Download presentation
Presentation is loading. Please wait.
Published byJune McDowell Modified over 9 years ago
1
PC Security 101 Keeping your data and your computer safe
2
Security is a real concern Identity theft is a hot topic in the news. Data theft is a very real and serious issue. Malicious programs allow users to capture logins, passwords, credit card information, personal, and business data. We have found some of these programs in home directories in our schools.
3
How does it all work? Users install malicious programs from floppy disks, CDs or thumb drives to avoid detection on the network. Programs install quickly and easily when logged in as an administrator. Local administrator passwords are easy to crack with software found on the Internet. Novell passwords are not easy to crack.
4
How does it all work? Once installed, these programs begin to capture data. The data can be stored on the machine, or even emailed to another user. Keystrokes can be captured, gathering your logins and passwords to websites, what you type in a document or email, as well as any information you enter on a form.
5
How does it all work? Screenshots can be captured, showing what you are seeing on the screen. Malicious users can use what they have captured to login as you and have access to all of your programs, files and data.
6
What can you do? Do not allow students to use your computer, if possible. **This is especially important in high schools and middle schools** Be sure to logout when you leave your computer, even for a brief time. Logout and turn off computers at the end of each day. Do not allow others to use your computer when you are logged in. Be aware of where you are saving documents. Do not save sensitive information to a shared folder.
7
What can you do? Change your password frequently. Do not allow other colleagues to login with your password. This is against board policy, as well as a really bad idea! Select hard to guess passwords with letters, numbers and other characters. Be aware of what students are doing on the computers. Enforce policies regarding misuse of computers. Report any suspicious activities to your supervisor and your technology support staff.
8
The Law State and Federal laws prohibit unauthorized access, additions, deletions, or changes to a network, password disclosure and numerous other activities. Violations of state and federal codes may result in fines and imprisonment. Copyright is a very serious issue. Violations may result in very large fines. Students should be educated on laws and ethics. Be sure to read the Douglas County Acceptable Use Policy on our staff home page: http://web.douglas.k12.ga.us/web/intranet/startstaff. htm http://web.douglas.k12.ga.us/web/intranet/startstaff. htm http://web.douglas.k12.ga.us/web/intranet/startstaff. htm
9
The Law Georgia Code: http://www.ganet.org/cgi- bin/pub/ocode/ocgsearch?docname=OCo de/G/16/9/93 http://www.ganet.org/cgi- bin/pub/ocode/ocgsearch?docname=OCo de/G/16/9/93http://www.ganet.org/cgi- bin/pub/ocode/ocgsearch?docname=OCo de/G/16/9/93 Federal Code: http://www.usdoj.gov/criminal/cybercri me/1030NEW.htm http://www.usdoj.gov/criminal/cybercri me/1030NEW.htm http://www.usdoj.gov/criminal/cybercri me/1030NEW.htm
10
More troubling news… Spyware/AdwareSpyware/Adware slows down our computer and compromises security. Spyware/Adware PhishingPhishing scams look so real that we are tempted to fall for them. Phishing New worms and viruses surface every day. worms and viruses worms and viruses
11
What about my home computer? The first line of defense is to monitor your inbox! –Do not open email from unknown/unexpected addresses, particularly with attachments. –Opening spam email verifies that your account is a live account. spam –If you have a “report as spam” option with your ISP, use it. –Enable email filtering, if your ISP provides it. (Junk/Spam folders)
12
What about my home computer? –Use your work email for work and have a personal email account for personal email. –Create an extra account that you will use when asked to provide an email address on a website. This account will fill up with junk and should only be used for this purpose. –If you feel compelled to forward emails to a large group, use the BCC feature to hide addresses. Encourage your friends to do the same.
13
What about my home computer? Use anti-spyware programs on your home computers to detect and delete malicious programs. –Update definitions and scan your PC once a week or at the very least, monthly. –AdAware, SpywareBlaster, and Spybot Search and Destroy are free for personal use and quite effective! Use anti-virus software on your home computers to protect against viruses, worms, and trojans. –Many ISPs now offer free anti-virus software. Comcast and AOL offer McAfee. Check with your ISP for further details.
14
What about my home computer? Use a firewall if you have high-speed internet service (broadband or DSL) –A router/gateway is a hardware firewall that will provide protection. –Software firewalls include: Windows firewall, built into Windows XP and ZoneAlarm, free products. –McAfee may be provided by your ISP. –Norton Internet Security is another product that works well. ** A word of caution: Be careful configuring software firewalls! You may completely block your internet connection! **
15
Home Networks If you’re like many high-speed internet users, you may have a wireless router installed at home. Here are a few security tips for wireless networks: –Turn on WEP encryption. If you’re unsure how to do this, check the manufacturer’s website. –Use MAC filtering to allow only certain PCs to access your network. –Turn off your router when not in use for extended periods.
16
We use locks to protect our homes, cars, and other valuables. Protect your personal and school data by taking steps to keep it secure.
17
Resources http://www.microsoft.com/athome/security/videos/default. mspxhttp://www.microsoft.com/athome/security/videos/default. mspx Numerous videos on various security topics may be found here. http://www.microsoft.com/athome/security/videos/default. mspx http://www.lavasoftusa.com/support/download/http://www.lavasoftusa.com/support/download/ AdAware free download http://www.lavasoftusa.com/support/download/ http://www.safer-networking.org/en/download/index.html http://www.safer-networking.org/en/download/index.html Spybot Search and Destroy free download http://www.safer-networking.org/en/download/index.html http://www.javacoolsoftware.com/spywareblaster.html http://www.javacoolsoftware.com/spywareblaster.html SpywareBlaster free download http://www.javacoolsoftware.com/spywareblaster.html http://free.grisoft.com/freeweb.php/doc/2/http://free.grisoft.com/freeweb.php/doc/2/ AVG Anti-virus free download http://free.grisoft.com/freeweb.php/doc/2/ http://www.microsoft.com/windowsxp/using/networking/e xpert/bowman_03july28.mspxhttp://www.microsoft.com/windowsxp/using/networking/e xpert/bowman_03july28.mspx Wireless security for home networks http://www.microsoft.com/windowsxp/using/networking/e xpert/bowman_03july28.mspx
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.