Basic Computer Security Part 2

Similar documents
Malware & Botnets. Botnets

Online Banking Fraud Prevention Recommendations and Best Practices

Cyber Security: Beginners Guide to Firewalls

References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household

Reliance Bank Fraud Prevention Best Practices

Cyber Security Beginners Guide to Firewalls A Non-Technical Guide

Business ebanking Fraud Prevention Best Practices

Frequently Asked Questions

Basic Computer Security Part 3

Section 12 MUST BE COMPLETED BY: 4/22

The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015.

Best Practices Guide to Electronic Banking

Deter, Detect, Defend

Frequently Asked Questions

Business Internet Banking / Cash Management Fraud Prevention Best Practices

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

Your security is our priority

Securing Your Technology Infrastructure Five security areas of focus for small to medium businesses.

How to easily clean an infected computer (Malware Removal Guide)

4/20/2015. Fraud Watch Campaign. AARP is Fighting for You. AARP is Fighting for You. Campaign Tactics. AARP can help you Spot & Report Fraud

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers Your Interactive Guide to the Digital World

Why is a strong password important?

Your Digital Dollars Online & Mobile Banking

9 Simple steps to secure your Wi-Fi Network.

VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong

Safe Practices for Online Banking

Essentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library

National Cyber Security Month 2015: Daily Security Awareness Tips

Cyber Security Awareness


Computer Security Maintenance Information and Self-Check Activities

Get Started Guide - PC Tools Internet Security

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

Don t Click That Link and other security tips. Laura Perry Jennifer Speegle Mike Trice

Internet Safety & Awareness. Dan Tomlinson 02/23/2013

How To Protect Your Data From Being Stolen

High Speed Internet - User Guide. Welcome to. your world.

Wireless Network Best Practices for General User

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

How to Use Windows Firewall With User Account Control (UAC)

Securing Your Wireless Network

JOIKUSPOT PREMIUM USER GUIDE. Contents

Why The Security You Bought Yesterday, Won t Save You Today

October Is National Cyber Security Awareness Month!

The Hidden Dangers of Public WiFi

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Wireless Network Security When On the Road

Brazosport College VPN Connection Installation and Setup Instructions. Draft 2 March 24, 2005

TMCEC CYBER SECURITY TRAINING

CLEO Remote Access Services CLEO Remote Desktop Access User Guide v1.3

Corporate Account Takeover & Information Security Awareness

Must score 89% or above. If you score below 89%, we will be contacting you to go over the material individually.

THE HOME LOAN SAVINGS BANK. Corporate Account Takeover & Information Security Awareness

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

FI8910W Quick Installation Guide. Indoor MJPEG Pan/Tilt Wireless IP Camera

The information contained in this session may contain privileged and confidential information. This presentation is for information purposes only.

Chapter 3 Safeguarding Your Network

Cyber Security Awareness

INFORMATION SECURITY GUIDE. Employee Teleworking. Information Security Unit. Information Technology Services (ITS) July 2013

Keeping you and your computer safe in the digital world.

Basic Security Considerations for and Web Browsing

What's the difference between spyware and a virus? What is Scareware?

INTERNET & COMPUTER SECURITY March 20, Scoville Library. ccayne@biblio.org

10 Quick Tips to Mobile Security

PC Security and Maintenance

Mifflinburg Bank & Trust. Corporate Account Takeover & Information Security Awareness

Computer Security: Best Practices for Home Computing. Presented by Student Help Desk Merced Community College

Introduction to Cyber Security

Understanding Home Network Security

General Security Best Practices

3. Are employees set as Administrator level on their workstations? a. Yes, if it is necessary for their work. b. Yes. c. No.

Getting Your Multifunction Back On Your Network After A Router Or Network Change

F-Secure Anti-Virus for Mac 2015

Chapter 2 Configuring Your Wireless Network and Security Settings

Introduction to Computer Security Table of Contents

platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential

Scott Lucas: I m Scott Lucas. I m the Director of Product Marketing for the Branch Solutions Business Unit.

When visiting online banking's sign-on page, your browser establishes a secure session with our server.

TRAINING FOR AMERICAN MOMENTUM BANK CLIENTS. Corporate Account Takeover & Information Security Awareness

What Do You Mean My Cloud Data Isn t Secure?

BYOD: (B)ROUGHT (Y)OUR (O)WN (D)ESTRUCTION?I. Righard J. Zwienenberg Senior Research Fellow ESET, The Netherlands

How to stay safe online

Business Identity Fraud Prevention Checklist

Quick Installation Guide

CNA NetProtect Essential SM. 1. Do you implement virus controls and filtering on all systems? Background:

How Do People Use Security in the Home

Preparing Your Personal Computer to Connect to the VPN

Cyber Security Education & Awareness. Guide for User s

Welcome To The L.R.F.H.S. Computer Group Wednesday 27 th November 2013

Laura Royer, Extension Faculty, University of Florida/IFAS Osceola County Extension Services

Senaca Shield Presents 10 Top Tip For Small Business Cyber Security

Use Bring-Your-Own-Device Programs Securely

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

Corporate Account Takeover (CATO) Risk Assessment

Fibe Internet Connection Hub Reference Guide

Keystroke Encryption Technology Explained

Beginning Open-Source/Free Solutions for Home and Small Business Owners. Robert Baldi, CISSP- ISSEP Robert Clauff

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

Transcription:

Basic Computer Security Part 2 Presenter David Schaefer, MBA OCC Manager of Desktop Support Adjunct Security Instructor: Walsh College, Oakland Community College, Lawrence Technology University

Welcome to Basic Computer Security Part 2 of 4 What to look for when you have been attacked Firewall Basics Wi-Fi Network Security

What to Look for When Your Computer Has Been Attacked The faster you realize you have been attacked and the faster you notify someone of the attack the less damage the unethical attacker can do There is no simple way to determine you are attacked electronically Criminals take steps to make it difficult for you to find out Your computer may be reprogramed to lie to you Meaning antivirus or antimalware may look great and your computer could seem OK with some of the most serious infections

Computer Infection Courtesy of WatchGuard Security

What to Look for When Your Computer Has Been Attacked - Continued However there are indicators we can look for when we have been attacked: 1. Antivirus Alert 2. Browser is taking you to unwanted websites Random websites open on your screen and you can t close them 3. Your passwords no longer work Unethical attackers often change your password after attacking your account 4. People tell you that they are getting messages from your face book, twitter, or email accounts that you know you didn t send 5. You believe you may have accidently installed suspicious software Ads on the web can trick us (via Social Engineering) into mistakenly click on software we didn t mean to install

What to Look for When Your Computer Has Been Attacked - Continued 6. Unusual applications installed on your computer Computer could be slow due to this 7. Web browser Home Page has changed 8. Unfamiliar toolbars appear in your Web Browser 9. Browser has new bookmarks you didn t make 10.Unusual files on your computer

What to Look for When Your Computer Has Been Attacked - Continued If you believe your computer has been infected Stop using it The sooner you shut down your computer and keep it off, the less opportunity the unethical attacker can have to use it against you Contact someone that knows how to fix infected computers @ Work IT Support Center Vendor Knowledgeable Friend or Family Member

How to Prevent an Attack on Your Computer Install a vendor supported Operating System Windows XP needs to be replaced Mac OS X supports up to the 2 3 latest OS releases List of supported Mac OS X versions: OS X 10.8 "Mountain Lion" OS X 10.9 "Mavericks" OS X 10.10 "Yosemite" Keep up to date with the latest updates and patches for: Your Operating System Applications Including but not limited to Web Browsers and other programs such as: Flash, Shockwave, Java, etc.

How to Prevent an Attack on Your Computer Set your web browser at a higher security setting Some web browsers like Firefox allow plugins in addition to settings that can protect you like: HTTPS Everywhere - EFF No Script If sites stop working you can add them to your allowed list more for intermediate users Ad Block (the original not Pro) However be careful because some plugins are bad Use Antivirus and Malware Protection Software Because of lawsuits there is a distinction between the two programs Keep antivirus and antimalware up to date

How to Prevent an Attack on Your Computer Uninstall Apps on your smartphone or applications on your computer you don t need or use One of the biggest computer threats is Malware Malware can damage your computer or gain unauthorized access to your personal information Viruses, Spyware, Trojan Horses, Rootkits, oh my! Any computer can get malware Antivirus helps to prevent malware from being installed

Protecting with Antivirus Antivirus uses an unethical list of software and behavioral patterns to identify malware on your computer This list is only a point in time, and there are well over 18 million malware instances and growing as of 2012! Antivirus comes out with updates more frequently than your computer updates Make sure you use automatic updates, and periodically check to ensure it s still working Ensure Antivirus scans when you: Save Edit Copy over a files from another device Make sure you schedule full scans At least once a month This scans all files on your machine with the latest updates from the antivirus company Check with your Internet Service Provider (ISP) for AV Lot of ISPs give away free paid for Antivirus Products.

Malware

Firewall Basics Firewalls are like traffic cops They either allow or deny traffic coming into (ingress) or going out (egress) of your computer based off of rules All modern Operating Systems have firewalls Not all hardware and Operating Systems have firewalls enabled Manufacturers are generally too afraid to turn them on as they may make things stop working for the customer

Firewall Basics - Continued Here are the benefits of turning on a firewall: They protect against hostile intrusions from an unethical attacker Prevents scans that could tell attackers what you have running on your computer that they could possibly attack If your computer gets infected, it may protect against the infection spreading from your computer to other computers Depends on infection

Wi-Fi Security Networks relied on physical connections for decades Physical network cables were required to connect to your laptop or desktop Inconvenience from a user s standpoint Good thing for security because it allowed us to control our networks People needed a faster and more convenient way to connect to networks A connection that didn t require physical cables

Wi-Fi Security Wi-Fi was created in the early 90s Allowing us to connect to networks without a cable To use Wi-Fi you simply select the network and click In some cases you may have to give a password or email address to connect

Wi-Fi Security Risks Everything you do over a Wi-Fi network can be potentially monitored Without proper precautions, anyone close to you can eavesdrop on you Unsecured connections can be used by unethical attackers to compromise your account Whenever you connect you should encrypt all online activity Especially on public Wi-Fi networks Security on public networks cannot be trusted

Wi-Fi Security Countermeasures If your work uses Virtual Private Network (VPN) technologies, use them Can allow you to encrypt traffic directly from your computer to the network you are connecting to Is useless if your computer is compromised This creates an encrypted tunnel that both ends need to be setup for in order to work properly Encryption is one of our best defenses in security When you use HTTPS instead of HTTP You are using encryption S is for secure

Wi-Fi Security Countermeasures If you have a Wi-Fi Network at home Change the default password Ensures only you can make changes to your network Use WPA2 Security mode for Wi-Fi home networks Older Weaker forms of encryption like WEP are not secured Use a strong passphrase to join your home networks Check to see if your router has Wi-Fi Protected Setup (WPS) enabled WPS is insecure and should be disabled Always secure your home network...

Wi-Fi Security Countermeasures Don t connect to Wi-Fi public connections unless you absolutely have to: Use a Wireless hotspot Acts like a portable network device Can be used on a smart phone or an individual device Disable Wi-Fi if you don t need it Especially true on smart phones as they will automatically connect to networks as you walk through areas without asking Will save on battery life as well for mobile phones May add to smart phone data costs Also great for when you have to take a vacation and won t be needing your router at home If you really need to connect to a public Wi-Fi, limit the time you are connected to do what you need to and get off immediately This reduces the window of time an attacker may have to break in your system

Wi-Fi Security Countermeasures Hiding your SSID only helps the attacker Wireless actually works by finding the unhidden network names first Attackers can implement a router with a visible wireless name in the same location of your hidden wireless name The attacker then knocks your computer off the legitimate router and connects to the attacker s router From there the attacker can start using tools to compromise your computer because you re on their network! Some people think that hiding your SSID is a smart thing to do Again a lot of copying ideas on the Internet leads to bad sources and ideas for security

Wi-Fi Security Countermeasures Keep in mind there s a lot of copy cats on the web giving advice for security Some people still advise using MAC address filtering MAC address is something every network card needs to get connected to a network MAC addresses are embedded on every network card states manufacturer and unique device Wireless attacks duplicate legitimate MAC addresses Rendering MAC Addressing useless other than to make your life harder on setting up your network!

Note about Bluetooth Bluetooth is a wireless connection used to connect devices over short distances 10 meters or 32.8ft Disable Bluetooth if not using it on your smart phone or computer Saves on battery too and limits attacks Turn off Bluetooth discoverable mode features as well (or only turn on when you need it) Limits connections without your knowledge Bluejacking sending spam messages, images/sound Bluesnarfing unauthorized access of information from a wireless device: Address book, calendar, email, text messages, pictures, videos, etc.

The End Hope you enjoyed this presentation What to look for when you have been attacked Firewall Basics Wi-Fi Network Security

My Personal Contact Info My Web Page: www.surrealparadigm.com My Email Address: surrealparadigm@surrealparadigm.com