Defensive Computing avoiding dangerous computing practices

download Defensive  Computing avoiding dangerous  computing practices

If you can't read please download the document

description

Defensive Computing avoiding dangerous computing practices. Wichita Public Library Rex Cornelius • Electronic Resources Webliography online at: http://www.wichita.lib.ks.us/Researchers/DefensiveComputing.htm. Computer Viruses and Worms. Programs designed to infect other computers. - PowerPoint PPT Presentation

Transcript of Defensive Computing avoiding dangerous computing practices

  • Wichita Public LibraryRex Cornelius Electronic ResourcesWebliography online at:http://www.wichita.lib.ks.us/Researchers/DefensiveComputing.htm

  • Programs designed to infect other computers.

  • software designed to infiltrate or damage a computer system without the owner's informed consent.

    Computer viruses, Worms, Trojan horses,Rootkits, Spyware, Hijackers, dishonest Adware, Crimeware.

  • Back DoorsRootkitsallow other people to access and control your computer

  • Being an intermediary for an attack on another computer.

  • Some Trojans function as a mail forwarder, and allow the attacker to transmit spam through the infected system.

  • A remote administrator can use your computer to store illegal materials.

  • Capture and record user keystrokes to obtain passwords or encryption keys

  • Adware - Software that supports itself or another program by displaying ads.

    Spyware - Software that gathers and transmits information without your knowledge.

    Hijacking software - Advertising software programs that change the settings of your browser without your knowledge.

  • Currently the biggest threat to personal computing.Virus-like symptoms.Earthlink: 29 million spyware-related files on the 1 million computers Microsoft: 50% of computer crashesGoogle: 450,000 sites that install malicious code

  • You

  • Keep all applications patched to the most recent levelOperating systemInternet BrowsersEmail programsWord ProcessorsSpreadsheets

    All Microsoft Products!

  • Use anti-virus software on all Internet-connected computers. Be sure to keep your anti-virus software up-to-date. Use automatic updates of virus definitions when available.

  • can be exploited by intruders

  • Dont run a program unless you know its from a trusted source. Never run programs of unknown originNever transfer programs of unknown origin

  • Scan with a removal tool often.Ad AwareSpybotMS Malicious Software Removal Tool

  • Network deviceLinksys, Netgear, etc.

    Personal firewall software ZoneAlarmOutpost Firewall ProWindows Firewall

  • techniques used to manipulate people into performing actions or divulging confidential information.

  • An e-mail message can appear to come from one source when it was sent from another.

  • Never open unknown e-mail attachments. Know the source.Before opening any e-mail attachments, be sure your virus definitions are up-to-dateYou can save the file to your disk and scan the file using your antivirus software

  • Messages designed to gather confidential information.

  • Never send confidential information by e-mail:Credit card numbers PasswordsNever trust links sent by e-mail.Service Providers will never ask for your username or password.

  • Disguise malicious programs

    LOVE-LETTER-FOR-YOU.TXT.vbsAnnaKournikova.jpg.pif

  • Using a domain name with bad faith intent to profit from the goodwill of a trademark belonging to someone else.A form of cybersquatting which relies on mistakes such as typographical errors made by Internet users when inputting a website address into a web browser.

  • Download of spyware, a computer virus or any kind of malware that happens without knowledge of the user. Drive-by downloads may happen by visiting a website, viewing an e-mail message or by clicking on a deceptive popup window.

  • securitycartoon.com

  • Windows FirewallMalicious Software Removal ToolGoogle Warnings (StopBadware.org)McAfee SiteAdvisor - Free plug-in

  • Warnings at Googlefrom StopBadware.org

  • McAfee Site Advisor

  • ShopSafe is a free service that allows you to create a temporary card number each time you make an online purchase. This number links directly to your credit card account number but keeps your card number private and protected.

  • Choose another Web BrowserFirefox, OperaChoose another e-Mail programEudora, ThunderbirdUse a Web Mail servicegmail.com, mail.com, everyone.net

  • Disconnect from any network when its not in use

  • Make regular backups of critical data

    Flash Drive, Floppy DiskExternal Hard DriveAnother Hard Drive or PartitionCD-R / CD-RWAnother PC on a network

  • Create an emergency boot disk. Remember, before you have a security event.

    Save all program media.

  • The Internet is still a wonderful information resource.

    Take precautions, but use and enjoy Internet access!Links are online at: http://www.wichita.lib.ks.us/Researchers/DefensiveComputing.htm

    ***************