Date post: | 25-Dec-2015 |
Category: |
Documents |
Upload: | godwin-payne |
View: | 214 times |
Download: | 1 times |
Protecting Yourself Online
Overview
This session is designed to:
Put Your Mind At Ease
Inform and Educate
Arm You With The Tools
Make Your Internet Experience Pleasant
Issues Covered
Keeping Your Information Private
Online Shopping
Passwords
Virus Protection & Firewalls
Keeping Systems Up To Date
Protecting Yourself Online
Government Is Getting Involved
President Bush directed the development of a National Strategy to Secure Cyberspaceto ensure that America has a clear road map to protect a part of its infrastructureso essential to our way of life.
Protecting Yourself Online
The Issues
The goal is to empower the home user and smallbusiness person to protect their cyberspace by:
• raising cybersecurity awareness of the home user and small business, including children and students;
• making it easier for home users and small businesses to keep current with anti-virus software, software patches, and firewalls;
• encouraging and helping facilitate the installation and use of firewalls on all broadband Internet connections, such as cable modems, DSL, satellite and wireless;
Protecting Yourself Online
Why Does The Government Care?
The home user and small business can be damaged severely and, in some cases, can be used to severely damage others.
The Issues
Protecting Yourself Online
Hard Drive Crashing
Identity Theft
Credit Theft
Tunneling
Extortion
Zombies/Trojans
Compromise of Private Information
The Issues
Protecting Yourself Online
Your Online Privacy
Why is my information so important to someone?
Businesses want to gain new customers and keep the customers they have. To do this, they need information.
The more information a business has about a prospect or a customer, the more likely it can meet that customer’s needs or shape its promotions to appeal to those needs.
This is called a “profile.”
Protecting Yourself Online
Your Online Privacy
Online Forms & Registrations
Websites (Traffic and Web Logs)
Newsgroups
Spyware/Adware
Online Methods Of Getting Your Data
Protecting Yourself Online
Your Online Privacy
Market additional products to you.
Sell it to a third-party company for a fee or a commission on the products it sells to you.
Trade it as barter for the use of another company's customer database.
What They Do With Your Information
This leads to unwanted email offers, more junk mail, and targeted web sites.
Protecting Yourself Online
Your Online Privacy
Don’t give out SS # or other personal information.
Don’t respond to surveys or polls unless sure of source – and then only give generic information
Weigh the importance of someone having your information
Be careful about posting any personal information online and what you sign up for.
Instruct family/employees regarding which information is ok to release online
How To Deal With This…
Protecting Yourself Online
Your Online Privacy
How To Deal With This…
Never Respond to Spam
Use A Throw Away Address
Use SpamCop – spamcop.net
Don’t Forward Mail With Everyone’s Address
When Filling Out Online Forms – Use Throw Away Address or Bogus Address
Use screen name not email address for Ebay, Chat Rooms, etc.
Protecting Yourself Online
Online Shopping
Herbal Viagra
Internet Investigator
Pump and Dump Stock Scams
Credit Scams
Nigerian Fee Scam
Counterfeit Items
To good to be true?
Protecting Yourself Online
Online Shopping
Do business with reputable firms online.
Use a credit card.
Watch for “great deals” without anyway to contact them offline.
When feasible verify by phone.
Check your statements
www.bbb.org
www.scambusters.org
Protecting Yourself Online
Passwords
Use a combination of characters, numbers and, if possible, symbols. Alternate the capitalization, interchanging upper case with lower case.
Don't use words that can be found in dictionaries of any language.
Don't use proper names, names of spouses or friends.
Don't use words spelled backwards.
Don't use the same password for everything.
Never give out your password to strangers.
Change passwords periodically.
Protecting Yourself Online
VIRUS PROTECTION
Computer viruses are the "common cold" of modern technology.
E-mail viruses are now twice as prevalent as they were in 2001, with one e-mail in every 200 containing a virus.
Virus-scanning company MessageLabs said it stopped 9.3 million viruses in 2 billion e-mails this year, which equated to one virus in every 215 e-mails.
Protecting Yourself Online
VIRUS PROTECTION
Viruses enter your system via e-mail, downloads, infected floppy disks, or (occasionally) hacking.
By definition, a virus must be able to self-replicate (make copies of itself) to spread.
Virus behavior can range from annoying to destructive.
Antivirus software can detect nearly all types of known viruses, but it must be updated regularly to maintain effectiveness.
Protecting Yourself Online
VIRUS PROTECTION
Install Antivirus Software and Keep It Up To Date.
Activate full-time protection.
Make sure “All Files” are scanned.
Turn On Automatic Updating
Use a personal firewall – (Hardware/Software)
Keep regular backups of important data.
Keep your operating system up to date.
Be cautious of email attachments even if you know the sender.
Protecting Yourself Online
VIRUS PROTECTION
PestPatrol defeats the threatby detecting and removing:
Spyware/Adware
Remote Access Trojans
Keystroke Loggers
Protecting Yourself Online
VIRUS PROTECTION
FIREWALLS
An Internet Router, which is installed between your Internet connection and the rest of your network, protects your network by making your individual computers virtually invisible to the outside world
Protecting Yourself Online
KEEPING SYSTEMS HEALTHY
Windows Security Certificates Vulnerable to Attack
Microsoft Warns of Windows Vulnerability—Again
Protecting Yourself Online
Safety Checklist
Use anti-virus software that will scan incoming mail messages and files on-access automatically.
Update anti-virus software definitions weekly, if not more often (ideally, the AV software should update the virus definitions automatically.)
Learn how to identify virus hoaxes from real threats.
Install a firewall,
Protecting Yourself Online
Do not open attachments unless absolutely necessary.
Do not open EXE, BAT, VBS, and SCR type attachments ever, since they are common vectors for virus/malware infections.
Avoid the use of insecure network programs such as ICQ, AIM or IRC for discussing private information.
Perform system manufacturer security patch updates on a regular basis.
Safety Checklist
Protecting Yourself Online
Backup your files regularly on ZIP disk or CD-ROM.
Ensure that effective passwords are used. Passwords should also be changed on a regular basis.
Set up company or family rules of use to ensure everyone has a safe experience.
Safety Checklist
Protecting Yourself Online
Sources
Government’s Initiative on Cyber Safetywww.whitehouse.gov/pcipb
Protecting Your Information
Privacy Net – Check Your Machinewww.privacy.net/analyze
Federal Trade Commission on Privacywww.ftc.gov/privacy
Tracking Spyware on Your Systemwww.grc.com
Protecting Yourself Online
SourcesFederal Trade Commission’s Safe Harborwww.ftc.gov/privacy
Consumer Reports On Identity Theftwww.consumer.gov/idtheft
Federal Trade CommissionWhen Bad Things Happen To Your Good Namewww.ftc.gov/bcp/conline/pubs/credit/idtheft.pdf
Identity Theft Assistancewww.VictimsAssistanceofAmerica.org
Run A Credit Reporthttps://www.econsumer.equifax.com
Protecting Yourself Online
SourcesSPAMCoalition Against Unsolicited Commercial Emailwww.cauce.org
Network Abuse Clearinghousewww.abuse.net
SpamCop - punish spammers www.spamcop.net
SpamCon Foundationwww.spamcon.org
SpamTrail – Email Filtering Servicewww.spamtrail.com
Protecting Yourself Online
SourcesOnline Shopping
Better Business Bureausearch.bbb.org/search.html
ScamBusterswww.scambusters.org/Scambusters48.html
FTC’s Guide to Buying and Selling on the Netwww.ftc.gov/bcp/conline/pubs/online/auctions.htm
Fighting Online Fraudwww.fraud.org
Card Cops – Check Your Credit Card For Theftwww.cardcops.com
Consumer Sentinelwww.consumer.gov/sentinel
Protecting Yourself Online
SourcesVirus Protection & Firewalls
Antionline - Fight Back Against Hackerswww.antionline.com/fight-back
Pest Patrol – Solutions for Spyware/Adwarewww.pestpatrol.com
Gibson Research – Check your firewallswww.grc.com
McAfee Antivirus Norton Anti-Viruswww.mcafee.com www.norton.com
F-Secure Trend Micro – PC-Cillianwww.f-secure.com www.trendmicro.com
Vmyths – Virus Myths & Hoaxeswww.vmyths.com
Protecting Yourself Online
Sources
Keeping Your Systems Up To Date
Microsoft’s Update Toolwindowsupdate.microsoft.com
Insecure.Org - Check system Security Holeswww.insecure.org/
Protecting Yourself Online