David Watterson & Ross Cavazos Chief Information Officer IT Director City of Billings Yellowstone County Local Government IT Group Vice-Chairmen Classic Battle of Good vs Evil GOOD EVIL Firewall E-Mail Spam Filter Web Filter Anti-Virus Software Anti-Spyware Software Employee Awareness Virus Spyware Crimeware (evolved from Malware) Phishing Spam Virus / Computer Infections: Viruses are usually brought upon by files opened from e-mail attachments or transferred from other computers via CDROM or flash drive. Viruses usually do more damage by deleting important files and spreading throughout your system or network and sometimes e-mailing themselves to people you know. Generally spread by coping the virus to any unprotected computer on the network. 1
Spyware is a software that aids in gathering information about a person or organization without their knowledge and that may send such information to another entity without the consumer's consent, or that asserts control over a computer without the consumer's knowledge. Common Types: System Monitors, Trojans, Adware, & Tracking Cookies. Spyware: Spyware is usually brought upon by YOU going to shady websites and clicking ok to download programs that aren t safe. You can get spyware just by visiting a page and browsing around. Another way to get spyware is by downloading "free" software which installs unwanted spyware along with it. Crimeware: Crimeware is malicious software that is covertly installed on computers. Trojans, keyloggers, and spyware represent a challenge to those fighting crime in the 21 st Century. Crimeware programs generally steal your confidential information such as passwords and PINs and send it back to the criminal. Armed with this information, the cybercriminal is then able to steal your money. 2
Phishing: A phishing attack is a specific form of cyber crime. The criminal creates an almost 100 percent perfect replica of a chosen financial institution s website, then attempts to trick the user in to disclosing their personal details username, password, PIN etc via a form on the fake website, allowing the criminal to use the details to obtain money. Software or hardware-based network security system. Controls the incoming and outgoing network traffic by analyzing the data packets 1 st line of defense on incoming traffic Last line of defense on outgoing traffic Analyzes incoming E-mail and sorts into categories such as spam, virus, questionable, & deliver. Most filters use national databases, watch lists, and end-user definitions to identify unwanted messages. End-User filter tuning is necessary to avoid False Positives 3
Enforce content/application policies. Protect the network against viruses, spyware, phishing and other Internet threats. Optimize network performance. Intended to increase user productivity and prevent exposing users to inappropriate material. Load Anti-Virus (AV)/Spyware (AS) software on your PC/Server. Update AV/AS software daily. AV/AS software will actively scan all activity such as internet traffic, CD-ROM, flash drives, E-mail, etc. Schedule a scan of your hard drive(s) daily during off-peak times. Only install ONE AV/AS protection product. O/S: Windows, OSX, Linux.. Browser updates Adobe updates: Flash & Acrobat Updates to E-Mail Spam Filter, Web Filter, & Firewall Office Suite updates: Microsoft Office, Open Office, Word Perfect, etc 4
Be cautious of E-mails from foreign countries, people you don t know, or anyone offering you money, trips, treasures,.. Don t reply to E-mails from strangers. A quick response to their seemingly harmless Unsubscribe lets the spammer know they have a valid E-mail address. Don t click on any link or open any attachment unless you are 100% sure of the source. This is the #1 way to infect your computer. Be wary of E-mails with poor grammar & spelling 5
Be wary of any E-mail that asks for information, stirs emotion, threatens, and/or demands quick response: Your bank account is overdrawn, The IRS wants to Audit you, Verify your ebay account info, etc o Look at the E-mail to see if it actually lists information that is specific to you: home address, account #, contact info, phone #, etc o Use another source to find a telephone # for the business and call them directly about the issue. o Don t send personal or sensitive information unless the site is secure and you are 100% comfortable with the source. Desktop protection suite installed and updated. Downloading custom toolbars, screen savers, backgrounds, greeting cards, music, etc are very common ways to infect your computer. For secure transactions, look for a lock icon in the URL. Be cautious of URL s with unique or foreign domains. Such as.ru Russia,.cn China,.pl Poland,.ir Iran Be cautious of downloading Free or pirated software, movies, music, etc. Avoid Peer-to-Peer, Torrent, File Sharing sites/software. Local Government Information Technology (LGIT) Website: www.lgit.mt.gov Chair: Chris Sinrud sinrud@lccountymt.gov Vice-Chair: David Watterson wattersond@ci.billings.mt.us Vice Chair: Ross Cavazos rcavazos@co.yellowstone.mt.gov 6