1 / 24

Safe Internet Browsing

Safe Internet Browsing Cyber Security Awareness Month October 2006 Safe Internet Browsing What are we going to talk about? Zombies Rats Spyware Safe Ecommerce Resources Zombies What is a zombie?

andrew
Download Presentation

Safe Internet Browsing

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Safe Internet Browsing Cyber Security Awareness Month October 2006

  2. Safe Internet Browsing • What are we going to talk about? • Zombies • Rats • Spyware • Safe Ecommerce • Resources

  3. Zombies • What is a zombie? • Zombie: A computer that has been implanted with a daemon that puts it under the control of a malicious hacker without the knowledge of the computer owner. • Zombie computers are combined to create “botnets” • Botnets can include as many as 100,000 individual ‘zombie’ computers

  4. Zombies • Is your computer a Zombie? • You may never know! • Zombie symptoms • Slow Slow Slow • Re-directed web sites • The FBI knocking on your door • Weird ports open

  5. 216.229.161.198 66.102.7.147 Weird Ports – Weird Science • Start • Run • CMD • Netstat -a • SamSpade.org • DNSSTUFF.org

  6. Zombies con’t • Your computer must be online and on the Internet in order for it to be used as a Zombie • How do I get infected? • Inadvertently from malicious websites • Joke email – photos, games, attachments • Instant messaging • File sharing – music, video, games

  7. RAT • Remote Access Trojans (RATs) are malicious software programs that enable criminals to control your computer through your Internet connection

  8. Zombies and RATs, con’t • How does your computer become a Zombie or RAT? • Code is downloaded from a source: • Email • Instant messaging • Web browsing • File sharing • Doing nothing at all?!?!

  9. Zombies and RATs con’t • What can Zombies and RATs do? • Attack other computers • Expose you to scams • Find your files and view, copy, alter, or delete them • Steal your credit account numbers, bank account number, identity • Key loggers - Record your typing and send that info to another computer

  10. Spyware • What is it? • Collection of technologies that help external parties in gathering information about a person or organization without their knowledge • Types • Adware • Hijackers • Keyloggers • Plug-ins • Phishers

  11. Spyware con’t • How do you get infected? • Infected freeware • Peer to peer file sharing (to share music and videos) • Instant messaging • Surfing the web • Symptoms of infection – Visible • Redirected searches • Pop up ads • Erratic email behavior • Slow internet connection speeds • New and strange sites on your favorites or bookmarks

  12. Spyware, Symptoms con’t • Symptoms – Hidden • Gathering of personal information • Credit card info • Passwords • Financial information • Browsing habits • Read and disclose the contents of files on your hard drive

  13. Spyware, Symptoms con’t • I’m infected! What do I do? • Use utilities to clean up malicious software • Lavasoft Adaware • Spybot Search and Destroy • SpoofStick • Manual removal • Step by step instructions • www.2-spyware.com

  14. Spyware, What to do con’t • Prevention • There is no ‘silver bullet’ to stop or prevent spyware • Overall awareness • Understand the warning signs and symptoms • Routine maintenance • Run spyware removal tools • Keep system updated

  15. Spyware, Prevention con’t • Use a firewall • Some anti-virus programs now provide spyware protection • DO NOT put personal information on public computers such as labs or library machines

  16. Spyware con’t • What’s GU doing about this? • Layered defense • Campus firewall – prevents spyware infected machines from transmitting information to 3rd parties • Spam filter appliance – stops some spyware from being distributed via email • Enterprise antivirus software – investigates email at a higher level than the appliance

  17. Spyware, What’s GU doing con’t • Desktop antivirus client – prevents spyware infections to a degree (not foolproof because users tend to OK the installation of the spyware) • Desktop firewall – prevents infected machines from transmitting and receiving data on non-standard ports • User awareness – understand the symptoms of spyware infections and how spyware gets installed in the first place

  18. Safe Ecommerce • Keep your transactions secure • Look for the bank or on-line store privacy and security practices, or contact the company directly • Look for the lock and HTTPS: • This indicates that the website is encrypted • Passwords or PINs should be used • General security • Keep your virus protection up to date • Use a debit card with a separate account for online transaction

  19. Safe Ecommerce

  20. Infection Symptoms • How to tell if your infected • Your computer runs more slowly than normal • Your computer stops responding or locks up often • Your computer crashes and restarts every few minutes • Your computer restarts on its own and then fails to run normally

  21. Infection Symptoms con’t • Applications on your computer don’t work correctly • Disks or disk drives are inaccessible • You can’t print correctly • You see unusual error messages • You see distorted menus and dialog boxes

  22. Internet Browsing Guidelines • Guidelines Web users should know • If there is sensitive data on your computer, don’t browse the Web • Store personal info on an encrypted drive or folder • Install security patches and updates • Ensure that browsers are up to date • Disable plug-ins and configure security settings not to run Java applets, JavaScript and VBScript, ActiveX controls, etc. without prompting you first • Consider using more then 1 Web browser

  23. Safe Internet Browsing Resources • Resources • Check for open ports Netstat –a • Free Open Port Scan – Gonzaga • http://toxocara.gonzaga.edu • To see if a website is legitimate go to www.SamSpade.org or www.DNSstuff.com • Free PC SAFETY Scan – Microsoft • http://safety.live.com/site/en-US/default.htm?s_cid=sah

  24. Contact Information • Help Desk – • Extension 5550 • Jim Jones – IT Asset Manager • jonesj@its.gonzaga.edu • Extension 5926 • Http://cybersecurity.gonzaga.edu

More Related