internet security l.
Skip this Video
Loading SlideShow in 5 Seconds..
Internet Security PowerPoint Presentation
Download Presentation
Internet Security

Loading in 2 Seconds...

play fullscreen
1 / 35

Internet Security - PowerPoint PPT Presentation

  • Uploaded on

Internet Security Why it’s important for you! Spam Spam - Unsolicited "junk" e-mail sent to large numbers of people to promote products, services, pornography, scams, nonsense, etc.

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
Download Presentation

Internet Security

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
internet security

Internet Security

Why it’s important for you!

  • Spam - Unsolicited"junk" e-mail sent to large numbers of people to promote products, services, pornography, scams, nonsense, etc.
  • AntiSpam- Software or service to help prevent unsolicited mail and to complicate a spammer's method of collecting email addresses.
spam some facts
Spam – Some Facts
  • Ferris Research estimates spam costs organizations $75 billion globally in antispam product purchases, lost productivity, and employees spending time cleaning out email.
  • Communications of the ACM estimate that spam makes up nearly 90% of email traffic and costs firms an estimated $1,000 per year per employee in lost productivity and bandwidth expenses.
other e mail fraud
Other e-mail fraud
  • Phishing – e-mail message that appears to come from a reliable source requesting confidential information to facilitate identity theft
  • Vishing – Similar to phishing but requests information called in to a fraudulent 800/888 number

Also, smishing – instant messaging version of phising

vishing example
Vishing Example


> Sent: Saturday, March 06, 2004 1:21:50 PM

> To:

> Subject: Your credit card has been successfully charged for $69.95

> Auto forwarded by a Rule


Administration of online store would like to thank you for your

purchase of Viagra tablets. Couple of words about our products and services. Viagra

is a prescription drug used to treat erection difficulties, such as erectile

dysfunction, which also refers to as an impotence. At this condition men do not

experience normal erection, necessary for the sexual act. VIAGRA works only in reply

to sexual excitation and does not influence reproductive function in any way. Your

tablets will be sent to the address specified by you within 24 hours. You should

store VIAGRA at temperature below 30 degrees in original packing and out of reach of

children. Do not take preparation after expiry date which is located on top of the

package. We are the only official dealers that offer you tablets in original

packaging. We guarantee to refund your money during 30 days.

If you never purchased this product please contact us at: 1.888.575.6398

To cancel this purchase please contact us at: 1.408-817-2800

To change the shipping address on the order: 1.877.999.8779

If you suffer any side effects please contact: 1.866.963.9696

For bulk purchases please contact: 1.703.547.2000

Thank you for choosing

We are the first - the best.

phishing facts
Phishing Facts
  • Top brands fraudulently represented in phishing messages:

Top 10 Identified Targets Valid Phishes

      • PayPal 9,575
      • eBay, Inc. 720
      • Internal Revenue Service 469
      • Sulake Corporation 459
      • Google 336
      • JPMorgan Chase and Co. 321
      • Wells Fargo 289
      • HSBC Group 272
      • Bank of America Corporation 231
      • Lloyds TSB 110

Source: PhishTank report, April 2009.

phishing facts15
Phishing Facts
  • Phishing is considered one of the most pernicious types of online crime.
  • According to the periodical, phishing is a $3. billion industry.
phishing protection
Phishing Protection
  • Don't click on links in spam messages or in pop-up windows
  • Look for secure sites with https as the protocol in the URI (e.g.,
  • Viruses – “a program that is able to infect other programs by modifying them to include a possibly evolved copy of itself" - Dr. Frederick Cohen
  • A virus may do little more than replicate itself in this way, although it is more likely to contain some form of malicious act
  • A virus is generally used to cover many different forms of malicious software, including true viruses, worms, Trojan horse programs and even some types of spyware and adware.
    • Examples:
      • Boot Sector - A virus which infects the boot sector or partition table of a disk
      • File Infector - traditional type of virus which infects .com .exe or other executable files
virus facts
Virus Facts
  • Less common than other computer nuisances - found in about 0.15 percent of e-mails
  • Less prevalent than the phishing attacks
  • However, viruses can corrupt your computer's programs and files or even destroy all the information on a computer, and cost$$$$$.
viruses protection
Viruses - Protection
  • Use antivirus software and set up a firewall
  • Stay away from risky Web pages - gambling, porn and other questionable sites
  • Like phishing - don't click on links in spam messages or in pop-up windows
viruses protection21
Viruses - Protection
  • Block images or graphics in e-mail messages
  • Use care with email attachments
    • Don’t open attachments from strangers
    • Don’t open unexpected attachments from “friends”
viruses protection22
Viruses - Protection

Use alternative Web browsers (e.g., Firefox), Microsoft's Internet Explorer (IE) browser poses additional risks because it is so tightly integrated into the Windows operating system. As a result, it is capable of running code that installs malware on your computer without your approval or knowledge


Try the Firefox browser with No Scripts

  • Will limit certain content
  • Will break a lot of web pages
  • But will also stop 99% of web attacks!!
protection patches
Protection - Patches

Keep your browser software patched and up-to-date

Use Secunia to check for missing patches and vulnerable software

note fake antivirus
NOTE – Fake Antivirus

Fake antivirus products earn promoters $34 million…a month

  • Bot - An automated software program that can execute certain commands when it receives a specific input
    • The Web searching bots, also known as spiders and crawlers, search the Web by retrieving a certain document and recording the information and links found on it. They then generate indexes of the sites they have searched which can later be accessed by a search engine.
    • Bots also function in chat rooms (IRC). They will do things like greet people when they enter a chat room, advertise web sites or special deals, or kick people out of chat rooms with an accompanying nasty message.
    • However, bot is also a term used to describe a small, malicious program that can be planted on a computer which is then used to attack another victim computer or Website.
  • Botnet – A collection of computers that have been infected with maliciously programmed bots which are then used to launch a coordinated attack against a victim's computer of website, most often resulting in a denial of service.  A botnet is also referred to as a zombie network.
  • Currently, researchers denote that the botnet, Conficker, has grown 10 times larger than any other e-mail malware. It was noted that an average of 1 million virus-laden e-mails are crossing the Internet daily.
  • Spyware - A general term for a program that monitors your navigating actions. Some may be sinister, like a remote control program used by a hacker, or employed by software companies to gather data about customers.
  • Some Spyware invades your computer, installs programs without your knowledge, steals your information, and compromises your security and privacy.
spyware protection
Spyware - Protection
  • Use Spybot Search & Destroy (, a program that removes spyware and other malware
  • Check out the Anti-Spyware Software Review at
more protection firewalls
More Protection - Firewalls
  • Firewalls – Gateway that limits access between networks in accordance with local security policy. The typical firewall is an inexpensive micro-based Unix box kept clean of critical data, with many modems and public network ports on it, but just one carefully watched connection back to the rest of the cluster.
  • Firewall Test
other smart ideas
Other smart ideas

Complex Passwords passwords are required for many of the university systems (eg. MyUAlbany, Webmail, UNIX). Please note that a 'good password' is both complex AND secure.

complex passwords
Complex passwords
  • At least eight characters.
  • At least one letter: (a-z).
  • At least one number: (0-9).
  • At least one special character: @ , $ , * , ?, etc.
  • Does NOT use the characters: !, &, {, ~ , ", `, ' , < .
  • Use long passphrases (> 14 characters)
    • J@im3leBibli0th3que
    • “I do not think much of a man who is not wiser today than he was yesterday.” Abraham Lincoln


    • Don’t use same passphrase for different confidential services
ualbany itsprotection
UAlbany ITSProtection

For more UAlbany information: