Upload
harriet-willis
View
214
Download
0
Tags:
Embed Size (px)
Citation preview
Internet Safety
How to protect your computer, yourself, and your children in
cyberspace
Internet Safety
The Internet – Should I be worried?
Updates SPAM Malware Viruses Badware Blogging Filtering Instant Messaging
Spyware Root Kits Firewalls Email Phishing Pharming Internet
Communications Newsgroups
Update, update, update
Operating systems should be updated on a regularly scheduled basis Windows update services should be scheduled to
run on your home computers weekly (minimum) To schedule these services go to start, settings,
control panel, security center, click on automatic updates (you must be logged in as an administrative user)
Updates continued
Updates continued
SPAM and Email
What is SPAM? Unsolicited junk email
Why do I get so much SPAM? Easily guessed email addresses Signing up for newsletters, internet information,
and using your email address online
How can I stop SPAM?
ANTI-SPAM Software www.mailwasher.net - free software that can help
eliminate SPAM Common sense ideas
Use 1 email address for all newsletters, specials, promotions, etc
Use a different email address for your friends and family
Use BCC when sending email to multiple users
Phishing and Pharming
Phishing is social engineering which attempts to steal user id’s, passwords, and account numbers via email or electronic instant messaging
Pharming is an exploitation of the domain naming system which allows an attacker to acquire a domain name and forward traffic destined for a legitimate site to another location
Phishing and Pharming
Subscribe to an alert system which will notify you of potential phishing attacks www.websensesecuritylabs.com Use filtering, anti-spam and anti-virus software to help
prevent phishing attacks Never click on email link connecting to a bank or other
online institution – open browser and key URL in manually
Pharming attacks are very infrequent and are extremely difficult to detect Be aware of website designs and be cautious when
providing any personal information online
Malware vs Badware
What is it? Malware is software or hardware intentionally
installed for a harmful purpose Identity logging, keylogging, etc
Badware is software that is installed with unintended results Webshots – great pictures but it contains adware,
spyware and user tracking Smileycentral – cool emoticons but it also contains
adware, spyware and user tracking
Malware and Badware
What can you do? Be cautious with downloads Search google and yahoo for information related
to the file you are downloading Read the fine print when installing software that
you download from the internet
Viruses, Trojans and Worms
Viruses are self replicating applications that infect computers via user interaction
Trojans are application programs that claim to do something for the user but in reality they do something else once installed
Worms are viruses that use networks and security holes to self replicate and infect additional computers
Viruses, Trojans and Worms
What can you do? Always run anti-virus software
Free.grisoft.com – free antivirus software for anyone Stinger - http://vil.nai.com/vil/stinger/ removes a
number of common viruses Symantec Antivirus – www.symantec.com McAfee Antivirus – www.mcafee.com/usa Sophos Antivirus – www.sophos.com Kapersky – usa.kapersky.com Be sure your antivirus software is up to date with
the latest signatures
Firewalls
What is a firewall? Software and/or hardware that blocks incoming or
outgoing network traffic Why do you need it?
Many exploits use network ports other than port 80 (www) to send and receive information
Firewalls can effectively block some exploits by blocking the ports they use to transmit information
Firewalls
Examples Microsoft Firewall Zone labs zonealarm Linksys internet routers (hardware)
Rootkits
What is a rootkit? Software that installs itself on a computer with no
user intervention What does it do?
Rootkits effectively give administrative control of the computer to the software
How do I block rootkits? It is difficult to block rootkits; however, most ant-
virus software blocks known rootkits
Blogging
What is Blogging? Blogging is a written log written in chronological
order posted to a website Should I be concerned with blogging?
Maybe? When used appropriately and with adult supervision a
blog can be an effective communications tool When personal information is provided in a blog it is
available to everyone with computer access
Blogging
Should my child be blogging? Children must understand that they should never
post any personal information on a blog site. They should never include last names, identification numbers, addresses, ages, or physical descriptions of themselves or their friends.
Remember that once the information is posted it is available to EVERYONE – friends, family, and online predators
Blogging
Kids favorite blogging sites www.myspace.com www.facebook.com www.xanga.com www.blogger.com 360.yahoo.com www.feedster.com (search blog sites)
Spyware
Spyware is malicious software that intercepts information and takes partial control of a computers operation without the owners consent for the benefit of a third party company. In 2005 Spyware was the primary cause for most personal computer problems.
Causes for concern: Pop-up ads Keylogging
Spyware
Causes for concern continued Surreptitious data monitoring
Includes financial data monitoring Account number monitoring Personal information monitoring
Computer hijacking Uses computer as a bot for malicious purposes
Spyware
Elimination and prevention Ad aware – www.lavasoftusa.com (free) Spybot search and destroy - www.safer-networking.org
(free) Webroot spysweeper – www.webroot.com (rated #1) Microsoft Defender – www.microsoft.com/spyware
(free)
Instant Messaging
Provides instant communications with other individuals (chat) Common programs
AIM (AOL) Yahoo Messenger ICQ (AOL) IRC (Internet Relay Chat) MSN Messenger Trillian (connects to multiple accounts simultaneously)
Instant Messaging
Concerns Who is the person on the other end? Viruses and worms Personal information sharing
Recommendations Be sure you know the person you or your children
are chatting with. Block unknown or anonymous users via chat
options.
Instant Messaging
Recommendations continued Never give out any personal information Monitor activity via filtering software
(reviewed later)
Internet Communications
Internet communications include VOIP (voice over IP) and live video
Common programs Skype – www.skype.com (free VOIP calls) Video enabled MSN, Yahoo, and AOL
Concerns Application exploits – be sure all applications are
up to date Profiles are seen by ALL users
Internet Communications
Concerns continued Set privacy options in application software to
avoid anonymous connections Call interception
Newsgroups
A usenet discussion group related to a single topic
Be aware that many newsgroups are used to harvest email addresses for spammers
Many newsgroups have VERY inappropriate material including graphic pictures, video, music and suggestive text
Filtering
Software designed to help eliminate unwanted websites, spam, chat, pop-ups, newsgroups and more. This software can also set time limits on websites and online chatting. Many filtering applications also include chat and internet logging.
Filtering recommendations
http://internet-filter-review.toptenreviews.com/ Review site for filtering software
Information Use your judgement when purchasing filtering
software Some software OVERBLOCKS websites Most teens know how to circumvent filtering
software
Recommendation Review
Update computer regularly (weekly or more frequently)
Run some form of antivirus software Run anti-spyware software Enable pop-blocker Beware of phishing email Be wary of email with external links or
applications that are attached
Recommendation Review
Talk to your children about safe computing – never give personal information online
Remember that once information has been posted it cannot be “taken back” and it is available to MILLIONS
Utilize online education sites for help www.isafe.org www.wiredsafety.org
Don’t be afraid to say NO
Q&A