Title: filename 1
1Personal Computer Safety
- Les Smee
- Georgia Tech Research Institute
2Quiz
http//www.alwaysuseprotection.com/quiz.aspx
3Famous Hacking
John DraperHandle Cap'n Crunch
Claim to fame Figured out how to make free
phone calls using a plastic prize whistle he
found in a cereal box. Cap'n Crunch introduced
generations of hackers to the glorious concept of
phone "phreaking."
4Famous Hacking
Robert MorrisHandle rtm
Claim to fame The son of the chief scientist at
the National Computer Security Center part of the
National Security Agency (NSA) this Cornell
University graduate student introduced the word
"hacker" into the vernacular when he accidentally
unleashed an Internet worm in 1988. Thousands of
computers were infected and subsequently crashed.
5Famous Hacking
Kevin MitnickHandle Condor
Claim to fame The first hacker to have his face
immortalized on an FBI "Most Wanted" poster. His
status as a repeat offender, a teenage hacker who
couldn't grow up, earned Mitnick the nickname
"The Lost Boy of Cyberspace." Inspired the
movie War Games by hacking NORAD.
6Computer Updates
- Update Operating System
- Automatic
- Manual
- Update individual Applications
- Usually Notified
- Update Virus and Spyware Programs
7Operating Systems
- Maintain updates
- The more common the OS the more vulnerable
- Windows
- Less common/vulnerable
- Linux, Mac OSX
8Viruses
- Run without intention or permission
- Have the ability to "infect" or modify other
files or disk structures - Replicate so it can spread to other files or
systems - Does NOT have to be malicious
9Virus Types
- Boot Sector Infectors attaches to boot program,
runs when computer is started - File Infectors attack file (.exe) and change
code - Macro Viruses use programming language built
into applications like Microsoft Word
10Virus-like
- Worms doesnt infect other files/programs,
completely self-contained - Trojan Horses software intentionally written to
do something it is not intended to do - Bugs unintentional coding that cause a program
to misbehave
11Virus Hoaxes and Myths
- Often Spread via email
- Threaten grave consequences
- http//hoaxbusters.ciac.org/ (HoaxBusters)
- Cannot get a virus simply from reading an email
12Virus Prevention
- More connections more vulnerability
- Pirated Software more likely to contain viruses
than legitimate software - Control access to PCs
- Scan removable media
- Disable booting from removable media
- Can disable its use completely
13Virus Detection
- Use Anti-Virus software
- Norton
- McAfee
- AVG (free)
- Keep AV program up to date (Virus Definitions)
- Auto updates
- Regular Checks
- Weekly Scans
- File Scanning
14Firewall
- Definition Hardware and/or software that limits
access to your computer from the outside world - Cannot stop you from download malicious software
- Virus, trojan, etc.
- Can be configured to allow or disallow specific
types of traffic (ports)
15Firewalls
- Hardware
- Can be combined with other product (switch,
router) - Dlink, Linksys, Netgear
- Software
- Many have free version for personal use
- Zonealarm, Norton, Windows
- Need to get updates
16Testing Firewalls
- Port Probe
- DSLReports
- http//www.pcflank.com/scanner1.htm
17Why not backup?
- Not important
- No Time
- Dont know how
- No routine (forget)
18Causes of Data Loss
- Hardware Failure
- Software Failure
- File System Corruption
- Accidental Deletion
- Virus
- Theft
- Sabotage
- Natural Disaster
19Backup Methods
- Medium
- Tape
- CD/DVD
- Removable Drive
- Internal duplicate drive
- Backup Specific Files
- Windows Backup
20Backups
- Make backing up routine (set reminder)
- Store backups in safe location
- One set on site and one set off
- Destroy old backups
21Browsing
- Get browser updates
- Try alternative browsers (Firefox)
- Verify addresses in address bar
- Regularly delete stored data
- Cookies
- Block pop-ups
22Online Shopping
- Look for padlock or https//
- Use credit cards
- Single use
- Research Company
- (www.bbb.org) or (www.naag.org)
- Know return policy
- Look at URL closely
- Print or save order confirmation
23Email
- Generally not secure
- Beware of Phishing
- Dont trust attachments
- Avoid Spam
- HTML email can be bad
- Some mail programs allow you to turn off html
24Email Donts
- Use full name as sender
- Give out passwords
- Use primary email for posting in public forums
- Respond to spam unsubscribe address
- Buy from spammers
- Include name in address
25Avoiding Spam
- How do spammer get your address?
- Spambot or Scraper to crawl the web looking for
addresses - Trick people into submitting their addresses
- Pick and domain and send thousands of emails
26Avoiding Spam
- Use disposable addresses
- Watch for Yes I want to receive checkboxes
- Disguise email address on blogs, chatrooms, etc
- Joeblow_at_YAdelete_thisHOO.COM
- joeblow64 yahoo46com
- Use unguessable email address
- Dont respond to spam, even to unsubscribe
27Wireless Security
- Easy to intercept wireless packets
- Airsnort, Aircrack
- http//www.wi-foo.com/index-3.html
- Change defaults
- SSID (Broadcast)
- Encryption
- Mac Filtering
28Wireless Security
- OK to use unencrypted wireless on encrypted sites
- Banking
- Shopping
29Passwords
- Use different for secure and non-secure sites
- Ideally use different for each site dealing with
money - Change regularly
- Use combination of letters, numbers, symbols
- Dont allow programs to remember critical
passwords
30Spyware
- Virtually all internet connected computers get
spyware - Symptoms of spyware
- Endless pop-ups
- Redirected to websites you didnt enter
- New icons in tasktray
- New toolbars in browser
- Computer is suddenly slow when accessing/saving
files
31Spyware Detection/Removal
- Run checks weekly
- Some antivirus programs check
- Free stand alone programs
- Spybot
- Adaware
32Chatting Safely
- Dont give out identifying info
- Name
- Phone
- Location/School
- Email
- Remember people do lie
- Choose non-identifiable screen name
- Dont meet people offline (if you do make it very
public) - Know how to save conversations and report
problems - Dont open/except files sent to you
33Chatting for Kids
- Only use monitored rooms
- Dont allow private chats
- Observe who kids talk with
- Choose rooms appropriate for age level
- Parents check out sites first
- Limit or dont allow webcam use
34Child safety
- Keep computer in family area
- Spend time with child online
- Tell child how to end/report situations where
he/she feels uncomfortable - Give feedback to ISPs about what you
like/dislike/expect - Use time limits
- Ask child to sign online agreement
35(No Transcript)
36Communal Sites
- Examples
- FaceBook
- MySpace
- Default security is low
- Assumes you want everyone to know everything
- What happens here stays here FOREVER
- Friends may not have same privacy concerns
- Upload pictures
- Pictures/sites used in court
37Communal Sites
- Sites portray themselves as safe
- Based on the assumption that everyone is honest
- Some create profiles for other people
- People often alter themselves positively in an
online profile - Third parties using information
- Police
- School administrators
- Spouses
38Mobiles (phone)
- FaceBook and Myspace plan to extend to mobiles
- Will be able to post to web pages directly
- Can search for other users emails and numbers
- Chat already on mobiles
- Yahoo, AOL, MSN
- Ability to send/receive photos and video
39Health Concerns
- Heat From laptop
- Carpal Tunnel Syndrome
- Proper Desk Setup
- Monitor height
- Chair height (feet flat)
- Get up every hour
40Keeping Kids Safe Online http//www.ou.edu/oupd/ki
dtool.htm SafeKids Website http//www.safekids.co
m/ Safekids Quiz http//www.safekids.com/quiz/ A
nother Internet Safety Quiz http//iol.ie/dromore
/safety/quiz/quiz.htm MySpace Safety http//www.w
iredsafety.org/internet101/myspaceguide.html Safe
ty on Communal Sites http//www.twu.edu/o-sl/Couns
eling/SelfHelp066.html Software
Downloads http//www.download.com/