Texas Christian UniversityTechnology Resources COMPUTER SECURITY @ HOME.

28
Texas Christian University Technology Resources COMPUTER SECURITY @ HOME

Transcript of Texas Christian UniversityTechnology Resources COMPUTER SECURITY @ HOME.

Page 1: Texas Christian UniversityTechnology Resources COMPUTER SECURITY @ HOME.

Texas Christian University Technology Resources

COMPUTER SECURITY @ HOME

Page 2: Texas Christian UniversityTechnology Resources COMPUTER SECURITY @ HOME.

TCU Information Security Services

OverviewCritical PatchesAnti-Virus SoftwareAnti-Spyware SoftwareInternet FirewallEmail SecurityBackup Your ComputerUse Strong PasswordsWireless SecurityEtcetera

Page 3: Texas Christian UniversityTechnology Resources COMPUTER SECURITY @ HOME.

TCU Information Security Services

Critical PatchesIt is critical to keep your software up-to-date

Operating systemAnti-virus and anti-spywareApplications including browsers, Adobe

Acrobat, Java, FlashNewest versions contain fixes for discovered

vulnerabilitiesEnable automatic update features in OS and

application softwareWindows – Control PanelMac OSX – System Preferences

Page 4: Texas Christian UniversityTechnology Resources COMPUTER SECURITY @ HOME.

TCU Information Security Services

Anti-virus SoftwareAnti-virus software is “used to identify and

remove computer viruses, as well as many other types of harmful computer software, collectively referred to as malware” Wikipedia

Anti-virus software offers ongoing protection, daily scans, daily updates.

To be effective virus definitions must be updated routinely.

Norton, Trend Micro, McAfee, AVG, Sophos, Eeye, also included in internet security packages.

Page 5: Texas Christian UniversityTechnology Resources COMPUTER SECURITY @ HOME.

TCU Information Security Services

Anti-Spyware SoftwareProtects your computer from malicious

spyware.Spyware may monitor your online activities

and collect personal information while you surf the web.

Periodically scans your computer for spyware.

Must also be kept up-to-dateAd-Adware, Spybot, also included

in internet security packages

Page 6: Texas Christian UniversityTechnology Resources COMPUTER SECURITY @ HOME.

TCU Information Security Services

Internet FirewallAnti-virus and anti-spyware products

inspect files on your computer, in incoming and outgoing email, and on removable media. 

Firewall software and/or hardware monitors the communications between your computer and the outside world (the Internet).

Firewalls prevent unauthorized access to or from a private “network” (i.e., your home computer).

Page 7: Texas Christian UniversityTechnology Resources COMPUTER SECURITY @ HOME.

TCU Information Security Services

Internet Firewall (continued)You can implement a firewall in either hardware

or software form, or a combination of both. Hardware Firewall

Router (wired or wireless), i.e., LinksysDSL Modem, Gateway

Software FirewallBuilt-in Windows Firewall

Only stops inbound traffic, does not check outboundMac OSX 10.2 and later also has an built-in firewallPart of an internet security package

Page 8: Texas Christian UniversityTechnology Resources COMPUTER SECURITY @ HOME.

TCU Information Security Services

Internet Security PackagesSome commercial internet security

packages include anti-virus, anti-software and firewall software.

Norton, Trend Micro, McAfee, Sophos, EEye, ESET, AVG

Page 9: Texas Christian UniversityTechnology Resources COMPUTER SECURITY @ HOME.

TCU Information Security Services

Email SecurityPhishingSpamAttachments

Page 10: Texas Christian UniversityTechnology Resources COMPUTER SECURITY @ HOME.

TCU Information Security Services

PhishingPhishing is an illegal activity that uses

social engineering techniques to manipulate people into giving out personal information.

A highly targeted version of a phishing scam is “spear phishing.”

Page 11: Texas Christian UniversityTechnology Resources COMPUTER SECURITY @ HOME.

TCU Information Security Services

Phishing (continued)Characteristics of phishing emails

Unsolicited request for personal information Username, userid, email id, email identity Password Social security number Birthdate

Generic greetingsContains an ultimatumGrammatical errorsContent appears genuine

Page 12: Texas Christian UniversityTechnology Resources COMPUTER SECURITY @ HOME.

TCU Information Security Services

Phishing techniquesLink manipulation

Technical deception designed to make a link in an email and the spoofed website it leads to, appear to belong to the spoofed organization.

Spoofed website Looks almost exactly like the real thing

Website forgery A spoofed website that uses JavaScript to alter the

address bar to appear legitimate.Filter evasion

Misspelled words and images instead of text are used to evade anti-phishing filters.

Page 13: Texas Christian UniversityTechnology Resources COMPUTER SECURITY @ HOME.

A Recent TCU Phishing Email

Link manipulation

Page 14: Texas Christian UniversityTechnology Resources COMPUTER SECURITY @ HOME.

http://www.1025.ru/js/mail.tcu.edu

Fake WebsiteLo

ok b

etw

een

first

doub

le //

and

firs

t

sing

le /

- tha

t’s N

OT

TCU

No https

Page 15: Texas Christian UniversityTechnology Resources COMPUTER SECURITY @ HOME.

https://mobile.tcu.edu/owa/auth/logon.aspx

Real Website

That is TCUSecure

Page 16: Texas Christian UniversityTechnology Resources COMPUTER SECURITY @ HOME.

Watch out for links in emails. Do not click on themType the link directly into web browser

Learn to spot non-legitimate web sitesLook at the address between the // and the first /

- it should end with the company you expectFake: http://www.1025.ru/js/mail.tcu.eduReal: https://mobile.tcu.edu/owa/auth/logon.aspx…

Is it secure?https in the addressYellow lock icon

Avoid being Phished!

Page 17: Texas Christian UniversityTechnology Resources COMPUTER SECURITY @ HOME.

TCU Information Security Services

Avoid being Phished (continued)Greet email or phone calls seeking

personal information with skepticism.If you think it may be legitimate, call

customer service number provided when account was opened.

Be leery of alarming statements that urge you to respond immediately.

Do NOT reply to phishing emails. OnGuard Online Phishy Home Video

http://www.onguardonline.gov/videos/phishy-home.aspx

Page 18: Texas Christian UniversityTechnology Resources COMPUTER SECURITY @ HOME.

TCU Information Security Services

Avoid being Phished (continued)TCU Technology Resources, including the

computer help desk and information security services will NEVER ask you for your password via email, the phone or in person.

When TCU upgrades its computer or email systems we will NEVER send a link inside an email which will go to a website requesting that you login or enter your username and password.

Page 19: Texas Christian UniversityTechnology Resources COMPUTER SECURITY @ HOME.

TCU Information Security Services

SpamSpam is anonymous, unsolicited junk

email sent indiscriminately to huge numbers of recipients.

Do not open email that is obviously Spam.If you do open spam, do

not click on any links.

Page 20: Texas Christian UniversityTechnology Resources COMPUTER SECURITY @ HOME.

TCU Information Security Services

Email AttachmentsComputer viruses and other malicious

software are often spread through email attachments.

If a file attached to an email contains a virus, it is often launched when you open (or double-click) the attachment.

Don’t open unexpected email attachments.

Page 21: Texas Christian UniversityTechnology Resources COMPUTER SECURITY @ HOME.

TCU Information Security Services

Backup Your ComputerBe prepared for the worst by backing up

critical data and keeping backups in a separate, secure location.Use supplemental hard drives, CDs/DVDs or

flash drivesBackup data, files,

pictures

Page 22: Texas Christian UniversityTechnology Resources COMPUTER SECURITY @ HOME.

TCU Information Security Services

Use Strong PasswordsStrong passwords

At least one alphabetic, one numeric and one special character

At least 7 characters longMixed caseNot similar to other passwords or your nameNot found in the dictionary

Let’s test some passwords:http://www.passwordmeter.com/

Page 23: Texas Christian UniversityTechnology Resources COMPUTER SECURITY @ HOME.

TCU Information Security Services

Wireless SecurityChange the administrator username and password

on your wireless hardware.Use WPA2 encryption to secure communication

between your computer and your wireless access point.

Change the Default SSID (default name of the your wireless network – i.e., Linksys devices are normally “linksys”)

Run setup wizard that comes with wireless router.Restrict which computers can access your

network.

Page 24: Texas Christian UniversityTechnology Resources COMPUTER SECURITY @ HOME.

TCU Information Security Services

Wireless Security continuedOnGuard Online Wireless Video

http://www.onguardonline.gov/videos/wireless-secuirty-yul-kwon.aspx

Page 25: Texas Christian UniversityTechnology Resources COMPUTER SECURITY @ HOME.

TCU Information Security Services

EtceteraSupervise Children

Teach computer security Use monitoring software

Turn off computer when not using itWarning – if off for weeks it won’t get updates.

Force updates when you turn it back on.Use FireFox instead of Internet Explorer

Turn on Master PasswordBeware of freeware or shareware – it may

be spyware

Page 26: Texas Christian UniversityTechnology Resources COMPUTER SECURITY @ HOME.

TCU Information Security Services

Etcetera (continued)If you need to access the TCU network from

home, use VPN with Remote Desktop (Windows) or Screensharing (Mac)

When getting rid of an old computer, even if the hard drive is broken, drill holes through it.

Beware of public computer accessWireless hotspots – not secure, don’t require

encryption. You may want to use TCU VPN.

Kiosks or public computers – not secure, key logging software may be installed.

Page 27: Texas Christian UniversityTechnology Resources COMPUTER SECURITY @ HOME.

TCU Information Security Services

RecapCritical Patches – keep everything up-to-

date!Anti-virus, anti-spyware, firewall

Recommendation – all inclusive internet security package

Email securityWatch for links in emails and learn to spot

non-legitimate web sitesUse strong passwordsWireless security

Page 28: Texas Christian UniversityTechnology Resources COMPUTER SECURITY @ HOME.

TCU Information Security Services

ResourcesTCU Computer Help Desk

[email protected]://Help.tcu.edu Location: Mary Couts Burnett Library, first

floorInformation Security Services

https://Security.tcu.edu [email protected]