Home PC Security What PC Users and Law Enforcement Should Know Printing with “Notes” enabled with provide a script for each slide Bob Samson 11/20/2004.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
The Internet = A World of Opportunities Look whats at your fingertips A way to communicate with friends, family, colleagues Access to information and.
How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Grass Valley Learning Center Surf the Net Safely Roger Thornburn.
Primary Threats to Computer Security
Computer Software 3 Section A Software Basics CHAPTER PARSONS/OJA
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
The Internet.
COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Netiquette Rules.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Instructions for Weds. Jan Get your Century 21 Jr. textbook 2.Log in to the computers 3.On page 80, read the Objectives listed under “Lesson 13:
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
How It Applies In A Virtual World
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Staying Safe Online Keep your Information Secure.
Protecting Your Information Assets
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
The Internet and Access to Information Why is it so difficult to eliminate SPAM? By:Juan C. Vargas Computer Science 450.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
Microsoft Internet Explorer and the Internet Using Microsoft Explorer 5.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Topic 5: Basic Security.
Internet Security and Your Computer Welcome to Boot Camp.
Internet Safety Internet Safety LPM
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Cyber Safety Jamie Salazar.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Safe Computing Practices. Outline Objective Safe Computing Defined Safe Computing Methods Summary List of References.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN Protecting Yourself and Your Family Online.
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
Common Methods Used to Commit Computer Crimes
Internet Identity, Safety, & Security
Home Computer Security
Information Security Session October 24, 2005
HOW DO I KEEP MY COMPUTER SAFE?
Presentation transcript:

Home PC Security What PC Users and Law Enforcement Should Know Printing with “Notes” enabled with provide a script for each slide Bob Samson 11/20/2004

What is the Problem?  Hardware architecture of a PC  Complexity of computer software  Anonymity of the Internet  High speed connections  Dial up connections  Wireless connections

Hardware Architecture of a PC  There are 65,535 open ports on every Intel-based PC  Only a few ports are probably necessary for the average home user  Port 25 – SMTP Simple Mail Transport Protocol is used for sending  Port 53 – DNS Domain Name Server translates URLs into IP Addresses  Port 67/68 - When an ISP uses DHCP (Dynamic Host Configuration Protocol) to assign IP addresses when you logon  Port 80 - Your main Internet Connection  Port 110 – POP3 Post Office Protocol version 3 for retrieving  Games, the use of instant messaging, or other business uses all may add a few additional ports to this list

Complexity of Computer Software  Windows has about 40 million lines of code (instructions)  By the year 2010, Windows is projected to grow to 100 million lines of code  A Carnegie Mellon University study found that a programmer makes an error every 1,000 lines of code.  That means just in Windows, there are probably 40,000 errors. If you consider all of the other application software that runs on the average PC, there are hundreds of thousands of errors that can be exploited by computer hackers so that they can gain entry into your computer

Anonymity of the Internet  When you are connected to the Internet, you are only known by a numeric Internet Protocol address  IP Addresses are not a reliable source of identification (they can easily be changed)  There is no way to identify a physical location from an IP address  Since the Internet is a network of millions of interconnected computers, it is easy to hide one’s “trail” behind the numerous points of interconnection  There are three sources of hackers: geeks; socially deprived intellects; terrorists - all pose a threat

High Speed Connections  DSL and cable connections pose a greater risk than telephone modems because they process data more quickly  Without a firewall, anyone in the world can gain access to your computer [easily!]  If you have more than one computer and share files between them, every file may also shared with the world unless you have a firewall  Peer-to-Peer programs like Kazaa, Gnutella used to swap music files can share more than you intended such as password files  Leave your computer open to the world wide web, add a few web pages to your files and you can easily find your private files indexed and accessible through search engines such as Google

Dial Up Connections  Dial up connections or modems have risks associated with them  Risks include the hijacking of one’s telephone for generating bogus long distance charges  Be thoroughly familiar with spyware and how to avoid it  Never leave your PC on unattended while connected to your modem

Wireless Connections  If you can connect without a wire, your neighbor’s high school computer wizard can also connect to your computer and your Internet connection  A wireless network must have:  Encryption of the signal/connection  Data encryption may also be required for additional protection  Strong log in and password rules for your computer are a must  Don’t let children use the wireless feature to hide and connect to the Internet - use it to keep them in the accompaniment of an adult

What you risk when connected  Personal Information  Reputation  Financial resources (Identity Theft)

Personal Information  Surfing habits can be tracked so a profile of your interests developed for marketing purposes  Your address book and the addresses of all your friends can be copied  Financial information like bank records, tax records, social security numbers, etc. can be stolen  Information can be corrupted or deleted by a virus  Read those Privacy Policies - you could be giving up your personal information

Reputation  Your computer can be used to send Spam without your knowledge  Your address book containing all of your contacts can be ed pornographic content

Financial Resources  $53 billion dollars was lost in 2003 through identity theft  27.3 million Americans in the last 5 years reported that personal information was stolen [Identity Theft]  The cost to victims for recovery of their good name in 2003 was $5 million  In the last year, nearly 2 million Americans had their checking accounts raided by criminals

No One is Safe Even the unborn and the dead can be victims of identity theft

What can you do?  Use anti-virus software  Use a firewall  Learn about patch management  Change your behavior  Be careful with online purchases

Anti-virus Software  Purchase an anti-virus application to protect your computer  Update frequently - better yet, use anti-virus software that will update automatically  Stay alert to virus trends - the media is an excellent source of pending attacks

Use a Firewall  At a minimum, use a software firewall (port blocker)  Use a hardware firewall if you connect to the Internet via a cable modem or DSL  Both a software and hardware firewall together offer the best protection  Block as many ports as you can - this may mean that you cannot play some Internet Games

Learn About Patch Management  Patch management means updating software frequently with the changes that manufactures add to improve security  Software updates are usually free  Microsoft provides automatic updates as a service to their customers  If you are using Windows 95 or older, stop and upgrade - the older versions are no longer supported and leave you vulnerable  If you have to re-install software for any reason, you must update it again because the patches will be missing

Change Your Behavior  Don’t use illegal copies of software - it can be loaded with viruses and spyware and besides it is wrong to steal!  Don’t surf questionable web sites - Pornographic sites are one of the biggest sources for web bugs and spyware  Update your software frequently (patch management)  Never send credit card data in an - s should always be considered unsecured  Don’t open attachments without understanding that these are the largest cause of viruses - Even opening an attachment from a trusted address is not safe (your friend could have been infected and had their address book stolen)

Dangerous Extensions  ADE Microsoft Access Project Extension  MDB Microsoft Access Application  ADP Microsoft Access Project  MDE Microsoft Access  MDE Database  BAS Visual Basic® Class Module  MSC Microsoft Common Console Document  BAT Batch File MSI Windows Installer Package  CHM Compiled  HTML Help File  MSP Windows Installer Patch  CMD Windows NT® Command Script  MST Visual Test Source File  COM MS-DOS® Application  PCD Photo CD Image  CPL Control Panel Extension  PIF Shortcut to MS-DOS Program  CRT Security Certificate  REG Registration Entries  EXE Application  SCR Screen Saver  HLP Windows® Help File  SCT Windows Script Component  HTA HTML Applications  SHS Shell Scrap Object  INF Setup Information File  URL Internet Shortcut (Uniform Resource Locator)  INS Internet Communication Settings  VB VBScript File  ISP Internet Communication Settings  VBE VBScript Encoded Script File  JS JScript® File  VBS VBScript Script File  JSE JScript Encoded Script File  WSC Windows Script Component  LNK Shortcut  WSF Windows Script File  WSH Windows Scripting Host Settings File  ZIP Compressed File Format

Watch Out for Phishing  s from legitimate companies are copied to trick consumers into providing confidential information  Passwords  Credit card numbers and expiration dates  Banking account numbers  Even experts cannot tell by looking at the messages or the web site that you are directed to that this message is a forgery  Understand that no legitimate company ever asks you to validate personal information via an in this way  Never respond, even if you do business with the company. If you are concerned, call them first!

Do Not Join Social Networks  “Social Networks” are services joined to help you remember addresses and phone numbers  Some companies are Plaxo, Friendster, Tickle and others  You risk your personal information, privacy and the information contained in your own computer’s address book  Remember, joining free services will expose your information and possibly the information stored on your computer to misuse and theft

Change Your Behavior continued  Make backups of important information stored on your computer  Don’t download browser add-ons and other software from unknown sources - this is an easy way to give your personal information to anyone through spyware or adware  Set your browser’s security and privacy settings to protect you from 3rd party cookies - these are used to track you  Be careful of HTML - it can contain web bugs and spyware  Learn how to identify a “secured” web page - Never send your personal information over an unsecured web page  AND… Don’t click on “Unsubscribe” links

Change Your Behavior continued  Disable Java and ActiveX in your browser - These can be used to steal information from your computer  For Windows XP users, don’t log in with ADMINISTRATIVE RIGHTS  Use complex passwords created from phrases  Example: MwaiJ10 (My wedding anniversary is June 10 th )  Example: Gmlogmd1775 (Give me liberty or give me death 1775)  Learn how to tell if a web page is secure

What About SPAM?  Two Thirds of all is SPAM  One of the largest sources of SPAM is infected home computers  Trojan programs hijacking computers to send others SPAM (zombies)  Beware of spyware/adware and Trojan programs  Disguised as free programs, they track your surfing activities  Don’t use music download sites like KaZaA, GrokSter, Imesh  Free Screen Savers are a source of spyware  If your computer becomes infected, your Internet Service Provider may turn off your capability until you fix it

Be Smart About Online Purchases  Selling or purchasing online through groups like eBay carry risks  40% of all credit card fraud is committed by criminals overseas  The top five offending countries are:  Yugoslavia  Nigeria  Romania  Pakistan  Indonesia  Many con artists hide the real country of origin  Use protection services  Never pay with a check card or debit card - only true credit cards with online protection

Where to go for help  Your local computer store  Microsoft’s web site  A knowledgeable and trusted friend  Community Services  Senior community centers  Community college classes  State and Federal fraud assistance web sites  Your local police department (when you suspect that a crime has been committed)

Remember If you don’t bother to protect your computer, your privacy and your information, you are a victim just waiting for the crime to happen.