Internet Security and Your Computer

Download Report

Transcript Internet Security and Your Computer

Internet Security and Your
Computer
Welcome to Boot Camp
OR
How to surf the web safely
Without becoming paranoid
Subjects We’ll cover
•
•
•
•
•
viruses, worms, trojan horses, spyware
virus scanners, firewalls, spyware blockers
E-mail protection, browser protection
home network security, wireless security
keeping kids safe in “chat rooms”
The good, the bad and the ugly
THE GOOD
VIRUS SCANNERS
FIREWALLS
SPY-WARE BLOCKERS
POP-UP BLOCKERS
E-MAIL SCANNERS
SPAM BLOCKERS
SECURITY SETTINGS
KNOWLEDGE
THE BAD
VIRUSES
WORMS
TROJAN HORSES
SPY-WARE
DIRECT ATTACK
SPAM
COST DIALERS
DATA MINERS
BROWSER JACKING
The Ugly
Welcome to Internet Boot Camp
Listen up recruits
Internet security basic training is about to
start!
Your computer is like your house
Are you connected to the Internet
without using a virus scanner a
firewall and a spy-ware blocker?
You might as well leave your front
door open 24/7
Your computer is like your house
• Virus scanner
• Police officer
Your computer is like your house
• Virus scanner
• Firewall
• Police officer
• Door guard
Your computer is like your house
• Virus scanner
• Firewall
• Spy-ware blocker
• Police officer
• Door guard
• Security guard
Your computer is like your house
•
•
•
•
Virus scanner
Firewall
Spy-ware blocker
Browser settings
•
•
•
•
Police officer
Door guard
Security guard
Another guard
Your computer is like your house
•
•
•
•
•
Virus scanner
Firewall
Spy-ware blocker
Browser settings
Virus/Worm/Trojan
•
•
•
•
•
Police officer
Door guard
Security guard
Another guard
Criminals
Your computer is like your house
•
•
•
•
•
•
Virus scanner
Firewall
Spy-ware blocker
Browser settings
Virus/Worm/Trojan
Spy-ware
•
•
•
•
•
•
Police officer
Door guard
Security guard
Another guard
Criminals
Thief
Your computer is like your house
•
•
•
•
•
•
•
Virus scanner
Firewall
Spy-ware blocker
Browser settings
Virus/Worm/Trojan
Spy-ware
Spam
•
•
•
•
•
•
•
Police officer
Door guard
Security guard
Another guard
Criminals
Thief
Junk mail
Meet The Enemy
• virus
Meet The Enemy
• virus
• worm
Meet The Enemy
• virus
• worm
• trojan horse
Meet The Enemy
•
•
•
•
virus
worm
trojan horse
spam
Meet The Enemy
•
•
•
•
•
virus
worm
trojan horse
spam
spy-ware
Meet the Allies
• Virus scanning software
Meet the Allies
• Virus scanning software
• Firewall hardware/software
Meet the Allies
• Virus scanning software
• Firewall hardware/software
• E-mail scanning software virus/spam
Meet the Allies
•
•
•
•
Virus scanning software
Firewall hardware/software
E-mail scanning software virus/spam
Spy-ware blocking software
Meet the Allies
•
•
•
•
•
Virus scanning software
Firewall hardware/software
E-mail scanning software virus/spam
Spy-ware blocking software
Pop-up blocking software
Meet the Allies
•
•
•
•
•
•
Virus scanning software
Firewall hardware/software
E-mail scanning software virus/spam
Spy-ware blocking software
Pop-up blocking software
Operating system updates
Meet the Allies
•
•
•
•
•
•
•
Virus scanning software
Firewall hardware/software
E-mail scanning software virus/spam
Spy-ware blocking software
Pop-up blocking software
Operating system updates
Browser security settings
E-Mail
friend or foe?
Don’t let the enemy use your E-mail
to launch their attacks
Securing E-mail
Web Mail
Server Mail
More secure
Less secure
Mail stays on host
server
Mail delivered to
Local computer
Access from any
computer
Needs mail program
& account setup
Securing E-mail
• Use an E-mail virus scanner
Securing E-mail
• Use an E-mail virus scanner
• Block images in HTML messages
Securing E-mail
• Use an E-mail virus scanner
• Block images in HTML messages
• View messages in plain text / block HTML
Securing E-mail
•
•
•
•
Use an E-mail virus scanner
Block images in HTML messages
View messages in plain text / block HTML
Use spam blocking software or ISP blocking
Securing E-mail
•
•
•
•
•
Use an E-mail virus scanner
Block images in HTML messages
View messages in plain text / block HTML
Use spam blocking software or ISP blocking
Set up spoof E-mail account(s)
Securing E-mail
•
•
•
•
•
•
Use an E-mail virus scanner
Block images in HTML messages
View messages in plain text / block HTML
Use spam blocking software or ISP blocking
Set up spoof E-mail account(s)
Update E-mail software regularly
Securing E-mail
• Never open attachments from “?” sender
Securing E-mail
• Never open attachments from “?” sender
• Never “unsubscribe” from spam
Securing E-mail
• Never open attachments from “?” sender
• Never “unsubscribe” from spam
• Never click on links in spam / junk mail
Securing E-mail
•
•
•
•
Never open attachments from “?” sender
Never “unsubscribe” from spam
Never click on links in spam / junk mail
Never give information reply to “?” mail
Securing E-mail
•
•
•
•
•
Never open attachments from “?” sender
Never “unsubscribe” from spam
Never click on links in spam / junk mail
Never give information reply to “?” mail
Never give real E-mail address to websites
Securing E-mail
•
•
•
•
•
•
Never open attachments from “?” sender
Never “unsubscribe” from spam
Never click on links in spam / junk mail
Never give information reply to “?” mail
Never give real E-mail address to websites
Beware of “phishing”
Eliminating Spy-ware
The enemy has spies everywhere
“All spies will be shot on sight”
Eliminating Spy-ware
• Download and install AD-AWARE
Eliminating Spy-ware
• Download and install AD-AWARE
• Download and install Spybot Search &
Destroy
Eliminating Spy-ware
• Download and install AD-AWARE
• Download and install Spybot Search &
Destroy
• Always use a firewall that monitors
incoming and outgoing internet traffic
Web Browser
who’s in control
The web browser. Your gateway to the
internet and a hackers gateway to your
computer
Secure that browser soldier!
Securing the browser
• Always use a firewall incoming/outgoing
BROSDBAND DSL/CABLE
Securing the browser
• Always use a firewall incoming/outgoing
• XP must be on SP2
Securing the browser
• Always use a firewall incoming/outgoing
• XP must be on SP2
• Security settings as high as you can tolerate
Securing the browser
•
•
•
•
Always use a firewall incoming/outgoing
XP must be on SP2
Security settings as high as you can tolerate
IE must be latest version / updated regularly
(windows update)
Securing the browser
•
•
•
•
•
Always use a firewall incoming/outgoing
XP must be on SP2
Security settings as high as you can tolerate
IE must be latest version / updated regularly
Disable Active-X controls
Never enable activeX to download
a file.
You don’t need it to download
files. This is a trick to get you to
enable activeX
Home network security
Let’s not be sharing information with
the enemy
Securing a home network
• Always use a firewall
Securing a home network
• Always use a firewall
• Never share the OS hard drive
Securing a home network
• Always use a firewall
• Never share the OS hard drive
• Don’t share drives / share folders
Securing a home network
•
•
•
•
Always use a firewall
Never share the OS hard drive
Don’t share drives / share folders
Enable encryption on wireless (WEP)
Securing a home network
•
•
•
•
•
Always use a firewall
Never share the OS hard drive
Don’t share drives / share folders
Enable encryption on wireless (WEP)
Hide SSID on wireless
Securing a home network
•
•
•
•
•
•
Always use a firewall
Never share the OS hard drive
Don’t share drives / share folders
Enable encryption on wireless (WEP)
Hide SSID on wireless
Change passwords on routers and modems
The 10 security commandments
• Thou shalt use and regularly update an antivirus program
• Thou shalt use a firewall program
• Thou shalt run Windows Update regularly
• Thou shalt not open E-mail attachments
• Thou shalt not share hard drives
The 10 security commandments
• Thou shalt not give out personal information
to non-trusted sites
• Thou shalt use an E-mail scanning program
• Thou shalt use a spy-ware blocking program
• Thou shalt use encryption on wireless
networks
• Thou shalt use common sense
Chat room security
Education is the answer
Chat Room Security
• Never share any personal information
Chat Room Security
• Never share any personal information
• Never give out E-mail address
Chat Room Security
• Never share any personal information
• Never give out E-mail address
• Never plan to meet anyone
Chat Room Security
•
•
•
•
Never share any personal information
Never give out E-mail address
Never plan to meet anyone
Never go to a web page from chat room
Chat Room Security
•
•
•
•
•
Never share any personal information
Never give out E-mail address
Never plan to meet anyone
Never go to a web page from chat room
Never trust anyone on-line
Chat Room Security
•
•
•
•
•
•
Never share any personal information
Never give out E-mail address
Never plan to meet anyone
Never go to a web page from chat room
Never trust anyone on-line
Always use a spoof identity
Chat Room Security
•
•
•
•
•
•
•
Never share any personal information
Never give out E-mail address
Never plan to meet anyone
Never go to a web page from chat room
Never trust anyone on-line
Always use a spoof identity
Chat room security could be life & death
Happy Surfing
Congratulations!
You’ve graduated from Security
Boot Camp