Computer Safety Workshop Presented by Roy Coleman April 14, 2015 © 2015 Roy Coleman.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Let’s Talk About Cyber Security
Grass Valley Learning Center Surf the Net Safely Roger Thornburn.
Thank you to IT Training at Indiana University Computer Malware.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
How to avoid Viruses and Malware on your Computer Use a firewall Using a firewall is like locking the front door to your house—it helps keep intruders.
The Most Dangerous Places on The Web (according to PC World)
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
Viruses and Spyware. What is a Virus? A virus can be defined as a computer program that can reproduce by changing other programs to include a copy of.
Free Software Alternatives: Avast! Anti-virus
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Security. Physical security Protection from fire/water Protection from dust and extremes of temperature.
Using Anti-virus Software A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
 Lesson 05: Computer Maintenance. Keep Software Up-To-Date Patches Security Holes Improves Software Stability Improves Software Performance Adds.
What is it, how does it work, and why is it important?
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Security for Seniors SeniorNet Help Desk
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Alisha Horsfield INTERNET SAFETY. firewall Firewall- a system made to stop unauthorised access to or from a private network Firewalls also protects your.
© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Malware: Defenses. Kinds of malware Viruses  Macro Viruses  Memory-resident viruses  File infector viruses  Boot Viruses  Trojan Horses  Hoaxes.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Malware Fighting Spyware, Viruses, and Malware Ch 4.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Staying Safe Online Keep your Information Secure.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
By Ksenia Primizenkina 8K
PC Maintenance How to keep your computer healthy.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
MyDoom By: Philippe Bissohong. Background ► MyDoom  Novarg, Mimail.R and Shimgapi ► Computer worm, unlike a virus it attacks a network.
Year 9 Autumn Assessment Computer system/Information security-Planning, Communicating, Information. By Louis Smith-Lassey 9k 9Y1.
PLUG IT IN SIX Protecting Your Information Assets.
How to Install Malwarebytes Anti- Malware Software Khushbu Shah ENG 393 May 4 th, 2010.
C OMPUTER V IRUSES Julia White. W HAT ARE COMPUTER VIRUSES ? Computer viruses are small software programs that are designed to spread from one computer.
Safer Online Shopping and Practices Presenter: Brian Moats Students Active In Leadership.
Presented by: Maha, Marina and Aleks Viruses,Wormsand Trojans.
COMPUTER VIRUS.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
We are here to help you… Fight something like this Brownies !
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
XP Practical PC, 3e Chapter 6 1 Protecting Your Files.
Safe Downloading & Malware Prevention. Adobe Flash Update One program that will ask you to update often is Adobe Flash. While updating Flash is important,
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Computer security By Isabelle Cooper.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Safety and Security issues of using ICT Alys brooks.
By Liam Wright Manga comic group Japan SAFETY on your computer.
Are you a COMPUTER GEEK or a COMPUTER FREAK? By Evie Watkins.
Don’t let them catch your computer!!!!!
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
Running Windows Securely and Efficiently By Gary Esworthy.
Remove [Browser Hijackers] For more information regarding [Browser Hijackers] Please Visit:
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
Computer Security Keeping you and your computer safe in the digital world.
For more information on Rouge, visit:
Three steps to prevent Malware infection
Call AVG Antivirus Support | Fix Your PC
Norton technical support Norton.com/Setup | Norton Setup and Install with Product Key Norton Antvirus Activation For protection against.
Presentation transcript:

Computer Safety Workshop Presented by Roy Coleman April 14, 2015 © 2015 Roy Coleman

Cover Your (whatever ) Unless you are Skyping, cover your camera. A simple piece of paper taped over it or a Post-it note is fine. This prevents your image (and what you are doing at that time) from being accidentally spread around the Internet. WGN Channel 9 has a regular feature where they ‘surf’ camera feeds and randomly talk to the people they encounter. Many are very surprised.

Anti-Virus Software A good anti-virus program will block most, if not all, types of intrusions into your computer. There are many good anti-virus programs available. Some of them are free. I prefer either AVG or BitDefender but I have used both McAfee and Nortons. Unless you are never connected to the Internet, you will be the target of many and varied attacks. These attacks range from simply looking at the contents of your hard drive to completely taking over your computer. There are malicious people that write programs called ‘worms’ that search for connected computers and then report back allowing some other program to try to exploit what was found. The best examples of ‘good’ worms are the search engines, especially Google and Yahoo. How do you think they come up with the lists they provide as the result of a search?

Microsoft Automatic Updates Always install updates from Microsoft as these are usually designed to fix vulnerabilities that have just been discovered. Your computer should be set to automatically download (and install) all important Microsoft updates. (The handout gives you a couple of ways to determine if your computer is set to receive automatic updates.) Even computers running Windows XP receive periodic updates for installed Microsoft Office software along with a ‘Malicious Software Removal Tool’.

Updates For Other Programs You should also install updates for your other programs as they are offered, especially for your browser. HOWEVER, beware of any ‘additional software’ offers. (See below for an Adobe Update Offer.)

Toolbars, Toolbars, Toolbars (argh!!) Too many toolbars on your browser can make it unstable and very slow. Unless you have a very specialized toolbar for your work, you should have, at most, one.

Yahoo Phishing Note that this target is NOT Yahoo.

Chase Phishing (1)

Chase Phishing (2) Note the start of the URL target is NOT Chase.com.

Protecting Yourself When Opening s Be very cautious when opening s, especially if they do not have anything in the ‘Subject’ line and/or only have a single line that is a link.

Protecting Yourself When Opening s If your program allows you to open your s in text only mode, use it as a preview. Look at who sent you the and where any links really take you.

Protecting Friends When You Send Multiperson s. Whenever you send an to multiple people PLEASE follow these guidelines: Put YOUR OWN name in the TO: field. Add everyone else’s in the BCC: field. If you are sending a link to something, clearly explain what the link is taking them to and what they should see there. There are two reason for this: 1.If ANY of the people in the TO: field has an infected system, the infection could send itself to ALL of the names on the list. Using BCC: hides the addresses from the recipients and from any malware or infections that may be hiding on one or more of their computers. 2.You will receive your message back indicating that it has been sent successfully.

Protecting Friends When You Send Multiperson s In Gmail In Thunderbird

How to Avoid Disaster (like a data loss or disk crash) BACKUP YOUR DATA! BACKUP (and set a restore point)

How to Avoid Disaster (like a data loss or corrupt flash drive) ALWAYS eject a flash drive and wait for the computer to tell you it is ok to remove!

What’s Next? Cell phone tracking Cell phone hacking (Android, Windows and IOS-Apple) Smart card piracy Automobile hacking Apple Mac’s and Linux

If that didn’t scare you --- The next slide might!

I hope your future computing is safe and enjoyable. Thank you for being here.