introduction to desktop security protecting your computer and your data
TRANSCRIPT
![Page 1: Introduction to Desktop Security Protecting your computer and your data](https://reader036.vdocuments.us/reader036/viewer/2022062301/5697bffb1a28abf838cc0de7/html5/thumbnails/1.jpg)
Introduction to Introduction to Desktop SecurityDesktop Security
Protecting your Protecting your computer and computer and your datayour data
![Page 2: Introduction to Desktop Security Protecting your computer and your data](https://reader036.vdocuments.us/reader036/viewer/2022062301/5697bffb1a28abf838cc0de7/html5/thumbnails/2.jpg)
Malware – The Threats Malware – The Threats • VirusesViruses
• WormsWorms
• Spyware/AdwareSpyware/Adware
• PhishingPhishing
![Page 3: Introduction to Desktop Security Protecting your computer and your data](https://reader036.vdocuments.us/reader036/viewer/2022062301/5697bffb1a28abf838cc0de7/html5/thumbnails/3.jpg)
Viruses Viruses • Usually come in Usually come in
emailemail
• Have to be run Have to be run
• Trick you into Trick you into running the virusrunning the virus
![Page 4: Introduction to Desktop Security Protecting your computer and your data](https://reader036.vdocuments.us/reader036/viewer/2022062301/5697bffb1a28abf838cc0de7/html5/thumbnails/4.jpg)
WormsWorms– self-replicating computer self-replicating computer
programprogram•Looking for youLooking for you
•Exploiting WeaknessesExploiting Weaknesses
•Install Back Door or other Install Back Door or other malwaremalware
![Page 5: Introduction to Desktop Security Protecting your computer and your data](https://reader036.vdocuments.us/reader036/viewer/2022062301/5697bffb1a28abf838cc0de7/html5/thumbnails/5.jpg)
SpywareSpyware
•Comes from other software Comes from other software
•Tracks usage Tracks usage
![Page 6: Introduction to Desktop Security Protecting your computer and your data](https://reader036.vdocuments.us/reader036/viewer/2022062301/5697bffb1a28abf838cc0de7/html5/thumbnails/6.jpg)
Phishing Phishing • Social-engineering schemes use 'spoofed' e-mails to Social-engineering schemes use 'spoofed' e-mails to
lead consumers to counterfeit websites designed to lead consumers to counterfeit websites designed to trick recipients into divulging financial data such as trick recipients into divulging financial data such as credit card numbers, account usernames, passwords credit card numbers, account usernames, passwords and social security numbers.and social security numbers.
• ““vishing” variationvishing” variation
• www.antiphishing.orgwww.antiphishing.org
![Page 7: Introduction to Desktop Security Protecting your computer and your data](https://reader036.vdocuments.us/reader036/viewer/2022062301/5697bffb1a28abf838cc0de7/html5/thumbnails/7.jpg)
PhishingPhishing
• Deceptive Subject LineDeceptive Subject Line
• Apparent genuine contentApparent genuine content
• Forged Sender’s AddressForged Sender’s Address
• Disguised Links Disguised Links
• Email FormEmail Form
![Page 8: Introduction to Desktop Security Protecting your computer and your data](https://reader036.vdocuments.us/reader036/viewer/2022062301/5697bffb1a28abf838cc0de7/html5/thumbnails/8.jpg)
Possible ProblemsPossible Problems
• Trojan HorsesTrojan Horses
• Zombie your ComputerZombie your Computer
• Destroy DataDestroy Data
• Steal Data Steal Data
• Key LoggersKey Loggers
![Page 9: Introduction to Desktop Security Protecting your computer and your data](https://reader036.vdocuments.us/reader036/viewer/2022062301/5697bffb1a28abf838cc0de7/html5/thumbnails/9.jpg)
Software Protections Software Protections • System UpdatesSystem Updates
• Anti-Virus softwareAnti-Virus software
• Anti-Spyware SoftwareAnti-Spyware Software
• FirewallFirewall
![Page 10: Introduction to Desktop Security Protecting your computer and your data](https://reader036.vdocuments.us/reader036/viewer/2022062301/5697bffb1a28abf838cc0de7/html5/thumbnails/10.jpg)
Anti-VirusAnti-Virus
• Keep up-to-dateKeep up-to-date
• Scan dailyScan daily
• Check Files in useCheck Files in use
• AVG from grisoft.comAVG from grisoft.com
![Page 11: Introduction to Desktop Security Protecting your computer and your data](https://reader036.vdocuments.us/reader036/viewer/2022062301/5697bffb1a28abf838cc0de7/html5/thumbnails/11.jpg)
Anti-SpywareAnti-Spyware
• Update regularlyUpdate regularly
• Scan regularlyScan regularly
• AdAware from Download.comAdAware from Download.com
![Page 12: Introduction to Desktop Security Protecting your computer and your data](https://reader036.vdocuments.us/reader036/viewer/2022062301/5697bffb1a28abf838cc0de7/html5/thumbnails/12.jpg)
FirewallFirewall
• Guards information flowing to and from your computerGuards information flowing to and from your computer
• ZoneAlarm from zonelabs.comZoneAlarm from zonelabs.com
![Page 13: Introduction to Desktop Security Protecting your computer and your data](https://reader036.vdocuments.us/reader036/viewer/2022062301/5697bffb1a28abf838cc0de7/html5/thumbnails/13.jpg)
Safe Computing PracticesSafe Computing Practices
• Update the Operating SystemUpdate the Operating System
• Keep protections updatedKeep protections updated
• Scan RegularlyScan Regularly
![Page 14: Introduction to Desktop Security Protecting your computer and your data](https://reader036.vdocuments.us/reader036/viewer/2022062301/5697bffb1a28abf838cc0de7/html5/thumbnails/14.jpg)
Safe Computing PracticesSafe Computing Practices• Regularly Back-up needed filesRegularly Back-up needed files
• Don’t download files using P2PDon’t download files using P2P
• Only get upgrades from trusted sourcesOnly get upgrades from trusted sources
• Use an alternate browser such as FireFox or ChromeUse an alternate browser such as FireFox or Chrome
![Page 15: Introduction to Desktop Security Protecting your computer and your data](https://reader036.vdocuments.us/reader036/viewer/2022062301/5697bffb1a28abf838cc0de7/html5/thumbnails/15.jpg)
Safe Computing Practices - Safe Computing Practices - emailemail
• Don’t open attachments even when they are from a trusted sourceDon’t open attachments even when they are from a trusted source
• Don’t unsubscribe to spamDon’t unsubscribe to spam
• Don’t click on links in emailsDon’t click on links in emails
![Page 16: Introduction to Desktop Security Protecting your computer and your data](https://reader036.vdocuments.us/reader036/viewer/2022062301/5697bffb1a28abf838cc0de7/html5/thumbnails/16.jpg)
Safe Computing Practices - Safe Computing Practices - DataData
• Don’t give out information especially your SSNDon’t give out information especially your SSN
• Banks and credit card companies never use email to confirm dataBanks and credit card companies never use email to confirm data
• Check for secure sites when shopping (https)Check for secure sites when shopping (https)
• Use a separate credit card and check each month’s billUse a separate credit card and check each month’s bill
![Page 17: Introduction to Desktop Security Protecting your computer and your data](https://reader036.vdocuments.us/reader036/viewer/2022062301/5697bffb1a28abf838cc0de7/html5/thumbnails/17.jpg)
Learn MoreLearn More
•CIS 115 CIS 115 InformatioInformation Securityn Security