Computer security: your life, your security - PowerPoint PPT Presentation

1 / 42
About This Presentation
Title:

Computer security: your life, your security

Description:

Mr. Michael Bruckner, Vice President. Mr. George Andrews, Member. Mr. Stephen Liu, Member ... First, let's look at some of the events that you may have already ... – PowerPoint PPT presentation

Number of Views:55
Avg rating:3.0/5.0
Slides: 43
Provided by: michaelb72
Category:

less

Transcript and Presenter's Notes

Title: Computer security: your life, your security


1
Computer security your life, your security
  • North Olmsted High School Computer Club Presents

2
Tonights Presenters Include
  • Mrs. Paula Caso, Advisor
  • Mr. Michael Bruckner, Vice President
  • Mr. George Andrews, Member
  • Mr. Stephen Liu, Member
  • Mr. Lee Saunders, Member
  • Mr. Justin Wolf, Member

3
Topics to be Covered Tonight
  • What is Internet Security?
  • What causes these threats?
  • Demonstration of threats
  • How do we protect ourselves?
  • Where do we go from here?
  • Question and Answer session
  • Surveys, closing thoughts, etc.

4
What is Internet Security?
5
First, lets look at some of the events that you
may have already experienced
Spyware Rubbernecking By McAfee
6
Internet Security, Defined
  • Internet security is defined, according to
    IEC.org, as
  • the practice of protecting and preserving
    private resources and information on the
    Internet.

7
Viruses
  • Malicious code designed to harm or annoy
  • Attaches to Host File
  • Usually contained to infected system
  • Examples
  • Cascade, Disk Killer, One_Half, and AntiExe

8
Worms
  • Written with malicious intent
  • Self contained and self spreading
  • Do not need Host Files
  • Can live inside Word and other documents
  • Example
  • The infamous Mydoom worm

9
Trojans
  • Written to cause harm
  • Not self replicating
  • Must install manually via poisoned file or
    email
  • Hide malicious intent behind legitimate programs
    or processes
  • Example
  • Trojan.Vundo

10
A quick recap of the 3 most known internet
threats
11
Dialers
  • Can be annoying, dangerous, and costly
  • Use computers modem to access premium phone
    numbers or web sites
  • Often, user will be charged for premium phone
    calls or other internet charges

12
Keyloggers
  • Capture keystrokes, words, phrases, etc. from a
    users keyboard
  • Can be software or hardware based.
  • Generally, its illegal for employers to use
    these devices to spy on employees

13
Ransomware
  • Is extremely new, and only a few of these
    programs exist thus far.
  • Encrypts certain files or folders
  • Makes user pay to release the files
  • Some threats do not sufficiently encrypt files,
    so they can be restored easily

14
Root Kits
  • New technology used to hide code or programs
  • Often incorporated to hide Trojan files.
  • Normal virus software will not usually detect.
  • Example
  • Sonys CDs that shipped last year with copy
    protection. These were really root kits.

15
Where did these threats come from?
  • Unavoidable sources
  • Personal Slip Ups

16
  • First viruses were written as competitions
    between bored programmers rather than to cause
    harm
  • Many programmers would include their names in
    their viruses as a way to get bragging rights
  • Over time, viruses morphed into the destructive
    forces that they are today

17
UnaVoidable sources
18
(No Transcript)
19
Could you see a difference between the two web
sites?
  • Internet threats are becoming more life-like
  • Phishing is a technique used to steal information
    through genuine looking web sites
  • In the previous slide, they are the same
  • A phishing site would look identical to the
    legitimate site

20
Spam
21
Spam
22
Spam
23
Spam
24
Instant Messaging
  • Whats the difference between these windows?

25
  • If we look at the actual links we see that they
    are the same!

26
Personal slip ups
27
Not Watching What We Type
Google.com ok. Thats safe
Goggle.com OOPS! What happens now???
28
Example of Browser Redirects
(A malicious drive-by download)
29
Not Watching What We Type, Continued
  • Check spelling
  • Misspelled URLs can lead to malicious sites and
    viruses
  • Multiple domains, redirecting to legitimate site
  • Check for correct suffix (.com, .net, .org,
    .info, .us, etc.)

30
Demonstration of threats
  • Presented By George Andrews

31
Demonstration Viruses
32
Demonstration Viruses
  • .

33
How can we protect ourselves?
34
Physical
  • Free Virus Software
  • AVG Grisoft 7.5 (Included on CD)
  • Anti Spyware / AdWare
  • Ad-Aware
  • GriSoft Anti-Spyware
  • SpyBot Search and Destroy
  • ALL above are on CD
  • SiteAdvisor
  • Rates web sites based on content such as SPAM,
    privacy, and exploit safety.
  • (SiteAdvisor is included on your CD)

35
Physical
  • Look for security sites specific to each web site
  • For example, Yahoo! lets you create a custom sign
    in seal, so that you know that you are on a
    genuine site

Yahoo! My Sign-in Seal
36
Mental
  • Look before you click go
  • Check web address spelling
  • Look before you click
  • Dont click a link until you have verified its
    destination
  • Think before you open
  • Scan ALL files for threats before you open
    REGARDLESS OF WHERE IT COMES FROM

37
Where do we go from here?
38
These concepts are important now more than ever
  • Online Banking
  • E-mailing
  • Photo Sharing
  • Online Shopping

39
Question and answer session
40
A few final thoughts
41
Please
  • Fill out survey located in folder
  • Look over CD content sheet
  • March 17th 700 845 -gt mark your calendars!
  • Sign up to be on our computer club email
    newsletter

42
Thank You!
Write a Comment
User Comments (0)
About PowerShow.com