Internet Security
Why is a strong password important? Identity theft motives: To gain access to resources For the challenge/fun Personal reasons Theft methods Brute forcing and other script hacking methods Phishing (imposter email, URLs, IMs etc.) Logging in to your local wireless network
Authentication methods Use pass phrases examples: Suns3tCe1ery Tra1n-F4ngs Password your local wireless network using your router Be skeptical of all emails, texts, IMs etc. Biometrics (fingerprint/retinal scanners) Text authentication Combine these methods!
Computer security Computer security is the foundation of a safe computing session. A secure computer system protects against many threats from the internet and in your neighborhood. Tight security on your system should be considered priority.
Spyware Spyware-software that enables the bad guys to obtain information about another's persons activities on the internet by transmitting data covertly from their hard drive. Spyware can be installed without your knowledge on your system by just clicking an ad or via piggyback.
Security and firewall programs The first defense for any computer system is a strong and efficient anti-virus software. Most anti-virus software contain many tools Malware and spyware detector and removal Local network protection Better Browsing security Firewall( Shield for computer) Pop-up blocker
Firewall A firewall is software that screens outside communications to your system Its used to block hackers and viruses from accessing your system from the outside. Firewall adds basic security to your system. Most computers have it pre-installed and most anti-virus software have a extra layer of protection
Accessible Security Hardware security are not always expensive. Some of the best software for Computer security is free. AVAST WWW.AVAST.COM All in-one security suite. This a well rounded tool for anyone security needs. Runs lighter then Norton and better in my opinion. Will detect and removal any threat.
Most Important!!!!! Always regularly keep your system updated. Window update pop-ups may be annoying but, it is essential for the life and security of your system. Do not hit remind me later or Don t remind me again These updates are from the manufacture to patch any holes and issues with your system and your anti-virus software. Do not ignore!!!!!
Lastly You can see if a virus Is running on your system by hitting ctrl-alt-delete together. A menu will pop up. Click processes. You can view background processes. Sometimes you can easily see a unknown process and turn it off your self.
Internet Security- Credit Cards Things to consider- When making purchases online, never buy from an unsecure site Never send your credit card number by email Never respond to emails asking you to follow a link within the email itself Never respond to calls asking about banking information unless you are expecting a call Don't buy from a company you know nothing about
Purchasing from a Secure site Make sure the site is secure by checking the beginning of the Link You should see htpps://, s meaning security You also should see a closed lock, indicating your transaction is secure DO NOT MAKE A PURCHASE IF YOU DO NOT SEE THESE!
Example of a Secure Website
Credit Cards and E-mails Never send your credit card number by email, e-mails aren t secure and can be read by anybody. Emails asking you to follow a link within the email itself are not secure. Banks and credit card companies will never ask for you to do that
Social Engineering by: Nick Bartole
Passwords Make sure your passwords aren t easy to guess Complex passwords with many letters and numbers work best Option on many social networks to add SMS security SMS sends a code to your phone so that only you can access your account
Pretexting Act of someone creating a false scenario to get important information or some action Happens from poor research/setup Example would be a fake credit card company wanting to know what your social security number is to get a fake credit card Prevented by doing research to make sure it is legitimate
Phishing Technique of fraudulently obtaining ones information Typically the phisher sends an email link from a legitimate company Usually from a credit card company or bank Requests verification information The link is a fraudulent website that looks legitimate
Phishing Security Spyware, anti-virus software, and a firewall are all tools you can use to prevent phishing Never open suspicious emails Never give out your personal information over an email link Verify the websites phone number and call the company
Pharming A cyber attack that is intended to direct a website s traffic to another fake site Illegitimate website may look the exact same as the real one Occurs when hackers locate vulnerabilities in DNS software Online banking and e-commerce sites are the most plagued
Pharming Cont. Pharming and Phishing threats can be used simultaneously to cause serious effects Identity theft is at most risk Anti-spyware, malware, and antivirus programs can help with stopping the problem Drive-by downloads are downloads that you didn t want that can have harmful effects
Physical Security Don t have your computer or laptop open and unprotected in a public place Make sure you have a password protected screensaver
Router Security
Router Security How to secure your network router. To start, while connected to your router, you will access your routers set up screen. To get to your router setup screen, you will type your routers IP address into your Internet browsers address bar. After typing it in, you will be prompted for a username and password. Eulas Boatwright
Router Setup If you have not changed it yet than it should be the default. The default username and password is usually admin or administrator for both or just for the username and no password. When putting a password or passphrase, you should use WPA as it is more secured than WEP. Now anyone that would want to use your Wi-Fi will need the password to access it. Eulas Boatwright
Router Setup You should also change the SSID(Service Set Identifier) name. Most routers have their own firewall and should be enabled if there is one. Enabling the firewall will add more security to it. Enabling the MAC filter is something else that you can do. It will only allow the devices that you entered on the filter list to access the internet. Eulas Boatwright
By: Brian Stovall Browser Security
Nonrepudiation Nonrepudiation lets you know that you are on the website that you think you are on. An example of a secure website will have a lock at the top or the bottom of the page or will have https:// instead of just the regular http://. www.amazon.com
How to know if your browser has been hacked? One of the most common symptoms of browser hijacking is discovering that your home page has been reset or changed. If you open up the internet on your computer and there is a picture of an animal for example, you have been hacked Popups are also a sign of your browser being hacked. Hackers blow up your screen with popups to try and get you to click on one of them so that they can get into your computer.
What can you do to prevent browser Use secure websites hackers? Secure websites will have a lock at the top or the bottom of the browser. some secure websites will have https://, the s is standing for secure. Don t click on pop up links. Make sure to keep your computer secured by running security scans and malware scans.