Introduction to Desktop Security Protecting your computer and your data
Malware – The Threats VirusesViruses WormsWorms Spyware/AdwareSpyware/Adware PhishingPhishing
Viruses Usually come in Usually come in Have to be runHave to be run Trick you into running the virusTrick you into running the virus
Worms –self-replicating computer program Looking for youLooking for you Exploiting WeaknessesExploiting Weaknesses Install Back Door or other malwareInstall Back Door or other malware
Spyware Comes from other softwareComes from other software Tracks usageTracks usage
Phishing Social-engineering schemes use 'spoofed' s to lead consumers to counterfeit websites designed to trick recipients into divulging financial data such as credit card numbers, account usernames, passwords and social security numbers.Social-engineering schemes use 'spoofed' s to lead consumers to counterfeit websites designed to trick recipients into divulging financial data such as credit card numbers, account usernames, passwords and social security numbers. “vishing” variation“vishing” variation
Phishing Deceptive Subject LineDeceptive Subject Line Apparent genuine contentApparent genuine content Forged Sender’s AddressForged Sender’s Address Disguised LinksDisguised Links Form Form
Possible Problems Trojan HorsesTrojan Horses Zombie your ComputerZombie your Computer Destroy DataDestroy Data Steal DataSteal Data Key LoggersKey Loggers
Software Protections System UpdatesSystem Updates Anti-Virus softwareAnti-Virus software Anti-Spyware SoftwareAnti-Spyware Software FirewallFirewall
Anti-Virus Keep up-to-dateKeep up-to-date Scan dailyScan daily Check Files in useCheck Files in use AVG from grisoft.comAVG from grisoft.com
Anti-Spyware Update regularlyUpdate regularly Scan regularlyScan regularly AdAware from Download.comAdAware from Download.com
Firewall Guards information flowing to and from your computerGuards information flowing to and from your computer ZoneAlarm from zonelabs.comZoneAlarm from zonelabs.com
Safe Computing Practices Update the Operating SystemUpdate the Operating System Keep protections updatedKeep protections updated Scan RegularlyScan Regularly
Safe Computing Practices Regularly Back-up needed filesRegularly Back-up needed files Don’t download files using P2PDon’t download files using P2P Only get upgrades from trusted sourcesOnly get upgrades from trusted sources Use an alternate browser such as FireFox or ChromeUse an alternate browser such as FireFox or Chrome
Safe Computing Practices - Don’t open attachments even when they are from a trusted sourceDon’t open attachments even when they are from a trusted source Don’t unsubscribe to spamDon’t unsubscribe to spam Don’t click on links in sDon’t click on links in s
Safe Computing Practices - Data Don’t give out information especially your SSNDon’t give out information especially your SSN Banks and credit card companies never use to confirm dataBanks and credit card companies never use to confirm data Check for secure sites when shopping (https)Check for secure sites when shopping (https) Use a separate credit card and check each month’s billUse a separate credit card and check each month’s bill
Learn More CIS 115 Information SecurityCIS 115 Information Security