1 / 87

Internet Security and Your Computer

Internet Security and Your Computer. Welcome to Boot Camp. OR How to surf the web safely. Without becoming paranoid. Subjects We’ll cover. viruses, worms, trojan horses, spyware virus scanners, firewalls, spyware blockers E-mail protection, browser protection

long
Download Presentation

Internet Security and Your Computer

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Internet Security and Your Computer Welcome to Boot Camp

  2. OR How to surf the web safely Without becoming paranoid

  3. Subjects We’ll cover • viruses, worms, trojan horses, spyware • virus scanners, firewalls, spyware blockers • E-mail protection, browser protection • home network security, wireless security • keeping kids safe in “chat rooms”

  4. The good, the bad and the ugly

  5. The Ugly

  6. Welcome to Internet Boot Camp Listen up recruits Internet security basic training is about to start!

  7. Your computer is like your house Are you connected to the Internet without using a virus scanner a firewall and a spy-ware blocker? You might as well leave your front door open 24/7

  8. Virus scanner Police officer Your computer is like your house

  9. Virus scanner Firewall Police officer Door guard Your computer is like your house

  10. Virus scanner Firewall Spy-ware blocker Police officer Door guard Security guard Your computer is like your house

  11. Virus scanner Firewall Spy-ware blocker Browser settings Police officer Door guard Security guard Another guard Your computer is like your house

  12. Virus scanner Firewall Spy-ware blocker Browser settings Virus/Worm/Trojan Police officer Door guard Security guard Another guard Criminals Your computer is like your house

  13. Virus scanner Firewall Spy-ware blocker Browser settings Virus/Worm/Trojan Spy-ware Police officer Door guard Security guard Another guard Criminals Thief Your computer is like your house

  14. Virus scanner Firewall Spy-ware blocker Browser settings Virus/Worm/Trojan Spy-ware Spam Police officer Door guard Security guard Another guard Criminals Thief Junk mail Your computer is like your house

  15. Meet The Enemy • virus

  16. Meet The Enemy • virus • worm

  17. Meet The Enemy • virus • worm • trojan horse

  18. Meet The Enemy • virus • worm • trojan horse • spam

  19. Meet The Enemy • virus • worm • trojan horse • spam • spy-ware

  20. Meet the Allies • Virus scanning software

  21. Meet the Allies • Virus scanning software • Firewall hardware/software

  22. Meet the Allies • Virus scanning software • Firewall hardware/software • E-mail scanning software virus/spam

  23. Meet the Allies • Virus scanning software • Firewall hardware/software • E-mail scanning software virus/spam • Spy-ware blocking software

  24. Meet the Allies • Virus scanning software • Firewall hardware/software • E-mail scanning software virus/spam • Spy-ware blocking software • Pop-up blocking software

  25. Meet the Allies • Virus scanning software • Firewall hardware/software • E-mail scanning software virus/spam • Spy-ware blocking software • Pop-up blocking software • Operating system updates

  26. Meet the Allies • Virus scanning software • Firewall hardware/software • E-mail scanning software virus/spam • Spy-ware blocking software • Pop-up blocking software • Operating system updates • Browser security settings

  27. E-Mail friend or foe? Don’t let the enemy use your E-mail to launch their attacks

  28. Securing E-mail

  29. Securing E-mail • Use an E-mail virus scanner

  30. Securing E-mail • Use an E-mail virus scanner • Block images in HTML messages

  31. Securing E-mail • Use an E-mail virus scanner • Block images in HTML messages • View messages in plain text / block HTML

  32. Securing E-mail • Use an E-mail virus scanner • Block images in HTML messages • View messages in plain text / block HTML • Use spam blocking software or ISP blocking

  33. Securing E-mail • Use an E-mail virus scanner • Block images in HTML messages • View messages in plain text / block HTML • Use spam blocking software or ISP blocking • Set up spoof E-mail account(s)

  34. Securing E-mail • Use an E-mail virus scanner • Block images in HTML messages • View messages in plain text / block HTML • Use spam blocking software or ISP blocking • Set up spoof E-mail account(s) • Update E-mail software regularly

  35. Securing E-mail • Never open attachments from “?” sender

  36. Securing E-mail • Never open attachments from “?” sender • Never “unsubscribe” from spam

  37. Securing E-mail • Never open attachments from “?” sender • Never “unsubscribe” from spam • Never click on links in spam / junk mail

  38. Securing E-mail • Never open attachments from “?” sender • Never “unsubscribe” from spam • Never click on links in spam / junk mail • Never give information reply to “?” mail

  39. Securing E-mail • Never open attachments from “?” sender • Never “unsubscribe” from spam • Never click on links in spam / junk mail • Never give information reply to “?” mail • Never give real E-mail address to websites

  40. Securing E-mail • Never open attachments from “?” sender • Never “unsubscribe” from spam • Never click on links in spam / junk mail • Never give information reply to “?” mail • Never give real E-mail address to websites • Beware of “phishing”

  41. Eliminating Spy-ware The enemy has spies everywhere “All spies will be shot on sight”

  42. Eliminating Spy-ware • Download and install AD-AWARE

  43. Eliminating Spy-ware • Download and install AD-AWARE • Download and install Spybot Search & Destroy

  44. Eliminating Spy-ware • Download and install AD-AWARE • Download and install Spybot Search & Destroy • Always use a firewall that monitors incoming and outgoing internet traffic

More Related