Download presentation
Presentation is loading. Please wait.
Published byEdwin Helme Modified over 10 years ago
1
Nathan J. Gibson, CISSP-CISM-CCNA-MCSA
2
Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers
3
Personal Data Identity Theft Bank Account Information Hard Drive Space Pornography Storage Hide stolen information Distribute copyrighted material CPU cycles Cracking code Writing Software Robot Computer Attack other sites Profit from large BotNet
4
E-mail Greeting Cards Chain Letters Hoax WebPages Phishing Blogs CDs, Jump Drives, Floppy Disk Instant Messengers PDAs
5
Fake Greeting Cards Appear to come from a friend Links in e-mail point to malicious sites Automatically Downloads malicious files Chain Letters Bill Gates is tracking this e-mail Religious Emails Sue needs your help emails Forward to Everyone you Know!!!!
7
Hoax E-mails Diplomat Husband died and left me $100 Million $198.4 Million Lost in 2006 alone Date Line To catch an ID Thief http://www.msnbc.msn.com/id/17805134/ Investment E-mails Hoax Virus Alert E-mails Good Times Virus
8
Teenagers like to make friends Messenger Skilled in extracting information Blogs To much sensitive information MySpace - 500 people tested 80% release sensitive information Pictures reveal a lot of information and motivate attackers
9
AntiVirus AntiSpyware Firewalls Updates Safe Browsing Habits Common Sense and Knowledge Rules
10
Antivirus Free protection is available McAfee: http://it.ouhsc.edu/services/desktopmgmnt/antivirussoftware.asp AVG : http://free.grisoft.com/ Install Scan Immediately Configure Daily Automatic Updates At least Weekly Scans
11
Anti Spyware Again Free Protection for all Spybot S & D : http://www.safer-networking.org/en/download/index.html Configure Automatic Updates At least Weekly Scans
12
Firewall Windows XP SP2 comes with a built in Firewall Turn on/Configure Dont Ignore Warnings Periodically Check Exceptions
18
Updates Configure to Automatically Update and Install Check Software vendor sites for updates periodically Dont postpone/ignore computer notifications.
22
Safe Browsing Habits Active X Set Internet Explorer Settings Think before clicking Yes Java Prompts Certificates Dont except certificates from people you dont trust SSL/Https Internet Explorer Phishing Tools
24
Okay! Okay! I understand not to click on everything. But my computer doesnt give me that prompt. Configure your security level
29
Certificates – SSL – HTTPS Secure & Confidential Internet Requires a degree of Trust What is Phishing? www.bankofthewest.com vs. www.bankofthevvest.com How can I be sure the site I am browsing is legit?
30
DOES THIS PROVE MY IDENTITY?
31
STATE LICENSE HERE -- This really proves my Identity
36
Your in Luck, Built in Phishing Help!
39
Search Engine & Website Information McAfee Site Advisor - Free Malicious Downloads Spam e-mail Site Phishing Sites Links to other known bad sites http://www.siteadvisor.com/download/ie.html
41
Common Sense and Knowledge If it is too good to be true….. Research e-mails and websites www.snopes.com http://hoaxbusters.ciac.org/ Advise Family Members Block them if you have to Criminal Act???? Mail Fraud(18 USC S1341)
42
How to keep your kids safe on the internet 1. Parenting Communicating 2. Technology Enforcing and Monitoring
43
Step 1: Establish a contract Times that are allowed Activities that are allowed Punishment for rule violation Computer should be in an open space and not in their room
44
Step 2: Separate user accounts for you and your kids You should have more rights than them to restrict and monitor their activity Each child should have their own account and password Trace unauthorized activity to a specific person
52
Step 3: Controlling Internet Activity There are bad sites on the internet Some legit and education sites can be flagged because of certain content
61
Uninstall Chat programs you dont want them to use Create an e-mail with your ISP for them You can monitor and view e-mail Block other e-mail sites(e.g. hotmail, yahoo, etc.) Key Loggers Messengers E-mail Blogs Browser History Programs
62
Configure your modems/routers to disable internet activity during certain hours Consult your ISP Technical support; they will gladly help you
63
QUESTIONS/COMMENTS
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.