filename 1 - PowerPoint PPT Presentation

1 / 40
About This Presentation
Title:

filename 1

Description:

– PowerPoint PPT presentation

Number of Views:75
Avg rating:3.0/5.0
Slides: 41
Provided by: Les152
Category:
Tags: filename

less

Transcript and Presenter's Notes

Title: filename 1


1
Personal Computer Safety
  • Les Smee
  • Georgia Tech Research Institute

2
Quiz
http//www.alwaysuseprotection.com/quiz.aspx
3
Famous Hacking
John DraperHandle Cap'n Crunch
Claim to fame Figured out how to make free
phone calls using a plastic prize whistle he
found in a cereal box. Cap'n Crunch introduced
generations of hackers to the glorious concept of
phone "phreaking."
4
Famous Hacking
Robert MorrisHandle rtm
Claim to fame The son of the chief scientist at
the National Computer Security Center part of the
National Security Agency (NSA) this Cornell
University graduate student introduced the word
"hacker" into the vernacular when he accidentally
unleashed an Internet worm in 1988. Thousands of
computers were infected and subsequently crashed.
5
Famous Hacking
Kevin MitnickHandle Condor
Claim to fame The first hacker to have his face
immortalized on an FBI "Most Wanted" poster. His
status as a repeat offender, a teenage hacker who
couldn't grow up, earned Mitnick the nickname
"The Lost Boy of Cyberspace." Inspired the
movie War Games by hacking NORAD.
6
Computer Updates
  • Update Operating System
  • Automatic
  • Manual
  • Update individual Applications
  • Usually Notified
  • Update Virus and Spyware Programs

7
Operating Systems
  • Maintain updates
  • The more common the OS the more vulnerable
  • Windows
  • Less common/vulnerable
  • Linux, Mac OSX

8
Viruses
  • Run without intention or permission
  • Have the ability to "infect" or modify other
    files or disk structures
  • Replicate so it can spread to other files or
    systems
  • Does NOT have to be malicious

9
Virus Types
  • Boot Sector Infectors attaches to boot program,
    runs when computer is started
  • File Infectors attack file (.exe) and change
    code
  • Macro Viruses use programming language built
    into applications like Microsoft Word

10
Virus-like
  • Worms doesnt infect other files/programs,
    completely self-contained
  • Trojan Horses software intentionally written to
    do something it is not intended to do
  • Bugs unintentional coding that cause a program
    to misbehave

11
Virus Hoaxes and Myths
  • Often Spread via email
  • Threaten grave consequences
  • http//hoaxbusters.ciac.org/ (HoaxBusters)
  • Cannot get a virus simply from reading an email

12
Virus Prevention
  • More connections more vulnerability
  • Pirated Software more likely to contain viruses
    than legitimate software
  • Control access to PCs
  • Scan removable media
  • Disable booting from removable media
  • Can disable its use completely

13
Virus Detection
  • Use Anti-Virus software
  • Norton
  • McAfee
  • AVG (free)
  • Keep AV program up to date (Virus Definitions)
  • Auto updates
  • Regular Checks
  • Weekly Scans
  • File Scanning

14
Firewall
  • Definition Hardware and/or software that limits
    access to your computer from the outside world
  • Cannot stop you from download malicious software
  • Virus, trojan, etc.
  • Can be configured to allow or disallow specific
    types of traffic (ports)

15
Firewalls
  • Hardware
  • Can be combined with other product (switch,
    router)
  • Dlink, Linksys, Netgear
  • Software
  • Many have free version for personal use
  • Zonealarm, Norton, Windows
  • Need to get updates

16
Testing Firewalls
  • Port Probe
  • DSLReports
  • http//www.pcflank.com/scanner1.htm

17
Why not backup?
  • Not important
  • No Time
  • Dont know how
  • No routine (forget)

18
Causes of Data Loss
  • Hardware Failure
  • Software Failure
  • File System Corruption
  • Accidental Deletion
  • Virus
  • Theft
  • Sabotage
  • Natural Disaster

19
Backup Methods
  • Medium
  • Tape
  • CD/DVD
  • Removable Drive
  • Internal duplicate drive
  • Backup Specific Files
  • Windows Backup

20
Backups
  • Make backing up routine (set reminder)
  • Store backups in safe location
  • One set on site and one set off
  • Destroy old backups

21
Browsing
  • Get browser updates
  • Try alternative browsers (Firefox)
  • Verify addresses in address bar
  • Regularly delete stored data
  • Cookies
  • Block pop-ups

22
Online Shopping
  • Look for padlock or https//
  • Use credit cards
  • Single use
  • Research Company
  • (www.bbb.org) or (www.naag.org)
  • Know return policy
  • Look at URL closely
  • Print or save order confirmation

23
Email
  • Generally not secure
  • Beware of Phishing
  • Dont trust attachments
  • Avoid Spam
  • HTML email can be bad
  • Some mail programs allow you to turn off html

24
Email Donts
  • Use full name as sender
  • Give out passwords
  • Use primary email for posting in public forums
  • Respond to spam unsubscribe address
  • Buy from spammers
  • Include name in address

25
Avoiding Spam
  • How do spammer get your address?
  • Spambot or Scraper to crawl the web looking for
    addresses
  • Trick people into submitting their addresses
  • Pick and domain and send thousands of emails

26
Avoiding Spam
  • Use disposable addresses
  • Watch for Yes I want to receive checkboxes
  • Disguise email address on blogs, chatrooms, etc
  • Joeblow_at_YAdelete_thisHOO.COM
  • joeblow64 yahoo46com
  • Use unguessable email address
  • Dont respond to spam, even to unsubscribe

27
Wireless Security
  • Easy to intercept wireless packets
  • Airsnort, Aircrack
  • http//www.wi-foo.com/index-3.html
  • Change defaults
  • SSID (Broadcast)
  • Encryption
  • Mac Filtering

28
Wireless Security
  • OK to use unencrypted wireless on encrypted sites
  • Banking
  • Shopping

29
Passwords
  • Use different for secure and non-secure sites
  • Ideally use different for each site dealing with
    money
  • Change regularly
  • Use combination of letters, numbers, symbols
  • Dont allow programs to remember critical
    passwords

30
Spyware
  • Virtually all internet connected computers get
    spyware
  • Symptoms of spyware
  • Endless pop-ups
  • Redirected to websites you didnt enter
  • New icons in tasktray
  • New toolbars in browser
  • Computer is suddenly slow when accessing/saving
    files

31
Spyware Detection/Removal
  • Run checks weekly
  • Some antivirus programs check
  • Free stand alone programs
  • Spybot
  • Adaware

32
Chatting Safely
  • Dont give out identifying info
  • Name
  • Phone
  • Location/School
  • Email
  • Remember people do lie
  • Choose non-identifiable screen name
  • Dont meet people offline (if you do make it very
    public)
  • Know how to save conversations and report
    problems
  • Dont open/except files sent to you

33
Chatting for Kids
  • Only use monitored rooms
  • Dont allow private chats
  • Observe who kids talk with
  • Choose rooms appropriate for age level
  • Parents check out sites first
  • Limit or dont allow webcam use

34
Child safety
  • Keep computer in family area
  • Spend time with child online
  • Tell child how to end/report situations where
    he/she feels uncomfortable
  • Give feedback to ISPs about what you
    like/dislike/expect
  • Use time limits
  • Ask child to sign online agreement

35
(No Transcript)
36
Communal Sites
  • Examples
  • FaceBook
  • MySpace
  • Default security is low
  • Assumes you want everyone to know everything
  • What happens here stays here FOREVER
  • Friends may not have same privacy concerns
  • Upload pictures
  • Pictures/sites used in court

37
Communal Sites
  • Sites portray themselves as safe
  • Based on the assumption that everyone is honest
  • Some create profiles for other people
  • People often alter themselves positively in an
    online profile
  • Third parties using information
  • Police
  • School administrators
  • Spouses

38
Mobiles (phone)
  • FaceBook and Myspace plan to extend to mobiles
  • Will be able to post to web pages directly
  • Can search for other users emails and numbers
  • Chat already on mobiles
  • Yahoo, AOL, MSN
  • Ability to send/receive photos and video

39
Health Concerns
  • Heat From laptop
  • Carpal Tunnel Syndrome
  • Proper Desk Setup
  • Monitor height
  • Chair height (feet flat)
  • Get up every hour

40
Keeping Kids Safe Online http//www.ou.edu/oupd/ki
dtool.htm SafeKids Website http//www.safekids.co
m/ Safekids Quiz http//www.safekids.com/quiz/ A
nother Internet Safety Quiz http//iol.ie/dromore
/safety/quiz/quiz.htm MySpace Safety http//www.w
iredsafety.org/internet101/myspaceguide.html Safe
ty on Communal Sites http//www.twu.edu/o-sl/Couns
eling/SelfHelp066.html Software
Downloads http//www.download.com/
Write a Comment
User Comments (0)
About PowerShow.com