SlideShare uma empresa Scribd logo
1 de 105
Internet Security Dave Palmer Instructional Media Agent South Central Extension District How to  Protect Yourself from Existing  Internet Threats 2.0
Disclaimer The information presented here are only options, not recommendations.  You alone are responsible for what you do on your own computer.
Agenda Part 1 - Existing threats   Scams, Phishing, Viruses, Worms, Trojans   Backdoors, Spyware, Rootkits, Botnets Part 2 - Protection   Layered Security   Best Practices   Security Software & Suites   Backups   Support
Best Practices ,[object Object],[object Object],[object Object],Handout
Best Practices ,[object Object],[object Object],[object Object],Handout
Malware –  mal icious soft ware Intent is to damage, disrupt, steal, control or otherwise inflict problems on computers, data, hosts, or networks.
Latest Statistics ,[object Object],[object Object]
Latest Statistics ,[object Object],[object Object],[object Object]
Social Networking Threats ,[object Object],[object Object],[object Object]
Social Networking Threats ,[object Object],[object Object]
The Scope of the Threat Is increasing   rapidly Malware threats have   doubled   every year   since 2006 2007 2008 2006 2009
Why the Dramatic Increase? ,[object Object],[object Object],[object Object]
Malware Stories  You Might Have Missed Handout Also available at: http://techteachtoo.com/category/internet-security/ Handout
What are the Threats? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Not malware ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Malware
Tracking Cookies ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Flash Cookies – ‘Super’ Cookies ,[object Object],[object Object],[object Object],[object Object],[object Object],Adobe  Flash  logo
Flash Cookies Widely used… … including in Extension
Controlling Flash Cookies Go thru each tab and set each accordingly http://www.macromedia.com/support/documentation/en/flashplayer/help/settings_manager03.html
Anatomy of a Web address http://collier.ifas.ufl.edu/HomeGarden/A-ZPubs.shtml Top Level Domain (TLD) Domains  never  have  a single slash on both ends 2 Handouts Handout Web folder domain subdomains Webpage URL or Web address Notice the slashes (/)
Is this URL part of the University of Florida? /webmail.ufl.edu/ premline.ru /img/ http://www. Handout This is the actual domain This is a domain registered in Russia. It’s  not  connected with UF. See the slashes? This is not the domain!
Shortened Links ,[object Object],[object Object],They change this: http://hillsborough.extension.ufl.edu/internetsecurityresources.html Into this: http://tinyurl.com/2eqmr32
The Answer? URL Decoders ,[object Object],[object Object],[object Object],[object Object]
Spam "...most non-commercial spam these days is aimed solely   to get you to click on a link ,  even out of curiosity.   As soon as you click on that link,   you're infected ,  most likely to become yet another   botnet victim ,  have your   identity and information stolen   and go on to participate, all unknowingly in the   infection of further victims ."  Rik Ferguson senior security analyst Trend Micro
Spam E-mail ,[object Object],[object Object],[object Object],[object Object],[object Object]
Social Engineering Means: Manipulating people to do things or to divulge confidential information
Scams ,[object Object],[object Object],[object Object]
Scams ,[object Object],[object Object],[object Object]
Scam Targets ,[object Object],[object Object],[object Object]
Scams ,[object Object],[object Object],[object Object],Estimated  annual  losses
Phishing ,[object Object],[object Object],[object Object],2 Handouts
Phishing ,[object Object],[object Object],[object Object],Excellent Phishing IQ test:  www.sonicwall/phishing/
Phishing Example Link #1 Link #2
Place your cursor over the e-mail link. Right  click (If you left click on the link you might get infected) Click on ‘Copy Shortcut’ Open a Word doc or Notepad Paste
The URL: http://stproofing.com /living/bankofamerica.repution/Online_BofA_Banking.UpdatingScreen.dostate=CAupdating.cfmpage=corp_bofacom.BankofAmricaScreen.dostate=CA/ The link: Link #1
This instruction has been send to all bank customers and is obligatory to follow. Actual URL: http://pushplaydj.ca /photos/albums/userpics/notice/www.bankofamerica.com/ Link #2
Phishing Sites 1 st  half of 2009  nearly 100% Increase Source: Anti-Phishing Working Group
[object Object],Phishing
Backdoor - malware ,[object Object],[object Object]
Trojans ,[object Object],[object Object],[object Object]
Spyware ,[object Object],[object Object],[object Object]
Rootkit ,[object Object],[object Object],[object Object],[object Object]
Bots or Zombies ,[object Object],[object Object],[object Object]
Simple Botnet
Botnet Statistics ,[object Object],[object Object],[object Object],[object Object]
Botnet Cyber Attack Estonia, a tiny but highly wired  country  on the Baltic Sea, was essentially   shut down   for 3 weeks during April and May of 2007 by organized cyber (botnet) attacks.
Another Botnet Attack Dozens of S. Korean & U.S. agencies  attacked in July 2009. Dept. of Defense, FAA, Homeland Security, NYSE, NASDAQ, etc.
The Child Porn Connection ,[object Object],[object Object],[object Object],[object Object],[object Object]
Part 2 – The Protection We’ve covered the threats, but how do we protect ourselves?
7-Layer Security Options 2) Wireless Router w/ hardware firewall 3) ZoneAlarm software firewall 4) Spybot w/ tea timer 5) Super Anti Spyware 6) Anti virus software 1) Use Best Practices 7) Backup Data Optional: Create user accounts Data
4-Layer Security Options 2) Wireless Router w/ hardware firewall 3) Use a Security Suite should include a software firewall, anti-virus and anti-spyware 4) Backup Data Data 1) Use Best Practices   Optional: Create user accounts
Best Practices ,[object Object],[object Object],[object Object],Handout
Encrypted websites Look for
Best Practices ,[object Object],[object Object],[object Object]
Best Practices ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Handout
Read the Fine Print ,[object Object],[object Object],[object Object]
Use  Good  Passwords ,[object Object],[object Object],Handout
More Passwords henearkrxern
Keep Passwords Safe ,[object Object],[object Object],[object Object],KeePass RoboForm Handout
Password Management Software ,[object Object],[object Object],[object Object],[object Object]
USB Malware ,[object Object],[object Object],[object Object]
USB Flash Drive w/ Read-Only ,[object Object],[object Object]
Update Your Operating System ,[object Object],[object Object],windowsupdate .microsoft.com/
Update/ Upgrade Your Applications ,[object Object],[object Object],[object Object],[object Object]
Update Your Applications ,[object Object],[object Object],[object Object],[object Object],[object Object]
7-Layer Security Options 2) Wireless Router w/ hardware firewall 3) ZoneAlarm software firewall 4) Spybot w/ tea timer 5) Super Anti Spyware 6) Anti virus software 1) Use Best Practices 7) Backup Data Optional: Create user accounts Data
Hardware Router w/Firewall ,[object Object],[object Object],[object Object],[object Object],[object Object]
Software Firewall ,[object Object],[object Object],Outbound Communication
Software Firewall ,[object Object],[object Object],[object Object]
7-Layer Security Options 2) Wireless Router w/ hardware firewall 3) ZoneAlarm software firewall 4) Spybot w/ tea timer 5) Super Anti Spyware 6) Anti virus software 1) Use Best Practices 7) Backup Data Optional: Create user accounts Data
Anti-spyware: Spybot Search & Destroy ,[object Object],[object Object]
Spybot Search & Destroy ,[object Object],[object Object]
Spybot Search and Destroy ‘ Immunization’ feature helps block installation of some malware, plus it tweaks browser settings to help block cookies, malware installations, bad websites and more.
Anti-spyware: Super AntiSpyware ,[object Object],- Free version available - Paid version includes   Real-time protection   Scheduling of scans   $29.95  $14.95  $9.95
Only tracking cookies
Trojan location
Removal Reboot
Anti-spyware: MalwareBytes ,[object Object],[object Object],[object Object]
Antivirus Software ,[object Object],[object Object],[object Object],[object Object]
“Rogue” or fake anti-malware
Rogue Anti-Malware Products  600% Increase  1 st  Half of 2009 Also known as “scareware, ransomware”
“ Rogue” Anti-malware products ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
To buy products other than those mentioned  Type the name of the software into Google and read the results that appear.
Find a System That Works for You ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
7-Layer Security Options 2) Wireless Router w/ hardware firewall 3) ZoneAlarm software firewall 4) Spybot w/ tea timer 5) Super Anti Spyware 6) Anti virus software 1) Use Best Practices 7) Backup Data Optional: Create user accounts Data
Backup Your Data ,[object Object],[object Object],[object Object],[object Object]
Backup Your Data ,[object Object],[object Object],[object Object]
Data-Only Backup ,[object Object],[object Object],[object Object],[object Object],Back2Zip free software
Whole-System Backup ,[object Object],[object Object],[object Object]
Online Backup Options ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Local External Backup ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],External  Hard Drive
7-Layer Security Options 2) Wireless Router w/ hardware firewall 3) ZoneAlarm software firewall 4) Spybot w/ tea timer 5) Super Anti Spyware 6) Anti virus software 1) Use Best Practices 7) Backup Data Optional: Create user accounts Data
User Accounts ,[object Object],[object Object],[object Object],2 Handouts
[object Object],[object Object],[object Object],[object Object],User Accounts 2 Handouts
4-Layer Security Options 2) Wireless Router w/ hardware firewall 3) Use a Security Suite 4) Backup Data Data 1) Use Best Practices Optional: Create user accounts
Security Suite Options ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security Suite Information ,[object Object],[object Object]
Secure Browsing Options FireFox with Security Plugins ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],Secure Browsing Options - Sandboxie
CompUSA, Geek Squad,  Local repair shop When you do need help… 3) Online help   forums 4) Commercial   Repair 2) Local PC Users   Group 1) Friends & family You
Don’t Forget ‘Safe Mode’ ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],PC Users Groups
Help / Support Forums ,[object Object],[object Object],[object Object],[object Object],Handout
Support Forums
Resources My website is at :  TechTeachToo.com - Practical technology tips & tricks - Relevant tech news  - Software reviews & tutorials - A brief weekly newsletter
Many thanks to… ,[object Object],[object Object],[object Object],My Time is UP!

Mais conteúdo relacionado

Mais procurados

Spiritual social media & mobile devices
Spiritual social media & mobile devicesSpiritual social media & mobile devices
Spiritual social media & mobile devices
Ernest Staats
 
Social networks security risks
Social networks security risksSocial networks security risks
Social networks security risks
osuhaibany
 

Mais procurados (19)

Presentation for class
Presentation for classPresentation for class
Presentation for class
 
M
MM
M
 
Lessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! HackLessons Learned From the Yahoo! Hack
Lessons Learned From the Yahoo! Hack
 
Top Cyber Threats of 2009
Top Cyber Threats of 2009Top Cyber Threats of 2009
Top Cyber Threats of 2009
 
Boushrat 9 a
Boushrat   9 aBoushrat   9 a
Boushrat 9 a
 
LIFARS - Social Media Dangers to Children
LIFARS - Social Media Dangers to ChildrenLIFARS - Social Media Dangers to Children
LIFARS - Social Media Dangers to Children
 
Spiritual social media & mobile devices
Spiritual social media & mobile devicesSpiritual social media & mobile devices
Spiritual social media & mobile devices
 
Users and Behaviors- Social Internet
Users and Behaviors- Social InternetUsers and Behaviors- Social Internet
Users and Behaviors- Social Internet
 
Cyber crime lecture pp update
Cyber crime lecture pp updateCyber crime lecture pp update
Cyber crime lecture pp update
 
Social networks security risks
Social networks security risksSocial networks security risks
Social networks security risks
 
Facebook Controversies
Facebook ControversiesFacebook Controversies
Facebook Controversies
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Social Media & Crime
Social Media & CrimeSocial Media & Crime
Social Media & Crime
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Threats of Computer System and its Prevention
Threats of Computer System and its PreventionThreats of Computer System and its Prevention
Threats of Computer System and its Prevention
 
0926182320 Sophos[1]
0926182320 Sophos[1]0926182320 Sophos[1]
0926182320 Sophos[1]
 
Facebook
FacebookFacebook
Facebook
 
Users and behaviors social internet: Safety & Security
Users and behaviors social internet: Safety & SecurityUsers and behaviors social internet: Safety & Security
Users and behaviors social internet: Safety & Security
 
Compilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacksCompilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacks
 

Destaque

Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
Arifa Ali
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internet
dpd
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacy
vinyas87
 
Research proposal sample
Research proposal sampleResearch proposal sample
Research proposal sample
Vanessa Cuesta
 
My research proposal.ppt
My research proposal.pptMy research proposal.ppt
My research proposal.ppt
nanimamat
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
realpeterz
 
The Research Proposal
The Research ProposalThe Research Proposal
The Research Proposal
guest349908
 

Destaque (20)

Internet Security
Internet SecurityInternet Security
Internet Security
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
Internet security
Internet securityInternet security
Internet security
 
Computer and internet security
Computer and internet securityComputer and internet security
Computer and internet security
 
Internet security
Internet securityInternet security
Internet security
 
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
Symantec Internet Security Threat Report 2011 Trends Volume 17 April 2012
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internet
 
Privacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesPrivacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key Issues
 
Research Proposal Sample - Instant Assignment Help
Research Proposal Sample - Instant Assignment HelpResearch Proposal Sample - Instant Assignment Help
Research Proposal Sample - Instant Assignment Help
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
How will the Internet of Things look by 2025?
How will the Internet of Things look by 2025?How will the Internet of Things look by 2025?
How will the Internet of Things look by 2025?
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacy
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Research proposal sample
Research proposal sampleResearch proposal sample
Research proposal sample
 
Basic Internet Security
Basic Internet SecurityBasic Internet Security
Basic Internet Security
 
Research Proposal Presentation
Research Proposal PresentationResearch Proposal Presentation
Research Proposal Presentation
 
My research proposal.ppt
My research proposal.pptMy research proposal.ppt
My research proposal.ppt
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
The Research Proposal
The Research ProposalThe Research Proposal
The Research Proposal
 
10 Project Proposal Writing
10 Project Proposal Writing10 Project Proposal Writing
10 Project Proposal Writing
 

Semelhante a 100812 internet security2.0

Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
Ashley Zimmerman
 
Information-Security-Lecture-6.pptx
Information-Security-Lecture-6.pptxInformation-Security-Lecture-6.pptx
Information-Security-Lecture-6.pptx
anbersattar
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
Hem Pokhrel
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
MArshad35
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
MILANOP1
 

Semelhante a 100812 internet security2.0 (20)

091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Information-Security-Lecture-6.pptx
Information-Security-Lecture-6.pptxInformation-Security-Lecture-6.pptx
Information-Security-Lecture-6.pptx
 
Information security
Information securityInformation security
Information security
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
 
Emp tech las-week-2
Emp tech las-week-2Emp tech las-week-2
Emp tech las-week-2
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.ppt
 
Information security a new era technology_
Information security a new era technology_Information security a new era technology_
Information security a new era technology_
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
 
C3
C3C3
C3
 
What is malware
What is malwareWhat is malware
What is malware
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 
cyber_security
cyber_securitycyber_security
cyber_security
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 

100812 internet security2.0

  • 1. Internet Security Dave Palmer Instructional Media Agent South Central Extension District How to Protect Yourself from Existing Internet Threats 2.0
  • 2. Disclaimer The information presented here are only options, not recommendations. You alone are responsible for what you do on your own computer.
  • 3. Agenda Part 1 - Existing threats Scams, Phishing, Viruses, Worms, Trojans Backdoors, Spyware, Rootkits, Botnets Part 2 - Protection Layered Security Best Practices Security Software & Suites Backups Support
  • 4.
  • 5.
  • 6. Malware – mal icious soft ware Intent is to damage, disrupt, steal, control or otherwise inflict problems on computers, data, hosts, or networks.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11. The Scope of the Threat Is increasing rapidly Malware threats have doubled every year since 2006 2007 2008 2006 2009
  • 12.
  • 13. Malware Stories You Might Have Missed Handout Also available at: http://techteachtoo.com/category/internet-security/ Handout
  • 14.
  • 15.
  • 16.
  • 17. Flash Cookies Widely used… … including in Extension
  • 18. Controlling Flash Cookies Go thru each tab and set each accordingly http://www.macromedia.com/support/documentation/en/flashplayer/help/settings_manager03.html
  • 19. Anatomy of a Web address http://collier.ifas.ufl.edu/HomeGarden/A-ZPubs.shtml Top Level Domain (TLD) Domains never have a single slash on both ends 2 Handouts Handout Web folder domain subdomains Webpage URL or Web address Notice the slashes (/)
  • 20. Is this URL part of the University of Florida? /webmail.ufl.edu/ premline.ru /img/ http://www. Handout This is the actual domain This is a domain registered in Russia. It’s not connected with UF. See the slashes? This is not the domain!
  • 21.
  • 22.
  • 23. Spam "...most non-commercial spam these days is aimed solely to get you to click on a link , even out of curiosity. As soon as you click on that link, you're infected , most likely to become yet another botnet victim , have your identity and information stolen and go on to participate, all unknowingly in the infection of further victims ." Rik Ferguson senior security analyst Trend Micro
  • 24.
  • 25. Social Engineering Means: Manipulating people to do things or to divulge confidential information
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32. Phishing Example Link #1 Link #2
  • 33. Place your cursor over the e-mail link. Right click (If you left click on the link you might get infected) Click on ‘Copy Shortcut’ Open a Word doc or Notepad Paste
  • 34. The URL: http://stproofing.com /living/bankofamerica.repution/Online_BofA_Banking.UpdatingScreen.dostate=CAupdating.cfmpage=corp_bofacom.BankofAmricaScreen.dostate=CA/ The link: Link #1
  • 35. This instruction has been send to all bank customers and is obligatory to follow. Actual URL: http://pushplaydj.ca /photos/albums/userpics/notice/www.bankofamerica.com/ Link #2
  • 36. Phishing Sites 1 st half of 2009 nearly 100% Increase Source: Anti-Phishing Working Group
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 44.
  • 45. Botnet Cyber Attack Estonia, a tiny but highly wired country on the Baltic Sea, was essentially shut down for 3 weeks during April and May of 2007 by organized cyber (botnet) attacks.
  • 46. Another Botnet Attack Dozens of S. Korean & U.S. agencies attacked in July 2009. Dept. of Defense, FAA, Homeland Security, NYSE, NASDAQ, etc.
  • 47.
  • 48. Part 2 – The Protection We’ve covered the threats, but how do we protect ourselves?
  • 49. 7-Layer Security Options 2) Wireless Router w/ hardware firewall 3) ZoneAlarm software firewall 4) Spybot w/ tea timer 5) Super Anti Spyware 6) Anti virus software 1) Use Best Practices 7) Backup Data Optional: Create user accounts Data
  • 50. 4-Layer Security Options 2) Wireless Router w/ hardware firewall 3) Use a Security Suite should include a software firewall, anti-virus and anti-spyware 4) Backup Data Data 1) Use Best Practices Optional: Create user accounts
  • 51.
  • 53.
  • 54.
  • 55.
  • 56.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64.
  • 65. 7-Layer Security Options 2) Wireless Router w/ hardware firewall 3) ZoneAlarm software firewall 4) Spybot w/ tea timer 5) Super Anti Spyware 6) Anti virus software 1) Use Best Practices 7) Backup Data Optional: Create user accounts Data
  • 66.
  • 67.
  • 68.
  • 69. 7-Layer Security Options 2) Wireless Router w/ hardware firewall 3) ZoneAlarm software firewall 4) Spybot w/ tea timer 5) Super Anti Spyware 6) Anti virus software 1) Use Best Practices 7) Backup Data Optional: Create user accounts Data
  • 70.
  • 71.
  • 72. Spybot Search and Destroy ‘ Immunization’ feature helps block installation of some malware, plus it tweaks browser settings to help block cookies, malware installations, bad websites and more.
  • 73.
  • 77.
  • 78.
  • 79. “Rogue” or fake anti-malware
  • 80. Rogue Anti-Malware Products 600% Increase 1 st Half of 2009 Also known as “scareware, ransomware”
  • 81.
  • 82. To buy products other than those mentioned Type the name of the software into Google and read the results that appear.
  • 83.
  • 84. 7-Layer Security Options 2) Wireless Router w/ hardware firewall 3) ZoneAlarm software firewall 4) Spybot w/ tea timer 5) Super Anti Spyware 6) Anti virus software 1) Use Best Practices 7) Backup Data Optional: Create user accounts Data
  • 85.
  • 86.
  • 87.
  • 88.
  • 89.
  • 90.
  • 91. 7-Layer Security Options 2) Wireless Router w/ hardware firewall 3) ZoneAlarm software firewall 4) Spybot w/ tea timer 5) Super Anti Spyware 6) Anti virus software 1) Use Best Practices 7) Backup Data Optional: Create user accounts Data
  • 92.
  • 93.
  • 94. 4-Layer Security Options 2) Wireless Router w/ hardware firewall 3) Use a Security Suite 4) Backup Data Data 1) Use Best Practices Optional: Create user accounts
  • 95.
  • 96.
  • 97.
  • 98.
  • 99. CompUSA, Geek Squad, Local repair shop When you do need help… 3) Online help forums 4) Commercial Repair 2) Local PC Users Group 1) Friends & family You
  • 100.
  • 101.
  • 102.
  • 104. Resources My website is at : TechTeachToo.com - Practical technology tips & tricks - Relevant tech news - Software reviews & tutorials - A brief weekly newsletter
  • 105.