Download presentation
Presentation is loading. Please wait.
Published byAgnes Peters Modified over 8 years ago
2
Goals Be able to identify the parts of a URL Determine the safeness of a link Know the best places to find the info you need Know how to deal with toolbars Know how to safely store passwords Know how to clear temp files Know how to reset browser to factory defaults
3
Definitions URL – the address of an object on the internet HTTP(S) – Stands for hyper-text transfer protocol, which is the meant to be secure 128bit encryption. Browser – program you open to access the internet Toolbar – an add-on extension of the bars at the top of your browser
4
URL Parts http:// or https:// www.firstheartland.com fhc.support tinyurl.com goo.gl bitly.com ow.ly
5
Is it safe? Don’t trust a link in an unsolicited email, and adopt a look before you click policy It’s ok to google search a domain and see what comes back before you click
6
Is it safe? They are smart and cunning, and they will use things called tiny links, short links, or redirectors to mask the true destination (which we try and block) that can start with tinyurl.com, goo.gl, bitly.com, ow.ly and a few others Any communication method can be used to transmit these, especially twitter, Facebook, text message, chat, and of course email If you see any of these, contact us to be sure since we can test them on our isolation network to see if they are legitimate or not
7
Is it safe? Pictures can be hyperlinks, which is why outlook blocks most pictures and hyperlinks by default Other files such as Word and PDFs can contain links to external content, same rules apply PDFs, Word docs, Excel docs, movies, and many more file types can have embedded content or be created in a way that allows an attacker to take advantage of an unpatched vulnerability or flaw in a program to do something that wasn’t originally intended, such as run a piece of code or a script to do something bad
8
Something bad, defined 1.Run a script to connect to their website which contains code to open a reverse remote access tunnel aka. back door into our network, providing access to our systems and data 2.Install a virus or malware to steal stored passwords, keystrokes, network traffic, screenshots, and upload them to the attackers systems 3.Install ransom-ware, which will encrypt a computer or even a network share and upload the key to an attacker, which will then extort the company for money in return for decrypting the data 4.Install a botnet client which can be used for a number of illegal activities such as DDOS attacks on other systems, processing power for breaking encryption or passwords, link clicking to generate ad revenue for the attacker, and even bitcoin mining while the computer is asleep
9
Reality Check – What’s at stake? Client’s data and lively hood – identity theft, actual theft, embarrassment, lawsuits Your company’s reputation – could lose clients, new clients not interested in us, clients don’t trust us enough to recommend at best Company’s Revenue – fewer clients = less $$$ Your employment – less $$$ = less employees
10
Where can I find more resources? Google.com is your friend Virustotal.com will scan URLs you are suspicious of Forward them to us, or if you don’t feel comfortable copying, tell us where to find them Wikipedia is also a great resource
11
TOOLBARS!! IE, Safari, and Firefox still use toolbars and Chrome switched to buttons Some toolbars are ok, as long as you actually want them, ie. Roboform
12
Firefox
13
Internet Explorer 10 and 11
14
Chrome
15
Clear Browser Temp Files Chrome Ctrl + Shift + Del Internet Explorer Ctrl + Shift + Del Firefox Ctrl + Shift + Del Safari Click safari, click preferences, click privacy, click “remove all website data”, click “remove now”
16
Reset Browser Chrome Chrome://settings/search#reset%20browser Internet Explorer Alt+T for tools, advanced tab, reset button at bottom Firefox Click Menu, then help, then troubleshooting information, then reset firefox.
17
Ransomware, etc.
18
Site Checker Bit Defender Traffic Light – FREE http://www.bitdefender.com/solutions/trafficlight.html
19
Save Passwords Roboform – get it…
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.