Why do you need to think about security?  Data loss  System loss  Identity theft.

Slides:



Advertisements
Similar presentations
Are you Safe at Work? A look into Safety at the Workplace and Internet Security Presented by Sheila Gee.
Advertisements

Day anti-virus anti-virus 1 detecting a malicious file malware, detection, hiding, removing.
SECURE YOUR COMPUTER or Lose It 1. Activate Anti-virus Software. 2. Firewall it. 3. Windows Service Pack 2 4. Fight Spyware 5. Update it, automate updates.
How to maintain your computer St. John UMC Computer Classroom.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
LittleOrange Internet Security an Endpoint Security Appliance.
DIYTP Computer Security – Virus Scanners  Works in two ways:  List of known ‘bad’ files  Suspicious activity  Terminate and Stay Resident (TSR)
Utility Programs and their Functions. Antivirus Software (Virus Checker) Keep the Computer software healthy and free of virus’ that can harm the function.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.
Computer Security Dylan, Robert, Matanel, Jordan.
No.24 Prerawat Denvutivorkarn M.2/2. Definition: "antivirus" is protective software designed to defend your computer against malicious software. Malicious.
1 Computer Security: Protect your PC and Protect Yourself.
Internet Security. A computer virus is an executable file designed to replicate itself while avoiding detection.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
How to maintain your computer
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Alisha Horsfield INTERNET SAFETY. firewall Firewall- a system made to stop unauthorised access to or from a private network Firewalls also protects your.
Keeping your computer current and trouble free Aaron Robertson.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
Learning In A Techno World How Safe is Your Cyberspace?
Virus & Anti-Virus Itthiwat Phiphopsukhawadee M.2/7 No.5 Saranpat Prasertthum M.2/7 No.17 Korakrit Laotrakul M.2/7 No.23 Pesan Kasemkitjanuwat M.2/7 No.25.
Computer Security By: MacKenzie Olson. To be safer and more secure online, make these seven practices part of your online routine.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Viruses By amrisa hussain Internet safety. viruses Viruses- a virus is a file or a piece of code which is capable of copying itself and typically has.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
 Physical protection and Simple measures  Passwords  Firewalls  Anti-Virus, Spyware and Malware  Web browsers   Patches  Wireless  Encryption.
Internet Safety By Adam T Introduction  This PowerPoint will show give you advice on how to stay safe on the internet.  You will be told how to stay.
Introduction to Firewalls TEC 236. What is a Firewall? A firewall is hardware, software, or a combination of both that is used to prevent unauthorized.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Protecting Students on the School Computer Network Enfield High School.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
C OMPUTER V IRUSES Julia White. W HAT ARE COMPUTER VIRUSES ? Computer viruses are small software programs that are designed to spread from one computer.
Computer viruses The effects of a virus are…  Slow loadings  Crashing  Not having control over the computer  Deleting documents.
Virus and Spyware Protection Group 9 Shana Reese, Jamarr Dumas, Casey Watkins.
CHAPTER 1 PROTECT YOUR TURF. Netizen – A citizen of cyberspace (ie. Internet) Any person using the Internet to participate in online social communities.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Intro to Firewalls. A firewall is hardware, software, or a combination of both that is used to prevent unauthorized programs or Internet users from accessing.
Small Business Security Keith Slagle April 24, 2007.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
1 Lab 12: Spyware A Window’s User’s Worst Nightmare.
Keeping Your Computer Safe and Running Efficiently.
Computer Skills and Applications Computer Security.
Protecting Your Computing Devices Antivirus, Anti-Spyware, Ad blocking, Antitheft and OS Maintenance.
NetTech Solutions Protecting the Computer Lesson 10.
Internet safety By Suman Nazir
Computer Essentials by Mark White. Computer Essentials Firewalls Anti-Virus Software Spyware Adware.
About Us AVG is a global security software maker protecting 98 million active users in 170 countries from the ever-growing incidence of Web threats, viruses,
Sydney Baize Mrs. Shirley Miller BPC110. “In the most familiar sense, a hacker is anyone who attempts to break into computer systems by surreptitious.
Spyware, Adware & Malware JEEP HOBSON JEEP HOBSON ITE-130 ITE-130 SPRING 2007 SPRING 2007.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Cybersecurity Test Review Introduction to Digital Technology.
What's a Firewall? A security system that acts as a protective boundary between a network and the outside world Isolates computer from the internet using.
Erica Larnerd COSC Spyware...  What is it?  What does it do?  How does it get on my computer?  How can I tell if it’s on my computer?  What.
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
Antivirus Software Troy Behmer. Outline Topics covered: – What is Antivirus software (AVS)? – What are the advantages and disadvantages of AVS? – What.
Information Systems Design and Development Security Precautions Computing Science.
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
Computer Security Keeping you and your computer safe in the digital world.
Protecting Computers From Viruses and Similarly Programmed Threats Ryan Gray COSC 316.
Computer Security Std XI– Chapter 8.
Lecture-16(B) Taking Protective Measures
Information Security Session November 11, 2004
 Security is a must today. If your device is not secure with updated antivirus then it is surely vulnerable to the attacks of dangerous viruses, spyware.
Information Security Session October 24, 2005
Information Security Session October 23, 2006
Presentation transcript:

Why do you need to think about security?  Data loss  System loss  Identity theft

Operating System Updates  Critical Updates  Security Updates  Patches or Fixes  Recommended Updates

Microsoft Baseline Security Analyzer

Microsoft Baseline Security Analyzer

Use Strong Passwords  Password recommendation: happyday  Microsoft Password Checker: security/password-checker.aspx?WT.mc_id=Site_Link security/password-checker.aspx?WT.mc_id=Site_Link

Use Strong Passwords  Use 10 or more characters—sohappyday  Add complexity—SOhappyDAY  Add length with numbers--SOhappyDAY2  Add length with punctuation– SOhappyDAY2!  Add length with symbols--

Use Strong Passwords  Strong Password Generator:

Anti-Virus A utility that searches a hard disk for viruses and removes any that are found.

Signature-Based Anti-Virus  Known Virus Table  1100 goes straight through!  MUST UPDATE!

Heuristic Detection Methods  Analyze suspicious file’s behavior and characteristics  Generic signature detection  Sandbox testing!  File analysis-determine the intent, destination, and purpose of the file

Anti-Virus Resources  Norton Anti-Virus  McAfee Anti-Virus  Free: AVG Free Edition en/homepage  BitDefender (online virus scanner) scanner/online/free.html

Firewall “A firewall ABSOLUTELY ISOLATES your computer from the Internet using a "wall of code" that inspects each individual "packet" of data as it arrives at either side of the firewall — inbound to or outbound from your computer — to determine whether it should be allowed to pass or be blocked.” ShieldsUP

Firewall

Firewall Resources  Windows Firewall  Norton  Free: Zone Alarm urity/en-us/zonealarm-pc- security-free-firewall.htm urity/en-us/zonealarm-pc- security-free-firewall.htm

Why do I need both Anti-Virus and Firewall Software?  Different purposes  Layers of protection

ShieldsUP  Browser based utility that tests your firewall from the outside!  Tests your firewall for vulnerabilities  file sharing  common ports  all service ports  messenger spam  browser headers 

Shields UP! 

Spyware Any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes.

Spyware Protection Microsoft Malware Protection Center

Spyware Protection Spybot Search and Destroy

Thumb Drives-How Safe is Your Data?  Lost or stolen!  Protection with passwords and encryption!  SanDisk Secure Access o Password protected and automatically encrypted!  TrueCrypt o Free open-source disk encryption software

PC Inventory

Sources  Microsoft Baseline Security Analyzer us/security/cc184924http://technet.microsoft.com/en- us/security/cc  Strong Password Generator:  Microsoft Password Checker: security/password-checker.aspx?WT.mc_id=Site_Linkhttps:// security/password-checker.aspx?WT.mc_id=Site_Link    Firewall Diagram  Firewall picture  Anti-Virus Picture both-antivirus-and-firewall-software/ both-antivirus-and-firewall-software/  AVG Free

Sources contd.  BitDefender (online virus scanner)  Firewall and computer picture  Zone Alarm Free security-free-firewall.htmhttp:// security-free-firewall.htm  Shields Up  Spyware pic spying-everywhere-on-your-computer-.htmlhttp:// spying-everywhere-on-your-computer-.html  Microsoft Malware Protection Center  Spybot Search and Destroy  SanDisk  TrueCrypt  BelArc Advisor