Home computer security - PowerPoint PPT Presentation

1 / 34
About This Presentation
Title:

Home computer security

Description:

go on Microsoft Download center website, or click 'Start' on the right corn of ... See performance. Problems. Block unwanted programs! www.Portforward.com ... – PowerPoint PPT presentation

Number of Views:40
Avg rating:3.0/5.0
Slides: 35
Provided by: stacy87
Category:

less

Transcript and Presenter's Notes

Title: Home computer security


1
Home computer security
  • By Stacy Wang
  • Ben Wright

2
Our Goal
  • Audience
  • What
  • Why
  • How

3
Core Topics
  • Password
  • Anti-Virus
  • Spoofing
  • Firewalls

4
password
  • the benefit of using longer passwords

5
Password
  • Password is useful to protect our own
    information.
  • The Using Dictionary program
  • Access to our files, e-mail, funds or personal
    account information
  • Will be able to modify these files, or to
    subscribe to unwanted services for which we have
    to pay.

6
Password(continue.)
  • Sniffer
  • A technical way of learning passwords to look at
    the raw data transmitted across the net and
    decipher its contents.

7
Password (Continue)
  • Help all user to develop a necessary degree of
    complexity
  • The Length
  • The Width
  • The Depth
  • The Times
  • Password Hashing Function

8
Password
Network Security Essentials Stallings
9
Anti-Virus
  • What is virus?
  • It is something into our computer though network.
  • Can be infect other program by modifying them to
    include a possibly evolved copy of itself.
  • There are some Virus
  • The Malicious Programs
  • The Trojans Horse

10
better to install and keeping update Anti-Virus
Software
  • Here are a few primary indicators that your
    computer might be infected
  • Your computer runs more slowly than normal
  • Your computer stops responding or locks up often
  • Your computer crashes and restarts every few
    minutes
  • Your computer restarts on its own and then fails
    to run normally
  • Applications on your computer don't work
    correctly
  • Disks or disk drives are inaccessible
  • You can't print correctly
  • You see unusual error messages
  • You see distorted menus and dialog boxes

11
How do we remove the computer virus?
  • go on Microsoft Download center website, or
    click Start on the right corn of you monitor,
    then click Control Panel
  • Click System, and then click the Automatic
    Updates tab.
  • Click Performance and Maintenance, click System,
    and then click the Automatic Updates tab.
  • Click the option that you want. Make sure
    Automatic Updates is not turn
  • If you currently use antivirus software, visit
    the manufacturer's Web site, update it, and then
    perform a thorough scan of your system. If you
    don't currently use antivirus software, subscribe
    to a service and scan your system immediately.
  • Download, install, and run the Malicious Software
    Removal Tool (for Microsoft Windows XP or Windows
    2000 users). Note that this tool does not prevent
    viruses from infecting your system it only helps
    to remove existing viruses.

12
Phishing - History
  • To steal consumers' personal identity data and
    financial account credentials1
  • Around 1995 on AOL
  • Only needed user name
  • Evolving Complexity
  • Being Educated is the best defense
  • Bait and Switch

1 http//www.AntiPhishing.org
13
Setting the Trap
  • Email and Spam
  • In 2004, 82 of US email was spam¹
  • 2 billion spam emails are sent every day2
  • ISPs and Spam filters only work so good.
  • Zombies
  • Targets eBay, Amazon, CitiBank

1 http//MessageLabs.com 2004 2
http//mailfrontier.com
14
Spotting a fake
  • Your account has been suspended.
  • Ask you to provide private information
  • Not personalized Valued Customer
  • Digital signature

http//survey.mailfrontier.com
15
(No Transcript)
16
(No Transcript)
17
(No Transcript)
18
(No Transcript)
19
(No Transcript)
20
www.PayPai.com
21
(No Transcript)
22
(No Transcript)
23
And the Switch
  • Stealing source
  • Look identical to their real counterparts
  • https//
  • .

24
Help is on the Way
Version 2.0 Firefox caught 79 phishing sites
25
Version 7.0
26
Firewalls
  • Designed to monitor / screen network traffic

27
Functions of a Firewall
  • Packet filtering
  • Application proxy
  • NAT (network address translation)
  • Monitoring and logging

28
Transmission Control Protocol and Internet
Protocol TCP/IP
  • Packet filtering
  • Read the headers what and where
  • Cost effective
  • Examine transport like TCP or UDP
  • Weakness no authentication, application attacks

29
More Defenses
  • Application Proxy
  • Deeper inspection
  • Costly each application has own rules

30
Added Benefits
  • NAT (Network Address Translation)
  • Communication with firewall
  • Monitoring and logging
  • Track attempts
  • See performance

31
Problems
  • Block unwanted programs!
  • www.Portforward.com
  • Confusing to configure

32
Are you protected?
33
Setting Up Firewall
34
Ports and Configuring
Write a Comment
User Comments (0)
About PowerShow.com