safe internet use n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Safe Internet Use PowerPoint Presentation
Download Presentation
Safe Internet Use

Loading in 2 Seconds...

play fullscreen
1 / 19

Safe Internet Use - PowerPoint PPT Presentation


  • 257 Views
  • Uploaded on

Safe Internet Use. Mark Wheatley CSI Onsite 952-928-1788 mark@csionsite.com. About Us. In business for over 15 years Purpose & Values driven Member in good standing with:. Safe Internet Use. What can we do to stay ahead? What to watch out for What is a URL?

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Safe Internet Use' - ivria


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
safe internet use
Safe Internet Use

Mark Wheatley

CSI Onsite

952-928-1788

mark@csionsite.com

about us
About Us
  • In business for over 15 years
  • Purpose & Values driven
  • Member in good standing with:
safe internet use1
Safe Internet Use
  • What can we do to stay ahead?
  • What to watch out for
    • What is a URL?
    • What is Phishing / Spoofing?
  • Threat Evolution - Malware
  • Good Practice - 5 rules (CSI Onsite Style)
what to watch out for
What to watch out for
  • URLs – Uniform Resource Locator
    • URL is the address to visit a web site
    • Domain name translates to an IP address
    • Can be masked to appear as something different than actual address
    • Web browser ignores the @ symbol in address
    • Besides the http://, look for the first “/”
    • Words to the left of that slash, is actual domain name
what to watch out for1
What to watch out for
  • Hyperlinks, URLs and Redirects
    • Easy to spoof
    • Underlying address may be different than visible link
    • Domain names that are close to actual
    • www.micosoft.com
    • www.verify-microsoft.com
    • ww.mircosoft.com
  • Examples
examples
Examples
  • Fake Link
  • Look for the first “/” after http://
what to watch out for2
What to watch out for
  • Phishing
    • Get you to click on link/s with malicious or fraudulent intent
    • Potential for identity theft
    • Fake emails from company with whom you do business
    • PayPal / EBay fraud
    • Fake charities
    • Urgent wording
    • Fake links with legitimate appearance

http://office.microsoft.com/en-us/outlook/HA011400021033.aspx

examples1
Examples
  • Link is the same as actual, but hoping you’ll only look at first or second line.
  • Look for the “/”. … viewvideopatch.com/
what to watch out for3
What to watch out for
  • Email Spoofing
    • Email appearing to be from someone other than the actual sender
    • Spamming technique
    • Creates concern for recipient
    • Could be sent from infected computer
    • Open relays
      • Many ISPs requiring outbound e-mail authentication to keep infected computers from relaying email
examples2
Examples
  • Spoofed Sender
  • Link that is close to actual
  • Clicked on link
  • Looked identical to PayPal site
  • All links were correct
  • Except one
examples3
Examples

Received: from blackbed by server1.0traffic.com with local (Exim 4.69)

(envelope-from <blackbed@server1.0traffic.com>)

id 1S55eO-0007wH-Bd

for sales@csionsite.com; Tue, 06 Mar 2012 20:26:47 -0500

To: sales@csionsite.com

Subject: Your package is available for pickup

From: "FedEx Support" <information@fedex.com>

threat evolution
Threat Evolution
  • What is Malware?
    • Short for Malicious Software
    • Disrupt computer operation, gather information or exploit system or data, without consent
    • Hostile, intrusive or annoying software
    • Delivered to system via:
      • Email attachment
      • Web site re-direct
      • Infected system, flash drive, software install
examples4
Examples
  • Virus Attachment
threat evolution1
Threat Evolution
  • Can look like legitimate software
  • Hold your system ransom
  • Lock system down so even skilled technicians may choose to reload computer operating system, or restore from backup rather than try to find or un-do changes
  • Capture credit card information, leading to identity theft
examples5
Examples
  • Looks legit and has feel of a Windows app
  • Could make changes to system with AV software installed
  • Entire window, one big “install me now” button
  • Shield in corner looks just like Windows Update
  • All BAD!
threat evolution2
Threat Evolution
  • Malicious intent – take down company web presence
  • Organized crime
  • Fraud
  • Financial gain
  • 1% of 1million emails = 10,000
    • X $40 = a lot of money to be had….
what can we do to stay ahead
What can we do to stay ahead
  • Education, education, education
  • Software can’t always protect you
  • Be suspicious of Internet content
  • Operate computer with lesser privileges
  • Watch for drive-by downloads, or piggy-backing
  • Verify the software you do install, is legitimate and has good intentions
  • Email settings / spam filters
  • Create regular backups and system restore points
5 basic rules
5 Basic Rules
  • Keep your antivirus software installed and definitions up to date
  • Careful where you browse…
  • Be careful when opening emails from people you do AND don’t know
  • Microsoft does not typically send updates or patches via email and neither do most software manufacturers
  • Check your hyperlinks and URLs before clicking
questions
Questions

Email:

mark@csionsite.com

paul@csionsite.com

john@csionsite.com

dan@csionsite.com

mail@csionsite.com

Or

Call: 952-928-1788