Presentation is loading. Please wait.

Presentation is loading. Please wait.

Safe Computing Keeping Your Computer and Data Safe Brian McFarlane -Lead Systems Engineer Anna Kircher -Assistant Dean, Information Services.

Similar presentations


Presentation on theme: "Safe Computing Keeping Your Computer and Data Safe Brian McFarlane -Lead Systems Engineer Anna Kircher -Assistant Dean, Information Services."— Presentation transcript:

1 Safe Computing Keeping Your Computer and Data Safe Brian McFarlane -Lead Systems Engineer Anna Kircher -Assistant Dean, Information Services

2 Today’s Target Objectives  You will: Understand the importance of security Know where the threats come from Know what to do to protect your computer

3 Good News / Bad News  The Internet and Networks give us better connectivity Share information Collaborate (a)synchronously  The Internet and Networks give us better connectivity Viruses can spread easier “The bad guys” now have easier access to your information as well

4 Why do I want to be secure? (What’s in it for me?)  You can ensure private information is kept private Some things are for certain eyes only and you probably want to keep them that way Is someone looking over your shoulder (physically or virtually)?

5 Why do I want to be secure? (What’s in it for me?)  You can trust the information you are reliant upon What if your data becomes unreliable without you knowing? Can you make decisions on data that others have tampered with?

6 Why do I want to be secure? (What’s in it for me?)  You can stay off the front page of the paper

7 Why do I want to be secure? (What’s in it for me?)  You can get more done Bad Guys break things – you (or your tech savvy friends) have to fix them Don’t have to recreate lost work Suspected Bad Guy (Notice the spiky hair and spooky backlighting)

8 What forms can the bad guys take? Not all things are as they appear…

9 The 4 Main Forms of Bad Guys  Virus/Worm  Trojan  Denial of Service  ‘Tricksters’

10 Viruses / Worms  Most widely known – thanks to press coverage  What is it? Computer programs written by bad guys ( ) to do malicious things often triggered by a specific event Example – Word Macro Virus that sends out junk email when word document is opened

11 Viruses / Worms (Cont…)  Often benign and safely removed (treated)  But! can be destructive Deleting files Slowing down computer Sending out SPAM

12 Trojans  Most dangerous of all  What is it? Computer programs often written by good guys but used by bad guys ( ) to give them a back door to your computer Example – Remote Management application that runs in background and allows the bad guys to “get in” and use your computer as they wish

13 Trojans (Cont…)  Typically can not be safely removed – must start from working backup or scratch  Typically very destructive - highly dependent on the “goals” of the bad guy Deleting/modifying data files Stealing personal information Interrupting/destroying business processes

14 Denial of Service  Mostly annoying, but costly in terms of time lost  What is it? Computer programs written by bad guys ( ) to deny a service offered from the good guys Example – Too many requests for a particular web site “clog the pipe” so that no one else can access the site

15 Denial of Service (cont…)  Typically very frustrating  Possible impacts: May reboot your computer Slows down computers Certain sites or applications become inaccessible

16 ‘Tricksters’  Typically most destructive on the pocket book  Who are they? Sneaky bad guys trying to get information/$$$ from you, utilizing social trickery

17 ‘Tricksters’ (Cont…)  Kinda scary  Usually associated with identity theft or impersonation  Different Forms Phishing Spoofing  Examples: Popup messages Fake emails Fake websites Phone calls  Often want: $$$$$ Personal info Install their software

18 Where do the Bad Guys Come From?  3 Key Places “New Files” “Viewed Content” “Exposed Services” What the heck does that mean?

19 Where do they come from: New Files  Unwanted email with attachments you weren’t expecting  Downloaded programs from the internet that come from less than trustworthy locations  File Sharing Programs (P2P)

20 Where do they come from: Viewed Content  Websites that will “install” things for you  Opening email in a “non patched” email program

21 Where do they come from: Exposed Services  Is your computer configured to (without you knowing) Share files? Run a web server? Host chat sessions?  The more open doors your computer has, the more chance of someone coming in

22 So the bad guy is coming, What can you do about it? I’m going to do bad things to your computer and your data…

23 What can I do?  Install and use anti-virus/anti-spyware programs  Keep your operating system patched  Install and use a firewall program  Use strong passwords  Use care when reading email with attachments  Use care when downloading and installing programs  Make backups of important files and folders

24 Home Computer VS Work Computer SON desktops SON portables HOME Anti-Virus (Automatic)Checks when you connect to net Anti-SpyWare (Manual) Software Patches (Automatic)Checks when you connect to net Backups (K,O,V Drives) Firewall (Automatic for XP sp2) (Automatic for XP sp2) Key: = NSHelp Takes Care of This = You Take Care of This

25 Install and Use Anti-Virus / Anti- Spyware Programs  UW gives Faculty/Staff/Students Antivirus software free!  Install The Latest Version VirusScan 8.0 SpyBot 1.4  http://www.washington.edu/computing/security/ http://www.washington.edu/computing/security/

26 Keep Your System Patched  Visit This Site Regularly: http://update.microsoft.com  Set your computer to keep itself updated automatically:

27 Install and Use a Firewall Program  Turn on your built- in firewall  Download one if you don’t have one Win2000 Win9X MacOS9 Apple IIE  Free Download: www.zonelabs.com

28 Use Strong Passwords  Make sure it is: Strong / Unique / Easy 4 U to remember  Good example: Sentence: I love to ski in snow. Password: Il0vE2sk!N***  Don’t write it down!  Don’t tell anyone (they might be one of the bad guys in disguise)

29 Use Care When Reading Email with Attachments - KRESV Test Know Test Receive Test Expect Test Sense Test Virus Test Is the email from someone that you know? Have you received email from this sender before? Were you expecting email with an attachment from this sender? Does the email subject make sense? Does the attachment have a virus?

30 Use Care When Downloading and Installing Programs  Don’t get them from non-reputable places: www.bobs-free-software.com They could be programmed by the bad guys  Read reviews about the application before installing it –Google It!  No holiday screensavers Bad Guy Programmer In Action

31 Make Backups of Important Files and Folders  How long did it take you to create it?  How long will it take you to recreate it?  How long will it take you to make a quick copy?  Do backups often!

32 In Conclusion  Be Smart: Backups Passwords Download cautiously  Use Protection: AntiVirus AntiSpyWare Firewall  Stay Informed: Ask lots of questions Read http://www.cert.org/homeusers/ http://www.cert.org/homeusers/


Download ppt "Safe Computing Keeping Your Computer and Data Safe Brian McFarlane -Lead Systems Engineer Anna Kircher -Assistant Dean, Information Services."

Similar presentations


Ads by Google