SlideShare uma empresa Scribd logo
1 de 85
Internet Security Dave Palmer Instructional Media Agent South Central Extension District
Who This is For… ,[object Object],[object Object],This presentation is intended for Extension faculty and staff who… It is  not  intended for faculty and staff who… ,[object Object],[object Object]
Part 1 – The Threats Virus Worms Scams Trojans Backdoor Bots Malware Hackers Phishing Rootkit Spyware
The threats most people  are not  aware of. The threats many of us are aware of.
The Global Scope of the Problem Estonia, a tiny but highly wired  country  on the Baltic Sea, was essentially  shut down  for 3 weeks during April and May of 2007 by organized cyber attacks.
The Global Scope of the Problem 2 dozen South Korean & U.S. Government agencies  & others were attacked in July 2009. Targets included the DoD, FAA, Homeland Security, NYSE, NASDAQ, etc.
The National Scope of the Problem Database breach by hackers personal information on 160,00 current and former students and alumni stolen. 530,000 medical records stolen including social security numbers. Sensitive information on 65,000 current and former employees stolen. A few  of the many major security breaches that became public in the 2 nd  Quarter of 2009.
The Personal Scope of the Problem ,[object Object],[object Object],[object Object],[object Object]
Malware Headlines You  Might Have Missed ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Malware Headlines You  Might Have Missed ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Malware – malicious software Intent is to damage, disrupt, steal, or otherwise inflict problems on data, hosts, or networks.
The Scope of the Problem The number of NEW malware threats is increasing New malicious code signatures - Symantec 2007 2008
What are the Threats? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Not malware ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Malware
Tracking Cookies ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Flash Cookies ,[object Object],[object Object],[object Object],[object Object],[object Object],Adobe  Flash  logo
Flash Cookies Widely used… … including in Extension
Adware ,[object Object],[object Object],[object Object],[object Object]
Social Engineering Means: Manipulating people to do things or to divulge confidential information
Phishing ,[object Object],[object Object],[object Object]
Phishing ,[object Object],[object Object],[object Object],[object Object],[object Object]
Pharming Intent is to redirect a legitimate website's traffic to another, nearly identical but bogus website for the purpose of stealing sensitive information.
Scams ,[object Object],[object Object],[object Object],[object Object]
Scams ,[object Object],[object Object],[object Object],[object Object]
Scams ,[object Object],[object Object],[object Object]
Scam Targets ,[object Object],[object Object],[object Object]
Scams ,[object Object],[object Object],[object Object],Estimated  annual  losses
Trojans ,[object Object],[object Object],[object Object]
Trojans ,[object Object],[object Object],[object Object]
Virus ,[object Object],[object Object],[object Object],[object Object],[object Object]
Worms ,[object Object],[object Object],[object Object],[object Object],[object Object]
Backdoor ,[object Object],[object Object]
Spyware ,[object Object],[object Object],[object Object]
Rootkit ,[object Object],[object Object],[object Object],[object Object]
Bots or Zombies ,[object Object],[object Object],[object Object]
Bots or Zombies ,[object Object],[object Object],[object Object]
Bot Network
Intermission  When we return… how do we protect our  computers and our data?
Part 2 – The Protection We’ve covered the threats, but how do we protect ourselves?
Use Best Practices Data Router w/ hardware firewall ZoneAlarm software firewall Spybot w/ tea timer Super Anti Spyware Anti virus software Backup  Data
Best Practices ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Best Practices ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Physical Computer Security ,[object Object],[object Object]
Physical Computer Security ,[object Object],[object Object]
Legal Agreements ,[object Object],[object Object],[object Object]
Read the Fine Print ,[object Object],[object Object],[object Object]
Use  Good  Passwords ,[object Object]
Keep Passwords Safe ,[object Object],[object Object],[object Object],KeePass RoboForm
Password Management Software ,[object Object],[object Object],[object Object],[object Object]
USB Malware ,[object Object],[object Object]
USB Flash Drive w/ Read-Only ,[object Object],[object Object],[object Object]
Upgrade vs Update ,[object Object],[object Object]
Update Your Operating System ,[object Object],[object Object]
Update Your Operating System ,[object Object]
Update/ Upgrade Your Applications ,[object Object],[object Object],[object Object]
Update Your Applications ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Update Your Applications
Data Router w/ hardware firewall ZoneAlarm software firewall Spybot w/ tea timer Super Anti Spyware Anti virus software Use Best Practices Backup  Data
Hardware Router w/Firewall ,[object Object],[object Object],[object Object],[object Object],[object Object]
Software Firewall ,[object Object],[object Object],Outbound Communication
Software Firewall ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],Software Firewall
Data Wireless Router w/ hardware firewall ZoneAlarm software firewall Spybot w/ tea timer Super Anti Spyware Anti virus software Use Best Practices Backup  Data
Spybot Search & Destroy ,[object Object],- Free - Real-time protection
Spybot Search & Destroy ,[object Object],[object Object],[object Object]
Spybot Search and Destroy ,[object Object],[object Object]
Super AntiSpyware ,[object Object],- Free - Real-time protection - Can be scheduled
MalwareBytes ,[object Object],[object Object]
Antivirus Software ,[object Object],[object Object],[object Object]
Data Wireless Router w/ hardware firewall ZoneAlarm software firewall Spybot w/ tea timer Super Anti Spyware Anti virus software Use Best Practices Backup  Data
How to Use These  Tools Effectively ,[object Object],[object Object],[object Object],[object Object],[object Object]
Backup Your Data ,[object Object],[object Object],[object Object],[object Object]
Backup Your Data ,[object Object],[object Object],[object Object]
Data-Only Backup ,[object Object],[object Object],[object Object],[object Object],Back2Zip free software
Whole-System Backup ,[object Object],[object Object],[object Object]
Online Backup Service ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Local External Backup ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],External  Hard Drive
FireFox with Security Plugins ,[object Object],[object Object],[object Object]
Virtual PC Products ,[object Object],[object Object],[object Object],[object Object],[object Object]
Virtual PC Software ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],Sandboxie
You Commercial Repair Local PC Users Groups Friends & family CompUSA Geek Squad Local repair shop Etc. When you need help…
When You Need Help ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],PC Users Groups
Disclaimers ,[object Object],[object Object],[object Object],[object Object],[object Object]
Thanks to… ,[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Mais procurados

Computer security
Computer securityComputer security
Computer securityfiza1975
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measuresDnyaneshwar Beedkar
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentationKudzai Rerayi
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security riskshazirma
 
Computer security risks
Computer security risksComputer security risks
Computer security risksAasim Mushtaq
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESShyam Kumar Singh
 
Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer SecurityDamian T. Gordon
 
Web Security
Web SecurityWeb Security
Web SecurityTripad M
 
Threats and Security Tips of Computer System
Threats and Security Tips of Computer SystemThreats and Security Tips of Computer System
Threats and Security Tips of Computer SystemFaruk_Hossen
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information SecurityAna Meskovska
 
Internet security
Internet securityInternet security
Internet securityrfukunaga
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer securityArzath Areeff
 

Mais procurados (20)

Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Computer security
Computer securityComputer security
Computer security
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Computer security
Computer securityComputer security
Computer security
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
 
Computer security risks
Computer security risksComputer security risks
Computer security risks
 
cyber_security
cyber_securitycyber_security
cyber_security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
Computer security
Computer securityComputer security
Computer security
 
Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer Security
 
Web Security
Web SecurityWeb Security
Web Security
 
Security threats
Security threatsSecurity threats
Security threats
 
Threats and Security Tips of Computer System
Threats and Security Tips of Computer SystemThreats and Security Tips of Computer System
Threats and Security Tips of Computer System
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security
 
Internet security
Internet securityInternet security
Internet security
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
 

Destaque

IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5Eslam Abdou
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer ProtocolRajan Pandey
 
FTP - File Transfer Protocol
FTP - File Transfer ProtocolFTP - File Transfer Protocol
FTP - File Transfer ProtocolPeter R. Egli
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocolguest029bcd
 
What is IEEE and why?
What is IEEE and why?What is IEEE and why?
What is IEEE and why?Ankita Tiwari
 

Destaque (8)

WLAN AND IEEE STANDARDS
WLAN AND IEEE STANDARDSWLAN AND IEEE STANDARDS
WLAN AND IEEE STANDARDS
 
IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5
 
Ieee standards
Ieee standardsIeee standards
Ieee standards
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
 
Smtp
SmtpSmtp
Smtp
 
FTP - File Transfer Protocol
FTP - File Transfer ProtocolFTP - File Transfer Protocol
FTP - File Transfer Protocol
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
 
What is IEEE and why?
What is IEEE and why?What is IEEE and why?
What is IEEE and why?
 

Semelhante a 091005 Internet Security

100812 internet security2.0
100812 internet security2.0100812 internet security2.0
100812 internet security2.0dkp205
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System ThreatsDrishti Bhalla
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.pptAsif Raza
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays worldSibghatullah Khattak
 
Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeComputer Explorers
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006Ben Rothke
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptxUmaraZahidLecturer
 
IT Security Seminar Cougar CPS
IT  Security  Seminar  Cougar  CPSIT  Security  Seminar  Cougar  CPS
IT Security Seminar Cougar CPScougarcps
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Security Basics Webinar
Security Basics WebinarSecurity Basics Webinar
Security Basics WebinarTechSoup
 
Information security for health practitioners
Information security for health practitionersInformation security for health practitioners
Information security for health practitionersDanny Doobay
 
Cyber security 101
Cyber security 101Cyber security 101
Cyber security 101Travis Good
 

Semelhante a 091005 Internet Security (20)

100812 internet security2.0
100812 internet security2.0100812 internet security2.0
100812 internet security2.0
 
Presented to Compass
Presented to CompassPresented to Compass
Presented to Compass
 
What is malware
What is malwareWhat is malware
What is malware
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Information security
Information securityInformation security
Information security
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 
C3
C3C3
C3
 
Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safe
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
 
IT Security Seminar Cougar CPS
IT  Security  Seminar  Cougar  CPSIT  Security  Seminar  Cougar  CPS
IT Security Seminar Cougar CPS
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Security Basics Webinar
Security Basics WebinarSecurity Basics Webinar
Security Basics Webinar
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Information security for health practitioners
Information security for health practitionersInformation security for health practitioners
Information security for health practitioners
 
Cyber security 101
Cyber security 101Cyber security 101
Cyber security 101
 

Último

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Último (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

091005 Internet Security

  • 1. Internet Security Dave Palmer Instructional Media Agent South Central Extension District
  • 2.
  • 3. Part 1 – The Threats Virus Worms Scams Trojans Backdoor Bots Malware Hackers Phishing Rootkit Spyware
  • 4. The threats most people are not aware of. The threats many of us are aware of.
  • 5. The Global Scope of the Problem Estonia, a tiny but highly wired country on the Baltic Sea, was essentially shut down for 3 weeks during April and May of 2007 by organized cyber attacks.
  • 6. The Global Scope of the Problem 2 dozen South Korean & U.S. Government agencies & others were attacked in July 2009. Targets included the DoD, FAA, Homeland Security, NYSE, NASDAQ, etc.
  • 7. The National Scope of the Problem Database breach by hackers personal information on 160,00 current and former students and alumni stolen. 530,000 medical records stolen including social security numbers. Sensitive information on 65,000 current and former employees stolen. A few of the many major security breaches that became public in the 2 nd Quarter of 2009.
  • 8.
  • 9.
  • 10.
  • 11. Malware – malicious software Intent is to damage, disrupt, steal, or otherwise inflict problems on data, hosts, or networks.
  • 12. The Scope of the Problem The number of NEW malware threats is increasing New malicious code signatures - Symantec 2007 2008
  • 13.
  • 14.
  • 15.
  • 16. Flash Cookies Widely used… … including in Extension
  • 17.
  • 18. Social Engineering Means: Manipulating people to do things or to divulge confidential information
  • 19.
  • 20.
  • 21. Pharming Intent is to redirect a legitimate website's traffic to another, nearly identical but bogus website for the purpose of stealing sensitive information.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 37. Intermission When we return… how do we protect our computers and our data?
  • 38. Part 2 – The Protection We’ve covered the threats, but how do we protect ourselves?
  • 39. Use Best Practices Data Router w/ hardware firewall ZoneAlarm software firewall Spybot w/ tea timer Super Anti Spyware Anti virus software Backup Data
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 57. Data Router w/ hardware firewall ZoneAlarm software firewall Spybot w/ tea timer Super Anti Spyware Anti virus software Use Best Practices Backup Data
  • 58.
  • 59.
  • 60.
  • 61.
  • 62. Data Wireless Router w/ hardware firewall ZoneAlarm software firewall Spybot w/ tea timer Super Anti Spyware Anti virus software Use Best Practices Backup Data
  • 63.
  • 64.
  • 65.
  • 66.
  • 67.
  • 68.
  • 69. Data Wireless Router w/ hardware firewall ZoneAlarm software firewall Spybot w/ tea timer Super Anti Spyware Anti virus software Use Best Practices Backup Data
  • 70.
  • 71.
  • 72.
  • 73.
  • 74.
  • 75.
  • 76.
  • 77.
  • 78.
  • 79.
  • 80.
  • 81. You Commercial Repair Local PC Users Groups Friends & family CompUSA Geek Squad Local repair shop Etc. When you need help…
  • 82.
  • 83.
  • 84.
  • 85.