+ All Categories
Home > Documents > Internet Security and Your Computer Welcome to Boot Camp.

Internet Security and Your Computer Welcome to Boot Camp.

Date post: 14-Dec-2015
Category:
Upload: oswald-burke
View: 219 times
Download: 2 times
Share this document with a friend
Popular Tags:
87
Internet Security and Your Computer Welcome to Boot Camp
Transcript

Internet Security and Your Computer

Welcome to Boot Camp

OR

How to surf the web safely

Without becoming paranoid

Subjects We’ll cover

• viruses, worms, trojan horses, spyware

• virus scanners, firewalls, spyware blockers

• E-mail protection, browser protection

• home network security, wireless security

• keeping kids safe in “chat rooms”

The good, the bad and the ugly

THE GOOD THE BAD

VIRUS SCANNERSFIREWALLSSPY-WARE BLOCKERSPOP-UP BLOCKERSE-MAIL SCANNERSSPAM BLOCKERSSECURITY SETTINGSKNOWLEDGE

VIRUSESWORMSTROJAN HORSESSPY-WAREDIRECT ATTACKSPAMCOST DIALERSDATA MINERSBROWSER JACKING

The Ugly

Welcome to Internet Boot Camp

Listen up recruits

Internet security basic training is about to start!

Your computer is like your house

Are you connected to the Internet without using a virus scanner a

firewall and a spy-ware blocker?

You might as well leave your front door open 24/7

Your computer is like your house

• Virus scanner • Police officer

Your computer is like your house

• Virus scanner• Firewall

• Police officer• Door guard

Your computer is like your house

• Virus scanner• Firewall• Spy-ware blocker

• Police officer• Door guard• Security guard

Your computer is like your house

• Virus scanner• Firewall• Spy-ware blocker• Browser settings

• Police officer• Door guard• Security guard• Another guard

Your computer is like your house

• Virus scanner• Firewall• Spy-ware blocker• Browser settings• Virus/Worm/Trojan

• Police officer• Door guard• Security guard• Another guard• Criminals

Your computer is like your house

• Virus scanner• Firewall• Spy-ware blocker• Browser settings• Virus/Worm/Trojan• Spy-ware

• Police officer• Door guard• Security guard• Another guard• Criminals• Thief

Your computer is like your house

• Virus scanner• Firewall• Spy-ware blocker• Browser settings• Virus/Worm/Trojan• Spy-ware• Spam

• Police officer• Door guard• Security guard• Another guard• Criminals• Thief• Junk mail

Meet The Enemy

• virus

Meet The Enemy

• virus

• worm

Meet The Enemy

• virus

• worm

• trojan horse

Meet The Enemy

• virus

• worm

• trojan horse

• spam

Meet The Enemy

• virus

• worm

• trojan horse

• spam

• spy-ware

Meet the Allies

• Virus scanning software

Meet the Allies

• Virus scanning software

• Firewall hardware/software

Meet the Allies

• Virus scanning software

• Firewall hardware/software

• E-mail scanning software virus/spam

Meet the Allies

• Virus scanning software

• Firewall hardware/software

• E-mail scanning software virus/spam

• Spy-ware blocking software

Meet the Allies

• Virus scanning software

• Firewall hardware/software

• E-mail scanning software virus/spam

• Spy-ware blocking software

• Pop-up blocking software

Meet the Allies

• Virus scanning software

• Firewall hardware/software

• E-mail scanning software virus/spam

• Spy-ware blocking software

• Pop-up blocking software

• Operating system updates

Meet the Allies

• Virus scanning software

• Firewall hardware/software

• E-mail scanning software virus/spam

• Spy-ware blocking software

• Pop-up blocking software

• Operating system updates

• Browser security settings

E-Mail friend or foe?

Don’t let the enemy use your E-mail to launch their attacks

Securing E-mail

Web Mail Server Mail

More secure Less secure

Mail stays on hostserver

Mail delivered toLocal computer

Access from anycomputer

Needs mail program& account setup

Securing E-mail

• Use an E-mail virus scanner

Securing E-mail

• Use an E-mail virus scanner

• Block images in HTML messages

Securing E-mail

• Use an E-mail virus scanner

• Block images in HTML messages

• View messages in plain text / block HTML

Securing E-mail

• Use an E-mail virus scanner

• Block images in HTML messages

• View messages in plain text / block HTML

• Use spam blocking software or ISP blocking

Securing E-mail

• Use an E-mail virus scanner

• Block images in HTML messages

• View messages in plain text / block HTML

• Use spam blocking software or ISP blocking

• Set up spoof E-mail account(s)

Securing E-mail

• Use an E-mail virus scanner

• Block images in HTML messages

• View messages in plain text / block HTML

• Use spam blocking software or ISP blocking

• Set up spoof E-mail account(s)

• Update E-mail software regularly

Securing E-mail

• Never open attachments from “?” sender

Securing E-mail

• Never open attachments from “?” sender

• Never “unsubscribe” from spam

Securing E-mail

• Never open attachments from “?” sender

• Never “unsubscribe” from spam

• Never click on links in spam / junk mail

Securing E-mail

• Never open attachments from “?” sender

• Never “unsubscribe” from spam

• Never click on links in spam / junk mail

• Never give information reply to “?” mail

Securing E-mail

• Never open attachments from “?” sender

• Never “unsubscribe” from spam

• Never click on links in spam / junk mail

• Never give information reply to “?” mail

• Never give real E-mail address to websites

Securing E-mail

• Never open attachments from “?” sender

• Never “unsubscribe” from spam

• Never click on links in spam / junk mail

• Never give information reply to “?” mail

• Never give real E-mail address to websites

• Beware of “phishing”

Eliminating Spy-ware

The enemy has spies everywhere

“All spies will be shot on sight”

Eliminating Spy-ware

• Download and install AD-AWARE

Eliminating Spy-ware

• Download and install AD-AWARE

• Download and install Spybot Search & Destroy

Eliminating Spy-ware

• Download and install AD-AWARE

• Download and install Spybot Search & Destroy

• Always use a firewall that monitors incoming and outgoing internet traffic

Web Browser who’s in control

The web browser. Your gateway to the internet and a hackers gateway to your

computer

Secure that browser soldier!

Securing the browser

• Always use a firewall incoming/outgoing

BROSDBAND DSL/CABLE

Securing the browser

• Always use a firewall incoming/outgoing

• XP must be on SP2

Securing the browser

• Always use a firewall incoming/outgoing

• XP must be on SP2

• Security settings as high as you can tolerate

Securing the browser

• Always use a firewall incoming/outgoing

• XP must be on SP2

• Security settings as high as you can tolerate

• IE must be latest version / updated regularly (windows update)

Securing the browser

• Always use a firewall incoming/outgoing

• XP must be on SP2

• Security settings as high as you can tolerate

• IE must be latest version / updated regularly

• Disable Active-X controls

Never enable activeX to download a file.

You don’t need it to download files. This is a trick to get you to enable activeX

Home network security

Let’s not be sharing information with the enemy

Securing a home network

• Always use a firewall

Securing a home network

• Always use a firewall

• Never share the OS hard drive

Securing a home network

• Always use a firewall

• Never share the OS hard drive

• Don’t share drives / share folders

Securing a home network

• Always use a firewall

• Never share the OS hard drive

• Don’t share drives / share folders

• Enable encryption on wireless (WEP)

Securing a home network

• Always use a firewall

• Never share the OS hard drive

• Don’t share drives / share folders

• Enable encryption on wireless (WEP)

• Hide SSID on wireless

Securing a home network

• Always use a firewall

• Never share the OS hard drive

• Don’t share drives / share folders

• Enable encryption on wireless (WEP)

• Hide SSID on wireless

• Change passwords on routers and modems

The 10 security commandments

• Thou shalt use and regularly update an anti-virus program

• Thou shalt use a firewall program

• Thou shalt run Windows Update regularly

• Thou shalt not open E-mail attachments

• Thou shalt not share hard drives

The 10 security commandments

• Thou shalt not give out personal information to non-trusted sites

• Thou shalt use an E-mail scanning program

• Thou shalt use a spy-ware blocking program

• Thou shalt use encryption on wireless networks

• Thou shalt use common sense

Chat room security

Education is the answer

Chat Room Security

• Never share any personal information

Chat Room Security

• Never share any personal information

• Never give out E-mail address

Chat Room Security

• Never share any personal information

• Never give out E-mail address

• Never plan to meet anyone

Chat Room Security

• Never share any personal information

• Never give out E-mail address

• Never plan to meet anyone

• Never go to a web page from chat room

Chat Room Security

• Never share any personal information

• Never give out E-mail address

• Never plan to meet anyone

• Never go to a web page from chat room

• Never trust anyone on-line

Chat Room Security

• Never share any personal information

• Never give out E-mail address

• Never plan to meet anyone

• Never go to a web page from chat room

• Never trust anyone on-line

• Always use a spoof identity

Chat Room Security

• Never share any personal information

• Never give out E-mail address

• Never plan to meet anyone

• Never go to a web page from chat room

• Never trust anyone on-line

• Always use a spoof identity

• Chat room security could be life & death

Happy Surfing

Congratulations!

You’ve graduated from Security

Boot Camp


Recommended