GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.
-
Upload
adelia-hunt -
Category
Documents
-
view
222 -
download
0
Transcript of GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.
![Page 1: GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.](https://reader030.fdocuments.in/reader030/viewer/2022033101/56649dab5503460f94a9960d/html5/thumbnails/1.jpg)
GET CONTROL!Avoid The Headache…
Five Simple Steps to a Safer Computer – NUIT Tech Talk
![Page 2: GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.](https://reader030.fdocuments.in/reader030/viewer/2022033101/56649dab5503460f94a9960d/html5/thumbnails/2.jpg)
Agenda
• Get Control Web site• 5 steps to secure your computer:
– Virus protection– Software updates– Password security– Spyware detection– Firewall protection
• Other Security concerns & resources
![Page 3: GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.](https://reader030.fdocuments.in/reader030/viewer/2022033101/56649dab5503460f94a9960d/html5/thumbnails/3.jpg)
Get Control on the Web
http://www.it.northwestern.edu/getcontrolhttp://www.it.northwestern.edu/getcontrol
OORRhttp://www.it.northwestern.edu/http://www.it.northwestern.edu/
and click on
Computer & Network Security
![Page 4: GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.](https://reader030.fdocuments.in/reader030/viewer/2022033101/56649dab5503460f94a9960d/html5/thumbnails/4.jpg)
Viruses: Disguised programming code that
causes unexpected or undesirable events.
• Often self-replicate, spread to other users
• Can be destructive, alter & destroy files
• Can execute immediately/on specific date
• Many exploit user’s address books
Step 1: Virus protection
![Page 5: GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.](https://reader030.fdocuments.in/reader030/viewer/2022033101/56649dab5503460f94a9960d/html5/thumbnails/5.jpg)
Step 1: Virus protectionHow do you get infected?
File sharing software
Weak password
“Worm” via Unpatched OS
File sent via e-mail or instant messenger
![Page 6: GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.](https://reader030.fdocuments.in/reader030/viewer/2022033101/56649dab5503460f94a9960d/html5/thumbnails/6.jpg)
Step 1: Virus protection
• FREE Symantec AntiVirus software• Mac & PC-compatible• To download, visit:
www.it.northwestern.eduwww.it.northwestern.edu Computer & Network SecurityComputer & Network Security““Download Symantec/Norton AntiVirus Download Symantec/Norton AntiVirus
software”software”
![Page 7: GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.](https://reader030.fdocuments.in/reader030/viewer/2022033101/56649dab5503460f94a9960d/html5/thumbnails/7.jpg)
Step 1: Virus protection
• Keep virus definitions updated • Run a scan once a week • Don't open unexpected
attachments • Always scan files you receive from
others • Turn your Macro security to High in
MS Office applications
![Page 8: GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.](https://reader030.fdocuments.in/reader030/viewer/2022033101/56649dab5503460f94a9960d/html5/thumbnails/8.jpg)
Step 1: Virus protection
A word on junk e-mail & viruses• Subject lines & social engineering• E-mail viruses more common now• Both may appear to come from
known and trusted e-mail addresses
• Poor grammar, strange attachments
![Page 9: GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.](https://reader030.fdocuments.in/reader030/viewer/2022033101/56649dab5503460f94a9960d/html5/thumbnails/9.jpg)
Viruses: Think you have one?
Check the Get Control Web siteConsult your UNITS rep/local techCheck virus hoax Web sites
www.myths.comwww.myths.comCall 847-491-HELP (4357)
![Page 10: GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.](https://reader030.fdocuments.in/reader030/viewer/2022033101/56649dab5503460f94a9960d/html5/thumbnails/10.jpg)
Windows• Windows Update
windowsupdate.microsoft.comwindowsupdate.microsoft.com
• Keep Microsoft Office updated office.microsoft.com/productupdatesoffice.microsoft.com/productupdates//
• Baseline Security Analyzer (ask your local tech support)www.microsoft.com/technet/www.microsoft.com/technet/security/security/tools/mbsahome.mspxtools/mbsahome.mspx
Step 2: Software updates
![Page 11: GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.](https://reader030.fdocuments.in/reader030/viewer/2022033101/56649dab5503460f94a9960d/html5/thumbnails/11.jpg)
Step 2: Software updates
Mac OS X:• Security Updates are
available www.apple.com/software/www.apple.com/software/
• Software updates: System Preferences Software Update (set to run automatically)
• MS Office security updates: www.microsoft.com/mac/downloads.awww.microsoft.com/mac/downloads.aspxspx
![Page 12: GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.](https://reader030.fdocuments.in/reader030/viewer/2022033101/56649dab5503460f94a9960d/html5/thumbnails/12.jpg)
Step 2: Software updates
Don’t forget to update other apps, especially those that connect to the Internet:
• Eudora & other e-mail software• Firefox & other Web browsers• Spybot – Search & Destroy & other
anti-spyware software
Security alerts and patches and version updates can be found on the software company’s Web site
![Page 13: GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.](https://reader030.fdocuments.in/reader030/viewer/2022033101/56649dab5503460f94a9960d/html5/thumbnails/13.jpg)
Step 3: Password security
• Strong system password/phrase– As long as possible (8+ characters)– Use symbols: %^*.,!– E.g., “w.ld!*c,at5” (NOT “wildcat”)
• It only takes a few seconds to crack a short, alphanumeric password
• Don’t leave Administrator account passwords blank
• Change passwords routinely
![Page 14: GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.](https://reader030.fdocuments.in/reader030/viewer/2022033101/56649dab5503460f94a9960d/html5/thumbnails/14.jpg)
Step 4: Spyware detection
What is spyware?– Any type of technology that
collects and transmits information about a person or their browsing, often for advertising purposes
![Page 15: GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.](https://reader030.fdocuments.in/reader030/viewer/2022033101/56649dab5503460f94a9960d/html5/thumbnails/15.jpg)
Malware maliciously attacks your computer or is used for illegal purposes. Includes so-called key loggers that record everything from passwords to credit card numbers.
Adware collects information about your browsing habits, geographic location, and possibly the contents of your computer.
Adware is usually legal.
The two major “flavors” of spyware
Step 4: Spyware detection
![Page 16: GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.](https://reader030.fdocuments.in/reader030/viewer/2022033101/56649dab5503460f94a9960d/html5/thumbnails/16.jpg)
Step 4: Spyware detection
• Installed without your knowledge• Bundled with software you install
• Shareware/freeware programs• File sharing programs• May not work if spyware removed
• Spyware-esque tracking cookies are picked up from Web sites; often unsavory ones!
• Spyware can be very difficult to remove
![Page 17: GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.](https://reader030.fdocuments.in/reader030/viewer/2022033101/56649dab5503460f94a9960d/html5/thumbnails/17.jpg)
Step 4: Spyware detection
• Suspicious behavior: • Machine running very slowly • Lots of unfamiliar programs in
Windows Task Manager (Ctrl + Alt + Del)
• Unusual Web browser activity• Contact local tech support if
you see anything strange• Don’t try to manually remove
any components yourself
![Page 18: GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.](https://reader030.fdocuments.in/reader030/viewer/2022033101/56649dab5503460f94a9960d/html5/thumbnails/18.jpg)
Step 4: Spyware detection
Spyware removal • Spybot - Search & Destroy:
spybot.safer-networking.despybot.safer-networking.de
• Free for University & home use• Has updates just like antivirus
program• Scans computer for known
spyware• Backs up files it removes
![Page 19: GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.](https://reader030.fdocuments.in/reader030/viewer/2022033101/56649dab5503460f94a9960d/html5/thumbnails/19.jpg)
Spybot – Search & Destroy
![Page 20: GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.](https://reader030.fdocuments.in/reader030/viewer/2022033101/56649dab5503460f94a9960d/html5/thumbnails/20.jpg)
Step 5: Firewall protection
• Protects your PC from unauthorized access by an individual (hacker)or a program
• Enables you to specify which network ports (“doors”) are open
• Mac OS X & Windows XP* have built-in (native) firewalls– * Built-in to Windows XP
Professional and XP Home SP2
![Page 21: GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.](https://reader030.fdocuments.in/reader030/viewer/2022033101/56649dab5503460f94a9960d/html5/thumbnails/21.jpg)
Step 5: Firewall protection
• Once it’s up, keep it up!• XP firewall prompts you if a new
program wants access
You can also configure manually:www.microsoft.com/security/protect/ports.aspwww.microsoft.com/security/protect/ports.asp
![Page 22: GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.](https://reader030.fdocuments.in/reader030/viewer/2022033101/56649dab5503460f94a9960d/html5/thumbnails/22.jpg)
Step 5: Firewall protection
Manual configuration of Mac OS X firewall
![Page 23: GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.](https://reader030.fdocuments.in/reader030/viewer/2022033101/56649dab5503460f94a9960d/html5/thumbnails/23.jpg)
Other Security Concerns
• “Phishing” scams• Identity theft• Junk e-mail• Illegal file sharing and copyright
violation• Online harassment
See the Get Control Web sitewww.it.northwestern.edu/getcontrol/www.it.northwestern.edu/getcontrol/
![Page 24: GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.](https://reader030.fdocuments.in/reader030/viewer/2022033101/56649dab5503460f94a9960d/html5/thumbnails/24.jpg)
Virus resources
www.symantec.com/avcenter/www.symantec.com/avcenter/ (Symantec Security Response)
www.it.northwestern.edu/security/www.it.northwestern.edu/security/ (Computer Virus Protection at Northwestern)
www.f-secure.comwww.f-secure.com (F-Secure Corporation)
www.virusbtn.comwww.virusbtn.com (Virus Bulletin)
www.cert.org/www.cert.org/ (Computer Emergency Response Team at Carnegie Mellon University)
![Page 25: GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.](https://reader030.fdocuments.in/reader030/viewer/2022033101/56649dab5503460f94a9960d/html5/thumbnails/25.jpg)
Privacy & Security
NUIT Computer Usage Policies & Guidelineswww.it.northwestern.edu/policies/www.it.northwestern.edu/policies/
Edit Your Directory Informationhttps://snap.it.northwestern.edu/https://snap.it.northwestern.edu/
Security and Privacy for Home userswww.microsoft.com/athome/security/default.mspxwww.microsoft.com/athome/security/default.mspx
![Page 26: GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.](https://reader030.fdocuments.in/reader030/viewer/2022033101/56649dab5503460f94a9960d/html5/thumbnails/26.jpg)
Questions?
Don’t forget to visit the Get Control Web Site!
www.it.northwestern.edu/getcontrolwww.it.northwestern.edu/getcontrol
![Page 27: GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.](https://reader030.fdocuments.in/reader030/viewer/2022033101/56649dab5503460f94a9960d/html5/thumbnails/27.jpg)
Next Tech Talk
Safe KeepingAn introduction to backing up your information
Backup, archiving, and more!
Date: TBA (see our Web site for details)Same locations, Noon – 1 p.m.
Please register online: www.it.northwestern.eduwww.it.northwestern.edu