Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.
-
Upload
ilene-charlotte-bennett -
Category
Documents
-
view
220 -
download
0
Transcript of Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.
![Page 1: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/1.jpg)
Computer Security
CPEs for CPAs Program
Georgia Perimeter College
December 9, 2005
![Page 2: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/2.jpg)
Today’s Topics
The Need for Computer Security
Setting Up a Secure Computer System
Using Your Computer Securely
Special Concerns for Wireless Networks
![Page 3: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/3.jpg)
Today’s Topics
Focus onQuality and effectivenessFree or low-cost solutionsEase of use
![Page 4: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/4.jpg)
The Need for Computer Security
Computers face a wide variety of threats IntrusionsPrivacy invasionsHijackingsData corruptionVirusesAnd more
![Page 5: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/5.jpg)
The Need for Computer Security (cont.)
Threats come from many sourcesPhysical accessNetwork accessUse of removable mediaUse of common programs
http://media.trendmicro.com/product/general/malware.html
![Page 6: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/6.jpg)
How to Keep a System Perfectly Secure
Don’t connect it to any type of networkDon’t use emailDon’t have Internet accessDon’t shop onlineDon’t bank onlineDon’t share files with other users
![Page 7: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/7.jpg)
How to Keep a System Perfectly Secure (cont.)
Don’t use any removable mediaFloppy disksCDs/DVDsFlash Drives/USB devices
Exception: New, unused CDs for backup of data
![Page 8: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/8.jpg)
How to Keep a System Perfectly Secure (cont.)
Don’t let anyone but yourself ever use the computer
Permanently secure it to the building structure
![Page 9: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/9.jpg)
Okay, this may not be feasible!
So what do we do?
![Page 10: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/10.jpg)
What about security for the REST of us?
![Page 11: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/11.jpg)
Setting Up a Secure System
Three Critical StepsAccess Control / Password ProtectionHardware SolutionsSoftware Solutions
![Page 12: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/12.jpg)
Access Control
Simple solution to some problems
No cost involved
Only handles some problems
![Page 13: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/13.jpg)
Password Protection
Set up login password on ALL computersHandled in operating systemDo not allow a “guest” account on
computersWith Windows, accounts can be bypassedNever allow automatic login
![Page 14: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/14.jpg)
Password Protection (cont.)
Extra protection desirable for laptopsSet up BIOS password
Power onHit designated key when prompt appears (must
do quickly)Locate password option on BIOS screen
Caution: if you forget this password, NO ONE can get into your computer
![Page 15: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/15.jpg)
Hardware Solutions
Acts as “first line of defense” by controlling network access
Only protects from external threats
Does not protect against invasion from within network itself
Does not protect against threats hidden inside legitimate data
![Page 16: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/16.jpg)
Hardware Firewall
Monitors network data transfersLANs Internet
Blocks unauthorized traffic while allowing legitimate traffic
May also perform additional security functions
![Page 17: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/17.jpg)
Hardware Firewall (cont.)
Any computer connected to Internet needs a firewallBroadband connections are more
vulnerableEven dial-up users can be attacked from
outside
![Page 18: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/18.jpg)
Hardware Firewall (cont.)
Makes your computer “invisible” from outside the local network
Often found as part of network routing device
Invaders “see” the router, not computers behind it
![Page 19: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/19.jpg)
Hardware Firewall (cont.)
Install between computers and modem in a local network
Internet Connection
RouterModem
Computer Computer Computer
![Page 20: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/20.jpg)
Hardware Firewall (cont.)
Setup and configuration depends on specific device
Follow directions given by manufacturer
![Page 21: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/21.jpg)
Hardware Firewall (cont.)
Solution for the truly paranoid, or the truly geeky
Bare-bones machine running Linux instead of Windows, combined with switch to connect machines
![Page 22: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/22.jpg)
Hardware Firewall (cont.)
Most hacking attacks target Windows features
Using Linux machine instead of router prevents these attacks
For information and instructions: Router Design Project,
http://www.routerdesign.com Coyote Linux Project,
http://www.coyotelinux.com
![Page 23: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/23.jpg)
Software Solutions
Software firewalls
Anti-virus software
Anti-malware software
Alternatives to common programs
Fixes for common programs
![Page 24: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/24.jpg)
Software Firewalls
Not a replacement for hardware firewalls
Protect individual computers within a networkHardware firewall protects entire network
Protect portable machines which may not always use a hardware firewall
![Page 25: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/25.jpg)
Software Firewalls (cont.)
Analyze incoming data from network
Block undesirable data
Better programs block undesirable outgoing data as well
![Page 26: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/26.jpg)
Software Firewalls (cont.)
Windows XP Internet Connection Firewall (ICF)Monitors/blocks incoming traffic onlyWill NOT block hijack attemptsBetter than nothing but not an optimal
solution
![Page 27: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/27.jpg)
Software Firewalls (cont.)
ZoneAlarm – top choiceMonitors traffic in both directionsHelps prevent hijacking of your computerBasic free version is adequate for most
users
![Page 28: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/28.jpg)
Software Firewalls (cont.)
Download from http://www.zonealarm.com/
Install via wizard
ConfigurationDone through normal computer usageDoes take time
![Page 29: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/29.jpg)
Anti-Virus/Anti-Spyware Software
Viruses and spyware are two different problemsBoth technologies can cause problemsRequire two different solutions
![Page 30: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/30.jpg)
Anti-Virus Software
Virus -- n : a software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer; "a true virus cannot spread to another computer without human assistance"
-- dictionary.com
![Page 31: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/31.jpg)
Anti-Virus Software (cont.)
AVG AntiVirusFree for personal useMay not provide quality of protection of a
commercial program
![Page 32: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/32.jpg)
Anti-Virus Software (cont.)
Trend MicroSystems PC-CillinTop-rated choiceVery effective
Norton Anti-VirusNot my favorite – I’ve had problems
McAfee Anti-Virus
![Page 33: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/33.jpg)
Anti-Virus Software (cont.)
Wizards handle installation seamlessly
Configure automatic email/file attachment scans
Need to upgrade virus signature subscription yearly if you don’t upgrade program
![Page 34: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/34.jpg)
Anti-Malware Software
Malware is catchall term for spyware and adware-type programs
AdwareSoftware that, without your consent, tracks
and reports your web usage to another entity without reporting personally identifying information
![Page 35: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/35.jpg)
Anti-Malware Software (cont.)
SpywareSoftware whose purpose is to collect
personally identifying demographic and usage information from your computer, usually for advertising purposes
Software that 'sneaks' onto the system or performs other activities hidden to the user.
--http://cexx.org
![Page 36: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/36.jpg)
Anti-Malware Software
No one program today catches all spyware – multiple programs neededSpyBot Search and Destroy
http://www.safer-networking.orgAdAware
http://www.lavasoft.comTrend MicroSystems Anti-Spyware
Web-based scanhttp://www.trendmicro.com
![Page 37: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/37.jpg)
Software Alternatives
Microsoft products are favorite targets of crackersWidespread use (80%+ of PCs use these)Easily exploitable security holesParticularly vulnerable
Internet Explorer – web browserOutlook – email client
![Page 38: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/38.jpg)
Software Alternatives (cont.)
Web BrowsersMozilla FirefoxOpera
Email ClientsMozilla ThunderbirdEudora
Office SoftwareOpenOffice
![Page 39: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/39.jpg)
Alternatives to Internet Explorer
Mozilla Firefox
Tutorial: http://opensourcearticles.com/articles/firefox_15/english/part_01
Opera
![Page 40: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/40.jpg)
Alternatives to Outlook
Email is most vulnerable feature of Outlook
Most alternatives only deal with emailScheduling, memo, other features not
provided
![Page 41: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/41.jpg)
Eudora
Download from http://www.eudora.com
Available in free, ad-supported, or paid versions
Supports multiple email accounts, folders, junk email filtering
![Page 42: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/42.jpg)
Mozilla Thunderbird
Imports existing email and contact information
Similar look & feel to Outlook
Handles multiple email accounts
Provides adaptive junk email filtering
Automatically blocks scriptsDeters spread of viruses
![Page 43: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/43.jpg)
Mozilla Thunderbird (cont.)
Download from http://www.mozilla.com/
Excellent tutorial: http://opensourcearticles.com/articles/thunderbird_15/english/part_01
![Page 44: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/44.jpg)
Mozilla Thunderbird (cont.)
InstallationWizard handles all work
ConfigurationSet up account(s) Import existing email/contact infoSet up spam filtering
![Page 45: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/45.jpg)
Office Software
Open OfficeAlternative to Microsoft OfficeMostly, but not fully, compatible
Available from http://www.openoffice.org/
![Page 46: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/46.jpg)
Other Software
Windows Media PlayerPotential for privacy invasion through
“supercookie”Disable with following step:
Tools->Options->PlayerUncheck box beside “Allow Internet sites to
uniquely identify your Player.”
![Page 47: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/47.jpg)
Other Software (cont.)
Windows MessengerAllows pop-ups without an active browserNot to be confused with MSN Messenger!To stop, disable the service
Start->Run, type services.msc & click OKDouble-click the Messenger entryChoose StopChoose Disabled from the StartUpType list
![Page 48: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/48.jpg)
Using Your Computer Securely
Monitor your computer’s behavior
Schedule maintenance tasks
Use hard-to-break passwords
Protect your data files
Take precautions with Internet data
Be extra careful with wireless networks
![Page 49: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/49.jpg)
Monitor Your Computer
Watch for unusual activity
Signs of problems:Excessive hard disk accessSlow operationPop-up windows
![Page 50: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/50.jpg)
Schedule Maintenance Tasks
Running tasks automatically ensures they are actually run!Many programs let you schedule them from the program itselfOther programs can be scheduled from Control PanelStart->Settings->Control Panel->
Scheduled Tasks
![Page 51: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/51.jpg)
Schedule Maintenance Tasks
Recommendations:Full virus scan weeklyFull spyware scan with Spybot weeklyFull spyware scan with Ad-Aware weeklyAutomatic updates for softwareAutomatic updates of signature files weekly
for all programs using them
![Page 52: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/52.jpg)
Password Choices
Choose passwords that areCombinations of letters, numbers, and
symbolsDo not contain any identifying data
Birth datesFamily members’ names/variations
Are at least eight to ten characters long
![Page 53: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/53.jpg)
Password Security
Do not write down passwords or PINsEspecially don’t keep written passwords or
PINs with the item using them!
Do NOT give ANYONE your password or PIN
![Page 54: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/54.jpg)
Changing Passwords
Do not use the same password for everything
Change your passwords regularly
However, it’s better to use a “good” password badly than to use “bad” passwords well
![Page 55: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/55.jpg)
Data File Protection
Do not make sensitive files accessible through networkDisable file sharing If files must be shared, password-protect
them
![Page 56: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/56.jpg)
Data File Protection (cont.)
Simply deleting a file is not enough!Files remain in the Recycle/Trash bin after
deletionRecovery from here is simpleMust either specifically delete files from
Recycle Bin or empty Recycle Bin
![Page 57: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/57.jpg)
Precautions with Internet Data
Use secure browsers and sites
Clear your data after use, especially from public computers
![Page 58: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/58.jpg)
Browser Security
Make sure you are using Secure Socket technology if sending personal information to a web site Indicated by
Lock icon at bottom of browser windowhttps:// prefix on site URL (not http://)
![Page 59: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/59.jpg)
Smart Use of Cookies
Most users will need to use cookiesMany legitimate Internet uses require them
Browsers should be set toReject third-party cookiesRestrict first-party cookies
![Page 60: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/60.jpg)
Smart Use of Cookies
Internet ExplorerTools->Internet Options->Privacy
Select Advanced ButtonCheck Override Automatic Cookie HandlingSelect Block Third-Party cookies
Mozilla FirefoxTools->Options->Privacy->Cookies
Allow only originating site to set cookies
![Page 61: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/61.jpg)
Browser History
Internet ExplorerHistory button on ToolbarSelect all items in window and delete
Mozilla FirefoxTools->Options->Privacy
Click on Clear button beside history
![Page 62: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/62.jpg)
Removing Temp Files
Make hidden files visibleStart -> Programs -> Accessories ->
Windows Explorer.Tools -> Folder Options-> View -> Show
Hidden Files and Folders, Apply
Navigate in the left-hand pane to C:\Documents and Settings\%your username%\Local Settings.
![Page 63: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/63.jpg)
Removing Temp Files (cont.)
Delete all contents in the following folders:TempTemporary Internet Files Content.IE5 (subfolder to Temporary
Internet Files) Note: Windows will warn you that you are trying to delete system files. This is okay, so click Yes.
![Page 64: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/64.jpg)
Wireless Networking Concerns
Wireless network connections are inherently insecure
Broadcast, not point to pointAnyone within range can intercept signalOnce signal is intercepted, anyone can
view dataMany tools exist to do this
![Page 65: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/65.jpg)
Wireless Networking Concerns (cont.)
Even encrypted transmissions are vulnerableAny currently used encryption scheme can
be brokenMost common scheme can be broken by a
middle-schooler in about 15 minutes!
![Page 66: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/66.jpg)
Wireless Networking Concerns (cont.)
Don’t enable file sharing on computers using wireless network connections
Don’t transmit sensitive data OF ANY TYPE over a wireless networkDon’t shopDon’t bank online
![Page 67: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/67.jpg)
In Closing
Suggestions and recommendations are for the normal user
The truly paranoid do need additional precautionsBut these require much more knowledge
Once your security is set up, maintenance will not be much effort
![Page 68: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005.](https://reader030.fdocuments.us/reader030/viewer/2022033106/56649db65503460f94aa81c4/html5/thumbnails/68.jpg)
Thank you for attending!
This presentation is available online athttp://www.gpc.edu/~jbenson/presentations/security.ppt
Contact information: Julia Benson-Slaughter
Associate Professor of Computer ScienceDepartment of Business/Computer ScienceGeorgia Perimeter College2101 Womack RoadDunwoody, GA 30338