Title: Computer / Internet Security Class / Seminar / Workshop
1Welcome!!
- Computer / Internet Security Class / Seminar /
Workshop
2- My Name is Larry Miller
- I have worked with computers since 1982, my first
computer was an Apple IIc
3- My Second was an IBM PC (model 5150)
4- SOME FACTS
- I am not all knowing
- I am hoping you will learn something new here
today
5- SOME FACTS
- The Slammer worm was relentless. In the first
minute of existence, it doubled the number of
machines that it infected every 8.5 seconds. In
just three minutes it was scanning 55 million
targets per second! Within 10-minutes, 90 percent
of all unprotected computers in the world were
infected. Luckily that is all that it did was
spread. What a nightmare it would have been if it
carried a payload that actually damaged
computers.
6- SOME FACTS
- No two computers are the same (even if you image
it) - I tend to ramble, so please stop me if I do ?
- I do not plan on reading every word that you see
on this wall - NO QUESTION IS A DUMB QUESTION
7- With the usage of these products our lives become
more social (i.e. Facebook and Twitter) and
more vulnerable - Today I will help you understand how to keep
yourself safe on your computer - Also, we will talk about the best way to navigate
the Internet without getting a virus, malware,
adware, etc.
8- TOPICS WE WILL DISCUSSING TODAY
- Securing Your Operating System
- Take steps to ensure your system is secure!
- Passwords
- AntiVirus, Adware, Malware, etc
- --------------------------------------------------
---- - Keeping your system up to date
- Windows Updates
- MAC OS Software Updates
- AntiVirus, Adware, Malware, etc Updates
- De-fragmentation
- Installing Applications and what the
ramifications are...
9- Connecting to the Internet
- Wired vs. Wireless
- Why and what is the difference
- What is the best browser to us (i.e. Internet
Explorer, Chrome, Firefox) - Safe Surfing
- Making sure you keep your information safe on the
Internet - EMAIL
- SPAM
- Phishing
- Attachments
- Virus', Malware, Adware, etc
10- Maintaining your computer
- Backups
- How to keep you computer from getting "SLOW
- --------------------------------------------------
---- - Questions and Answers (talk and hands on)
11- Do you feel this way about your computer most
days?
12Take steps to ensure yoursystem is secure!
- Securing Your Operating System
- First thing to protecting yourself is to become
familiar with what types of attacks there are on
the Internet. - Always Think First, and Ask QuestionsWhen in
doubt, DELETE or CLOSE the screen (right click on
the bottom of the screen and choose close)! - Be careful who you trust and what information you
- provide online.
- Know what data you have, where it is and that
its - secured.
- Dont let your private life become part of the
Internet.
13- Securing Your Operating System
- Good Passwords
- At Least 8 Characters Long
- No Dictionary Words - (Forwards OR Backwards)
- May Contain Special Characters (_)
- Should Have UPPER and lower Case Letters and/or
Words.
14- Securing Your Operating System
- Good Passwords
- Never Be Written Down or Shared
- Should Be Changed Regularly
- Do Not Tell ANYONE! Not Me, Not Anyone!
- If it is absolutely necessary for maintenance
and/or a trusted repair person you can give them
a temporary password. After they are done,
change it immediately.
15- Securing Your Operating System
- Good Passwords
- Your Password should be a unique combination of
letters, numbers and a special character - (i.e. Y_at_nkeyD00dle )
16- Securing Your Operating System
- Good Passwords
- Example of BAD passwords
17- Securing Your Operating System
- It is very important to assign passwords to your
user accounts on your computer this will keep
your DATA safe and secure - Setting The Windows Administrators Password
- Start -gt Run -gt control userpasswords2
18Securing Your Operating System
Highlight Administrator Choose Reset Password
Clear the User Name field and Rename it
19- Securing Your Operating System
- Setting The Mac OS X Root Password
- Root Account DISABLED by Default
- Net Info Manager
- Authenticate
- Enable Root User
- Create Root Password
20- What Is A Virus?
- "A parasitic program written intentionally to
enter a computer without the user's permission or
knowledge. The word parasitic is used because a
virus attaches to files or boot sectors and
replicates itself, thus continuing to spread.
Though some viruses do little but replicate,
others can cause serious damage or affect program
and system performance. A virus should never be
assumed harmless and left on a system." --
Symantec
Securing Your Operating System
21- Types of Computer Viruses
- Basic Virus - a piece of software code that is
developed to attack computers and network
entities via email or Internet connections. It
quickly replicates itself and gradually attaches
to files, programs or the hard drive. - Trojan Horse - This is a type of benign program,
a malicious code that doesn't replicate when
entering a system but can be effectively used to
open 'back doors.' Trojan Horses allow hackers to
assume control over a particular system or to
steal vital data. As an example, QAZ helped
hackers view the secret source code at
Microsoft-owned network. - Â Worm - this type of virus has the capability to
spread itself automatically over the network from
one computer to the next. During a worm attack,
users' computers get infected without even having
to click open email attachment or any program,
etc. As an example, in the early August of 2003,
a worm by the name of Blaster infected more than
1 million computers worldwide. In similar case,
Welchia, an antidote to Blaster, clogged huge
amounts of network computers and caused computers
crashes. - Â Blended or a Combination Attack - covers
innovative strategies to infect and spread
various viruses within computer networks. It
involves basic virus, worm, and Trojan Horse
techniques where attackers can use peer-to-peer
networks and instant messaging systems to channel
such viruses. In the mid-August of 2003, SoBig, a
virus, infected nearly every other email
traveling on the Internet at its peak.
Securing Your Operating System
22- How They Infect
- Open Ports (Worms, Trojans)
- A port is a method on how your computer connects
to the Internet (it is like a room full of doors
and you choose which one to go through) - Removable Media (Floppy Disk, Memory Card)
- Downloads (WWW, FTP, P2P)
- Email (Attachments, Scripts)
Securing Your Operating System
23Securing Your Operating System
24- Free AntiVirus, Anti-Malware and Anti-Spyware
- AVG
- Avast
- Spybot Search and Destory
- AntiVir
- Ad-Aware
Securing Your Operating System
25Lets hope your computer does not do this
26 27- Computer Maintenance Checklist
- At system setup
- Install a surge suppressor/emergency shutdown
power strip - Register your software products
- Schedule automated updates
- Read the maintenance section of your manual
- Set up your email to auto-archive older messages
(if you are using that type of email program
(i.e. Microsoft Outlook) - Install anti virus software
- Install anti-advertising/malware software
- Put your software drivers (does anyone know what
a software driver is??) in a pocket sleeve 3 ring
binder
Keeping your system up to date
28- Weekly
- Run a disk scan to check for hard drive issues
(demo) - Run a defragmentation program in Windows Vista
and 7 this is done automatically) - Run a clean up to delete unneeded files (demo)
- Back up your files to a remote location (I
suggest Mozy Pro) - Empty your recycle bin
- Delete your Internet files (demo)
- Clear your browsing history (demo)
- Delete your cookies (demo)
- Update your virus definitions
- Run a full virus scan
Keeping your system up to date
29- Monthly
- Check for updates
- Delete/uninstall unneeded or unused programs
- Quarterly
- Clean your keyboard and mouse (alcohol pads and
canned air) I have a story about canned
air - Clean your monitor
- Clean your peripherals
- Rebuild your desktop (this is not an easy task,
please make sure you get a professional to do
this or ask a friend to help or myself) -- MOST
IMPORTANT, BACK UP YOUR DATA - Change all your passwords
Keeping your system up to date
30- Yearly
- Renew your software update and anti virus
subscriptions
Keeping your system up to date
31- Installing Applications
- Only install applications that you need
- If you install to many applications, your hard
drive will slowly fill up with files and will
cause it to be slow over time (also, even if you
think that uninstalling an application will speed
up your computer, that is not always a truth
some applications leave behind files and could
cause issues later on)
Keeping your system up to date
32- Which Operating System is best for me??
- It is all about preference (what works best for
me?) - Windows XP?
- Windows Vista
- Windows 7
- MAC OS X
- Linux (Ubuntu, Fedora, Red Hat)
- No matter which Operating System you choose,
always remember, it can get a virus, you need to
keep it up to date and you need to back up your
data
Keeping your system up to date
33 34 35- Wired vs. Wireless
- Some Pros and Cons
- Wired can be more fast (some wired connections
have faster speeds than wireless) - Wireless allows you to be anywhere in your home
and still connected to the Internet - Wired connections can be more secure (in some
cases than wireless) - Wireless connections can be less secure if you
dont have the proper encryption enabled on your
wireless access point
Connecting to the Internet
36- Which Internet Browser is best for me
- It is all about preference (what works best for
me?) - Windows Internet Explorer
- Integrates really well with Windows OS
- Probably the most targeted (hacked, virus)
browser in the world - Mozillas Firefox
- It is very extendable (customizable)
- Apples Safari
- Apples answer to browsing
- Not very customizable
- Googles Chrome
- Googles answer to browsing
- Not very customizable
- Opera
- Operas answer to browsing
- Not very customizable
Connecting to the Internet
37Connecting to the Internet
38- Safe/Smart Surfing
- First rule of smart surfing? Remain as anonymous
as possible. That means keeping all private
information private. Here are some examples of
private information that you should never give
out on the Internet - full name
- home address
- phone number
- Social Security number
- passwords
- names of family members
- credit card numbers
Connecting to the Internet
39- Keeping your information safe on the Internet
- The best way is not to put anything out there
- No personal information should be shared with
anyone you dont know - If you use Facebook, MySpace, Linkedin, etc
understand that everything you say, express and
post (i.e. photos) are available for the world to
see Also, remember that once something is
posted on the Internet it could potentially be
there forever. The all mighty Google may have
already cataloged it.
Connecting to the Internet
40- If you have children, it might be a good idea to
use some sort of preventative measures to keep
them safe - First thing is talk to them about Internet and
let me know the about the dangers keeping their
personal information safe - If you are worried that they might go to unsafe
places on the Internet you can install programs
on to your computer to help them stay safe (i.e.
McGruff SafeGuard, CYBERSitter and NetNanny).
Windows Vista and Windows 7 have a similar
programs built-in
Connecting to the Internet
41- Downloading Files, Music and Applications from
the Internet - My best advise to you about any of this is dont
do any of it - If you have to download something, I suggest you
have updated AntiVirus software and Anti-Malware
software - For Music, I suggest using iTunes or another
reputable company to download your music. Stay
away from companies like LimeWire and other
free music download sites. They typically have
a lot of virus associated with them
Connecting to the Internet
42- Email
- The best way to keep from getting these, is to
only open emails from people you trust - SPAM (video)
- Phishing
- These people are trying to get you to give them
information about personal online accounts (i.e.
ebay, paypal, etc) - Attachments
- Only time you should open email from anyone is if
you trust the person and you are expecting
something from them (next to Phishing, this is
the 1 way people get virus)
Connecting to the Internet
43- Email
- Dont get fooled by the emails with attachments
like, If you forward this email you will receive
100 in 100 days - Remember if you are going to forward an email to
friends and family, it is important to not
include the previous email addresses from the
attached email. - Also, if you have a group of emails that you plan
to send to, it is best to blind carbon copy (BCC)
them
Connecting to the Internet
44Connecting to the Internet
45- Malware
- Malware, short for malicious software, is
software designed to infiltrate a computer system
without the owner's informed consent. The
expression is a general term used by computer
professionals to mean a variety of forms of
hostile, intrusive, or annoying software or
program code.1 The term "computer virus" is
sometimes used as a catch-all phrase to include
all types of malware, including true viruses. -
wikipedia - Intrusive-ware (not an official term, that is
what I call it) - It is almost the same as Malware however, it has
all of the characteristics of a legitimate piece
of software. Example, a program that looks and
feels like your AntiVirus program however, it
keeps telling you that you have virus and the
only way to make these pop-ups go away, is to buy
their software. Now they may have your money,
your computer and possibly your identity.
Connecting to the Internet
46- Misconceptions about your computer
- Upgrading (to the next version of Windows, Linux
or MAC OS X) will not always fix the issue - Running a virus scan and/or a anti-malware will
not always fix your issue
47- Keeping yourself from having to call a technician
or repair person - Follow these 4 simple rules
- Be mindful of where you go on to the Internet (if
you think it is doesnt look or feel right, then
it isnt close your browser and/or just turn off
your computer) - Update your computer with your AntiVirus
definitions and Window Updates - Back up your data to an external hard or an
external company (i.e. Mozy Pro) - Follow the Weekly, Monthly, Quarterly, Yearly
plan (as mentioned above)
48 49- Cool Websites
- http//www.komando.com/
- http//twit.tv/
- http//www.cnet.com/buzz-out-loud-podcast/
- http//www.crossloop.com/
- http//www.mahalo.com/
- http//www.petri.co.il/
- http//www.connectedgeek.net
- Survey
- http//shortlinks.connectedgeek.net/2010-04-Survey
50- THANK YOU FOR COMING TODAY!
- Please fill out the survey form
- If you have any questions or need help, please
contact me at - http//www.connectedgeek.net
- LARRY_at_CONNECTEDGEEK.NET
- or
- 248-648-1717