Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computer Security: How to Protect Your Computer By Roopa Mathur Computer Information Management Irvine Valley College

Similar presentations


Presentation on theme: "Computer Security: How to Protect Your Computer By Roopa Mathur Computer Information Management Irvine Valley College"— Presentation transcript:

1

2 Computer Security: How to Protect Your Computer By Roopa Mathur Computer Information Management Irvine Valley College www.ivc.eduwww.ivc.edu rmathur0@ivc.edu

3 2 of 62 $ Identity Theft Phishing/ Pharming Spam Keystroke Loggers Spoofing Attacks Fraud Attacks

4 rmathur0@ivc.edu3 of 62 Attacks Hijack Attacks

5 rmathur0@ivc.edu4 of 62 How To Keep Windows PC free of malware and intruders Use e-mail and Web browsers safely Protect a wireless connection Shelter kids Help protect your identity and privacy

6 rmathur0@ivc.edu5 of 62 Pop Quiz http://onguardonline.gov/quiz/idtheft_quiz. htmlhttp://onguardonline.gov/quiz/idtheft_quiz. html http://survey.mailfrontier.com/ survey/quiztest.cgihttp://survey.mailfrontier.com/ survey/quiztest.cgi http://www.antiphishing.org/ phishing_archive.htmlhttp://www.antiphishing.org/ phishing_archive.html

7 rmathur0@ivc.edu6 of 62 Reasons of Malware

8 rmathur0@ivc.edu7 of 62 Identity Theft RootkitsSpywarePhishing Backdoors Denial of Service WormsViruses Attacks

9 rmathur0@ivc.edu8 of 62 Virus TypeExample File infectorCascade MacroMelissa Boot sectorMichelangelo Memory-residentJerusalem PolymorphicMarburg RetroGobi Viruses

10 rmathur0@ivc.edu9 of 62 Not attached but spreads by itself Exploit system vulnerability like buffer overflow or flawed protocol Consume system resources Modify system configurations Install backdoor program Create zombie to launch DoS Examples: MyDoom, LoveLetter, Blaster Worms

11 rmathur0@ivc.edu10 of 62 Overwhelms system resources Prevents legitimate users from accessing system Distributed DoS attacks Denial of Service

12 rmathur0@ivc.edu11 of 62 Denial of Service

13 rmathur0@ivc.edu12 of 62 Virus and DoS disrupts but backdoor provides avenue to steal Allows attacker to secretly access system Listen for commands on open ports Backdoors

14 rmathur0@ivc.edu13 of 62 Phishing Online scam Tricks user into disclosing personal info like credit cards Uses spoofed e-mails or popups to direct users to fraudulent Web sites

15 rmathur0@ivc.edu14 of 62 @sign in sender’s address Cc’d to others – why? Asks user to reply to Web link in e-mail message. Asks for personal info. - password. When mouse is over the link, notice that it will redirect the user to a different web page if clicked. Phishing

16 rmathur0@ivc.edu15 of 62 Collects personal information Monitors activity without knowledge Keystroke loggerKeystroke logger Spyware

17 rmathur0@ivc.edu16 of 62 SpywareAdware Installs a service or program Spawns popups or launches Web browser to specific site Can track surfing habits

18 rmathur0@ivc.edu17 of 62 Software to obtain special operating system privileges to perform unauthorized functions and hide all traces of existence Causes no direct damage to the computer but hides presence of other types of malicious software Remove traces of log-in records, log entries, and related processes User can no longer trust operating system Rootkits

19 rmathur0@ivc.edu18 of 62 Identity Theft Databases You Social Engineering Phishing Spoofing

20 rmathur0@ivc.edu19 of 62 Identity Theft RootkitsSpywarePhishing Backdoors Denial of Service WormsViruses Attacks

21 rmathur0@ivc.edu20 of 62 Practical Defenses PasswordsPatch Updates Antivirus Antispyware Anti- spam Firewall Browser Security BackupsRootkitsWireless Security

22 rmathur0@ivc.edu21 of 62 Minimum 8 characters Use combination letters, numbers, & special characters Use space or nonprintable characters when available Change every 30 days Not reuse for 12 months Not use for multiple accounts Avoid inexpensive biometric devices Passwords

23 rmathur0@ivc.edu22 of 62 Tools Password crackers Online password creators Create & protect secure password list (Adobe Acrobat PDF)secure password list Use password program (Password Safe)Password Safe Passwords

24 rmathur0@ivc.edu23 of 62 Secure Password List Passwords

25 rmathur0@ivc.edu24 of 62 Different types of patches Install patch Auto-update Patch Updates

26 rmathur0@ivc.edu25 of 62 Patch Updates

27 rmathur0@ivc.edu26 of 62 Update automatically or weekly Scan weekly Disinfect virus Antivirus Antispyware Anti- spam

28 rmathur0@ivc.edu27 of 62 Antivirus Antispyware Anti- spam

29 rmathur0@ivc.edu28 of 62 Antivirus Antispyware Anti- spam

30 rmathur0@ivc.edu29 of 62 Antivirus Antispyware Anti- spam

31 rmathur0@ivc.edu30 of 62 http://www.microsoft.com/athome/security/spyware/software/default.mspx Antivirus Antispyware Anti- spam

32 rmathur0@ivc.edu31 of 62 http://www.microsoft.com/athome/security/spyware/software/default.mspx Antivirus Antispyware Anti- spam

33 rmathur0@ivc.edu32 of 62 Install Update Scan a device Disinfect (System Restore) Ad-Aware SE Personal www.lavasoft.com Microsoft AntiSpyware www.microsoft.com Spybot Search&Destroy www.safer-networking.org Antivirus Antispyware Anti- spam

34 rmathur0@ivc.edu33 of 62 Antivirus Antispyware Anti- spam

35 rmathur0@ivc.edu34 of 62 Antivirus Antispyware Anti- spam

36 rmathur0@ivc.edu35 of 62 Antivirus Antispyware Anti- spam

37 rmathur0@ivc.edu36 of 62 Firewall

38 rmathur0@ivc.edu37 of 62 Check Firewall-Norton Firewall

39 rmathur0@ivc.edu38 of 62 Check Firewall-Norton Firewall

40 rmathur0@ivc.edu39 of 62 Check Firewall-Norton Firewall

41 rmathur0@ivc.edu40 of 62 Check Firewall-Windows Firewall

42 rmathur0@ivc.edu41 of 62 Check Firewall-Windows Firewall

43 rmathur0@ivc.edu42 of 62 Test Firewall http://www.grc.com http://www.grc.com “Shields UP!!” Common Ports Test Firewall

44 rmathur0@ivc.edu43 of 62 Test Firewall http://www.grc.com http://www.grc.com “Shields UP!!” All Service Ports Test Firewall

45 rmathur0@ivc.edu44 of 62 Test Firewall http://www.symantec.com/home_homeoffice/index.html Firewall

46 rmathur0@ivc.edu45 of 62 Practical Defenses PasswordsPatch Updates Antivirus Antispyware Anti- spam Firewall Browser Security BackupsRootkitsWireless Security

47 rmathur0@ivc.edu46 of 62 Browser Security

48 rmathur0@ivc.edu47 of 62 Browser Security

49 rmathur0@ivc.edu48 of 62 Browser Security

50 rmathur0@ivc.edu49 of 62 Browser Security

51 rmathur0@ivc.edu50 of 62 Browser Security

52 rmathur0@ivc.edu51 of 62 What? Where? When? How? Backups

53 rmathur0@ivc.edu52 of 62 Backups All ProgramsAccessoriesSystem ToolsBackupAdvanced

54 rmathur0@ivc.edu53 of 62 Sony BMG Music Cannot remove rootkit Rootkit detectors Rootkits

55 rmathur0@ivc.edu54 of 62 Wireless Security Use Encryption WEP/WPA Change default SSID & Network Key (Password) Use MAC Filtering

56 rmathur0@ivc.edu55 of 62 Wireless Security Hot Spot Avoid online banking or e- commerce Turn off file sharing Use Firewall

57 rmathur0@ivc.edu56 of 62 Practical Defenses PasswordsPatch Updates Antivirus Antispyware Anti- spam Firewall Browser Security BackupsRootkitsWireless Security

58 rmathur0@ivc.edu57 of 62 Keep your PC Safe - Schedule http://www.hp.com/go/techcenter/pctuneup Weekly Update virus software Update spyware software Full virus scan Full file backup Quarterly Remove old programs Clean your desktop PC Monthly Disk Cleanup Defragment System Restore Point Yearly Backup photos and files to a CD or DVD

59 rmathur0@ivc.edu58 of 62 8 Security Practices to Stay Safe Online - 1 of 2 1.Protect your personal information. 2.Know who you’re dealing with online. 3.Use antivirus software, a firewall, and anti-spyware software, and update them regularly, to help keep your computer safe and secure. 4.Be sure to set up your operating system and Web browser software properly, and update them regularly. http://www.staysafeonline.info/practices/

60 rmathur0@ivc.edu59 of 62 8 Security Practices to Stay Safe Online - 2 of 2 5.Use strong passwords or strong authentication technology to help protect your personal information. 6.Back up important files. 7.Learn what to do id something goes wrong. 8.Protect your children online. http://www.staysafeonline.info/practices/

61 rmathur0@ivc.edu60 of 62 Resources www.staysafeonline.info/practices/ www.eraseyourharddrive.com www.annualcreditreport.com www.consumer.gov/idtheft/ www.cnet.com and http://www.download.com/www.cnet.comhttp://www.download.com/ www.pcmagazine.com www.microsoft.com/athome/security/spyware/software/default.mspx Windows Defender - Spyware Protection for freewww.microsoft.com/athome/security/spyware/software/default.mspx www.lavasoft.com Ad-Aware SE Personalwww.lavasoft.com www.microsoft.com Microsoft AntiSpywarewww.microsoft.com www.safer-networking.org Spybot Search&Destroywww.safer-networking.org www.spoofstick.com/ SpoofStick –helps spot fake websiteswww.spoofstick.com/ www.pcpitstop.com/spycheck/top25.asp

62 rmathur0@ivc.edu61 of 62 Biography Conry-Murray, Andrew and Weafer, Vincent, 2006 The Symantec Guide to Home Internet Security. Addison-Wesley. Ciampa, Mark “The Elements of Security” http://www.hp.com/go/techcenter/pctuneup National Cyber Security Alliance http://www.staysafeonline.info/practices/ http://www.staysafeonline.info/practices/ http://www.staysafeonline.info/basics/ resources/MicrosoftHomeUserGuidebook.pdfhttp://www.staysafeonline.info/basics/ resources/MicrosoftHomeUserGuidebook.pdf Bauknight, Trevor April 2005 Cookies and PIE – An Introduction to Flash Security

63 Computer Security: How to Protect Your Computer By Roopa Mathur Computer Information Management Irvine Valley College www.ivc.eduwww.ivc.edu rmathur0@ivc.edu


Download ppt "Computer Security: How to Protect Your Computer By Roopa Mathur Computer Information Management Irvine Valley College"

Similar presentations


Ads by Google