Title: Computer security: your life, your security
1Computer security your life, your security
- North Olmsted High School Computer Club Presents
2Tonights Presenters Include
- Mrs. Paula Caso, Advisor
- Mr. Michael Bruckner, Vice President
- Mr. George Andrews, Member
- Mr. Stephen Liu, Member
- Mr. Lee Saunders, Member
- Mr. Justin Wolf, Member
3Topics to be Covered Tonight
- What is Internet Security?
- What causes these threats?
- Demonstration of threats
- How do we protect ourselves?
- Where do we go from here?
- Question and Answer session
- Surveys, closing thoughts, etc.
4What is Internet Security?
5First, lets look at some of the events that you
may have already experienced
Spyware Rubbernecking By McAfee
6Internet Security, Defined
- Internet security is defined, according to
IEC.org, as - the practice of protecting and preserving
private resources and information on the
Internet.
7Viruses
- Malicious code designed to harm or annoy
- Attaches to Host File
- Usually contained to infected system
- Examples
- Cascade, Disk Killer, One_Half, and AntiExe
8Worms
- Written with malicious intent
- Self contained and self spreading
- Do not need Host Files
- Can live inside Word and other documents
- Example
- The infamous Mydoom worm
9Trojans
- Written to cause harm
- Not self replicating
- Must install manually via poisoned file or
email - Hide malicious intent behind legitimate programs
or processes - Example
- Trojan.Vundo
10A quick recap of the 3 most known internet
threats
11Dialers
- Can be annoying, dangerous, and costly
- Use computers modem to access premium phone
numbers or web sites - Often, user will be charged for premium phone
calls or other internet charges
12Keyloggers
- Capture keystrokes, words, phrases, etc. from a
users keyboard - Can be software or hardware based.
- Generally, its illegal for employers to use
these devices to spy on employees
13Ransomware
- Is extremely new, and only a few of these
programs exist thus far. - Encrypts certain files or folders
- Makes user pay to release the files
- Some threats do not sufficiently encrypt files,
so they can be restored easily
14Root Kits
- New technology used to hide code or programs
- Often incorporated to hide Trojan files.
- Normal virus software will not usually detect.
- Example
- Sonys CDs that shipped last year with copy
protection. These were really root kits.
15Where did these threats come from?
- Unavoidable sources
- Personal Slip Ups
16- First viruses were written as competitions
between bored programmers rather than to cause
harm - Many programmers would include their names in
their viruses as a way to get bragging rights - Over time, viruses morphed into the destructive
forces that they are today
17UnaVoidable sources
18(No Transcript)
19Could you see a difference between the two web
sites?
- Internet threats are becoming more life-like
- Phishing is a technique used to steal information
through genuine looking web sites - In the previous slide, they are the same
- A phishing site would look identical to the
legitimate site
20Spam
21Spam
22Spam
23Spam
24Instant Messaging
- Whats the difference between these windows?
25- If we look at the actual links we see that they
are the same!
26Personal slip ups
27Not Watching What We Type
Google.com ok. Thats safe
Goggle.com OOPS! What happens now???
28Example of Browser Redirects
(A malicious drive-by download)
29Not Watching What We Type, Continued
- Check spelling
- Misspelled URLs can lead to malicious sites and
viruses - Multiple domains, redirecting to legitimate site
- Check for correct suffix (.com, .net, .org,
.info, .us, etc.)
30Demonstration of threats
- Presented By George Andrews
31Demonstration Viruses
32Demonstration Viruses
33How can we protect ourselves?
34Physical
- Free Virus Software
- AVG Grisoft 7.5 (Included on CD)
- Anti Spyware / AdWare
- Ad-Aware
- GriSoft Anti-Spyware
- SpyBot Search and Destroy
- ALL above are on CD
- SiteAdvisor
- Rates web sites based on content such as SPAM,
privacy, and exploit safety. - (SiteAdvisor is included on your CD)
35Physical
- Look for security sites specific to each web site
- For example, Yahoo! lets you create a custom sign
in seal, so that you know that you are on a
genuine site
Yahoo! My Sign-in Seal
36Mental
- Look before you click go
- Check web address spelling
- Look before you click
- Dont click a link until you have verified its
destination - Think before you open
- Scan ALL files for threats before you open
REGARDLESS OF WHERE IT COMES FROM
37Where do we go from here?
38These concepts are important now more than ever
- Online Banking
- E-mailing
- Photo Sharing
- Online Shopping
39Question and answer session
40A few final thoughts
41Please
- Fill out survey located in folder
- Look over CD content sheet
- March 17th 700 845 -gt mark your calendars!
- Sign up to be on our computer club email
newsletter
42Thank You!