SlideShare uma empresa Scribd logo
1 de 85
Internet Security Dave Palmer Instructional Media Agent South Central Extension District
Who This is For… ,[object Object],[object Object],This presentation is intended for Extension faculty and staff who… It is  not  intended for faculty and staff who… ,[object Object],[object Object]
Part 1 – The Threats Virus Worms Scams Trojans Backdoor Bots Malware Hackers Phishing Rootkit Spyware
The threats most people  are not  aware of. The threats many of us are aware of.
The Global Scope of the Problem Estonia, a tiny but highly wired  country  on the Baltic Sea, was essentially  shut down  for 3 weeks during April and May of 2007 by organized cyber attacks.
The Global Scope of the Problem 2 dozen South Korean & U.S. Government agencies  & others were attacked in July 2009. Targets included the DoD, FAA, Homeland Security, NYSE, NASDAQ, etc.
The National Scope of the Problem Database breach by hackers personal information on 160,00 current and former students and alumni stolen. 530,000 medical records stolen including social security numbers. Sensitive information on 65,000 current and former employees stolen. A few  of the many major security breaches that became public in the 2 nd  Quarter of 2009.
The Personal Scope of the Problem ,[object Object],[object Object],[object Object],[object Object]
Malware Headlines You  Might Have Missed ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Malware Headlines You  Might Have Missed ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Malware – malicious software Intent is to damage, disrupt, steal, or otherwise inflict problems on data, hosts, or networks.
The Scope of the Problem The number of NEW malware threats is increasing New malicious code signatures - Symantec 2007 2008
What are the Threats? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Not malware ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Malware
Tracking Cookies ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Flash Cookies ,[object Object],[object Object],[object Object],[object Object],[object Object],Adobe  Flash  logo
Flash Cookies Widely used… … including in Extension
Adware ,[object Object],[object Object],[object Object],[object Object]
Social Engineering Means: Manipulating people to do things or to divulge confidential information
Phishing ,[object Object],[object Object],[object Object]
Phishing ,[object Object],[object Object],[object Object],[object Object],[object Object]
Pharming Intent is to redirect a legitimate website's traffic to another, nearly identical but bogus website for the purpose of stealing sensitive information.
Scams ,[object Object],[object Object],[object Object],[object Object]
Scams ,[object Object],[object Object],[object Object],[object Object]
Scams ,[object Object],[object Object],[object Object]
Scam Targets ,[object Object],[object Object],[object Object]
Scams ,[object Object],[object Object],[object Object],Estimated  annual  losses
Trojans ,[object Object],[object Object],[object Object]
Trojans ,[object Object],[object Object],[object Object]
Virus ,[object Object],[object Object],[object Object],[object Object],[object Object]
Worms ,[object Object],[object Object],[object Object],[object Object],[object Object]
Backdoor ,[object Object],[object Object]
Spyware ,[object Object],[object Object],[object Object]
Rootkit ,[object Object],[object Object],[object Object],[object Object]
Bots or Zombies ,[object Object],[object Object],[object Object]
Bots or Zombies ,[object Object],[object Object],[object Object]
Bot Network
Intermission  When we return… how do we protect our  computers and our data?
Part 2 – The Protection We’ve covered the threats, but how do we protect ourselves?
Use Best Practices Data Router w/ hardware firewall ZoneAlarm software firewall Spybot w/ tea timer Super Anti Spyware Anti virus software Backup  Data
Best Practices ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Best Practices ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Physical Computer Security ,[object Object],[object Object]
Physical Computer Security ,[object Object],[object Object]
Legal Agreements ,[object Object],[object Object],[object Object]
Read the Fine Print ,[object Object],[object Object],[object Object]
Use  Good  Passwords ,[object Object]
Keep Passwords Safe ,[object Object],[object Object],[object Object],KeePass RoboForm
Password Management Software ,[object Object],[object Object],[object Object],[object Object]
USB Malware ,[object Object],[object Object]
USB Flash Drive w/ Read-Only ,[object Object],[object Object],[object Object]
Upgrade vs Update ,[object Object],[object Object]
Update Your Operating System ,[object Object],[object Object]
Update Your Operating System ,[object Object]
Update/ Upgrade Your Applications ,[object Object],[object Object],[object Object]
Update Your Applications ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Update Your Applications
Data Router w/ hardware firewall ZoneAlarm software firewall Spybot w/ tea timer Super Anti Spyware Anti virus software Use Best Practices Backup  Data
Hardware Router w/Firewall ,[object Object],[object Object],[object Object],[object Object],[object Object]
Software Firewall ,[object Object],[object Object],Outbound Communication
Software Firewall ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],Software Firewall
Data Wireless Router w/ hardware firewall ZoneAlarm software firewall Spybot w/ tea timer Super Anti Spyware Anti virus software Use Best Practices Backup  Data
Spybot Search & Destroy ,[object Object],- Free - Real-time protection
Spybot Search & Destroy ,[object Object],[object Object],[object Object]
Spybot Search and Destroy ,[object Object],[object Object]
Super AntiSpyware ,[object Object],- Free - Real-time protection - Can be scheduled
MalwareBytes ,[object Object],[object Object]
Antivirus Software ,[object Object],[object Object],[object Object]
Data Wireless Router w/ hardware firewall ZoneAlarm software firewall Spybot w/ tea timer Super Anti Spyware Anti virus software Use Best Practices Backup  Data
How to Use These  Tools Effectively ,[object Object],[object Object],[object Object],[object Object],[object Object]
Backup Your Data ,[object Object],[object Object],[object Object],[object Object]
Backup Your Data ,[object Object],[object Object],[object Object]
Data-Only Backup ,[object Object],[object Object],[object Object],[object Object],Back2Zip free software
Whole-System Backup ,[object Object],[object Object],[object Object]
Online Backup Service ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Local External Backup ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],External  Hard Drive
FireFox with Security Plugins ,[object Object],[object Object],[object Object]
Virtual PC Products ,[object Object],[object Object],[object Object],[object Object],[object Object]
Virtual PC Software ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],Sandboxie
You Commercial Repair Local PC Users Groups Friends & family CompUSA Geek Squad Local repair shop Etc. When you need help…
When You Need Help ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],PC Users Groups
Disclaimers ,[object Object],[object Object],[object Object],[object Object],[object Object]
Thanks to… ,[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Mais procurados

Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
Colin058
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
hazirma
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security
Ana Meskovska
 

Mais procurados (20)

Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Computer security
Computer securityComputer security
Computer security
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Computer security
Computer securityComputer security
Computer security
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
 
Computer security risks
Computer security risksComputer security risks
Computer security risks
 
cyber_security
cyber_securitycyber_security
cyber_security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
Computer security
Computer securityComputer security
Computer security
 
Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer Security
 
Web Security
Web SecurityWeb Security
Web Security
 
Security threats
Security threatsSecurity threats
Security threats
 
Threats and Security Tips of Computer System
Threats and Security Tips of Computer SystemThreats and Security Tips of Computer System
Threats and Security Tips of Computer System
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security
 
Internet security
Internet securityInternet security
Internet security
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
 

Destaque

Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
Rajan Pandey
 

Destaque (8)

WLAN AND IEEE STANDARDS
WLAN AND IEEE STANDARDSWLAN AND IEEE STANDARDS
WLAN AND IEEE STANDARDS
 
IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5
 
Ieee standards
Ieee standardsIeee standards
Ieee standards
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
 
Smtp
SmtpSmtp
Smtp
 
FTP - File Transfer Protocol
FTP - File Transfer ProtocolFTP - File Transfer Protocol
FTP - File Transfer Protocol
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
 
What is IEEE and why?
What is IEEE and why?What is IEEE and why?
What is IEEE and why?
 

Semelhante a 091005 Internet Security

Computer Malware
Computer MalwareComputer Malware
Computer Malware
aztechtchr
 
IT Security Seminar Cougar CPS
IT  Security  Seminar  Cougar  CPSIT  Security  Seminar  Cougar  CPS
IT Security Seminar Cougar CPS
cougarcps
 
Cyber security 101
Cyber security 101Cyber security 101
Cyber security 101
Travis Good
 

Semelhante a 091005 Internet Security (20)

100812 internet security2.0
100812 internet security2.0100812 internet security2.0
100812 internet security2.0
 
Presented to Compass
Presented to CompassPresented to Compass
Presented to Compass
 
What is malware
What is malwareWhat is malware
What is malware
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Information security
Information securityInformation security
Information security
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 
C3
C3C3
C3
 
Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safe
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
 
IT Security Seminar Cougar CPS
IT  Security  Seminar  Cougar  CPSIT  Security  Seminar  Cougar  CPS
IT Security Seminar Cougar CPS
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Security Basics Webinar
Security Basics WebinarSecurity Basics Webinar
Security Basics Webinar
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Information security for health practitioners
Information security for health practitionersInformation security for health practitioners
Information security for health practitioners
 
Cyber security 101
Cyber security 101Cyber security 101
Cyber security 101
 

Último

Último (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

091005 Internet Security

  • 1. Internet Security Dave Palmer Instructional Media Agent South Central Extension District
  • 2.
  • 3. Part 1 – The Threats Virus Worms Scams Trojans Backdoor Bots Malware Hackers Phishing Rootkit Spyware
  • 4. The threats most people are not aware of. The threats many of us are aware of.
  • 5. The Global Scope of the Problem Estonia, a tiny but highly wired country on the Baltic Sea, was essentially shut down for 3 weeks during April and May of 2007 by organized cyber attacks.
  • 6. The Global Scope of the Problem 2 dozen South Korean & U.S. Government agencies & others were attacked in July 2009. Targets included the DoD, FAA, Homeland Security, NYSE, NASDAQ, etc.
  • 7. The National Scope of the Problem Database breach by hackers personal information on 160,00 current and former students and alumni stolen. 530,000 medical records stolen including social security numbers. Sensitive information on 65,000 current and former employees stolen. A few of the many major security breaches that became public in the 2 nd Quarter of 2009.
  • 8.
  • 9.
  • 10.
  • 11. Malware – malicious software Intent is to damage, disrupt, steal, or otherwise inflict problems on data, hosts, or networks.
  • 12. The Scope of the Problem The number of NEW malware threats is increasing New malicious code signatures - Symantec 2007 2008
  • 13.
  • 14.
  • 15.
  • 16. Flash Cookies Widely used… … including in Extension
  • 17.
  • 18. Social Engineering Means: Manipulating people to do things or to divulge confidential information
  • 19.
  • 20.
  • 21. Pharming Intent is to redirect a legitimate website's traffic to another, nearly identical but bogus website for the purpose of stealing sensitive information.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 37. Intermission When we return… how do we protect our computers and our data?
  • 38. Part 2 – The Protection We’ve covered the threats, but how do we protect ourselves?
  • 39. Use Best Practices Data Router w/ hardware firewall ZoneAlarm software firewall Spybot w/ tea timer Super Anti Spyware Anti virus software Backup Data
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 57. Data Router w/ hardware firewall ZoneAlarm software firewall Spybot w/ tea timer Super Anti Spyware Anti virus software Use Best Practices Backup Data
  • 58.
  • 59.
  • 60.
  • 61.
  • 62. Data Wireless Router w/ hardware firewall ZoneAlarm software firewall Spybot w/ tea timer Super Anti Spyware Anti virus software Use Best Practices Backup Data
  • 63.
  • 64.
  • 65.
  • 66.
  • 67.
  • 68.
  • 69. Data Wireless Router w/ hardware firewall ZoneAlarm software firewall Spybot w/ tea timer Super Anti Spyware Anti virus software Use Best Practices Backup Data
  • 70.
  • 71.
  • 72.
  • 73.
  • 74.
  • 75.
  • 76.
  • 77.
  • 78.
  • 79.
  • 80.
  • 81. You Commercial Repair Local PC Users Groups Friends & family CompUSA Geek Squad Local repair shop Etc. When you need help…
  • 82.
  • 83.
  • 84.
  • 85.