View
507
Download
0
Category
Tags:
Preview:
DESCRIPTION
Information Security tips for the home
Citation preview
Internet Security at Home
Angela Samuels
2
Topics
Child Online Safety
Phishing and Pharming Scams
Spyware Protection
Virus and Worm Protection
Patches and Updates
3
Child Online Safety
Statistics of Online Activity
61% of 13 to 17 year olds have a personal profile on sites such as Myspace or Friendster.
33% of 13- to- 17-year-olds reported that their parents or guardians know “very little” or “nothing” about what they do on the Internet
14% have actually met face-to-face with a person they had known only through the Internet
Source: http://www.netsmartz.org/safety/statistics.htm
4
Child Online Safety
Online Resources
http://www.netsmartz.org/
http://www.protectyourkids.info/
http://www.safekids.com/
http://www.blogsafety.com/
Recommended Software by PC magazine
http://www.safeeyes.com/
5
To-Do List
Educate yourself and your children about the risk of online communication with strangers
Define family rules of computer use and post those rules for all to see
Have your children sign a pledge form
Keep the line of communication open between you and your kids
6
Example of House Rules
1. Be careful when communicating online
2. Never share personal information online
3. Respect other people’s rights
4. Tell your parents if something online makes you feel uncomfortable
7
Information Security: Today’s Threats
All of these are daily growing threats. 1 in 5 Americans were the target of a phishing ploy last year,
costing US banks and creditors roughly $1.2 Billion - CNET.com news
Viruses are increasingly used for more corrupt purposes – it’s not just for fame or fun anymore
Written for profit
Data theft also an increasing goal
8
Scams
As a computer user you are threatened by: Phishing – Deceptive emails falsely representing a legitimate
enterprise that attempt to lure a user into sharing personal or financial information for the purposes of identity theft.
Example: A scammer posing as a online book store, wanting a user to login their account to restore their account.
Pharming – forged emails that look as though they came from a somewhere or someone other than the actual source.
Example: An email sent by a scammer or virus that appears to come from a friend or associate.
9
Tips on Phishing Scams
Never reply to email messages that request personal information
Don’t click on suspicious links
Make sure the Web sites use encryption
10
Spyware
Software that covertly gathers user information through a user’s Internet connection without your consent. Primarily used for advertisements.
What Spyware can do it?
1. Bombard you with ads
2. Change your settings
3. Collect personal information
4. Slow down or crash your computer
Possible Spyware sites Screensavers
Free program downloads site
11
Viruses and Worms
A program or piece of code that is loaded onto a computer and runs without the users knowledge.
Trojan horse – a destructive program masquerading as a friendly application.
Worm – a self-replicating program designed to send itself to as many email recipients, or computers on a network, as possible.
Example: Yamanner arrives in a Yahoo mailbox bearing the subject header "New Graphic Site." Once the message is opened, the computer becomes infected and the worm spreads itself to people on the Yahoo e-mail contact list. The harvested e-mail addresses are also sent to a remote online server (June 06 cnet.com)
12
Three things to keep safe online
Use an Internet Firewall Guard against Intruders
Get Computer Updates Keep your software current
Use an Up-to-Date Antivirus Software Keep antivirus software updated
13
Information Security: Today’s Threats
Solution ??
Knowledge.
The best home security system in the world cannot stop you from leaving your front door wide open.
14
Security at home for Chrysler Group colleagues
The latest articles on
Internet Security Download Free
Norton Antivirus Software
Articles about Spam and Phishing
15
Global Information Security
Recommended