1 / 40

Personal Computer Safety

Personal Computer Safety. Les Smee Georgia Tech Research Institute. Quiz. http://www.alwaysuseprotection.com/quiz.aspx. Famous Hacking. John Draper Handle: Cap'n Crunch. Claim to fame:

lynn
Download Presentation

Personal Computer Safety

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Personal Computer Safety Les Smee Georgia Tech Research Institute

  2. Quiz http://www.alwaysuseprotection.com/quiz.aspx

  3. Famous Hacking John DraperHandle:Cap'n Crunch Claim to fame: Figured out how to make free phone calls using a plastic prize whistle he found in a cereal box. Cap'n Crunch introduced generations of hackers to the glorious concept of phone "phreaking."

  4. Famous Hacking Robert MorrisHandle:rtm Claim to fame: The son of the chief scientist at the National Computer Security Center part of the National Security Agency (NSA) this Cornell University graduate student introduced the word "hacker" into the vernacular when he accidentally unleashed an Internet worm in 1988. Thousands of computers were infected and subsequently crashed.

  5. Famous Hacking Kevin MitnickHandle:Condor Claim to fame: The first hacker to have his face immortalized on an FBI "Most Wanted" poster. His status as a repeat offender, a teenage hacker who couldn't grow up, earned Mitnick the nickname "The Lost Boy of Cyberspace." Inspired the movie “War Games” by hacking NORAD.

  6. Computer Updates • Update Operating System • Automatic • Manual • Update individual Applications • Usually Notified • Update Virus and Spyware Programs

  7. Operating Systems • Maintain updates • The more common the OS the more vulnerable • Windows • Less common/vulnerable • Linux, Mac OSX

  8. Viruses • Run without intention or permission • Have the ability to "infect" or modify other files or disk structures • Replicate so it can spread to other files or systems • Does NOT have to be malicious

  9. Virus Types • Boot Sector Infectors – attaches to boot program, runs when computer is started • File Infectors – attack file (.exe) and change code • Macro Viruses – use programming language built into applications like Microsoft Word

  10. Virus-like • Worms – doesn’t infect other files/programs, completely self-contained • Trojan Horses – software intentionally written to do something it is not intended to do • Bugs – unintentional coding that cause a program to misbehave

  11. Virus Hoaxes and Myths • Often Spread via email • Threaten grave consequences • http://hoaxbusters.ciac.org/ (HoaxBusters) • Cannot get a virus simply from reading an email

  12. Virus Prevention • More connections = more vulnerability • Pirated Software more likely to contain viruses than legitimate software • Control access to PCs • Scan removable media • Disable booting from removable media • Can disable it’s use completely

  13. Virus Detection • Use Anti-Virus software • Norton • McAfee • AVG (free) • Keep AV program up to date (Virus Definitions) • Auto updates • Regular Checks • Weekly Scans • File Scanning

  14. Firewall • Definition: Hardware and/or software that limits access to your computer from the outside world • Cannot stop you from download malicious software • Virus, trojan, etc. • Can be configured to allow or disallow specific types of traffic (ports)

  15. Firewalls • Hardware • Can be combined with other product (switch, router) • Dlink, Linksys, Netgear • Software • Many have free version for personal use • Zonealarm, Norton, Windows • Need to get updates

  16. Testing Firewalls • Port Probe • DSLReports • http://www.pcflank.com/scanner1.htm

  17. Why not backup? • Not important • No Time • Don’t know how • No routine (forget)

  18. Causes of Data Loss • Hardware Failure • Software Failure • File System Corruption • Accidental Deletion • Virus • Theft • Sabotage • Natural Disaster

  19. Backup Methods • Medium • Tape • CD/DVD • Removable Drive • Internal duplicate drive • Backup Specific Files • Windows Backup

  20. Backups • Make backing up routine (set reminder) • Store backups in safe location • One set on site and one set off • Destroy old backups

  21. Browsing • Get browser updates • Try alternative browsers (Firefox) • Verify addresses in address bar • Regularly delete stored data • Cookies • Block pop-ups

  22. Online Shopping • Look for padlock or https:// • Use credit cards • Single use • Research Company • (www.bbb.org) or (www.naag.org) • Know return policy • Look at URL closely • Print or save order confirmation

  23. Email • Generally not secure • Beware of Phishing • Don’t trust attachments • Avoid Spam • HTML email can be bad • Some mail programs allow you to turn off html

  24. Email Don’ts • Use full name as sender • Give out passwords • Use primary email for posting in public forums • Respond to spam unsubscribe address • Buy from spammers • Include name in address

  25. Avoiding Spam • How do spammer get your address? • Spambot or Scraper to crawl the web looking for addresses • Trick people into submitting their addresses • Pick and domain and send thousands of emails

  26. Avoiding Spam • Use disposable addresses • Watch for “Yes I want to receive …” checkboxes • Disguise email address on blogs, chatrooms, etc • Joeblow@YAdelete_thisHOO.COM • joeblow@ yahoo.com • Use unguessable email address • Don’t respond to spam, even to unsubscribe

  27. Wireless Security • Easy to intercept wireless packets • Airsnort, Aircrack • http://www.wi-foo.com/index-3.html • Change defaults • SSID (Broadcast) • Encryption • Mac Filtering

  28. Wireless Security • OK to use unencrypted wireless on encrypted sites • Banking • Shopping

  29. Passwords • Use different for secure and non-secure sites • Ideally use different for each site dealing with money • Change regularly • Use combination of letters, numbers, symbols • Don’t allow programs to “remember” critical passwords

  30. Spyware • Virtually all internet connected computers get spyware • Symptoms of spyware • Endless pop-ups • Redirected to websites you didn’t enter • New icons in tasktray • New toolbars in browser • Computer is suddenly slow when accessing/saving files

  31. Spyware Detection/Removal • Run checks weekly • Some antivirus programs check • Free stand alone programs • Spybot • Adaware

  32. Chatting Safely • Don’t give out identifying info • Name • Phone • Location/School • Email • Remember people do lie • Choose non-identifiable screen name • Don’t meet people offline (if you do make it very public) • Know how to save conversations and report problems • Don’t open/except files sent to you

  33. Chatting for Kids • Only use monitored rooms • Don’t allow private chats • Observe who kids talk with • Choose rooms appropriate for age level • Parents check out sites first • Limit or don’t allow webcam use

  34. Child safety • Keep computer in family area • Spend time with child online • Tell child how to end/report situations where he/she feels uncomfortable • Give feedback to ISPs about what you like/dislike/expect • Use time limits • Ask child to sign online agreement

  35. Communal Sites • Examples • FaceBook • MySpace • Default security is low • Assumes you want everyone to know everything • What happens here stays here … FOREVER • Friends may not have same privacy concerns • Upload pictures • Pictures/sites used in court

  36. Communal Sites • Sites portray themselves as safe • Based on the assumption that everyone is honest • Some create profiles “for” other people • People often alter themselves positively in an online profile • Third parties using information • Police • School administrators • Spouses

  37. Mobiles (phone) • FaceBook and Myspace plan to extend to mobiles • Will be able to post to web pages directly • Can search for other users emails and numbers • Chat already on mobiles • Yahoo, AOL, MSN • Ability to send/receive photos and video

  38. Health Concerns • Heat From laptop • Carpal Tunnel Syndrome • Proper Desk Setup • Monitor height • Chair height (feet flat) • Get up every hour

  39. Keeping Kids Safe Online http://www.ou.edu/oupd/kidtool.htm SafeKids Website http://www.safekids.com/ Safekids Quiz http://www.safekids.com/quiz/ Another Internet Safety Quiz http://iol.ie/~dromore/safety/quiz/quiz.htm MySpace Safety http://www.wiredsafety.org/internet101/myspaceguide.html Safety on Communal Sites http://www.twu.edu/o-sl/Counseling/SelfHelp066.html Software Downloads http://www.download.com/

More Related