23
Understanding security and safe computing. Be Web Wise. Bob Penn presents:

Understanding security and safe computing. Be Web Wise. Bob Penn presents:

Embed Size (px)

Citation preview

Page 1: Understanding security and safe computing. Be Web Wise. Bob Penn presents:

Understanding security and safe computing.

Be Web Wise.

Bob Penn presents:

Page 2: Understanding security and safe computing. Be Web Wise. Bob Penn presents:

• Overview: Online Risks.

• Understanding the Risks.

• Keeping Safe.

Understanding security and safe computing

Page 3: Understanding security and safe computing. Be Web Wise. Bob Penn presents:

Internet shopping is booming – every 20th pound is spent online.

Internet card fraud accounts for 80 per cent of all losses where the card is not physically present.

Overview: Online Risks

Page 4: Understanding security and safe computing. Be Web Wise. Bob Penn presents:

Simple, common sense precautions can keep you safe when you’re in cyberspace.

Don’t panic its not as bad as it sounds.

Overview: Online Risks

Page 5: Understanding security and safe computing. Be Web Wise. Bob Penn presents:

Understanding the Risks

• Viruses and worms can wreck your data and shut down your machine.

– Purchase recognised anti-viral and anti-spyware programs and set them to auto-update regularly.

– Free software is also available, and works well but carries no warranty.

– Set your browser preferences only to accept cookies from sites you recognise and actively wish to install.

Page 6: Understanding security and safe computing. Be Web Wise. Bob Penn presents:

Understanding the Risks

• Do other users access your PC while you’re connected to the Internet.

– Use a personal firewall.

– If your operating system already includes a firewall, make sure it is switched on.

Page 7: Understanding security and safe computing. Be Web Wise. Bob Penn presents:

Understanding the Risks

• Update your Operating System!

– Regularly install any operating system patches and fixes to keep your system security in place.

– Instruct your computer to check regularly. Cyber crooks target those who don’t bother.

Page 8: Understanding security and safe computing. Be Web Wise. Bob Penn presents:

Understanding the Risks

• Eavesdroppers can tune in to insecure wireless networks.

– Many wireless networks are not encrypted, so anyone with a little knowledge could eavesdrop.

– Keep your device in non-discoverable mode when you are not using Wi-Fi.

– Do not connect to non-secure access points in public places.

Page 9: Understanding security and safe computing. Be Web Wise. Bob Penn presents:

Understanding the Risks

• E-mails from unknown people.

– If you receive mail from people or organisations you do not know, delete them and, if possible, inform your e-mail supplier that they are spam.

– Do not open any unknown attachments – these may carry viruses.

– Never reply because that alerts spammers that the e-mail address is valid and you will be bombarded with more messages from more senders.

Page 10: Understanding security and safe computing. Be Web Wise. Bob Penn presents:

Please Update Your Account

Dear valued PayPal member: It has come to out attention that your PayPal account information needs to be updated as part of our continuing commitment to protect your accountand to reduce the instance of fraud on our website. However, failure to update your records will result in account suspension. Please update your records on or before February 27 , 2008. Once you have updated your account records, your PayPal session will notbe interrupted and will continue as normal. To update your PayPal records click on the following link: https://www.paypal.com/cgi-bin/webscr?cmd=_login-run PayPal, Inc. P.O. Box 45950 Omaha, NE 68145

Sincerely,

PayPal

Understanding the Risks – Sample - A

Page 11: Understanding security and safe computing. Be Web Wise. Bob Penn presents:

Firewall Gold Message Centre: You may need to update your Firewall security settings as soon as possible:

Press here to update your Firewall security settings or read below for more information:http://spacehyper.info/[email protected]

There is a high possibility that your PC's Firewall security settings may become exploited by malicious websites without your knowledge. This could easily lead to the following attacks on your PC's hard drive:

- Unwanted Virus Downloads- Uncontrollable Trojan horse attacks- The running of unwanted script programs- The installation of malicious spyware

Understanding the Risks – Sample - B

Page 12: Understanding security and safe computing. Be Web Wise. Bob Penn presents:

Understanding the Risks

• Password forgetfulness.

– The average person now has 15 different passwords and codes to access online accounts and more than ten per cent use an astonishing 50 or more online accounts.

– Many use the same password for several accounts & a quarter of us keep a password list in our purse or wallet - DON’T DO IT.

– Use as many different passwords as possible and try word association techniques to remember them.

– Never, ever give your password to anyone else – treat it like a PIN.

Page 13: Understanding security and safe computing. Be Web Wise. Bob Penn presents:

Understanding the Risks

• File Delete is not enough.

– Information does not disappear when you place it in your computer’s waste basket or recycle bin.

– Buy and use a clean-up utility to overwrite the disk space occupied by discarded information or use a free eraser such as “Eraser 5.86a from (VNUNET).

– Delete sensitive and personal information if you need to send your PC to a supplier for a health check or upgrade.

– When replacing your computer, the only real way of preventing others from recovering the data from your hard disk is physical destruction.

Page 14: Understanding security and safe computing. Be Web Wise. Bob Penn presents:

Understanding the Risks

• Portable storage devices.

– Portable storage devices, such as USB key rings, are not secure.

– keep them as safe as you would your passport or credit cards.

Page 15: Understanding security and safe computing. Be Web Wise. Bob Penn presents:

Understanding the Risks

• Back up important documents!

– Most of us are dependant on our PCs now, so it makes sense to copy important documents on to a CD and keep it somewhere secure.

– And of course……Don’t, if possible, record your passwords!

Page 16: Understanding security and safe computing. Be Web Wise. Bob Penn presents:

`

So What to Do?

Keeping Safe

Page 17: Understanding security and safe computing. Be Web Wise. Bob Penn presents:

Keeping Safe

Check your security status with Windows Security Centre.

Page 18: Understanding security and safe computing. Be Web Wise. Bob Penn presents:

Keeping Safe

Use a firewall.

Page 19: Understanding security and safe computing. Be Web Wise. Bob Penn presents:

Keeping Safe

Security alerts.

If Windows detects that your computer might need enhanced security in any one of the security areas— firewall, automatic updating, malware protection, or other security settings — until the problem is fixed, you will see a notification every time you log on. Notifications are displayed in the notification area of the taskbar.

Page 20: Understanding security and safe computing. Be Web Wise. Bob Penn presents:

Keeping Safe

• Destructive viruses, etc can erase information from your hard disk, completely disable your computer or worsen its performance and stability.

– Antivirus programs scan e-mail and other files on your computer for viruses, worms, and Trojan horses – even the free ones.

– If one is found, the antivirus program either quarantines (isolates) it or deletes it entirely before it damages your computer and files.

– If you do not use antivirus software, you expose your computer to damage from malicious software. You also run the risk of spreading viruses to other computers.

Use and update regularly your Virus Protection.

Page 21: Understanding security and safe computing. Be Web Wise. Bob Penn presents:

Keeping Safe

• Spyware/ Adware is software that can display advertisements, collect information about you, or change settings on your computer, generally without obtaining your consent.

• Most spyware is installed through free downloaded software, but in some cases simply visiting a website can results in an infection.

– Windows has a built-in antispyware program called Windows Defender, turned on by default. Defender alerts you when spyware tries to install itself. It also scans for existing spyware and then remove it.

– A number of free programs are also available but require manual updating/scanning (SpyBot / Ad-aware).

Use and update regularly your Spyware Protection.

Page 22: Understanding security and safe computing. Be Web Wise. Bob Penn presents:

Keeping Safe

Microsoft regularly offers important updates to Windows that can help protect your computer against new viruses and other security threats. To ensure that you receive these updates as quickly as possible, turn on automatic updating.

Update Windows automatically.

Page 23: Understanding security and safe computing. Be Web Wise. Bob Penn presents:

Safe Surfing

Keep Safe

Bob