Upload
adelia-hunt
View
224
Download
0
Tags:
Embed Size (px)
Citation preview
GET CONTROL!Avoid The Headache…
Five Simple Steps to a Safer Computer – NUIT Tech Talk
Agenda
• Get Control Web site• 5 steps to secure your computer:
– Virus protection– Software updates– Password security– Spyware detection– Firewall protection
• Other Security concerns & resources
Get Control on the Web
http://www.it.northwestern.edu/getcontrolhttp://www.it.northwestern.edu/getcontrol
OORRhttp://www.it.northwestern.edu/http://www.it.northwestern.edu/
and click on
Computer & Network Security
Viruses: Disguised programming code that
causes unexpected or undesirable events.
• Often self-replicate, spread to other users
• Can be destructive, alter & destroy files
• Can execute immediately/on specific date
• Many exploit user’s address books
Step 1: Virus protection
Step 1: Virus protectionHow do you get infected?
File sharing software
Weak password
“Worm” via Unpatched OS
File sent via e-mail or instant messenger
Step 1: Virus protection
• FREE Symantec AntiVirus software• Mac & PC-compatible• To download, visit:
www.it.northwestern.eduwww.it.northwestern.edu Computer & Network SecurityComputer & Network Security““Download Symantec/Norton AntiVirus Download Symantec/Norton AntiVirus
software”software”
Step 1: Virus protection
• Keep virus definitions updated • Run a scan once a week • Don't open unexpected
attachments • Always scan files you receive from
others • Turn your Macro security to High in
MS Office applications
Step 1: Virus protection
A word on junk e-mail & viruses• Subject lines & social engineering• E-mail viruses more common now• Both may appear to come from
known and trusted e-mail addresses
• Poor grammar, strange attachments
Viruses: Think you have one?
Check the Get Control Web siteConsult your UNITS rep/local techCheck virus hoax Web sites
www.myths.comwww.myths.comCall 847-491-HELP (4357)
Windows• Windows Update
windowsupdate.microsoft.comwindowsupdate.microsoft.com
• Keep Microsoft Office updated office.microsoft.com/productupdatesoffice.microsoft.com/productupdates//
• Baseline Security Analyzer (ask your local tech support)www.microsoft.com/technet/www.microsoft.com/technet/security/security/tools/mbsahome.mspxtools/mbsahome.mspx
Step 2: Software updates
Step 2: Software updates
Mac OS X:• Security Updates are
available www.apple.com/software/www.apple.com/software/
• Software updates: System Preferences Software Update (set to run automatically)
• MS Office security updates: www.microsoft.com/mac/downloads.awww.microsoft.com/mac/downloads.aspxspx
Step 2: Software updates
Don’t forget to update other apps, especially those that connect to the Internet:
• Eudora & other e-mail software• Firefox & other Web browsers• Spybot – Search & Destroy & other
anti-spyware software
Security alerts and patches and version updates can be found on the software company’s Web site
Step 3: Password security
• Strong system password/phrase– As long as possible (8+ characters)– Use symbols: %^*.,!– E.g., “w.ld!*c,at5” (NOT “wildcat”)
• It only takes a few seconds to crack a short, alphanumeric password
• Don’t leave Administrator account passwords blank
• Change passwords routinely
Step 4: Spyware detection
What is spyware?– Any type of technology that
collects and transmits information about a person or their browsing, often for advertising purposes
Malware maliciously attacks your computer or is used for illegal purposes. Includes so-called key loggers that record everything from passwords to credit card numbers.
Adware collects information about your browsing habits, geographic location, and possibly the contents of your computer.
Adware is usually legal.
The two major “flavors” of spyware
Step 4: Spyware detection
Step 4: Spyware detection
• Installed without your knowledge• Bundled with software you install
• Shareware/freeware programs• File sharing programs• May not work if spyware removed
• Spyware-esque tracking cookies are picked up from Web sites; often unsavory ones!
• Spyware can be very difficult to remove
Step 4: Spyware detection
• Suspicious behavior: • Machine running very slowly • Lots of unfamiliar programs in
Windows Task Manager (Ctrl + Alt + Del)
• Unusual Web browser activity• Contact local tech support if
you see anything strange• Don’t try to manually remove
any components yourself
Step 4: Spyware detection
Spyware removal • Spybot - Search & Destroy:
spybot.safer-networking.despybot.safer-networking.de
• Free for University & home use• Has updates just like antivirus
program• Scans computer for known
spyware• Backs up files it removes
Spybot – Search & Destroy
Step 5: Firewall protection
• Protects your PC from unauthorized access by an individual (hacker)or a program
• Enables you to specify which network ports (“doors”) are open
• Mac OS X & Windows XP* have built-in (native) firewalls– * Built-in to Windows XP
Professional and XP Home SP2
Step 5: Firewall protection
• Once it’s up, keep it up!• XP firewall prompts you if a new
program wants access
You can also configure manually:www.microsoft.com/security/protect/ports.aspwww.microsoft.com/security/protect/ports.asp
Step 5: Firewall protection
Manual configuration of Mac OS X firewall
Other Security Concerns
• “Phishing” scams• Identity theft• Junk e-mail• Illegal file sharing and copyright
violation• Online harassment
See the Get Control Web sitewww.it.northwestern.edu/getcontrol/www.it.northwestern.edu/getcontrol/
Virus resources
www.symantec.com/avcenter/www.symantec.com/avcenter/ (Symantec Security Response)
www.it.northwestern.edu/security/www.it.northwestern.edu/security/ (Computer Virus Protection at Northwestern)
www.f-secure.comwww.f-secure.com (F-Secure Corporation)
www.virusbtn.comwww.virusbtn.com (Virus Bulletin)
www.cert.org/www.cert.org/ (Computer Emergency Response Team at Carnegie Mellon University)
Privacy & Security
NUIT Computer Usage Policies & Guidelineswww.it.northwestern.edu/policies/www.it.northwestern.edu/policies/
Edit Your Directory Informationhttps://snap.it.northwestern.edu/https://snap.it.northwestern.edu/
Security and Privacy for Home userswww.microsoft.com/athome/security/default.mspxwww.microsoft.com/athome/security/default.mspx
Questions?
Don’t forget to visit the Get Control Web Site!
www.it.northwestern.edu/getcontrolwww.it.northwestern.edu/getcontrol
Next Tech Talk
Safe KeepingAn introduction to backing up your information
Backup, archiving, and more!
Date: TBA (see our Web site for details)Same locations, Noon – 1 p.m.
Please register online: www.it.northwestern.eduwww.it.northwestern.edu