Computer Security: How to Protect Your Computer By Roopa Mathur Computer Information Management Irvine Valley College

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Primary Threats to Computer Security
Protect your PC virus, worm, Trojan horse, phishing, spam, botnet and zombies, spoofing, social engineering, identity theft, spyware, rootkits Click.
7 Effective Habits when using the Internet Philip O’Kane 1.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
Don’t Lose Your Identity – Protect Yourself from Spyware Dan Frommer Sherry Minton.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
How You Can Protect Yourself from Cyber-Attacks Ian G. Harris Department of Computer Science University of California Irvine Irvine, CA USA
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Use computer and internet safely Dave Dai Computer security Malware Virus: a program that copies itself and infect a computer without permission.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Understanding security and safe computing. Be Web Wise. Bob Penn presents:
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Security for Seniors SeniorNet Help Desk
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Protecting Your Computer & Your Information
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Learning In A Techno World How Safe is Your Cyberspace?
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Staying Safe Online Keep your Information Secure.
 We all know we need to stay safe while using the Internet, but we may not know just how to do that. In the past, Internet safety was mostly about.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Protecting Your Information Assets
IT security By Tilly Gerlack.
PC Maintenance How to keep your computer healthy.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
Management Information Systems Chapter Eight Securing Information Systems Md. Golam Kibria Lecturer, Southeast University.
Protecting Students on the School Computer Network Enfield High School.
PLUG IT IN SIX Protecting Your Information Assets.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Safer Online Shopping and Practices Presenter: Brian Moats Students Active In Leadership.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
Internet Security and Your Computer Welcome to Boot Camp.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Computer Skills and Applications Computer Security.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Understand Malware LESSON Security Fundamentals.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Cybersecurity Test Review Introduction to Digital Technology.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
E-Commerce & Bank Security By: Mark Reed COSC 480.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Computer Security Keeping you and your computer safe in the digital world.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
TECHNOLOGY GUIDE THREE
Information Security 101 Richard Davis, Rob Laltrello.
Protect Your Computer Against Harmful Attacks!
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
G061 - Network Security.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Computer Security: How to Protect Your Computer By Roopa Mathur Computer Information Management Irvine Valley College

2 of 62 $ Identity Theft Phishing/ Pharming Spam Keystroke Loggers Spoofing Attacks Fraud Attacks

of 62 Attacks Hijack Attacks

of 62 How To Keep Windows PC free of malware and intruders Use and Web browsers safely Protect a wireless connection Shelter kids Help protect your identity and privacy

of 62 Pop Quiz htmlhttp://onguardonline.gov/quiz/idtheft_quiz. html survey/quiztest.cgihttp://survey.mailfrontier.com/ survey/quiztest.cgi phishing_archive.htmlhttp:// phishing_archive.html

of 62 Reasons of Malware

of 62 Identity Theft RootkitsSpywarePhishing Backdoors Denial of Service WormsViruses Attacks

of 62 Virus TypeExample File infectorCascade MacroMelissa Boot sectorMichelangelo Memory-residentJerusalem PolymorphicMarburg RetroGobi Viruses

of 62 Not attached but spreads by itself Exploit system vulnerability like buffer overflow or flawed protocol Consume system resources Modify system configurations Install backdoor program Create zombie to launch DoS Examples: MyDoom, LoveLetter, Blaster Worms

of 62 Overwhelms system resources Prevents legitimate users from accessing system Distributed DoS attacks Denial of Service

of 62 Denial of Service

of 62 Virus and DoS disrupts but backdoor provides avenue to steal Allows attacker to secretly access system Listen for commands on open ports Backdoors

of 62 Phishing Online scam Tricks user into disclosing personal info like credit cards Uses spoofed s or popups to direct users to fraudulent Web sites

of in sender’s address Cc’d to others – why? Asks user to reply to Web link in message. Asks for personal info. - password. When mouse is over the link, notice that it will redirect the user to a different web page if clicked. Phishing

of 62 Collects personal information Monitors activity without knowledge Keystroke loggerKeystroke logger Spyware

of 62 SpywareAdware Installs a service or program Spawns popups or launches Web browser to specific site Can track surfing habits

of 62 Software to obtain special operating system privileges to perform unauthorized functions and hide all traces of existence Causes no direct damage to the computer but hides presence of other types of malicious software Remove traces of log-in records, log entries, and related processes User can no longer trust operating system Rootkits

of 62 Identity Theft Databases You Social Engineering Phishing Spoofing

of 62 Identity Theft RootkitsSpywarePhishing Backdoors Denial of Service WormsViruses Attacks

of 62 Practical Defenses PasswordsPatch Updates Antivirus Antispyware Anti- spam Firewall Browser Security BackupsRootkitsWireless Security

of 62 Minimum 8 characters Use combination letters, numbers, & special characters Use space or nonprintable characters when available Change every 30 days Not reuse for 12 months Not use for multiple accounts Avoid inexpensive biometric devices Passwords

of 62 Tools Password crackers Online password creators Create & protect secure password list (Adobe Acrobat PDF)secure password list Use password program (Password Safe)Password Safe Passwords

of 62 Secure Password List Passwords

of 62 Different types of patches Install patch Auto-update Patch Updates

of 62 Patch Updates

of 62 Update automatically or weekly Scan weekly Disinfect virus Antivirus Antispyware Anti- spam

of 62 Antivirus Antispyware Anti- spam

of 62 Antivirus Antispyware Anti- spam

of 62 Antivirus Antispyware Anti- spam

of 62 Antivirus Antispyware Anti- spam

of 62 Antivirus Antispyware Anti- spam

of 62 Install Update Scan a device Disinfect (System Restore) Ad-Aware SE Personal Microsoft AntiSpyware Spybot Search&Destroy Antivirus Antispyware Anti- spam

of 62 Antivirus Antispyware Anti- spam

of 62 Antivirus Antispyware Anti- spam

of 62 Antivirus Antispyware Anti- spam

of 62 Firewall

of 62 Check Firewall-Norton Firewall

of 62 Check Firewall-Norton Firewall

of 62 Check Firewall-Norton Firewall

of 62 Check Firewall-Windows Firewall

of 62 Check Firewall-Windows Firewall

of 62 Test Firewall “Shields UP!!” Common Ports Test Firewall

of 62 Test Firewall “Shields UP!!” All Service Ports Test Firewall

of 62 Test Firewall Firewall

of 62 Practical Defenses PasswordsPatch Updates Antivirus Antispyware Anti- spam Firewall Browser Security BackupsRootkitsWireless Security

of 62 Browser Security

of 62 Browser Security

of 62 Browser Security

of 62 Browser Security

of 62 Browser Security

of 62 What? Where? When? How? Backups

of 62 Backups All ProgramsAccessoriesSystem ToolsBackupAdvanced

of 62 Sony BMG Music Cannot remove rootkit Rootkit detectors Rootkits

of 62 Wireless Security Use Encryption WEP/WPA Change default SSID & Network Key (Password) Use MAC Filtering

of 62 Wireless Security Hot Spot Avoid online banking or e- commerce Turn off file sharing Use Firewall

of 62 Practical Defenses PasswordsPatch Updates Antivirus Antispyware Anti- spam Firewall Browser Security BackupsRootkitsWireless Security

of 62 Keep your PC Safe - Schedule Weekly Update virus software Update spyware software Full virus scan Full file backup Quarterly Remove old programs Clean your desktop PC Monthly Disk Cleanup Defragment System Restore Point Yearly Backup photos and files to a CD or DVD

of 62 8 Security Practices to Stay Safe Online - 1 of 2 1.Protect your personal information. 2.Know who you’re dealing with online. 3.Use antivirus software, a firewall, and anti-spyware software, and update them regularly, to help keep your computer safe and secure. 4.Be sure to set up your operating system and Web browser software properly, and update them regularly.

of 62 8 Security Practices to Stay Safe Online - 2 of 2 5.Use strong passwords or strong authentication technology to help protect your personal information. 6.Back up important files. 7.Learn what to do id something goes wrong. 8.Protect your children online.

of 62 Resources and Windows Defender - Spyware Protection for freewww.microsoft.com/athome/security/spyware/software/default.mspx Ad-Aware SE Personalwww.lavasoft.com Microsoft AntiSpywarewww.microsoft.com Spybot Search&Destroywww.safer-networking.org SpoofStick –helps spot fake websiteswww.spoofstick.com/

of 62 Biography Conry-Murray, Andrew and Weafer, Vincent, 2006 The Symantec Guide to Home Internet Security. Addison-Wesley. Ciampa, Mark “The Elements of Security” National Cyber Security Alliance resources/MicrosoftHomeUserGuidebook.pdfhttp:// resources/MicrosoftHomeUserGuidebook.pdf Bauknight, Trevor April 2005 Cookies and PIE – An Introduction to Flash Security

Computer Security: How to Protect Your Computer By Roopa Mathur Computer Information Management Irvine Valley College