Presentation is loading. Please wait.

Presentation is loading. Please wait.

Introduction to Desktop Security Protecting your computer and your data.

Similar presentations


Presentation on theme: "Introduction to Desktop Security Protecting your computer and your data."— Presentation transcript:

1 Introduction to Desktop Security Protecting your computer and your data

2 Malware – The Threats VirusesViruses WormsWorms Spyware/AdwareSpyware/Adware PhishingPhishing

3 Viruses Usually come in emailUsually come in email Have to be runHave to be run Trick you into running the virusTrick you into running the virus

4 Worms –self-replicating computer program Looking for youLooking for you Exploiting WeaknessesExploiting Weaknesses Install Back Door or other malwareInstall Back Door or other malware

5 Spyware Comes from other softwareComes from other software Tracks usageTracks usage

6 Phishing Social-engineering schemes use 'spoofed' e-mails to lead consumers to counterfeit websites designed to trick recipients into divulging financial data such as credit card numbers, account usernames, passwords and social security numbers.Social-engineering schemes use 'spoofed' e-mails to lead consumers to counterfeit websites designed to trick recipients into divulging financial data such as credit card numbers, account usernames, passwords and social security numbers. “vishing” variation“vishing” variation www.antiphishing.orgwww.antiphishing.org

7 Phishing Deceptive Subject LineDeceptive Subject Line Apparent genuine contentApparent genuine content Forged Sender’s AddressForged Sender’s Address Disguised LinksDisguised Links Email FormEmail Form

8 Possible Problems Trojan HorsesTrojan Horses Zombie your ComputerZombie your Computer Destroy DataDestroy Data Steal DataSteal Data Key LoggersKey Loggers

9 Software Protections System UpdatesSystem Updates Anti-Virus softwareAnti-Virus software Anti-Spyware SoftwareAnti-Spyware Software FirewallFirewall

10 Anti-Virus Keep up-to-dateKeep up-to-date Scan dailyScan daily Check Files in useCheck Files in use AVG from grisoft.comAVG from grisoft.com

11 Anti-Spyware Update regularlyUpdate regularly Scan regularlyScan regularly AdAware from Download.comAdAware from Download.com

12 Firewall Guards information flowing to and from your computerGuards information flowing to and from your computer ZoneAlarm from zonelabs.comZoneAlarm from zonelabs.com

13 Safe Computing Practices Update the Operating SystemUpdate the Operating System Keep protections updatedKeep protections updated Scan RegularlyScan Regularly

14 Safe Computing Practices Regularly Back-up needed filesRegularly Back-up needed files Don’t download files using P2PDon’t download files using P2P Only get upgrades from trusted sourcesOnly get upgrades from trusted sources Use an alternate browser such as FireFox or ChromeUse an alternate browser such as FireFox or Chrome

15 Safe Computing Practices - email Don’t open attachments even when they are from a trusted sourceDon’t open attachments even when they are from a trusted source Don’t unsubscribe to spamDon’t unsubscribe to spam Don’t click on links in emailsDon’t click on links in emails

16 Safe Computing Practices - Data Don’t give out information especially your SSNDon’t give out information especially your SSN Banks and credit card companies never use email to confirm dataBanks and credit card companies never use email to confirm data Check for secure sites when shopping (https)Check for secure sites when shopping (https) Use a separate credit card and check each month’s billUse a separate credit card and check each month’s bill

17 Learn More CIS 115 Information SecurityCIS 115 Information Security


Download ppt "Introduction to Desktop Security Protecting your computer and your data."

Similar presentations


Ads by Google