computer & internet security
DESCRIPTION
Some Terminology Computer Security Type of threats Security measures Internet SecurityTRANSCRIPT
![Page 1: Computer & internet Security](https://reader033.vdocuments.mx/reader033/viewer/2022061209/548e2df4b47959975e8b45f0/html5/thumbnails/1.jpg)
COMPUTER & INTERNETSECURITY
A LOOK INTO COMMON PRACTICES OF:
• SECURING YOUR PERSONAL COMPUTER FROM KNOWN THREATS
• SAFELY NAVIGATING AND USING THE INTERNET
• SECURING YOUR ONLINE ACCOUNTS
![Page 2: Computer & internet Security](https://reader033.vdocuments.mx/reader033/viewer/2022061209/548e2df4b47959975e8b45f0/html5/thumbnails/2.jpg)
OVERVIEWWHAT WE WILL COVER
1. Some Terminology
2. Computer Securityi. Type of threats
ii. Security measures
3. Break
4. Internet Securityi. Browser security
ii. Web browsing
iii. Online accountsSPEAKER: GERARD LAMUSSE
![Page 3: Computer & internet Security](https://reader033.vdocuments.mx/reader033/viewer/2022061209/548e2df4b47959975e8b45f0/html5/thumbnails/3.jpg)
!OVERVIEWWHAT WE WON’T COVER
• Enterprise security
• Server security
• Active cyber security
• Kitchen security
SPEAKER: GERARD LAMUSSE
![Page 4: Computer & internet Security](https://reader033.vdocuments.mx/reader033/viewer/2022061209/548e2df4b47959975e8b45f0/html5/thumbnails/4.jpg)
SPEAKER: GERARD LAMUSSE
SOME TERMINOLOGY
• Computer security
• Security types
• Hacker vs. Cracker
• Script kiddie
• Virus
• Worm
• Key logging
• Malware
• Trojan
• Spyware/adware
• Phishing
• Quarantine
![Page 5: Computer & internet Security](https://reader033.vdocuments.mx/reader033/viewer/2022061209/548e2df4b47959975e8b45f0/html5/thumbnails/5.jpg)
TERMINOLOGYCONTINUED
COMPUTER SECURITY
• Computer Security means protecting our computer system and the information they contain against unwanted access, damage, destruction or modification
SECURITY TYPES
• Hardware security
• Software security
• Anti-virus
• Firewall
• Network security
SPEAKER: GERARD LAMUSSE
![Page 6: Computer & internet Security](https://reader033.vdocuments.mx/reader033/viewer/2022061209/548e2df4b47959975e8b45f0/html5/thumbnails/6.jpg)
TERMINOLOGYCONTINUED
HACKER
• A person who accesses a computer or network illegally.
• Various types
• Black
• Grey
• White
CRACKER
• A person who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious action.
SPEAKER: GERARD LAMUSSE
![Page 7: Computer & internet Security](https://reader033.vdocuments.mx/reader033/viewer/2022061209/548e2df4b47959975e8b45f0/html5/thumbnails/7.jpg)
TERMINOLOGYCONTINUED
SCRIPT KIDDIE
• Often are teenagers that use prewritten hacking and cracking programs to break into computers
• Same intent as a cracker
VIRUS
• Can replicate itself and spread from one computer to another.
• Does damage by altering programs or the operating system itself.
SPEAKER: GERARD LAMUSSE
![Page 8: Computer & internet Security](https://reader033.vdocuments.mx/reader033/viewer/2022061209/548e2df4b47959975e8b45f0/html5/thumbnails/8.jpg)
TERMINOLOGYCONTINUED
WORM
• Spreads itself over a network and other means.
• Replicates on host invisibly
• Aim: To use up available memory and system resources.
KEY LOGGING
• The action of recording keys struck on a keyboard.
• User unaware of this types password and account details
• Information sent via malware.
SPEAKER: GERARD LAMUSSE
![Page 9: Computer & internet Security](https://reader033.vdocuments.mx/reader033/viewer/2022061209/548e2df4b47959975e8b45f0/html5/thumbnails/9.jpg)
TERMINOLOGYCONTINUED
MALWARE
• Malicious software
• Gather sensitive information
• Gain access to private computer systems.
TROJAN
• Form of malware
• A program claiming to rid your computer of viruses but instead introduces viruses, to your computer
SPEAKER: GERARD LAMUSSE
![Page 10: Computer & internet Security](https://reader033.vdocuments.mx/reader033/viewer/2022061209/548e2df4b47959975e8b45f0/html5/thumbnails/10.jpg)
TERMINOLOGYCONTINUED
SPYWARE
• Similar to Trojan horse.
• Co-exists with other software
• Records actions performed by user and relaying this information to its author
ADWARE
• Legitmate alternative offered to consumers who do not wish to pay for software
• Displays adverts within program
• Tracks browsing habits to serve related advertisements
• Has a bad reputation as a result of spyware.SPEAKER: GERARD LAMUSSE
![Page 11: Computer & internet Security](https://reader033.vdocuments.mx/reader033/viewer/2022061209/548e2df4b47959975e8b45f0/html5/thumbnails/11.jpg)
TERMINOLOGYCONTINUED
PHISHING
• The fraudulent practice of sending e-mails purporting to be from legitimate companies in order to induce individuals to reveal personal information.
QUARANTINE
• To move an undesired file such as a virus-infected file or spyware to an encrypted folder.
SPEAKER: GERARD LAMUSSE
![Page 12: Computer & internet Security](https://reader033.vdocuments.mx/reader033/viewer/2022061209/548e2df4b47959975e8b45f0/html5/thumbnails/12.jpg)
SPEAKER: GERARD LAMUSSE
COMPUTER SECURITY
i. Type of threats
ii. Security measures
![Page 13: Computer & internet Security](https://reader033.vdocuments.mx/reader033/viewer/2022061209/548e2df4b47959975e8b45f0/html5/thumbnails/13.jpg)
COMPUTER SECURITYTYPES OF THREATS
SPEAKER: GERARD LAMUSSE
Malicious Code
Natural Threats
Humans
![Page 14: Computer & internet Security](https://reader033.vdocuments.mx/reader033/viewer/2022061209/548e2df4b47959975e8b45f0/html5/thumbnails/14.jpg)
COMPUTER SECURITYSECURITY MEASURES
SPEAKER: GERARD LAMUSSE
4 Main types of security measure
1. Data Backup
2. Antivirus
3. Anti-spyware
4. Firewall
MALICIOUS CODE
1. Rip data to DVDs• Cheap, but takes time.
2. External secondary storage• Cheaper per Gigabyte
• 2x 500Gb from R7003. Upload and store to Cloud Storage
• Always available, monthly/yearly costs• www.drive.google.com• www.justcload.com• www.mypcbackup.com
![Page 15: Computer & internet Security](https://reader033.vdocuments.mx/reader033/viewer/2022061209/548e2df4b47959975e8b45f0/html5/thumbnails/15.jpg)
COMPUTER SECURITYSECURITY MEASURES
SPEAKER: GERARD LAMUSSE
4 Main types of security measure
1. Data Backup
2. Antivirus
3. Anti-spyware
4. Firewall
MALICIOUS CODE
A utility program that we use to protect a computer against viruses by identifying and removing
computer viruses found in the computer memory, computer storage and on incoming e-mail files.
Microsoft Security EssentialsFor windows 7 & earlier or
Windows DefenderFor Windows 8
AVAST FREE for mac
![Page 16: Computer & internet Security](https://reader033.vdocuments.mx/reader033/viewer/2022061209/548e2df4b47959975e8b45f0/html5/thumbnails/16.jpg)
COMPUTER SECURITYSECURITY MEASURES
SPEAKER: GERARD LAMUSSE
4 Main types of security measure
1. Data Backup
2. Antivirus
3. Anti-spyware
4. Firewall
MALICIOUS CODE
WHY?Not all anti-virus will prevent installation of spyware!
Much more common today than viruses.
Recommended
Malwarebytes Anti-Malware
![Page 17: Computer & internet Security](https://reader033.vdocuments.mx/reader033/viewer/2022061209/548e2df4b47959975e8b45f0/html5/thumbnails/17.jpg)
COMPUTER SECURITYSECURITY MEASURES
SPEAKER: GERARD LAMUSSE
4 Main types of security measure
1. Data Backup
2. Antivirus
3. Anti-spyware
4. Firewall
MALICIOUS CODE
Two types, hardware and software firewalls.Your router functions as a hardware firewall, while
Windows includes a software firewall.
How it works?
![Page 18: Computer & internet Security](https://reader033.vdocuments.mx/reader033/viewer/2022061209/548e2df4b47959975e8b45f0/html5/thumbnails/18.jpg)
COMPUTER SECURITYSECURITY MEASURES
SPEAKER: GERARD LAMUSSE
Problems and solutions:
1. Children
2. Thieves
HUMANS
Applies to teens as well.Problems they pose:
• Accidental data deletion• Corrupt system files
• Installation of spyware or viruses• Accidental natural disaster
Preventing or Safe guarding against children threats:• Backup data
• Save your data before…• Set up limited user accounts
• Set up parental controls
RECOMMENDATION:K9 Web Protection
![Page 19: Computer & internet Security](https://reader033.vdocuments.mx/reader033/viewer/2022061209/548e2df4b47959975e8b45f0/html5/thumbnails/19.jpg)
SPEAKER: GERARD LAMUSSE
SECURING AND SETTING UP USER ACCOUNTS
Figure 1.Windows 7 Control Panel
![Page 20: Computer & internet Security](https://reader033.vdocuments.mx/reader033/viewer/2022061209/548e2df4b47959975e8b45f0/html5/thumbnails/20.jpg)
SPEAKER: GERARD LAMUSSE
SECURING AND SETTING UP USER ACCOUNTS
Figure 2.Manage Accounts screen
in Windows 7
![Page 21: Computer & internet Security](https://reader033.vdocuments.mx/reader033/viewer/2022061209/548e2df4b47959975e8b45f0/html5/thumbnails/21.jpg)
SPEAKER: GERARD LAMUSSE
SECURING AND SETTING UP USER ACCOUNTS
Figure 3.Create New Account screen
![Page 22: Computer & internet Security](https://reader033.vdocuments.mx/reader033/viewer/2022061209/548e2df4b47959975e8b45f0/html5/thumbnails/22.jpg)
SPEAKER: GERARD LAMUSSE
SECURING AND SETTING UP USER ACCOUNTS
Figure 4.New user has been created
![Page 23: Computer & internet Security](https://reader033.vdocuments.mx/reader033/viewer/2022061209/548e2df4b47959975e8b45f0/html5/thumbnails/23.jpg)
COMPUTER SECURITYSECURITY MEASURES
SPEAKER: GERARD LAMUSSE
Problems and solutions:
1. Children
2. Thieves
HUMANS
Applies to teens as well.Problems they pose:
• Accidental data deletion• Corrupt system files
• Installation of spyware or viruses• Accidental natural disaster
Preventing or Safe guarding against children threats:• Backup data
• Set up limited user accounts• Set up parental controls
RECOMMENDATION:K9 Web Protection
![Page 24: Computer & internet Security](https://reader033.vdocuments.mx/reader033/viewer/2022061209/548e2df4b47959975e8b45f0/html5/thumbnails/24.jpg)
COMPUTER SECURITYSECURITY MEASURES
SPEAKER: GERARD LAMUSSE
Problems and solutions:
1. Children
2. Thieves
HUMANS
Threat:• Loss of data
• Stolen computer and other valuables• Damage to property
Solutions???• If they want to get in they will find a way
• Backup your data!!!• Lockup and password secure your accounts.
RECOMMENDATION:K9 Home Protection
![Page 25: Computer & internet Security](https://reader033.vdocuments.mx/reader033/viewer/2022061209/548e2df4b47959975e8b45f0/html5/thumbnails/25.jpg)
COMPUTER & INTERNETSECURITY
15min
![Page 26: Computer & internet Security](https://reader033.vdocuments.mx/reader033/viewer/2022061209/548e2df4b47959975e8b45f0/html5/thumbnails/26.jpg)
SPEAKER: GERARD LAMUSSE
INTERNET SECURITY
i. Browser security
ii. Web browsing
iii. Online accounts
![Page 27: Computer & internet Security](https://reader033.vdocuments.mx/reader033/viewer/2022061209/548e2df4b47959975e8b45f0/html5/thumbnails/27.jpg)
SPEAKER: GERARD LAMUSSE
INTERNET SECURITYFIRST: PASSWORDS
i. What defines a strong password
ii. What is NOT a good password
![Page 28: Computer & internet Security](https://reader033.vdocuments.mx/reader033/viewer/2022061209/548e2df4b47959975e8b45f0/html5/thumbnails/28.jpg)
INTERNET SECURITYGOOD PASSWORDS
SPEAKER: GERARD LAMUSSE
What makes a password a strong password
i. Is at least eight characters long.
ii. Does not contain your user name, real name, or company name.
iii. Does not contain a complete word.
iv. Is significantly different from previous passwords.
v. Contains characters from each of the following four categories:
![Page 29: Computer & internet Security](https://reader033.vdocuments.mx/reader033/viewer/2022061209/548e2df4b47959975e8b45f0/html5/thumbnails/29.jpg)
INTERNET SECURITYGOOD PASSWORDS
SPEAKER: GERARD LAMUSSE
Character category Examples
Uppercase letters A, B, C
Lowercase letters a, b, c
Numbers 0, 1, 2, 3, 4, 5, 6, 7, 8, 9
Symbols found on the keyboard and spaces
` ~ ! @ # $ % ^ & * ( ) _ - + = { } [ ] \ | : ; " ' < > , . ? /
![Page 30: Computer & internet Security](https://reader033.vdocuments.mx/reader033/viewer/2022061209/548e2df4b47959975e8b45f0/html5/thumbnails/30.jpg)
INTERNET SECURITYBAD PASSWORDS
SPEAKER: GERARD LAMUSSE
What makes a password a bad password
i. Dictionary words.
ii. Names, surnames, contact details, registration numbers
iii. Not long enough
iv. Simply contains simple ‘!’ ‘1’ ‘?’ ‘01’ at the end
![Page 31: Computer & internet Security](https://reader033.vdocuments.mx/reader033/viewer/2022061209/548e2df4b47959975e8b45f0/html5/thumbnails/31.jpg)
INTERNET SECURITYPASSWORD OVERVIEW
SPEAKER: GERARD LAMUSSE
• Create an acronym from an easy-to-remember piece of information. For example, pick a phrase that is meaningful to you, such as My son's birthday is 12 December, 2004. Using that phrase as your guide, you might use Msbi12/Dec,4 for your password.
![Page 32: Computer & internet Security](https://reader033.vdocuments.mx/reader033/viewer/2022061209/548e2df4b47959975e8b45f0/html5/thumbnails/32.jpg)
INTERNET SECURITYPASSWORD OVERVIEW
SPEAKER: GERARD LAMUSSE
• Substitute numbers, symbols, and misspellings for letters or words in an easy-to-remember phrase. For example, My son's birthday is 12 December, 2004 could become Mi$un's Brthd8iz 12124 (it's OK to use spaces in your password).
• Relate your password to a favourite hobby or sport. For example, ‘I love to play badminton’ could become ILuv2PlayB@dm1nt()n.
![Page 33: Computer & internet Security](https://reader033.vdocuments.mx/reader033/viewer/2022061209/548e2df4b47959975e8b45f0/html5/thumbnails/33.jpg)
INTERNET SECURITYPASSWORD OVERVIEW
SPEAKER: GERARD LAMUSSE
Highly Recommended
• Use secure, unique passwords for every Internet site or service is one of the best security practices out there.
• Use a single master password for storage of all passwords, then never user it again!
• LastPass
• How secure is your password? Try
![Page 34: Computer & internet Security](https://reader033.vdocuments.mx/reader033/viewer/2022061209/548e2df4b47959975e8b45f0/html5/thumbnails/34.jpg)
SPEAKER: GERARD LAMUSSE
INTERNET SECURITY
i. Browser security
ii. Web browsing
iii. Online accounts
![Page 35: Computer & internet Security](https://reader033.vdocuments.mx/reader033/viewer/2022061209/548e2df4b47959975e8b45f0/html5/thumbnails/35.jpg)
THE ENDTHANKS
SPEAKER: GERARD LAMUSSE