Download presentation
Presentation is loading. Please wait.
Published byNicholas Rodgers Modified over 9 years ago
1
Introduction to Desktop Security Protecting your computer and your data
2
Malware – The Threats VirusesViruses WormsWorms Spyware/AdwareSpyware/Adware PhishingPhishing
3
Viruses Usually come in emailUsually come in email Have to be runHave to be run Trick you into running the virusTrick you into running the virus
4
Worms –self-replicating computer program Looking for youLooking for you Exploiting WeaknessesExploiting Weaknesses Install Back Door or other malwareInstall Back Door or other malware
5
Spyware Comes from other softwareComes from other software Tracks usageTracks usage
6
Phishing Social-engineering schemes use 'spoofed' e-mails to lead consumers to counterfeit websites designed to trick recipients into divulging financial data such as credit card numbers, account usernames, passwords and social security numbers.Social-engineering schemes use 'spoofed' e-mails to lead consumers to counterfeit websites designed to trick recipients into divulging financial data such as credit card numbers, account usernames, passwords and social security numbers. “vishing” variation“vishing” variation www.antiphishing.orgwww.antiphishing.org
7
Phishing Deceptive Subject LineDeceptive Subject Line Apparent genuine contentApparent genuine content Forged Sender’s AddressForged Sender’s Address Disguised LinksDisguised Links Email FormEmail Form
8
Possible Problems Trojan HorsesTrojan Horses Zombie your ComputerZombie your Computer Destroy DataDestroy Data Steal DataSteal Data Key LoggersKey Loggers
9
Software Protections System UpdatesSystem Updates Anti-Virus softwareAnti-Virus software Anti-Spyware SoftwareAnti-Spyware Software FirewallFirewall
10
Anti-Virus Keep up-to-dateKeep up-to-date Scan dailyScan daily Check Files in useCheck Files in use AVG from grisoft.comAVG from grisoft.com
11
Anti-Spyware Update regularlyUpdate regularly Scan regularlyScan regularly AdAware from Download.comAdAware from Download.com
12
Firewall Guards information flowing to and from your computerGuards information flowing to and from your computer ZoneAlarm from zonelabs.comZoneAlarm from zonelabs.com
13
Safe Computing Practices Update the Operating SystemUpdate the Operating System Keep protections updatedKeep protections updated Scan RegularlyScan Regularly
14
Safe Computing Practices Regularly Back-up needed filesRegularly Back-up needed files Don’t download files using P2PDon’t download files using P2P Only get upgrades from trusted sourcesOnly get upgrades from trusted sources Use an alternate browser such as FireFox or ChromeUse an alternate browser such as FireFox or Chrome
15
Safe Computing Practices - email Don’t open attachments even when they are from a trusted sourceDon’t open attachments even when they are from a trusted source Don’t unsubscribe to spamDon’t unsubscribe to spam Don’t click on links in emailsDon’t click on links in emails
16
Safe Computing Practices - Data Don’t give out information especially your SSNDon’t give out information especially your SSN Banks and credit card companies never use email to confirm dataBanks and credit card companies never use email to confirm data Check for secure sites when shopping (https)Check for secure sites when shopping (https) Use a separate credit card and check each month’s billUse a separate credit card and check each month’s bill
17
Learn More CIS 115 Information SecurityCIS 115 Information Security
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.