Upload
nicholas-rodgers
View
227
Download
0
Tags:
Embed Size (px)
Citation preview
Introduction to Introduction to Desktop SecurityDesktop Security
Protecting your Protecting your computer and computer and your datayour data
Malware – The Threats Malware – The Threats • VirusesViruses
• WormsWorms
• Spyware/AdwareSpyware/Adware
• PhishingPhishing
Viruses Viruses • Usually come in Usually come in
emailemail
• Have to be run Have to be run
• Trick you into Trick you into running the virusrunning the virus
WormsWorms– self-replicating computer self-replicating computer
programprogram•Looking for youLooking for you
•Exploiting WeaknessesExploiting Weaknesses
•Install Back Door or other Install Back Door or other malwaremalware
SpywareSpyware
•Comes from other software Comes from other software
•Tracks usage Tracks usage
Phishing Phishing • Social-engineering schemes use 'spoofed' e-mails to Social-engineering schemes use 'spoofed' e-mails to
lead consumers to counterfeit websites designed to lead consumers to counterfeit websites designed to trick recipients into divulging financial data such as trick recipients into divulging financial data such as credit card numbers, account usernames, passwords credit card numbers, account usernames, passwords and social security numbers.and social security numbers.
• ““vishing” variationvishing” variation
• www.antiphishing.orgwww.antiphishing.org
PhishingPhishing
• Deceptive Subject LineDeceptive Subject Line
• Apparent genuine contentApparent genuine content
• Forged Sender’s AddressForged Sender’s Address
• Disguised Links Disguised Links
• Email FormEmail Form
Possible ProblemsPossible Problems
• Trojan HorsesTrojan Horses
• Zombie your ComputerZombie your Computer
• Destroy DataDestroy Data
• Steal Data Steal Data
• Key LoggersKey Loggers
Software Protections Software Protections • System UpdatesSystem Updates
• Anti-Virus softwareAnti-Virus software
• Anti-Spyware SoftwareAnti-Spyware Software
• FirewallFirewall
Anti-VirusAnti-Virus
• Keep up-to-dateKeep up-to-date
• Scan dailyScan daily
• Check Files in useCheck Files in use
• AVG from grisoft.comAVG from grisoft.com
Anti-SpywareAnti-Spyware
• Update regularlyUpdate regularly
• Scan regularlyScan regularly
• AdAware from Download.comAdAware from Download.com
FirewallFirewall
• Guards information flowing to and from your computerGuards information flowing to and from your computer
• ZoneAlarm from zonelabs.comZoneAlarm from zonelabs.com
Safe Computing PracticesSafe Computing Practices
• Update the Operating SystemUpdate the Operating System
• Keep protections updatedKeep protections updated
• Scan RegularlyScan Regularly
Safe Computing PracticesSafe Computing Practices• Regularly Back-up needed filesRegularly Back-up needed files
• Don’t download files using P2PDon’t download files using P2P
• Only get upgrades from trusted sourcesOnly get upgrades from trusted sources
• Use an alternate browser such as FireFox or ChromeUse an alternate browser such as FireFox or Chrome
Safe Computing Practices - Safe Computing Practices - emailemail
• Don’t open attachments even when they are from a trusted sourceDon’t open attachments even when they are from a trusted source
• Don’t unsubscribe to spamDon’t unsubscribe to spam
• Don’t click on links in emailsDon’t click on links in emails
Safe Computing Practices - Safe Computing Practices - DataData
• Don’t give out information especially your SSNDon’t give out information especially your SSN
• Banks and credit card companies never use email to confirm dataBanks and credit card companies never use email to confirm data
• Check for secure sites when shopping (https)Check for secure sites when shopping (https)
• Use a separate credit card and check each month’s billUse a separate credit card and check each month’s bill
Learn MoreLearn More
•CIS 115 CIS 115 InformatioInformation Securityn Security