Defensive Computing avoiding dangerous computing practices

  • Upload
    phong

  • View
    17

  • Download
    2

Embed Size (px)

DESCRIPTION

Defensive Computing avoiding dangerous computing practices. Wichita Public Library Rex Cornelius • Electronic Resources Webliography online at: http://www.wichita.lib.ks.us/Researchers/DefensiveComputing.htm. Computer Viruses and Worms. Programs designed to infect other computers. - PowerPoint PPT Presentation

Citation preview

  • Wichita Public LibraryRex Cornelius Electronic ResourcesWebliography online at:http://www.wichita.lib.ks.us/Researchers/DefensiveComputing.htm

  • Programs designed to infect other computers.

  • software designed to infiltrate or damage a computer system without the owner's informed consent.

    Computer viruses, Worms, Trojan horses,Rootkits, Spyware, Hijackers, dishonest Adware, Crimeware.

  • Back DoorsRootkitsallow other people to access and control your computer

  • Being an intermediary for an attack on another computer.

  • Some Trojans function as a mail forwarder, and allow the attacker to transmit spam through the infected system.

  • A remote administrator can use your computer to store illegal materials.

  • Capture and record user keystrokes to obtain passwords or encryption keys

  • Adware - Software that supports itself or another program by displaying ads.

    Spyware - Software that gathers and transmits information without your knowledge.

    Hijacking software - Advertising software programs that change the settings of your browser without your knowledge.

  • Currently the biggest threat to personal computing.Virus-like symptoms.Earthlink: 29 million spyware-related files on the 1 million computers Microsoft: 50% of computer crashesGoogle: 450,000 sites that install malicious code

  • You

  • Keep all applications patched to the most recent levelOperating systemInternet BrowsersEmail programsWord ProcessorsSpreadsheets

    All Microsoft Products!

  • Use anti-virus software on all Internet-connected computers. Be sure to keep your anti-virus software up-to-date. Use automatic updates of virus definitions when available.

  • can be exploited by intruders

  • Dont run a program unless you know its from a trusted source. Never run programs of unknown originNever transfer programs of unknown origin

  • Scan with a removal tool often.Ad AwareSpybotMS Malicious Software Removal Tool

  • Network deviceLinksys, Netgear, etc.

    Personal firewall software ZoneAlarmOutpost Firewall ProWindows Firewall

  • techniques used to manipulate people into performing actions or divulging confidential information.

  • An e-mail message can appear to come from one source when it was sent from another.

  • Never open unknown e-mail attachments. Know the source.Before opening any e-mail attachments, be sure your virus definitions are up-to-dateYou can save the file to your disk and scan the file using your antivirus software

  • Messages designed to gather confidential information.

  • Never send confidential information by e-mail:Credit card numbers PasswordsNever trust links sent by e-mail.Service Providers will never ask for your username or password.

  • Disguise malicious programs

    LOVE-LETTER-FOR-YOU.TXT.vbsAnnaKournikova.jpg.pif

  • Using a domain name with bad faith intent to profit from the goodwill of a trademark belonging to someone else.A form of cybersquatting which relies on mistakes such as typographical errors made by Internet users when inputting a website address into a web browser.

  • Download of spyware, a computer virus or any kind of malware that happens without knowledge of the user. Drive-by downloads may happen by visiting a website, viewing an e-mail message or by clicking on a deceptive popup window.

  • securitycartoon.com

  • Windows FirewallMalicious Software Removal ToolGoogle Warnings (StopBadware.org)McAfee SiteAdvisor - Free plug-in

  • Warnings at Googlefrom StopBadware.org

  • McAfee Site Advisor

  • ShopSafe is a free service that allows you to create a temporary card number each time you make an online purchase. This number links directly to your credit card account number but keeps your card number private and protected.

  • Choose another Web BrowserFirefox, OperaChoose another e-Mail programEudora, ThunderbirdUse a Web Mail servicegmail.com, mail.com, everyone.net

  • Disconnect from any network when its not in use

  • Make regular backups of critical data

    Flash Drive, Floppy DiskExternal Hard DriveAnother Hard Drive or PartitionCD-R / CD-RWAnother PC on a network

  • Create an emergency boot disk. Remember, before you have a security event.

    Save all program media.

  • The Internet is still a wonderful information resource.

    Take precautions, but use and enjoy Internet access!Links are online at: http://www.wichita.lib.ks.us/Researchers/DefensiveComputing.htm

    ***************