safe internet browsing l.
Skip this Video
Loading SlideShow in 5 Seconds..
Safe Internet Browsing PowerPoint Presentation
Download Presentation
Safe Internet Browsing

Loading in 2 Seconds...

play fullscreen
1 / 24

Safe Internet Browsing - PowerPoint PPT Presentation

  • Uploaded on

Safe Internet Browsing Cyber Security Awareness Month October 2006 Safe Internet Browsing What are we going to talk about? Zombies Rats Spyware Safe Ecommerce Resources Zombies What is a zombie?

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
Download Presentation

Safe Internet Browsing

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
safe internet browsing

Safe Internet Browsing

Cyber Security Awareness Month

October 2006

safe internet browsing2
Safe Internet Browsing
  • What are we going to talk about?
    • Zombies
    • Rats
    • Spyware
    • Safe Ecommerce
    • Resources
  • What is a zombie?
  • Zombie: A computer that has been implanted with a daemon that puts it under the control of a malicious hacker without the knowledge of the computer owner.
  • Zombie computers are combined to create “botnets”
  • Botnets can include as many as 100,000 individual ‘zombie’ computers
  • Is your computer a Zombie?
    • You may never know!
    • Zombie symptoms
      • Slow Slow Slow
      • Re-directed web sites
      • The FBI knocking on your door
      • Weird ports open
weird ports weird science

Weird Ports – Weird Science
  • Start
  • Run
  • CMD
  • Netstat -a
zombies con t
Zombies con’t
  • Your computer must be online and on the Internet in order for it to be used as a Zombie
  • How do I get infected?
    • Inadvertently from malicious websites
    • Joke email – photos, games, attachments
    • Instant messaging
    • File sharing – music, video, games
  • Remote Access Trojans (RATs) are malicious software programs that enable criminals to control your computer through your Internet connection
zombies and rats con t
Zombies and RATs, con’t
  • How does your computer become a Zombie or RAT?
    • Code is downloaded from a source:
      • Email
      • Instant messaging
      • Web browsing
      • File sharing
      • Doing nothing at all?!?!
zombies and rats con t9
Zombies and RATs con’t
  • What can Zombies and RATs do?
    • Attack other computers
    • Expose you to scams
    • Find your files and view, copy, alter, or delete them
    • Steal your credit account numbers, bank account number, identity
    • Key loggers - Record your typing and send that info to another computer
  • What is it?
    • Collection of technologies that help external parties in gathering information about a person or organization without their knowledge
  • Types
    • Adware
    • Hijackers
    • Keyloggers
    • Plug-ins
    • Phishers
spyware con t
Spyware con’t
  • How do you get infected?
    • Infected freeware
    • Peer to peer file sharing (to share music and videos)
    • Instant messaging
    • Surfing the web
  • Symptoms of infection – Visible
    • Redirected searches
    • Pop up ads
    • Erratic email behavior
    • Slow internet connection speeds
    • New and strange sites on your favorites or bookmarks
spyware symptoms con t
Spyware, Symptoms con’t
  • Symptoms – Hidden
    • Gathering of personal information
      • Credit card info
      • Passwords
      • Financial information
      • Browsing habits
    • Read and disclose the contents of files on your hard drive
spyware symptoms con t13
Spyware, Symptoms con’t
  • I’m infected! What do I do?
    • Use utilities to clean up malicious software
      • Lavasoft Adaware
      • Spybot Search and Destroy
      • SpoofStick
    • Manual removal
      • Step by step instructions
spyware what to do con t
Spyware, What to do con’t
  • Prevention
    • There is no ‘silver bullet’ to stop or prevent spyware
    • Overall awareness
      • Understand the warning signs and symptoms
    • Routine maintenance
      • Run spyware removal tools
      • Keep system updated
spyware prevention con t
Spyware, Prevention con’t
  • Use a firewall
  • Some anti-virus programs now provide spyware protection
  • DO NOT put personal information on public computers such as labs or library machines
spyware con t16
Spyware con’t
  • What’s GU doing about this?
    • Layered defense
      • Campus firewall – prevents spyware infected machines from transmitting information to 3rd parties
      • Spam filter appliance – stops some spyware from being distributed via email
      • Enterprise antivirus software – investigates email at a higher level than the appliance
spyware what s gu doing con t
Spyware, What’s GU doing con’t
  • Desktop antivirus client – prevents spyware infections to a degree (not foolproof because users tend to OK the installation of the spyware)
  • Desktop firewall – prevents infected machines from transmitting and receiving data on non-standard ports
  • User awareness – understand the symptoms of spyware infections and how spyware gets installed in the first place
safe ecommerce
Safe Ecommerce
  • Keep your transactions secure
      • Look for the bank or on-line store privacy and security practices, or contact the company directly
      • Look for the lock and HTTPS:
        • This indicates that the website is encrypted
      • Passwords or PINs should be used
      • General security
        • Keep your virus protection up to date
        • Use a debit card with a separate account for online transaction
infection symptoms
Infection Symptoms
  • How to tell if your infected
    • Your computer runs more slowly than normal
    • Your computer stops responding or locks up often
    • Your computer crashes and restarts every few minutes
    • Your computer restarts on its own and then fails to run normally
infection symptoms con t
Infection Symptoms con’t
  • Applications on your computer don’t work correctly
  • Disks or disk drives are inaccessible
  • You can’t print correctly
  • You see unusual error messages
  • You see distorted menus and dialog boxes
internet browsing guidelines
Internet Browsing Guidelines
  • Guidelines Web users should know
    • If there is sensitive data on your computer, don’t browse the Web
      • Store personal info on an encrypted drive or folder
    • Install security patches and updates
    • Ensure that browsers are up to date
    • Disable plug-ins and configure security settings not to run Java applets, JavaScript and VBScript, ActiveX controls, etc. without prompting you first
    • Consider using more then 1 Web browser
safe internet browsing resources
Safe Internet Browsing Resources
  • Resources
    • Check for open ports Netstat –a
    • Free Open Port Scan – Gonzaga
    • To see if a website is legitimate go to or
    • Free PC SAFETY Scan – Microsoft
contact information
Contact Information
  • Help Desk –
    • Extension 5550
  • Jim Jones – IT Asset Manager
    • Extension 5926
  • Http://