1 / 49

“Antibiotics don't work against viruses.” - Mayo Clinic

Under Attack. “Antibiotics don't work against viruses.” - Mayo Clinic. Computer Security You Can (and Should ) Use. Sandia High School November 8 th , 2013 University of New Mexico. Who We Are.

Download Presentation

“Antibiotics don't work against viruses.” - Mayo Clinic

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Under Attack “Antibiotics don't work against viruses.”- Mayo Clinic Computer Security You Can (and Should) Use Sandia High School November 8th, 2013 University of New Mexico

  2. Who We Are • We are graduate students at the Anderson School of Management at UNM studying Information Assurance. As part of our Information Security class we are promoting information security in the community by speaking to High School students. We hope that this information proves to be useful for you.

  3. How Widespread is it?

  4. What’s Out There?

  5. It’s Not for Lunch Anymore • In August, 2013 unsolicited emails made up 67.6% of all global email traffic. – Kapersky Labs

  6. What About SHS? • How many times has a computer you use (personal or home) become infected with some type of malware (virus, couldn’t make a program stop appearing, etc.)?

  7. What About SHS? • When doing online research, have you ever clicked on a link that went to someplace other than what it claimed, containing adult content?

  8. Why? • $$$ (Yours)

  9. Why? • $$$ (Yours) • $$$ (if you’re not the consumer, you’re the product

  10. Why? • $$$ (Yours) • $$$ (if you’re not the consumer, you’re the product • Distributed Denial of Service Attack • Financial • Political • Personal satisfaction

  11. Types • Phishing

  12. Types • Phishing • Trojans/Viruses/Bots

  13. Types • Phishing • Trojans/Viruses/Bots • Adware

  14. Types • Phishing • Trojans/Viruses/Bots/Worms • Adware • Mobile • Up to 90 percent of Android devices are infected, due to Google’s open development

  15. Types

  16. Types

  17. What Can I Do? • Curiosity killed the cat

  18. What Can I Do? • Curiosity killed the computer

  19. What Can I Do? • Curiosity killed the computer • No one can make you feel inferior without your consent. -Eleanor Roosevelt

  20. What Can I Do? • Curiosity killed the computer • No one can make you feel inferior without your consent. -Eleanor Roosevelt • Very few types of malicious programs can infect your computer without your consent. –Keith Smith

  21. What Can I Do? • Curiosity killed the computer • No one can make you feel inferior without your consent. -Eleanor Roosevelt • Very few types of malicious programs can infect your computer without your consent. –Keith Smith • Drive by (iFrame insertion)

  22. What Not to Do • Don’t click on that link

  23. What Not to Do • Don’t click on that link • Don’t click on that button

  24. What Not to Do • Don’t click on that link • Don’t click on that button • Don’t click on that image

  25. What Not to Do • Don’t click on that link • Don’t click on that button • Don’t click on that image • That one-line email was sent by a friend, a friend with a virus. Hi! I advise link  http://gangsterlife.net/_45_advise.facebook.apps_34_.html?otagiwiw=4136897

  26. What Not to Do • Don’t click on that “close window” X

  27. What Not to Do • Don’t change your profile picture to a giraffe!!

  28. What to Do • Update, update, update • Automatic

  29. What to Do • Update, update, update • Automatic • Use protection • Microsoft • AVG • ZoneAlarm • Symantec • Etc.

  30. What to Do • Use incomplete search terms • (pssstt! Wanna buy Air Force One?)

  31. What to Do • Use incomplete search terms • (pssstt! Wanna buy Air Force One?) • That (song, movie, software) might cost you MUCH more if you get it free • Torrent. World’s greatest source of revenue for McAfee and Symantec

  32. What to Do • Be careful out there

  33. What to Do • Be careful out there

  34. Next- • Social diseases…

  35. How Over Sharing Hurts You • Identity Theft • Social media sites ask for personal information like the following: • Full Name • Email Address • Date of Birth • Home Town • School Name, Location and Graduation Dates • Pet Names • Other Interests and hobbies

  36. How Over Sharing Hurts You • Why is this information dangerous? • That information is commonly used for passwords and security questions. • Hackers can lock you out of your own accounts. • Protect Yourself • When creating online profiles do not use your full name and do not allow your email address to be visible. • Give as little other information as possible.

  37. How Over Sharing Hurts You • Stalkers • Checking in at locations. • Thieves • Announcing when you and your family are away. • Employers • May find the content of your profiles to be inappropriate.

  38. How Over Sharing Hurts You • Protect Yourself • Do not check in at places. If you must, make sure your profile is private and you know all of your friends and followers. • Do not let people know when you are away, even those you know in real life. • Don’t post things you wouldn’t be comfortable talking about in the workplace.

  39. Protect Your Reputation • Don’t post anything online you wouldn’t want your parents to see! • Check pictures that your friends tag you in. • Google yourself.

  40. Protect Your Online Reputation

  41. Protect Your Reputation • Why is this important? • 77% of employers check applicant’s social networking sites during the hiring process. • 80% of top colleges check applicant’s social networking sites during the recruiting process.

  42. Geotagging • Geotagging is marking a form of media, video, photo, etc. with the location of where that media file was created.

  43. Geotagging

  44. General Internet Security Guidelines • Create a strong password. • 8 characters in length • Use each of the following: • A lower case letter • An uppercase letter • Number • Special character

  45. General Internet Security Guidelines • Create a strong password. • Don’t use the names of family, friends or pets. • Use acronyms instead of full words. • Ex: My dog Rex is 4 years old! Would be used in a password as MdRi4yo! • Change your passwords every 6 months. • Don’t use the same password for all of you logins, especially banking and financial services. • Use a password vault.

  46. General Internet Security Guidelines • Don’t leave your personal devices logged in to online accounts. • If you suspect one of your accounts has been hacked, change your passwords immediately.

  47. General Internet Security Guidelines • Use Two-Factor Authentication • Two factor authentication is a security process in which the user provides two means of identification to access an account. • Helps reduce identity theft, phishing scams, and other online fraud.

  48. General Internet Security Guidelines • Use two factor authentication.

  49. Questions? • References: • Fisher, Anne. "Checking out Job Applicants on Facebook? Better Ask a Lawyer." Fortune Management Career Blog. CNN Money, 2 Mar. 2011. Web. 01 Nov. 2013. • Jackson, Ben, and Larry Pesce. "I Can Stalk U." I Can Stalk U. Mayhemic Labs, 2010. Web. 01 Nov. 2013. • Lewis, Kent. "How Social Media Networks Facilitate Identity Theft and Fraud ." How Social Media Networks Facilitate Identity Theft and Fraud | Entrepreneurs' Organization. Entreprenuers Association, n.d. Web. 01 Nov. 2013. • Natarajan, Ramesh. "The Ultimate Guide for Creating Strong Passwords." The Geek Stuff. N.p., n.d. Web. 08 June 2008. • Quigley, Robert. "Geekosystem." Report 80 of College Admissions Departments Check Applicants Facebook Pages Comments. Geek System, 25 Feb. 2011. Web. 01 Nov. 2013. • Wawro, Alex. "How to Set up Two-factor Authentication for Facebook, Google, Microsoft, and More." PCWorld. N.p., 25 Apr. 2013. Web. 01 Nov. 2013.

More Related