50
Welcome!! Welcome!! Computer / Internet Security Class / Seminar / Workshop

Welcome!! Computer / Internet Security Class / Seminar / Workshop

Embed Size (px)

Citation preview

Page 1: Welcome!! Computer / Internet Security Class / Seminar / Workshop

Welcome!!Welcome!!

Computer / Internet Security Class / Seminar /

Workshop

Page 2: Welcome!! Computer / Internet Security Class / Seminar / Workshop

My Name is: Larry MillerI have worked with computers since 1982,

my first computer was an Apple IIc

Page 3: Welcome!! Computer / Internet Security Class / Seminar / Workshop

My Second was an IBM PC (model 5150)

Page 4: Welcome!! Computer / Internet Security Class / Seminar / Workshop

SOME FACTS:

◦I am not all knowingI am not all knowing

◦I am hoping you will learn something new here today

Page 5: Welcome!! Computer / Internet Security Class / Seminar / Workshop

SOME FACTS:

◦The Slammer worm was relentless. In the first The Slammer worm was relentless. In the first minute of existence, it doubled the number of minute of existence, it doubled the number of machines that it infected every 8.5 seconds. In machines that it infected every 8.5 seconds. In just three minutes it was scanning 55 million just three minutes it was scanning 55 million targets per second! Within 10-minutes, 90 percent targets per second! Within 10-minutes, 90 percent of all unprotected computers in the world were of all unprotected computers in the world were infected. Luckily that is all that it did was spread. infected. Luckily that is all that it did was spread. What a nightmare it would have been if it carried What a nightmare it would have been if it carried a payload that actually damaged computers.a payload that actually damaged computers.

Page 6: Welcome!! Computer / Internet Security Class / Seminar / Workshop

SOME FACTS:

◦No two computers are the same (even if you image it)

◦I tend to ramble, so please stop me if I do

◦I do not plan on reading every word that you see on this wall

◦NO QUESTION IS A DUMB QUESTION

Page 7: Welcome!! Computer / Internet Security Class / Seminar / Workshop

With the usage of these products our lives become more “social” (i.e. Facebook and Twitter) and more vulnerable

Today I will help you understand how to keep yourself safe on your computer

Also, we will talk about the best way to navigate the Internet without getting a virus’, malware, adware, etc.

Page 8: Welcome!! Computer / Internet Security Class / Seminar / Workshop

TOPICS WE WILL DISCUSSING TODAYSecuring Your Operating System

◦Take steps to ensure your system is secure!◦Passwords◦AntiVirus, Adware, Malware, etc------------------------------------------------------

Keeping your system up to date ◦Windows Updates◦MAC OS Software Updates◦AntiVirus, Adware, Malware, etc Updates◦De-fragmentation◦Installing Applications and what the

ramifications are...

Page 9: Welcome!! Computer / Internet Security Class / Seminar / Workshop

Connecting to the Internet ◦Wired vs. Wireless

Why and what is the difference◦What is the best browser to us (i.e. Internet

Explorer, Chrome, Firefox)◦Safe Surfing◦Making sure you keep your information safe on

the Internet◦EMAIL

SPAM Phishing Attachments

◦Virus', Malware, Adware, etc

Page 10: Welcome!! Computer / Internet Security Class / Seminar / Workshop

Maintaining your computer ◦Backups◦How to keep you computer from getting

"SLOW“------------------------------------------------------

Questions and Answers (talk and hands on)

Page 11: Welcome!! Computer / Internet Security Class / Seminar / Workshop

Do you feel this way about your computer most days?

Page 12: Welcome!! Computer / Internet Security Class / Seminar / Workshop

Take steps to ensure yourTake steps to ensure yoursystem is secure!system is secure!

Securing Your Operating SystemFirst thing to protecting yourself is to become familiar

with what types of attacks there are on the Internet.Always Think First, and Ask Questions

When in doubt, DELETE or CLOSE the screen (right click on the bottom of the screen and choose close)!

Be careful who you trust and what information youprovide online.Know what data you have, where it is and that it’ssecured.Don’t let your private life become part of the Internet.

Page 13: Welcome!! Computer / Internet Security Class / Seminar / Workshop

Securing Your Operating System

Good Passwords:At Least 8 Characters Long

No Dictionary Words - (Forwards OR Backwards)

May Contain Special Characters (&%_#)

Should Have UPPER and lower Case Letters and/or Words.

Page 14: Welcome!! Computer / Internet Security Class / Seminar / Workshop

Securing Your Operating System

Good Passwords:Never Be Written Down or Shared

Should Be Changed Regularly

Do Not Tell ANYONE! Not Me, Not Anyone!

If it is absolutely necessary for maintenance and/or a trusted repair person you can give them a temporary password. After they are done, change it immediately.

Page 15: Welcome!! Computer / Internet Security Class / Seminar / Workshop

Securing Your Operating System

Good Passwords:

Your Password should be a unique combination of letters, numbers and a special character

(i.e. Y@nkeyD00dle )

Page 16: Welcome!! Computer / Internet Security Class / Seminar / Workshop

Securing Your Operating System

Good Passwords:Example of BAD passwords:

Page 17: Welcome!! Computer / Internet Security Class / Seminar / Workshop

Securing Your Operating System

It is very important to assign passwords to your user accounts on your computer – this will keep your DATA safe and secure

Setting The Windows Administrator’s Password:

Start -> Run -> control userpasswords2

Page 18: Welcome!! Computer / Internet Security Class / Seminar / Workshop

Highlight “Administrator”Choose “Reset Password”

Clear the User Name field and Rename it

Securing Your Operating System

Page 19: Welcome!! Computer / Internet Security Class / Seminar / Workshop

Securing Your Operating System

Setting The Mac OS X Root Password:Root Account DISABLED by Default

•Net Info Manager•Authenticate•Enable Root User•Create Root Password

Page 20: Welcome!! Computer / Internet Security Class / Seminar / Workshop

What Is A Virus?"A parasitic program written intentionally to

enter a computer without the user's permission or knowledge. The word parasitic is used because a virus attaches to files or boot sectors and replicates itself, thus continuing to spread. Though some viruses do little but replicate, others can cause serious damage or affect program and system performance. A virus should never be assumed harmless and left on a system." -- Symantec

Securing Your Operating System

Page 21: Welcome!! Computer / Internet Security Class / Seminar / Workshop

Types of Computer Viruses Basic Virus - a piece of software code that is developed to attack computers and

network entities via email or Internet connections. It quickly replicates itself and gradually attaches to files, programs or the hard drive.

Trojan Horse - This is a type of benign program, a malicious code that doesn't replicate when entering a system but can be effectively used to open 'back doors.' Trojan Horses allow hackers to assume control over a particular system or to steal vital data. As an example, QAZ helped hackers view the secret source code at Microsoft-owned network.

 Worm - this type of virus has the capability to spread itself automatically over the network from one computer to the next. During a worm attack, users' computers get infected without even having to click open email attachment or any program, etc. As an example, in the early August of 2003, a worm by the name of Blaster infected more than 1 million computers worldwide. In similar case, Welchia, an antidote to Blaster, clogged huge amounts of network computers and caused computers crashes.

 Blended or a Combination Attack - covers innovative strategies to infect and spread various viruses within computer networks. It involves basic virus, worm, and Trojan Horse techniques where attackers can use peer-to-peer networks and instant messaging systems to channel such viruses. In the mid-August of 2003, SoBig, a virus, infected nearly every other email traveling on the Internet at its peak.

Securing Your Operating System

Page 22: Welcome!! Computer / Internet Security Class / Seminar / Workshop

How They InfectOpen Ports (Worms, Trojans)

◦A port is a method on how your computer connects to the Internet (it is like a room full of doors and you choose which one to go through)

Removable Media (Floppy Disk, Memory Card)

Downloads (WWW, FTP, P2P)Email (Attachments, Scripts)

Securing Your Operating System

Page 23: Welcome!! Computer / Internet Security Class / Seminar / Workshop

Securing Your Operating System

Page 24: Welcome!! Computer / Internet Security Class / Seminar / Workshop

Free AntiVirus, Anti-Malware and Anti-Spyware◦AVG◦Avast◦Spybot Search and Destory◦AntiVir◦Ad-Aware

Securing Your Operating System

Page 25: Welcome!! Computer / Internet Security Class / Seminar / Workshop

Let’s hope your computer does Let’s hope your computer does not do this…not do this…

Page 26: Welcome!! Computer / Internet Security Class / Seminar / Workshop

QUESTIONS

Page 27: Welcome!! Computer / Internet Security Class / Seminar / Workshop

Computer Maintenance Checklist◦ At system setup

Install a surge suppressor/emergency shutdown power strip

Register your software products Schedule automated updates Read the maintenance section of your manual Set up your email to auto-archive older messages (if

you are using that type of email program (i.e. Microsoft Outlook)

Install anti virus software Install anti-advertising/malware software Put your software drivers (does anyone know what a

software driver is??) in a pocket sleeve 3 ring binder

Keeping your system up to date

Page 28: Welcome!! Computer / Internet Security Class / Seminar / Workshop

Weekly◦ Run a disk scan to check for hard drive issues (demo)◦ Run a defragmentation program – in Windows Vista and

7 this is done automatically)◦ Run a clean up to delete unneeded files (demo)◦ Back up your files to a remote location (I suggest Mozy

Pro)◦ Empty your recycle bin◦ Delete your Internet files (demo)◦ Clear your browsing history (demo)◦ Delete your cookies (demo)◦ Update your virus definitions◦ Run a full virus scan

Keeping your system up to date

Page 29: Welcome!! Computer / Internet Security Class / Seminar / Workshop

Monthly◦ Check for updates◦ Delete/uninstall unneeded or unused programs

Quarterly◦ Clean your keyboard and mouse (alcohol pads and

canned air) ***** I have a story about canned air◦ Clean your monitor◦ Clean your peripherals◦ Rebuild your desktop (this is not an easy task, please

make sure you get a professional to do this or ask a friend to help or myself) -- MOST IMPORTANT, BACK UP YOUR DATA

◦ Change all your passwords

Keeping your system up to date

Page 30: Welcome!! Computer / Internet Security Class / Seminar / Workshop

Yearly◦ Renew your software update and anti virus subscriptions

Keeping your system up to date

Page 31: Welcome!! Computer / Internet Security Class / Seminar / Workshop

Installing Applications◦Only install applications that you need◦If you install to many applications, your hard

drive will slowly fill up with files and will cause it to be slow over time (also, even if you think that uninstalling an application will speed up your computer, that is not always a truth… some applications leave behind files and could cause issues later on)

Keeping your system up to date

Page 32: Welcome!! Computer / Internet Security Class / Seminar / Workshop

Which Operating System is best for me??◦It is all about preference (what works best for

me?)◦Windows XP?◦Windows Vista◦Windows 7◦MAC OS X◦Linux (Ubuntu, Fedora, Red Hat)

No matter which Operating System you choose, always remember, it can get a virus, you need to keep it up to date and you need to back up your data

Keeping your system up to date

Page 33: Welcome!! Computer / Internet Security Class / Seminar / Workshop

QUESTIONS

Page 34: Welcome!! Computer / Internet Security Class / Seminar / Workshop

NEED A BREAK???

Page 35: Welcome!! Computer / Internet Security Class / Seminar / Workshop

Wired vs. Wireless◦Some Pros and Cons

Wired can be more fast (some wired connections have faster speeds than wireless)

Wireless allows you to be anywhere in your home and still connected to the Internet

Wired connections can be more secure (in some cases than wireless)

Wireless connections can be less secure if you don’t have the proper encryption enabled on your wireless access point

Connecting to the Internet

Page 36: Welcome!! Computer / Internet Security Class / Seminar / Workshop

Which Internet Browser is best for me◦ It is all about preference (what works best for me?)◦ Window’s Internet Explorer

Integrates really well with Windows OS Probably the most targeted (hacked, virus) browser in the world

◦ Mozilla’s Firefox It is very extendable (customizable)

◦ Apple’s Safari Apple’s answer to browsing Not very customizable

◦ Google’s Chrome Google’s answer to browsing Not very customizable

◦ Opera Opera’s answer to browsing Not very customizable

Connecting to the Internet

Page 37: Welcome!! Computer / Internet Security Class / Seminar / Workshop

Connecting to the Internet

Page 38: Welcome!! Computer / Internet Security Class / Seminar / Workshop

Safe/Smart Surfing◦First rule of smart surfing? Remain as

anonymous as possible. That means keeping all private information private. Here are some examples of private information that you should never give out on the Internet: full name home address phone number Social Security number passwords names of family members credit card numbers

Connecting to the Internet

Page 39: Welcome!! Computer / Internet Security Class / Seminar / Workshop

Keeping your information safe on the Internet◦The best way is not to put anything out there◦No personal information should be shared with

anyone you don’t knowIf you use Facebook, MySpace, Linkedin, etc…

understand that everything you say, express and post (i.e. photos) are available for the world to see… Also, remember that once something is “posted” on the Internet it could potentially be there forever. The all mighty Google may have already cataloged it.

Connecting to the Internet

Page 40: Welcome!! Computer / Internet Security Class / Seminar / Workshop

If you have children, it might be a good idea to use some sort of preventative measures to keep them safe◦ First thing is talk to them about Internet and let me

know the about the dangers keeping their personal information safe

◦ If you are worried that they might go to unsafe places on the Internet you can install programs on to your computer to help them stay safe (i.e. McGruff SafeGuard, CYBERSitter and NetNanny). Windows Vista and Windows 7 have a similar programs built-in

Connecting to the Internet

Page 41: Welcome!! Computer / Internet Security Class / Seminar / Workshop

Downloading Files, Music and Applications from the Internet◦My best advise to you about any of this is… don’t do any of it

◦If you have to download something, I suggest you have updated AntiVirus software and Anti-Malware software

◦For Music, I suggest using iTunes or another reputable company to download your music. Stay away from companies like LimeWire and other “free” music download sites. They typically have a lot of virus’ associated with them

Connecting to the Internet

Page 42: Welcome!! Computer / Internet Security Class / Seminar / Workshop

Email◦The best way to keep from getting these, is to

only open emails from people you trust SPAM (video) Phishing

◦These people are trying to get you to give them information about personal online accounts (i.e. ebay, paypal, etc)

Attachments◦Only time you should open email from anyone is if you

trust the person and you are expecting something from them (next to Phishing, this is the #1 way people get virus)

Connecting to the Internet

Page 43: Welcome!! Computer / Internet Security Class / Seminar / Workshop

Email◦ Don’t get fooled by the emails with attachments… like,

“If you forward this email you will receive $100 in 100 days”

◦ Remember if you are going to forward an email to friends and family, it is important to not include the previous email addresses from the attached email.

◦ Also, if you have a group of emails that you plan to send to, it is best to blind carbon copy (BCC) them

Connecting to the Internet

Page 44: Welcome!! Computer / Internet Security Class / Seminar / Workshop

Connecting to the Internet

Page 45: Welcome!! Computer / Internet Security Class / Seminar / Workshop

Connecting to the InternetMalware

◦ Malware, short for malicious software, is software designed to infiltrate a computer system without the owner's informed consent. The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code.[1] The term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, including true viruses. - wikipedia

Intrusive-ware (not an official term, that is what I call it)◦ It is almost the same as Malware; however, it has all of the

characteristics of a legitimate piece of software. Example, a program that looks and feels like your AntiVirus program; however, it keeps telling you that you have virus and the only way to make these pop-ups go away, is to buy their software. Now they may have your money, your computer and possibly your identity.

Page 46: Welcome!! Computer / Internet Security Class / Seminar / Workshop

Misconceptions about your computer◦Upgrading (to the next version of Windows,

Linux or MAC OS X) will not always fix the issue◦Running a virus scan and/or a anti-malware will

not always fix your issue

Page 47: Welcome!! Computer / Internet Security Class / Seminar / Workshop

Keeping yourself from having to call a technician or repair person◦Follow these 4 simple rules1)Be mindful of where you go on to the Internet

(if you think it is doesn’t look or feel right, then it isn’t… close your browser and/or just turn off your computer)

2)Update your computer with your AntiVirus definitions and Window Updates

3)Back up your data to an external hard or an external company (i.e. Mozy Pro)

4)Follow the Weekly, Monthly, Quarterly, Yearly plan (as mentioned above)

Page 48: Welcome!! Computer / Internet Security Class / Seminar / Workshop

QUESTIONS

Page 49: Welcome!! Computer / Internet Security Class / Seminar / Workshop

Cool Websites:◦http://www.komando.com/◦http://twit.tv/◦http://www.cnet.com/buzz-out-loud-podcast/◦http://www.crossloop.com/◦http://www.mahalo.com/◦http://www.petri.co.il/

◦http://www.connectedgeek.net

◦Survey:◦ http://shortlinks.connectedgeek.net/2010-04-Survey

Page 50: Welcome!! Computer / Internet Security Class / Seminar / Workshop

THANK YOU FOR COMING TODAY!◦Please fill out the survey form

If you have any questions or need help, please contact me at:

http://www.connectedgeek.net

[email protected]