internet security and your computer welcome to boot camp
TRANSCRIPT
Subjects We’ll cover
• viruses, worms, trojan horses, spyware
• virus scanners, firewalls, spyware blockers
• E-mail protection, browser protection
• home network security, wireless security
• keeping kids safe in “chat rooms”
The good, the bad and the ugly
THE GOOD THE BAD
VIRUS SCANNERSFIREWALLSSPY-WARE BLOCKERSPOP-UP BLOCKERSE-MAIL SCANNERSSPAM BLOCKERSSECURITY SETTINGSKNOWLEDGE
VIRUSESWORMSTROJAN HORSESSPY-WAREDIRECT ATTACKSPAMCOST DIALERSDATA MINERSBROWSER JACKING
Welcome to Internet Boot Camp
Listen up recruits
Internet security basic training is about to start!
Your computer is like your house
Are you connected to the Internet without using a virus scanner a
firewall and a spy-ware blocker?
You might as well leave your front door open 24/7
Your computer is like your house
• Virus scanner• Firewall• Spy-ware blocker
• Police officer• Door guard• Security guard
Your computer is like your house
• Virus scanner• Firewall• Spy-ware blocker• Browser settings
• Police officer• Door guard• Security guard• Another guard
Your computer is like your house
• Virus scanner• Firewall• Spy-ware blocker• Browser settings• Virus/Worm/Trojan
• Police officer• Door guard• Security guard• Another guard• Criminals
Your computer is like your house
• Virus scanner• Firewall• Spy-ware blocker• Browser settings• Virus/Worm/Trojan• Spy-ware
• Police officer• Door guard• Security guard• Another guard• Criminals• Thief
Your computer is like your house
• Virus scanner• Firewall• Spy-ware blocker• Browser settings• Virus/Worm/Trojan• Spy-ware• Spam
• Police officer• Door guard• Security guard• Another guard• Criminals• Thief• Junk mail
Meet the Allies
• Virus scanning software
• Firewall hardware/software
• E-mail scanning software virus/spam
Meet the Allies
• Virus scanning software
• Firewall hardware/software
• E-mail scanning software virus/spam
• Spy-ware blocking software
Meet the Allies
• Virus scanning software
• Firewall hardware/software
• E-mail scanning software virus/spam
• Spy-ware blocking software
• Pop-up blocking software
Meet the Allies
• Virus scanning software
• Firewall hardware/software
• E-mail scanning software virus/spam
• Spy-ware blocking software
• Pop-up blocking software
• Operating system updates
Meet the Allies
• Virus scanning software
• Firewall hardware/software
• E-mail scanning software virus/spam
• Spy-ware blocking software
• Pop-up blocking software
• Operating system updates
• Browser security settings
Securing E-mail
Web Mail Server Mail
More secure Less secure
Mail stays on hostserver
Mail delivered toLocal computer
Access from anycomputer
Needs mail program& account setup
Securing E-mail
• Use an E-mail virus scanner
• Block images in HTML messages
• View messages in plain text / block HTML
Securing E-mail
• Use an E-mail virus scanner
• Block images in HTML messages
• View messages in plain text / block HTML
• Use spam blocking software or ISP blocking
Securing E-mail
• Use an E-mail virus scanner
• Block images in HTML messages
• View messages in plain text / block HTML
• Use spam blocking software or ISP blocking
• Set up spoof E-mail account(s)
Securing E-mail
• Use an E-mail virus scanner
• Block images in HTML messages
• View messages in plain text / block HTML
• Use spam blocking software or ISP blocking
• Set up spoof E-mail account(s)
• Update E-mail software regularly
Securing E-mail
• Never open attachments from “?” sender
• Never “unsubscribe” from spam
• Never click on links in spam / junk mail
Securing E-mail
• Never open attachments from “?” sender
• Never “unsubscribe” from spam
• Never click on links in spam / junk mail
• Never give information reply to “?” mail
Securing E-mail
• Never open attachments from “?” sender
• Never “unsubscribe” from spam
• Never click on links in spam / junk mail
• Never give information reply to “?” mail
• Never give real E-mail address to websites
Securing E-mail
• Never open attachments from “?” sender
• Never “unsubscribe” from spam
• Never click on links in spam / junk mail
• Never give information reply to “?” mail
• Never give real E-mail address to websites
• Beware of “phishing”
Eliminating Spy-ware
• Download and install AD-AWARE
• Download and install Spybot Search & Destroy
• Always use a firewall that monitors incoming and outgoing internet traffic
Web Browser who’s in control
The web browser. Your gateway to the internet and a hackers gateway to your
computer
Secure that browser soldier!
Securing the browser
• Always use a firewall incoming/outgoing
• XP must be on SP2
• Security settings as high as you can tolerate
Securing the browser
• Always use a firewall incoming/outgoing
• XP must be on SP2
• Security settings as high as you can tolerate
• IE must be latest version / updated regularly (windows update)
Securing the browser
• Always use a firewall incoming/outgoing
• XP must be on SP2
• Security settings as high as you can tolerate
• IE must be latest version / updated regularly
• Disable Active-X controls
Never enable activeX to download a file.
You don’t need it to download files. This is a trick to get you to enable activeX
Securing a home network
• Always use a firewall
• Never share the OS hard drive
• Don’t share drives / share folders
Securing a home network
• Always use a firewall
• Never share the OS hard drive
• Don’t share drives / share folders
• Enable encryption on wireless (WEP)
Securing a home network
• Always use a firewall
• Never share the OS hard drive
• Don’t share drives / share folders
• Enable encryption on wireless (WEP)
• Hide SSID on wireless
Securing a home network
• Always use a firewall
• Never share the OS hard drive
• Don’t share drives / share folders
• Enable encryption on wireless (WEP)
• Hide SSID on wireless
• Change passwords on routers and modems
The 10 security commandments
• Thou shalt use and regularly update an anti-virus program
• Thou shalt use a firewall program
• Thou shalt run Windows Update regularly
• Thou shalt not open E-mail attachments
• Thou shalt not share hard drives
The 10 security commandments
• Thou shalt not give out personal information to non-trusted sites
• Thou shalt use an E-mail scanning program
• Thou shalt use a spy-ware blocking program
• Thou shalt use encryption on wireless networks
• Thou shalt use common sense
Chat Room Security
• Never share any personal information
• Never give out E-mail address
• Never plan to meet anyone
Chat Room Security
• Never share any personal information
• Never give out E-mail address
• Never plan to meet anyone
• Never go to a web page from chat room
Chat Room Security
• Never share any personal information
• Never give out E-mail address
• Never plan to meet anyone
• Never go to a web page from chat room
• Never trust anyone on-line
Chat Room Security
• Never share any personal information
• Never give out E-mail address
• Never plan to meet anyone
• Never go to a web page from chat room
• Never trust anyone on-line
• Always use a spoof identity
Chat Room Security
• Never share any personal information
• Never give out E-mail address
• Never plan to meet anyone
• Never go to a web page from chat room
• Never trust anyone on-line
• Always use a spoof identity
• Chat room security could be life & death