Password Safe)Password Safe Passwords
of 62 Secure Password List Passwords
of 62 Different types of patches Install patch Auto-update Patch Updates
of 62 Patch Updates
of 62 Update automatically or weekly Scan weekly Disinfect virus Antivirus Antispyware Anti- spam
of 62 Antivirus Antispyware Anti- spam
of 62 Antivirus Antispyware Anti- spam
of 62 Antivirus Antispyware Anti- spam
of 62 Antivirus Antispyware Anti- spam
of 62 Antivirus Antispyware Anti- spam
of 62 Install Update Scan a device Disinfect (System Restore) Ad-Aware SE Personal Microsoft AntiSpyware Spybot Search&Destroy Antivirus Antispyware Anti- spam
of 62 Antivirus Antispyware Anti- spam
of 62 Antivirus Antispyware Anti- spam
of 62 Antivirus Antispyware Anti- spam
of 62 Firewall
of 62 Check Firewall-Norton Firewall
of 62 Check Firewall-Norton Firewall
of 62 Check Firewall-Norton Firewall
of 62 Check Firewall-Windows Firewall
of 62 Check Firewall-Windows Firewall
of 62 Test Firewall “Shields UP!!” Common Ports Test Firewall
of 62 Test Firewall “Shields UP!!” All Service Ports Test Firewall
of 62 Test Firewall Firewall
of 62 Practical Defenses PasswordsPatch Updates Antivirus Antispyware Anti- spam Firewall Browser Security BackupsRootkitsWireless Security
of 62 Browser Security
of 62 Browser Security
of 62 Browser Security
of 62 Browser Security
of 62 Browser Security
of 62 What? Where? When? How? Backups
of 62 Backups All ProgramsAccessoriesSystem ToolsBackupAdvanced
of 62 Sony BMG Music Cannot remove rootkit Rootkit detectors Rootkits
of 62 Wireless Security Use Encryption WEP/WPA Change default SSID & Network Key (Password) Use MAC Filtering
of 62 Wireless Security Hot Spot Avoid online banking or e- commerce Turn off file sharing Use Firewall
of 62 Practical Defenses PasswordsPatch Updates Antivirus Antispyware Anti- spam Firewall Browser Security BackupsRootkitsWireless Security
of 62 Keep your PC Safe - Schedule Weekly Update virus software Update spyware software Full virus scan Full file backup Quarterly Remove old programs Clean your desktop PC Monthly Disk Cleanup Defragment System Restore Point Yearly Backup photos and files to a CD or DVD
of 62 8 Security Practices to Stay Safe Online - 1 of 2 1.Protect your personal information. 2.Know who you’re dealing with online. 3.Use antivirus software, a firewall, and anti-spyware software, and update them regularly, to help keep your computer safe and secure. 4.Be sure to set up your operating system and Web browser software properly, and update them regularly.
of 62 8 Security Practices to Stay Safe Online - 2 of 2 5.Use strong passwords or strong authentication technology to help protect your personal information. 6.Back up important files. 7.Learn what to do id something goes wrong. 8.Protect your children online.
of 62 Resources and Windows Defender - Spyware Protection for freewww.microsoft.com/athome/security/spyware/software/default.mspx Ad-Aware SE Personalwww.lavasoft.com Microsoft AntiSpywarewww.microsoft.com Spybot Search&Destroywww.safer-networking.org SpoofStick –helps spot fake websiteswww.spoofstick.com/
of 62 Biography Conry-Murray, Andrew and Weafer, Vincent, 2006 The Symantec Guide to Home Internet Security. Addison-Wesley. Ciampa, Mark “The Elements of Security” National Cyber Security Alliance resources/MicrosoftHomeUserGuidebook.pdfhttp:// resources/MicrosoftHomeUserGuidebook.pdf Bauknight, Trevor April 2005 Cookies and PIE – An Introduction to Flash Security
Computer Security: How to Protect Your Computer By Roopa Mathur Computer Information Management Irvine Valley College