INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org



Similar documents
When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

Welcome To The L.R.F.H.S. Computer Group Wednesday 27 th November 2013

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

Internet Security. For Home Users

How to stay safe online

Protection from Fraud and Identity Theft

10 Things You Need to Know About Internet Security

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

PC Security and Maintenance

Computer Security Maintenance Information and Self-Check Activities

Internet basics 2.3 Protecting your computer

Cyber Security. Maintaining Your Identity on the Net

What you need to know to keep your computer safe on the Internet

When visiting online banking's sign-on page, your browser establishes a secure session with our server.

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Security Fort Mac

Common Cyber Threats. Common cyber threats include:

Keeping you and your computer safe in the digital world.

BE SAFE ONLINE: Lesson Plan

Advice about online security

CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere.

Virus Definition and Adware

It is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes.

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Computer Viruses: How to Avoid Infection

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Payment Fraud and Risk Management

STOP. THINK. CONNECT. Online Safety Quiz

F-Secure Anti-Virus for Mac. User's Guide

Infocomm Sec rity is incomplete without U Be aware,

Malware & Botnets. Botnets

Get Started Guide - PC Tools Internet Security

F-Secure Anti-Virus for Mac 2015

Retail/Consumer Client. Internet Banking Awareness and Education Program

For assistance with your computer, software or router we have supplied the following information: Tech Support , press 1

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0

Protecting your business from fraud

Information Security. Louis Morgan, CISSP Information Security Officer

Free and Legal Software You Can Download By Tom Krauser

4/20/2015. Fraud Watch Campaign. AARP is Fighting for You. AARP is Fighting for You. Campaign Tactics. AARP can help you Spot & Report Fraud

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Certified Secure Computer User

Recognizing Spam. IT Computer Technical Support Newsletter

Beginners Security Basics Presentation. Presented by Tom Crittenden RASCALs 2015

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

avast! Free Antivirus for Mac Quick Start Guide avast! Free Antivirus for Mac Quick Start Guide

Certified Secure Computer User

Ohio University Computer Services Center October, 2004 Spyware, Adware, and Virus Guide

How Do People Use Security in the Home

October Is National Cyber Security Awareness Month!

How to easily clean an infected computer (Malware Removal Guide)

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

Customer Awareness for Security and Fraud Prevention

Digital Safety and Privacy

Fraud Detection and Prevention. Timothy P. Minahan Vice President Government Banking TD Bank

C&G FLUX MARKET Internet Safety

Cyber Security Presentation Cyber Security Month Curtis McNay, Director of IT Security

Corporate Account Takeover & Information Security Awareness. Customer Training

Why is a strong password important?

2016 Digital Safety Class UNDERSTAND YOUR RISKS AND STAY TOTALLY SECURE JESSE ROBERTSON, TECH 4 LIFE

Contents. McAfee Internet Security 3

1. Threat Types Express familiarity with different threat types such as Virus, Malware, Trojan, Spyware, and Downloaders.

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

Online Security Information. Tips for staying safe online

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

2009 Antispyware Coalition Public Workshop

SecuritySecuritySecurity!

Digital Citizenship Lesson

FAKE ANTIVIRUS MALWARE This information has come from - a very useful resource if you are having computer issues.

Deter, Detect, Defend

Office of Information Technology Desktop Security and Best Practices

Don t Fall Victim to Cybercrime:

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

User Guide for the Identity Shield

Essentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library

What's the difference between spyware and a virus? What is Scareware?

LAW OFFICE SECURITY for Small Firms and Sole Practitioners. Prepared by Andrew Mason, Scott Phelps & Mason, Saskatoon Saskatchewan

KASPERSKY SMALL OFFICE SECURITY (Version 3) Features List

Network Security and the Small Business

National Cyber Security Month 2015: Daily Security Awareness Tips

Basic PC Maintenance. Instructors. Action Center

Norton 360. Benefits. Our ultimate protection, now even more so. Introducing the new Norton 360.

Paul Nguyen CSG Interna0onal

Network Security. Demo: Web browser

Learn to protect yourself from Identity Theft. First National Bank can help.

CLEO Remote Access Services CLEO Remote Desktop Access User Guide v1.3

OIG Fraud Alert Phishing

Spyware Doctor Enterprise Technical Data Sheet

Bitdefender Internet Security 2015 User's Guide

Phishing Scams Security Update Best Practices for General User

Bookmarks for Desktop Self-Defense

Kaspersky Internet Security

AVG Internet Security

FORBIDDEN - Ethical Hacking Workshop Duration

Security Tips You are here: Home» Security Tips

PREVENTING HIGH-TECH IDENTITY THEFT

Willem Wiechers 3 rd March 2015

Transcription:

INTERNET & COMPUTER SECURITY March 20, 2010 Scoville Library ccayne@biblio.org

Internet: Computer Password strength Phishing Malware Email scams Identity Theft Viruses Windows updates Browser updates Backup Firewall

Password Strength Effectiveness of a password is measured in resisting guessing and brute-force attacks The strength of a password is a function of length, complexity, and randomness. Don t use the same password for all your accounts. Use the same password, sometimes with small variations, for low level accounts Use a good password for high level accounts such as online banking and change that password some time within every 100 days. Some security experts recommend writing down your password and carrying it on a piece of paper in your wallet. If passwords are written down, they should never be kept in obvious places such as address books, rolodex, etc.

Password Strength - High level passwords: Include numbers, symbols, upper and lowercase letters in passwords Password length should be around 12 to 14 characters Avoid any password based on repetition, dictionary words, letter or number sequences, usernames, relative or pet names, or biographical information (eg, dates, ID numbers, ancestors names or dates,...). If the system is case sensitive use capital and lower-case letters Password should be easy to remember for the user Great way to pick a hard password: use the first letters of the words in a classic song's chorus. Ex.: "1itlntyed2cbaba1." That stood for "One is the loneliest number that you'll ever do. Two...can be as bad as one..." https://www.microsoft. com/protect/fraud/passwords/checker.aspx - test your password s strength.

Password Manager A program that keeps track of all your passwords using a master password to access the information www.lastpass.com, a free download, has been recommended by PC Magazine, PC World, The Economist and Fox News and CNet as one of the top products of 2009, T is a better choice than having your browser remember passwords which is not very secure. Last Pass encrypts all the logons and passwords stored on your computer. Access is through a master password. So, be warned: forget your master password and you could be in trouble especially if you have let the program delete (as it urges you to let it do) all the vulnerable logons and passwords on your own computer. Nice feature is the use of one time only passwords to access your password vault

PHISHING phishing is the fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Phishing is typically carried out by email or instant messaging and it often directs users to enter details at a fake website whose look and feell are almost identical to the legitimate one. Secure websites have a padlock symbol and in Firefox and Google Chrome the background of the URL bar will be yellow for secure sites.

Phishing Protection is turned on by default in Firefox 3 or later, and works by checking the sites that you browse against a list of known phishing sites. This list is automatically downloaded and regularly updated within Firefox when the Phishing Protection feature is enabled. Phishing protection is also turned on automatically in Google Chrome If you go to a site deemed to be a phishing site, a popup window will appear giving you the choice of get me out of here or continue. The "Get me out of here!" link will back out of a suspected phishing site and redirect you to the Firefox Start page. The "Ignore this warning" link will allow you to continue to the suspected phishing site.

MALWARE Malware, short for malicious software, is software designed to infiltrate a computer system without the owner's informed consent. The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code. In Firefox 3 and later and Google Chrome, malware protection is turned on automatically. If you wish to scan your computer, Malwarebytes Anti- Malware is an effective antimalware tool: www. malwarebytes.org. A quick scan takes about 8 minutes. Real-time protection is restricted to the paid version, as is the scheduler for updates and scans.

EMAIL SAFETY Change your password often and keep it in a safe place Don t share the password with anyone. Don t open any attachments from anyone unless they are run through an anti-virus program. Log off when done. Don t reply to spam, harassing, or offensive e-mail or forward chain e-mail letters. Use common sense and keep personal information personal. Delete all e-mails, unread, from people you don t know Don t be caught by the spammers favorite trick, Remember me?

IDENTITY THEFT Identity theft is a term used that is to refer to fraud that involves someone pretending to be someone else in order to steal money or get other benefits. Government website with excellent information on what to do if you are the victim of identity theft: http://www.ftc.gov/bcp/edu/pubs/consumer/idtheft/idt04.shtm

VIRUSES, ETC. A virus is a small piece of software that piggybacks on real programs. Each time the real program runs, the virus runs, too, and it has the chance to reproduce (by attaching to other programs) or wreak havoc. E-mail viruses - An e-mail virus travels as an attachment to email messages, and usually replicates itself by automatically mailing itself to dozens of people in the victim's e-mail address book. Some e-mail viruses don't even require a double-click -- they launch when you view the infected message in the preview pane of your e-mail software

Trojan Horse - A Trojan horse is simply a computer program. The program claims to do one thing (it may claim to be a game) but instead does damage when you run it (it may erase your hard drive). Trojan horses have no way to replicate automatically. Worms - A worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well.

ANTIVIRUS SOFTWARE AVG Anti-Virus Free Edition is an anti-virus protection tool free to home users. Rapid virus database updates are available for the lifetime of the product, thereby providing the high level of detection capability. AVG Anti-Virus Free Edition gives you free rock solid protection for your basic security needs. Additionally, version 9.0 comes with basic anti-rootkit protection to ensure protection against sophisticated hidden threats. 5 star editor's rating on Cnet.com Free download: http://free.avg.com/us-en/homepage

ANTIVIRUS SOFTWARE Microsoft Security Essentials provides real-time protection for your home PC that guards against viruses, spyware, and other malicious software. It is a free* download from Microsoft that is simple to install, easy to use, and always kept up to date so you can be assured your PC is protected by the latest technology. http://www.microsoft.com/security_essentials/default.aspx? mkt=en-us#dlbutton 4.5 stars by CNet.com

WINDOWS UPDATES Control Panel - Settings - Control Panel Recommended to select Automatic Updates If you do not change the default schedule, updates that have been downloaded to your computer will be installed at 3 A.M. If your computer is turned off during a scheduled update, Windows will install the updates the next time you start your computer. When you turn on Automatic Updates, Windows routinely checks the Windows Update Web site for high-priority updates that can help protect your computer from the latest viruses and other security threats. These updates can include security updates, critical updates, and service packs. Depending on the setting you choose, Windows automatically downloads and installs any high-priority updates that your computer needs, or notifies you as these

BROWSERS Recommended browers are Firefox, Google Chrome and Safari for Macs. Always make sure you are running the latest version of your browser. Do not have browser remember passwords In Firefox 3.5 and up, you can enable private browsing. If private browsing is enabled, sites visited will not appear in the browsing history. More info: http://support.mozilla. com/en-us/kb/private+browsing?bl=n&s=private% 20browsing&as=q

BACKUP Backing up is saving the data on your computer to a location outside of your computer It is one of the most important things you can do Hard drives (where your data is stored) last 3-5 years If that is the only place where your information is, you can lose all of it You should back up everything on your computer which you would not want to lose You can back up to an external piece of hardware, like a CD, large flash drive or external hard drive Windows: connect external storage start-programs-accessories-system tools-backup Follow instructions in the wizard which will open

ONLINE BACKUP Online backup services encrypt your data and it is stored on servers at the host location. You can schedule automatic online backups more easily than scheduling through Windows www.jungledisk.com. $2 per month; 5GB free; $.15 @ GB; includes unlimited number of computers; works with PCs and Macs; only backs up files that have changed since the last backup. www.mozy.com. 2GB month free; $4.95 per month more storage. I believe pricing is per computer.

FIREWALL A firewall is simply a program or hardware device that filters the information coming through the Internet connection into your private network or computer. If an incoming packet of information is flagged by the filters, it is not allowed through. Windows: Start - Control Panel - Security Center