Computer / Internet Security Class / Seminar / Workshop - PowerPoint PPT Presentation

1 / 50
About This Presentation
Title:

Computer / Internet Security Class / Seminar / Workshop

Description:

Welcome!! Computer / Internet Security Class / Seminar / Workshop NEED A BREAK??? Wired vs. Wireless Some Pros and Cons Wired can be more fast (some wired connections ... – PowerPoint PPT presentation

Number of Views:966
Avg rating:3.0/5.0
Slides: 51
Provided by: LarryM62
Category:

less

Transcript and Presenter's Notes

Title: Computer / Internet Security Class / Seminar / Workshop


1
Welcome!!
  • Computer / Internet Security Class / Seminar /
    Workshop

2
  • My Name is Larry Miller
  • I have worked with computers since 1982, my first
    computer was an Apple IIc

3
  • My Second was an IBM PC (model 5150)

4
  • SOME FACTS
  • I am not all knowing
  • I am hoping you will learn something new here
    today

5
  • SOME FACTS
  • The Slammer worm was relentless. In the first
    minute of existence, it doubled the number of
    machines that it infected every 8.5 seconds. In
    just three minutes it was scanning 55 million
    targets per second! Within 10-minutes, 90 percent
    of all unprotected computers in the world were
    infected. Luckily that is all that it did was
    spread. What a nightmare it would have been if it
    carried a payload that actually damaged
    computers.

6
  • SOME FACTS
  • No two computers are the same (even if you image
    it)
  • I tend to ramble, so please stop me if I do ?
  • I do not plan on reading every word that you see
    on this wall
  • NO QUESTION IS A DUMB QUESTION

7
  • With the usage of these products our lives become
    more social (i.e. Facebook and Twitter) and
    more vulnerable
  • Today I will help you understand how to keep
    yourself safe on your computer
  • Also, we will talk about the best way to navigate
    the Internet without getting a virus, malware,
    adware, etc.

8
  • TOPICS WE WILL DISCUSSING TODAY
  • Securing Your Operating System
  • Take steps to ensure your system is secure!
  • Passwords
  • AntiVirus, Adware, Malware, etc
  • --------------------------------------------------
    ----
  • Keeping your system up to date
  • Windows Updates
  • MAC OS Software Updates
  • AntiVirus, Adware, Malware, etc Updates
  • De-fragmentation
  • Installing Applications and what the
    ramifications are...

9
  • Connecting to the Internet
  • Wired vs. Wireless
  • Why and what is the difference
  • What is the best browser to us (i.e. Internet
    Explorer, Chrome, Firefox)
  • Safe Surfing
  • Making sure you keep your information safe on the
    Internet
  • EMAIL
  • SPAM
  • Phishing
  • Attachments
  • Virus', Malware, Adware, etc

10
  • Maintaining your computer
  • Backups
  • How to keep you computer from getting "SLOW
  • --------------------------------------------------
    ----
  • Questions and Answers (talk and hands on)

11
  • Do you feel this way about your computer most
    days?

12
Take steps to ensure yoursystem is secure!
  • Securing Your Operating System
  • First thing to protecting yourself is to become
    familiar with what types of attacks there are on
    the Internet.
  • Always Think First, and Ask QuestionsWhen in
    doubt, DELETE or CLOSE the screen (right click on
    the bottom of the screen and choose close)!
  • Be careful who you trust and what information you
  • provide online.
  • Know what data you have, where it is and that
    its
  • secured.
  • Dont let your private life become part of the
    Internet.

13
  • Securing Your Operating System
  • Good Passwords
  • At Least 8 Characters Long
  • No Dictionary Words - (Forwards OR Backwards)
  • May Contain Special Characters (_)
  • Should Have UPPER and lower Case Letters and/or
    Words.

14
  • Securing Your Operating System
  • Good Passwords
  • Never Be Written Down or Shared
  • Should Be Changed Regularly
  • Do Not Tell ANYONE! Not Me, Not Anyone!
  • If it is absolutely necessary for maintenance
    and/or a trusted repair person you can give them
    a temporary password. After they are done,
    change it immediately.

15
  • Securing Your Operating System
  • Good Passwords
  • Your Password should be a unique combination of
    letters, numbers and a special character
  • (i.e. Y_at_nkeyD00dle )

16
  • Securing Your Operating System
  • Good Passwords
  • Example of BAD passwords

17
  • Securing Your Operating System
  • It is very important to assign passwords to your
    user accounts on your computer this will keep
    your DATA safe and secure
  • Setting The Windows Administrators Password
  • Start -gt Run -gt control userpasswords2

18
Securing Your Operating System
Highlight Administrator Choose Reset Password
Clear the User Name field and Rename it
19
  • Securing Your Operating System
  • Setting The Mac OS X Root Password
  • Root Account DISABLED by Default
  • Net Info Manager
  • Authenticate
  • Enable Root User
  • Create Root Password

20
  • What Is A Virus?
  • "A parasitic program written intentionally to
    enter a computer without the user's permission or
    knowledge. The word parasitic is used because a
    virus attaches to files or boot sectors and
    replicates itself, thus continuing to spread.
    Though some viruses do little but replicate,
    others can cause serious damage or affect program
    and system performance. A virus should never be
    assumed harmless and left on a system." --
    Symantec

Securing Your Operating System
21
  • Types of Computer Viruses
  • Basic Virus - a piece of software code that is
    developed to attack computers and network
    entities via email or Internet connections. It
    quickly replicates itself and gradually attaches
    to files, programs or the hard drive.
  • Trojan Horse - This is a type of benign program,
    a malicious code that doesn't replicate when
    entering a system but can be effectively used to
    open 'back doors.' Trojan Horses allow hackers to
    assume control over a particular system or to
    steal vital data. As an example, QAZ helped
    hackers view the secret source code at
    Microsoft-owned network.
  •  Worm - this type of virus has the capability to
    spread itself automatically over the network from
    one computer to the next. During a worm attack,
    users' computers get infected without even having
    to click open email attachment or any program,
    etc. As an example, in the early August of 2003,
    a worm by the name of Blaster infected more than
    1 million computers worldwide. In similar case,
    Welchia, an antidote to Blaster, clogged huge
    amounts of network computers and caused computers
    crashes.
  •  Blended or a Combination Attack - covers
    innovative strategies to infect and spread
    various viruses within computer networks. It
    involves basic virus, worm, and Trojan Horse
    techniques where attackers can use peer-to-peer
    networks and instant messaging systems to channel
    such viruses. In the mid-August of 2003, SoBig, a
    virus, infected nearly every other email
    traveling on the Internet at its peak.

Securing Your Operating System
22
  • How They Infect
  • Open Ports (Worms, Trojans)
  • A port is a method on how your computer connects
    to the Internet (it is like a room full of doors
    and you choose which one to go through)
  • Removable Media (Floppy Disk, Memory Card)
  • Downloads (WWW, FTP, P2P)
  • Email (Attachments, Scripts)

Securing Your Operating System
23
Securing Your Operating System
24
  • Free AntiVirus, Anti-Malware and Anti-Spyware
  • AVG
  • Avast
  • Spybot Search and Destory
  • AntiVir
  • Ad-Aware

Securing Your Operating System
25
Lets hope your computer does not do this
26
  • QUESTIONS

27
  • Computer Maintenance Checklist
  • At system setup
  • Install a surge suppressor/emergency shutdown
    power strip
  • Register your software products
  • Schedule automated updates
  • Read the maintenance section of your manual
  • Set up your email to auto-archive older messages
    (if you are using that type of email program
    (i.e. Microsoft Outlook)
  • Install anti virus software
  • Install anti-advertising/malware software
  • Put your software drivers (does anyone know what
    a software driver is??) in a pocket sleeve 3 ring
    binder

Keeping your system up to date
28
  • Weekly
  • Run a disk scan to check for hard drive issues
    (demo)
  • Run a defragmentation program in Windows Vista
    and 7 this is done automatically)
  • Run a clean up to delete unneeded files (demo)
  • Back up your files to a remote location (I
    suggest Mozy Pro)
  • Empty your recycle bin
  • Delete your Internet files (demo)
  • Clear your browsing history (demo)
  • Delete your cookies (demo)
  • Update your virus definitions
  • Run a full virus scan

Keeping your system up to date
29
  • Monthly
  • Check for updates
  • Delete/uninstall unneeded or unused programs
  • Quarterly
  • Clean your keyboard and mouse (alcohol pads and
    canned air) I have a story about canned
    air
  • Clean your monitor
  • Clean your peripherals
  • Rebuild your desktop (this is not an easy task,
    please make sure you get a professional to do
    this or ask a friend to help or myself) -- MOST
    IMPORTANT, BACK UP YOUR DATA
  • Change all your passwords

Keeping your system up to date
30
  • Yearly
  • Renew your software update and anti virus
    subscriptions

Keeping your system up to date
31
  • Installing Applications
  • Only install applications that you need
  • If you install to many applications, your hard
    drive will slowly fill up with files and will
    cause it to be slow over time (also, even if you
    think that uninstalling an application will speed
    up your computer, that is not always a truth
    some applications leave behind files and could
    cause issues later on)

Keeping your system up to date
32
  • Which Operating System is best for me??
  • It is all about preference (what works best for
    me?)
  • Windows XP?
  • Windows Vista
  • Windows 7
  • MAC OS X
  • Linux (Ubuntu, Fedora, Red Hat)
  • No matter which Operating System you choose,
    always remember, it can get a virus, you need to
    keep it up to date and you need to back up your
    data

Keeping your system up to date
33
  • QUESTIONS

34
  • NEED A BREAK???

35
  • Wired vs. Wireless
  • Some Pros and Cons
  • Wired can be more fast (some wired connections
    have faster speeds than wireless)
  • Wireless allows you to be anywhere in your home
    and still connected to the Internet
  • Wired connections can be more secure (in some
    cases than wireless)
  • Wireless connections can be less secure if you
    dont have the proper encryption enabled on your
    wireless access point

Connecting to the Internet
36
  • Which Internet Browser is best for me
  • It is all about preference (what works best for
    me?)
  • Windows Internet Explorer
  • Integrates really well with Windows OS
  • Probably the most targeted (hacked, virus)
    browser in the world
  • Mozillas Firefox
  • It is very extendable (customizable)
  • Apples Safari
  • Apples answer to browsing
  • Not very customizable
  • Googles Chrome
  • Googles answer to browsing
  • Not very customizable
  • Opera
  • Operas answer to browsing
  • Not very customizable

Connecting to the Internet
37
Connecting to the Internet
38
  • Safe/Smart Surfing
  • First rule of smart surfing? Remain as anonymous
    as possible. That means keeping all private
    information private. Here are some examples of
    private information that you should never give
    out on the Internet
  • full name
  • home address
  • phone number
  • Social Security number
  • passwords
  • names of family members
  • credit card numbers

Connecting to the Internet
39
  • Keeping your information safe on the Internet
  • The best way is not to put anything out there
  • No personal information should be shared with
    anyone you dont know
  • If you use Facebook, MySpace, Linkedin, etc
    understand that everything you say, express and
    post (i.e. photos) are available for the world to
    see Also, remember that once something is
    posted on the Internet it could potentially be
    there forever. The all mighty Google may have
    already cataloged it.

Connecting to the Internet
40
  • If you have children, it might be a good idea to
    use some sort of preventative measures to keep
    them safe
  • First thing is talk to them about Internet and
    let me know the about the dangers keeping their
    personal information safe
  • If you are worried that they might go to unsafe
    places on the Internet you can install programs
    on to your computer to help them stay safe (i.e.
    McGruff SafeGuard, CYBERSitter and NetNanny).
    Windows Vista and Windows 7 have a similar
    programs built-in

Connecting to the Internet
41
  • Downloading Files, Music and Applications from
    the Internet
  • My best advise to you about any of this is dont
    do any of it
  • If you have to download something, I suggest you
    have updated AntiVirus software and Anti-Malware
    software
  • For Music, I suggest using iTunes or another
    reputable company to download your music. Stay
    away from companies like LimeWire and other
    free music download sites. They typically have
    a lot of virus associated with them

Connecting to the Internet
42
  • Email
  • The best way to keep from getting these, is to
    only open emails from people you trust
  • SPAM (video)
  • Phishing
  • These people are trying to get you to give them
    information about personal online accounts (i.e.
    ebay, paypal, etc)
  • Attachments
  • Only time you should open email from anyone is if
    you trust the person and you are expecting
    something from them (next to Phishing, this is
    the 1 way people get virus)

Connecting to the Internet
43
  • Email
  • Dont get fooled by the emails with attachments
    like, If you forward this email you will receive
    100 in 100 days
  • Remember if you are going to forward an email to
    friends and family, it is important to not
    include the previous email addresses from the
    attached email.
  • Also, if you have a group of emails that you plan
    to send to, it is best to blind carbon copy (BCC)
    them

Connecting to the Internet
44
Connecting to the Internet
45
  • Malware
  • Malware, short for malicious software, is
    software designed to infiltrate a computer system
    without the owner's informed consent. The
    expression is a general term used by computer
    professionals to mean a variety of forms of
    hostile, intrusive, or annoying software or
    program code.1 The term "computer virus" is
    sometimes used as a catch-all phrase to include
    all types of malware, including true viruses. -
    wikipedia
  • Intrusive-ware (not an official term, that is
    what I call it)
  • It is almost the same as Malware however, it has
    all of the characteristics of a legitimate piece
    of software. Example, a program that looks and
    feels like your AntiVirus program however, it
    keeps telling you that you have virus and the
    only way to make these pop-ups go away, is to buy
    their software. Now they may have your money,
    your computer and possibly your identity.

Connecting to the Internet
46
  • Misconceptions about your computer
  • Upgrading (to the next version of Windows, Linux
    or MAC OS X) will not always fix the issue
  • Running a virus scan and/or a anti-malware will
    not always fix your issue

47
  • Keeping yourself from having to call a technician
    or repair person
  • Follow these 4 simple rules
  • Be mindful of where you go on to the Internet (if
    you think it is doesnt look or feel right, then
    it isnt close your browser and/or just turn off
    your computer)
  • Update your computer with your AntiVirus
    definitions and Window Updates
  • Back up your data to an external hard or an
    external company (i.e. Mozy Pro)
  • Follow the Weekly, Monthly, Quarterly, Yearly
    plan (as mentioned above)

48
  • QUESTIONS

49
  • Cool Websites
  • http//www.komando.com/
  • http//twit.tv/
  • http//www.cnet.com/buzz-out-loud-podcast/
  • http//www.crossloop.com/
  • http//www.mahalo.com/
  • http//www.petri.co.il/
  • http//www.connectedgeek.net
  • Survey
  • http//shortlinks.connectedgeek.net/2010-04-Survey

50
  • THANK YOU FOR COMING TODAY!
  • Please fill out the survey form
  • If you have any questions or need help, please
    contact me at
  • http//www.connectedgeek.net
  • LARRY_at_CONNECTEDGEEK.NET
  • or
  • 248-648-1717
Write a Comment
User Comments (0)
About PowerShow.com