1 / 23

Internet Security Protect your computer in 4 steps.

Bits, Bytes & Chips. Internet Security Protect your computer in 4 steps. Court Nederveld. Presented by. Step 1. Keep your firewall turned on.

kyley
Download Presentation

Internet Security Protect your computer in 4 steps.

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Bits, Bytes & Chips Internet SecurityProtect your computer in 4 steps. Court Nederveld Presented by Bits, Bytes & Chips

  2. Step 1. Keep your firewall turned on • A firewall is a software program or piece of hardware that helps screen out hackers, viruses, and worms that try to reach your computer over the Internet. • A firewall helps protect your computer from hackers who might try to delete information, make your computer crash, or even steal personal information such as passwords or credit card numbers. You should make sure your firewall is always turned on. • if you have a small-office network, it is important to protect every computer. You should have a hardware firewall (such as a router) Bits, Bytes & Chips

  3. How Firewalls Work • When someone on the Internet or on a network tries to connect to your computer, the attempt is called an "unsolicited request." When your computer gets an unsolicited request, Firewalls block the connection. If you run a program such as an instant messaging program or a multiplayer network game that needs to receive information from the Internet or a network, the firewall asks if you want to block or unblock (allow) the connection. Bits, Bytes & Chips

  4. Step 2. Keep your operating system up-to-date • High priority updates are critical to the security and reliability of your computer. They offer the latest protection against malicious online activities. Microsoft provides new updates, as necessary, on the second Tuesday of the month. • Automatic Updates is the easiest, most reliable way to help protect your computer from the latest Internet threats by delivering security updates right to your computer automatically. Bits, Bytes & Chips

  5. Step 3. Use updated antivirus software • Viruses are usually malicious software. You need antivirus technology to help prevent viruses, and you need to keep it regularly updated. • Here are a few primary indicators that your computer might be infected: • Your computer runs more slowly than normal • Your computer stops responding or locks up often • Your computer crashes and restarts every few minutes • Your computer restarts on its own and then fails to run normally • Applications on your computer don't work correctly • Disks or disk drives are inaccessible • You can't print correctly • You see unusual error messages • You see distorted menus and dialog boxes Bits, Bytes & Chips

  6. Step 4. Use updated antispyware technology • Spyware is usually malicious software. You need antispyware technology to help prevent spyware, and you need to keep it regularly updated. • Spyware is a general term used to describe software that performs certain behaviors such as advertising, collecting personal information, or changing the configuration of your computer, generally without appropriately obtaining your consent first. Bits, Bytes & Chips

  7. Internet Safety Guidelines • Recognize phishing scams and fake e-mails • Phishing is a type of deception designed to steal your valuable personal data, such as credit card numbers, passwords, account data, or other information. • Con artists might send millions of fraudulent e-mail messages that appear to come from Web sites you trust, like your bank or credit card company, and request that you provide personal information. Bits, Bytes & Chips

  8. Internet Safety Guidelines • How to handle suspicious e-mail • If you think you've received a phishing e-mail message, do not respond to it. • Report suspicious e-mail to the faked or "spoofed" organization. • Contact the organization directly—not through the e-mail you received—and ask for confirmation. Or call the organization's toll-free number and speak to a customer service representative. Report the e-mail to the proper authorities, including the FBI, the Federal Trade Commission (FTC), and the Anti-Phishing Working Group. For more information on how to report phishing scams, read What to do if you've responded to a phishing scam. • Don't click links in e-mail messages. Bits, Bytes & Chips

  9. Internet Safety Guidelines(continued) • If you need to update your account information or change your password, visit the Web site by using your personal bookmark or by typing the URL directly into your browser. • Check the security certificate before you enter personal or financial information into a Web site. • Links in phishing e-mail messages often take you to phony sites that encourage you to transmit personal or financial information to con artists. Avoid clicking a link in an e-mail message unless you are sure of the destination. Even if the address bar displays the correct Web address, don't risk being fooled. Con artists can display a fake URL in the address bar on your browser. Type addresses directly into your browser or use your personal bookmarks. • Make sure the site is secure before you type. Bits, Bytes & Chips

  10. Anti-spam and anti-phishing technologies • Microsoft Phishing Filter • Use e-mail software that filters spam • Look at some of the key phrases used to get you to respond to a fake email. Bits, Bytes & Chips

  11. Watch for Key Phishing Words • "Verify your account.“ • "If you don't respond within 48 hours, your account will be closed.“ • "Dear Valued Customer.“ • "Click the link below to gain access to your account.“ • Slightly modified URLs • www.micosoft.com www.mircosoft.com www.verify-microsoft.com Bits, Bytes & Chips

  12. Protect your personal information • Create strong passwords • Make it lengthy • Combine letters, numbers, and symbols • Avoid your login name • Test your password athttp://www.microsoft.com/athome/security/privacy/password_checker.mspx • Use online payment services • Use a third-party payment service to pay for things online Bits, Bytes & Chips

  13. Beyond the basics, how to protect yourself and your data. • ID theft • Social engineering is a way for criminals to gain access to your computer. The purpose of social engineering is usually to secretly install spyware or other malicious software or to trick you into handing over your passwords or other sensitive financial or personal information. • Use Strong Passwords • Recognize Spam and Phishing Bits, Bytes & Chips

  14. Phishing! • Phishing” is a form of Internet fraud that aims to steal valuable information such as credit cards, social security numbers, user IDs and passwords • Refers to the stealing of personal identifiers such as Pin numbers, Credit card numbers and passwords via a spoof web site or email. Bits, Bytes & Chips

  15. Spam • Unsolicited, unwanted, irrelevant, or inappropriate messages, especially commercial advertising in mass quantities • Spam also eats up a lot of network bandwidth Bits, Bytes & Chips

  16. Mobile devices and wireless5 safety tips for using a public computer • Don't save your logon information. Always log out of Web sites by clicking "log out" on the site. It's not enough to simply close the browser window or type in another address • Don't leave the computer unattended with sensitive information on the screen. • Erase your tracks • Here’s how Bits, Bytes & Chips

  17. How to remove your presence. • To disable the feature that stores passwordsBefore you go to the Web, turn off the Internet Explorer feature that "remembers" your passwords.1. In Internet Explorer, click Tools, and then click Internet Options.2. Click the Content tab, and then click AutoComplete.3. Click to clear both check boxes having to do with passwords.To delete your temporary Internet files and your historyWhen you finish your use of a public computer, you should delete all the temporary files and your Internet history.1. In Internet Explorer, click Tools, and then click Internet Options.2. On the General tab, under Temporary Internet files, click Delete Files, and then click Delete Cookies.3. Under History, click Clear History. Bits, Bytes & Chips

  18. 5 safety tips for using a public computer (continued) • Watch for over-the-shoulder snoops. • Don't enter sensitive information into a public computer. These measures provide some protection against casual hackers who use a public computer after you have. • If you really want to be safe, avoid typing your credit card number or any other financial or otherwise sensitive information into any public computer. Bits, Bytes & Chips

  19. Malware • Software designed to infiltrate or damage a computer system without the owner's informed consent • It can hijack your browser, redirect your search attempts, serve up nasty pop-up ads, track what web sites you visit • Usually poorly-programmed and can cause a computer to become unbearably slow and unstable • Can reinstall themselves even after you think you have removed them Bits, Bytes & Chips

  20. Let’s Review. • Keep your operating system current with the most recent updates. • Use a Firewall • Use an Anti-Virus program and keep it updated. • Use an Anti-Spyware program and keep it updated. • Use an Anti-Spam program and keep it updated. Bits, Bytes & Chips

  21. Where do I get the tools I need? • Many ISP’s provide Anti-Virus with your subscription. Comcast, Embarq, AOL just to name a few. BUT! It must be downloaded and installed. • There are many Anti-Spyware programs but Microsoft makes Windows Defender available at no charge to users of Windows XP and it is included in Vista. Bits, Bytes & Chips

  22. Where do I get the tools I need? • Many companies offer Anti-Phishing capabilities but Microsoft includes it in Internet Explorer 7. • Firewalls are often a feature of Anti-virus programs but if not, turn on the Windows Firewall built into XP and Vista. • And finally, the most powerful protection available! Bits, Bytes & Chips

  23. Where do I get the tools I need? • Common Sense. • If it sounds to good to be true….. • If the program is FREE, read the EULA • Do not respond to bogus Emails • Do not click on links in Emails to other sites • Passwords, Passwords, Passwords • Watch for encryption signals. Padlocks and Certificates. Bits, Bytes & Chips

More Related