17
Introduction to Introduction to Desktop Security Desktop Security Protecting your Protecting your computer and computer and your data your data

Introduction to Desktop Security Protecting your computer and your data

Embed Size (px)

Citation preview

Page 1: Introduction to Desktop Security Protecting your computer and your data

Introduction to Introduction to Desktop SecurityDesktop Security

Protecting your Protecting your computer and computer and your datayour data

Page 2: Introduction to Desktop Security Protecting your computer and your data

Malware – The Threats Malware – The Threats • VirusesViruses

• WormsWorms

• Spyware/AdwareSpyware/Adware

• PhishingPhishing

Page 3: Introduction to Desktop Security Protecting your computer and your data

Viruses Viruses • Usually come in Usually come in

emailemail

• Have to be run Have to be run

• Trick you into Trick you into running the virusrunning the virus

Page 4: Introduction to Desktop Security Protecting your computer and your data

WormsWorms– self-replicating computer self-replicating computer

programprogram•Looking for youLooking for you

•Exploiting WeaknessesExploiting Weaknesses

•Install Back Door or other Install Back Door or other malwaremalware

Page 5: Introduction to Desktop Security Protecting your computer and your data

SpywareSpyware

•Comes from other software Comes from other software

•Tracks usage Tracks usage

Page 6: Introduction to Desktop Security Protecting your computer and your data

Phishing Phishing • Social-engineering schemes use 'spoofed' e-mails to Social-engineering schemes use 'spoofed' e-mails to

lead consumers to counterfeit websites designed to lead consumers to counterfeit websites designed to trick recipients into divulging financial data such as trick recipients into divulging financial data such as credit card numbers, account usernames, passwords credit card numbers, account usernames, passwords and social security numbers.and social security numbers.

• ““vishing” variationvishing” variation

• www.antiphishing.orgwww.antiphishing.org

Page 7: Introduction to Desktop Security Protecting your computer and your data

PhishingPhishing

• Deceptive Subject LineDeceptive Subject Line

• Apparent genuine contentApparent genuine content

• Forged Sender’s AddressForged Sender’s Address

• Disguised Links Disguised Links

• Email FormEmail Form

Page 8: Introduction to Desktop Security Protecting your computer and your data

Possible ProblemsPossible Problems

• Trojan HorsesTrojan Horses

• Zombie your ComputerZombie your Computer

• Destroy DataDestroy Data

• Steal Data Steal Data

• Key LoggersKey Loggers

Page 9: Introduction to Desktop Security Protecting your computer and your data

Software Protections Software Protections • System UpdatesSystem Updates

• Anti-Virus softwareAnti-Virus software

• Anti-Spyware SoftwareAnti-Spyware Software

• FirewallFirewall

Page 10: Introduction to Desktop Security Protecting your computer and your data

Anti-VirusAnti-Virus

• Keep up-to-dateKeep up-to-date

• Scan dailyScan daily

• Check Files in useCheck Files in use

• AVG from grisoft.comAVG from grisoft.com

Page 11: Introduction to Desktop Security Protecting your computer and your data

Anti-SpywareAnti-Spyware

• Update regularlyUpdate regularly

• Scan regularlyScan regularly

• AdAware from Download.comAdAware from Download.com

Page 12: Introduction to Desktop Security Protecting your computer and your data

FirewallFirewall

• Guards information flowing to and from your computerGuards information flowing to and from your computer

• ZoneAlarm from zonelabs.comZoneAlarm from zonelabs.com

Page 13: Introduction to Desktop Security Protecting your computer and your data

Safe Computing PracticesSafe Computing Practices

• Update the Operating SystemUpdate the Operating System

• Keep protections updatedKeep protections updated

• Scan RegularlyScan Regularly

Page 14: Introduction to Desktop Security Protecting your computer and your data

Safe Computing PracticesSafe Computing Practices• Regularly Back-up needed filesRegularly Back-up needed files

• Don’t download files using P2PDon’t download files using P2P

• Only get upgrades from trusted sourcesOnly get upgrades from trusted sources

• Use an alternate browser such as FireFox or ChromeUse an alternate browser such as FireFox or Chrome

Page 15: Introduction to Desktop Security Protecting your computer and your data

Safe Computing Practices - Safe Computing Practices - emailemail

• Don’t open attachments even when they are from a trusted sourceDon’t open attachments even when they are from a trusted source

• Don’t unsubscribe to spamDon’t unsubscribe to spam

• Don’t click on links in emailsDon’t click on links in emails

Page 16: Introduction to Desktop Security Protecting your computer and your data

Safe Computing Practices - Safe Computing Practices - DataData

• Don’t give out information especially your SSNDon’t give out information especially your SSN

• Banks and credit card companies never use email to confirm dataBanks and credit card companies never use email to confirm data

• Check for secure sites when shopping (https)Check for secure sites when shopping (https)

• Use a separate credit card and check each month’s billUse a separate credit card and check each month’s bill

Page 17: Introduction to Desktop Security Protecting your computer and your data

Learn MoreLearn More

•CIS 115 CIS 115 InformatioInformation Securityn Security