Internet Security

26
PC/Internet Security Dec 12, 2007

description

An introduction for internet and computer security. Some of Windows-based examples are used.

Transcript of Internet Security

Page 1: Internet Security

PC/Internet SecurityPC/Internet Security

Dec 12, 2007

Page 2: Internet Security

PasswordPasswordCommon security

solution

Page 3: Internet Security

PasswordPassword

» No reason to share password because you can:• Share files/folders• Remote Desktop• E-mail Proxy

Page 4: Internet Security
Page 5: Internet Security

Managing PasswordsManaging Passwords» Choosing a good passphrase

• “1wb1DCH”http://www.aces.edu/extconnections/2006/10/

» Use different passwords for different systems

» Password Managers• Password Safe

http://passwordsafe.sourceforge.net• Others

http://www.lifehack.org/articles/technology/10-free-ways-to-track-all-your-passwords.html

Page 6: Internet Security

Safely Using EmailSafely Using EmailAvoid hoaxes and phishing

attempts

Page 7: Internet Security

HoaxesHoaxes» Trickery» Please forward» Usually harmless» Waste time and resources

Page 8: Internet Security

Phishing Clues Phishing Clues » Return address appears to be legitimate» Warns of consequences unless urgent action is taken» No personal info or account name/number in message» Name of link doesn’t match destination

• Name of link: https://www.firstnational.com• Destination of link: http://

www.sargonas.com/firstnational/login.htm» Link is not secure (HTTPS)

http://www.aces.edu/extconnections/2006/12http://www.wikipedia.org/wiki/Phishinghttp://jdorner.blogspot.com/2007/03/every-now-and-then-i-come-across.html

Page 9: Internet Security

Don’t Become A VictimDon’t Become A Victim

» “Google” a sentence from the message to see if it’s a hoax or phishing attempt

» Never click on web links and be mindful of HTTPS

» Only open attachments which are in expected messages (just because you know the sender doesn’t mean the message is legitimate)

Page 10: Internet Security

Protecting You and Your Operating System

Protecting You and Your Operating System

Page 11: Internet Security

Ways to Secure MS WindowsWays to Secure MS Windows

» Install virus protection software» Turn on the Windows firewall» Turn on Windows updates» Use spyware/adware prevention

software» Use Windows Security Center» Use limited accounts

Page 12: Internet Security

Virus Protection SoftwareVirus Protection Software» Install & routinely update virus protection

software• McAfee• Trend Micro• Sophos• AVG

• Free for non-commercial use• Download at www.downloads.com

• Symantec (Norton)• Resource intensive

Page 13: Internet Security

Windows FirewallWindows Firewall» Choose

“On”» Only unblock

programs that you trust

Page 14: Internet Security

Windows UpdatesWindows Updates

» Select “Automatic (recommended)”

» Select “Everyday”» Choose an

appropriate time» Leave computer

on! (check sleep/hibernate)

Page 15: Internet Security

Spyware/MalwarePrevention Software

Spyware/MalwarePrevention Software

» Preventative—combine w/ Reactive• Windows Defender

http://www.microsoft.com/athome/security/spyware/software/default.mspx

• AVG Anti-Spywarewww.downloads.com

» Reactive (run once a week)• Spybot

www.downloads.com• Adaware

www.downloads.com

Page 16: Internet Security

Security CenterSecurity Center

» Ensures:• Firewall is on• Automatic

updates are installed

• Virus protection installed & up-to-date

Page 17: Internet Security

Security CenterSecurity Center

You don’t want the RED or Yellow shield

Click on the shield to fix the problem

Page 18: Internet Security

Limited AccountsLimited Accounts» Prohibited from installing software

• Prevents installation of malware/viruses• User has access to currently installed

software» Prohibited from accessing Administrator’s

documents & settings• Prevents changes to administrator

password• Prevents access to Administrator’s

Documents, Desktop, etc.» Create/modify system accounts under

“Control Panel/User Accounts”

Page 19: Internet Security

Limited AccountsLimited Accounts

» Easily switch between accounts

» Leave programs running while others login (windows-L)

Page 20: Internet Security

Home NetworkingHome NetworkingEveryone Needs a Router!

Page 21: Internet Security

Home Networking RoutersHome Networking Routers» One internet connection,

multiple computers» Firewall protection» Access restrictions

Page 22: Internet Security

One Internet ConnectionOne Internet Connection

Page 23: Internet Security

Firewall ProtectionFirewall Protection» One-way valve that lets you out, but doesn’t

let intruders in• Prevents unauthorized access to your

computer(s)• Hides your computer(s) from the internet while

still allowing access to the internet

» Justification: Attacks on AU (week of 5/28-6/02)

• 90,540 blocked• 25,147 suspicious• 3,893 possibly successful

Page 24: Internet Security

Access RestrictionsAccess Restrictions

» Control when a computer can access the internet

• Deny/Allow by website or keyword

» Multiple configurations

• Everyday or only on school days etc.

• All the time, or only between 4p.m. & 10p.m, etc.

Page 25: Internet Security

Secure WirelessSecure Wireless» Most routers can be configured w/a

CD» What can be done manually?

• Change the SSID (wireless network name)

• Disable SSID Broadcast (make it invisible)

• Require a password to join the wireless network

• Restrict by MAC address

Page 26: Internet Security

Questions?Questions?

Thank You!Greg Parmer, Jonas Bowersock, Anne Adrian