Upload
erik-wilson
View
218
Download
0
Tags:
Embed Size (px)
Citation preview
Safe Computing Outreach
Joseph HowardUndergraduate Research Assistant
05/01/2015
Disclaimer: This research was supported by the National Science Foundation (Grant No.1241735). Opinions, findings, and conclusions/recommendations are those of the authors and do not necessarily reflect the views of the NSF.
Research Purpose
Perform research to help fulfill outreach portion of research grant. Review Texas Tech IT Divisions Safe Computing program Review the Cyber Security classes course materials Make recommendations to Texas Tech IT Divisions Safe Computing
program based off of my findings in the Cyber Security course materials.
The Modern World We Live In
Because of the internet, life has never been easier. Online shopping Social networking sites Online banking/investments Email
New Dangers
Also, because of the growth in popularity of the internet, there are new threats emerging that we have never had to experience As the internet grows, so does danger Old malware use to be created by mischievous programmers. Present day malware is dangerous and utilized by criminals. SAFE COMPUTING PRACTICES ARE ESSENTIAL!!!
Common Threats
Although there are countless attacks that cyber criminals use, these are the most common categories Viruses Worms Trojans Spyware Spam Ransomeware
Anti-malware is a very easy to use defense mechanism to help protect your computer Scan your computer regularly Regularly check for updates Understand that anti-malware will not completely secure you
computer
Anti-Malware Utilization
A common way for a computer to be infected is the user unwittingly installing the malware themselves. Scan all new files coming onto to your computer Be cautious of file types.
Be Cautious of Files Being Put On your Computer
In addition to the previous tips here are some additional general tips Make sure you change name and passwords for new
electronic devices Be cautious of public Wi-Fi Keep up to date with widespread computer threats via news or
internet Encrypt sensitive information Be conscious of potential threats
General Tips
Some malwares have some specific defenses not applicable to others. For these you have to use specific techniques Some software trick users into installing spyware on to their computers by
stating that spyware will be installed, but they will hide it in all of the other licensing agreement text
A lot of spam email includes an unsubscribe button
What this button does is confirm that this is a legitimate email address and will send you even more spam
Limit or completely restrict your browsers use of cookies
Malware Specific Caution
If your precautions, fail it is important to be able to recognize an attack. Fortunately. with many of these types of malware. there are some telltale signs of infection
Recognizing Attacks
“deteriorating computer responsiveness, unexpected and sustained churning” [1:363]
“sudden sluggishness of user applications, unexplained freezing of applications or unexpected error messages” [1:363]
“unscheduled hardware resets and crashes, sudden antivirus alarm activity” [1:363]
“disk error messages, saved documents that open as DOT files” [1:363]
“applications that disappear or will not execute” [1:363]
Evidence of Viruses
“unrecognized new process running, startup messages indicating that new software has been (or is being) installed (registry updating)” [1: 372]
“unresponsiveness of applications to normal commands, unusual redirection of normal web requests to unknown sites” [1: 372]
“unexpected or unscheduled modem connection activity” [1: 372] “unexpected remote logon prompts at unusual times or unfamiliar
logon prompt panels (this may result from routine software upgrades or session resets but can also indicate Trojan keylogging or password capturing software)” [1: 372]
“sudden or unexpected termination of antivirus scanning software or personal firewall software ( either at startup or when user attempts to load)” [1: 372]
Evidence of Trojans
Because of how connected we are by the internet, proper knowledge on how to safely browse the internet is crucial
Stay up to date Be cautious
Conclusion
References
[1] Kim, David, and Michael Solomon. Fundamentals Of Information Systems Security, Second Edition. Burlington, MA: Jones & Bartlett Learning, 2014. Print.