Safe Computing Outreach Joseph Howard Undergraduate Research Assistant 05/01/2015 Disclaimer: This research was supported by the National Science Foundation.

Slides:



Advertisements
Similar presentations
Privacy & Other Issues. Acceptable Use Policies When you sign up for an account at school or from an Internet Service Provider, you agree to their rules.
Advertisements

Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Let’s Talk About Cyber Security
Thank you to IT Training at Indiana University Computer Malware.
Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access and attacks delivered.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Computer Maintenance & Safety Spring Internet Safety Keeping your computer safe What is a computer virus? A computer program that can copy itself.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
How to avoid Viruses and Malware on your Computer Use a firewall Using a firewall is like locking the front door to your house—it helps keep intruders.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
What is spyware? Supervisor dr. lo’ay tawalbeh Search By Mahmoud al-ashram Soufyan al-qblawe.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
James Tam Computer Security You will learn about some common computerized security threats as well as some ways of minimizing these threats.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
1 Computer Security: Protect your PC and Protect Yourself.
Quiz Review.
THE WONDERFUL HISTORY OF COMPUTERS FROM THE BEGINNING HARDWARE, SOFTWARE,SAFTEY, AND COMPUTER ETHICS.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Security for Seniors SeniorNet Help Desk
Data Security.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
IT Security for Users By Matthew Moody.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah 24 Cookies: What.
Electronic Security. WELCOME -About us What we're going to talk to you about: Why Systems are Attacked Malware Firewall Security Computer System Safety.
IT security By Tilly Gerlack.
C HAPTER 5 General Computer Topics. 5.1 Computer Crimes Computer crime refers to any crime that involves a computer and a network. Net crime refers to.
Year 9 Autumn Assessment Computer system/Information security-Planning, Communicating, Information. By Louis Smith-Lassey 9k 9Y1.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Protecting Students on the School Computer Network Enfield High School.
FIREWALL. The member in group 1. Bhummikorn M.2/5 No.5 2.Borwornrat Khrongsiriwat M.2/5 No.6 3. Panaphon sangobsakun M.2/5 No.20 4.Kalint Muangsornkeaw.
What is Spam? d min.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Internet safety By Suman Nazir
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Network Security.  With an increasing amount of people getting connected to networks, the security threats that cause massive harm are increasing also.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
Bay Ridge Security Consulting (BRSC). Importance in Securing System  If don’t keep up with security issues or fixes Exploitation of root access Installation.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
A Quick and Easy Crash Course Internet Safety for Everyone.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
3.6 Fundamentals of cyber security
Lesson 3 Safe Computing.
Risk of the Internet At Home
Computer Security.
Unit 4 IT Security Kerris Davies.

Presentation transcript:

Safe Computing Outreach Joseph Howard Undergraduate Research Assistant 05/01/2015 Disclaimer: This research was supported by the National Science Foundation (Grant No ). Opinions, findings, and conclusions/recommendations are those of the authors and do not necessarily reflect the views of the NSF.

Research Purpose  Perform research to help fulfill outreach portion of research grant.  Review Texas Tech IT Divisions Safe Computing program  Review the Cyber Security classes course materials  Make recommendations to Texas Tech IT Divisions Safe Computing program based off of my findings in the Cyber Security course materials.

The Modern World We Live In Because of the internet, life has never been easier.  Online shopping  Social networking sites  Online banking/investments 

New Dangers Also, because of the growth in popularity of the internet, there are new threats emerging that we have never had to experience  As the internet grows, so does danger  Old malware use to be created by mischievous programmers.  Present day malware is dangerous and utilized by criminals.  SAFE COMPUTING PRACTICES ARE ESSENTIAL!!!

Common Threats Although there are countless attacks that cyber criminals use, these are the most common categories  Viruses  Worms  Trojans  Spyware  Spam  Ransomeware

Safe Computing Practices

Anti-malware is a very easy to use defense mechanism to help protect your computer  Scan your computer regularly  Regularly check for updates  Understand that anti-malware will not completely secure you computer Anti-Malware Utilization

A common way for a computer to be infected is the user unwittingly installing the malware themselves.  Scan all new files coming onto to your computer  Be cautious of file types. Be Cautious of Files Being Put On your Computer

In addition to the previous tips here are some additional general tips  Make sure you change name and passwords for new electronic devices  Be cautious of public Wi-Fi  Keep up to date with widespread computer threats via news or internet  Encrypt sensitive information  Be conscious of potential threats General Tips

Some malwares have some specific defenses not applicable to others. For these you have to use specific techniques  Some software trick users into installing spyware on to their computers by stating that spyware will be installed, but they will hide it in all of the other licensing agreement text  A lot of spam includes an unsubscribe button  What this button does is confirm that this is a legitimate address and will send you even more spam  Limit or completely restrict your browsers use of cookies Malware Specific Caution

If your precautions, fail it is important to be able to recognize an attack. Fortunately. with many of these types of malware. there are some telltale signs of infection Recognizing Attacks

 “deteriorating computer responsiveness, unexpected and sustained churning” [1:363]  “sudden sluggishness of user applications, unexplained freezing of applications or unexpected error messages” [1:363]  “unscheduled hardware resets and crashes, sudden antivirus alarm activity” [1:363]  “disk error messages, saved documents that open as DOT files” [1:363]  “applications that disappear or will not execute” [1:363] Evidence of Viruses

 “unrecognized new process running, startup messages indicating that new software has been (or is being) installed (registry updating)” [1: 372]  “unresponsiveness of applications to normal commands, unusual redirection of normal web requests to unknown sites” [1: 372]  “unexpected or unscheduled modem connection activity” [1: 372]  “unexpected remote logon prompts at unusual times or unfamiliar logon prompt panels (this may result from routine software upgrades or session resets but can also indicate Trojan keylogging or password capturing software)” [1: 372]  “sudden or unexpected termination of antivirus scanning software or personal firewall software ( either at startup or when user attempts to load)” [1: 372] Evidence of Trojans

 Because of how connected we are by the internet, proper knowledge on how to safely browse the internet is crucial  Stay up to date  Be cautious Conclusion

References [1] Kim, David, and Michael Solomon. Fundamentals Of Information Systems Security, Second Edition. Burlington, MA: Jones & Bartlett Learning, Print.

QUESTIONS?

THANK YOU