740 likes | 968 Views
Computer Security. CPEs for CPAs Program Georgia Perimeter College December 9, 2005. Today’s Topics. The Need for Computer Security Setting Up a Secure Computer System Using Your Computer Securely Special Concerns for Wireless Networks. Today’s Topics. Focus on Quality and effectiveness
E N D
Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005
Today’s Topics • The Need for Computer Security • Setting Up a Secure Computer System • Using Your Computer Securely • Special Concerns for Wireless Networks
Today’s Topics • Focus on • Quality and effectiveness • Free or low-cost solutions • Ease of use
The Need for Computer Security • Computers face a wide variety of threats • Intrusions • Privacy invasions • Hijackings • Data corruption • Viruses • And more
The Need for Computer Security (cont.) • Threats come from many sources • Physical access • Network access • Use of removable media • Use of common programs • http://media.trendmicro.com/product/general/malware.html
How to Keep a System Perfectly Secure • Don’t connect it to any type of network • Don’t use email • Don’t have Internet access • Don’t shop online • Don’t bank online • Don’t share files with other users
How to Keep a System Perfectly Secure (cont.) • Don’t use any removable media • Floppy disks • CDs/DVDs • Flash Drives/USB devices • Exception: New, unused CDs for backup of data
How to Keep a System Perfectly Secure (cont.) • Don’t let anyone but yourself ever use the computer • Permanently secure it to the building structure
Okay, this may not be feasible! So what do we do?
Setting Up a Secure System • Three Critical Steps • Access Control / Password Protection • Hardware Solutions • Software Solutions
Access Control • Simple solution to some problems • No cost involved • Only handles some problems
Password Protection • Set up login password on ALL computers • Handled in operating system • Do not allow a “guest” account on computers • With Windows, accounts can be bypassed • Never allow automatic login
Password Protection (cont.) • Extra protection desirable for laptops • Set up BIOS password • Power on • Hit designated key when prompt appears (must do quickly) • Locate password option on BIOS screen • Caution: if you forget this password, NO ONE can get into your computer
Hardware Solutions • Acts as “first line of defense” by controlling network access • Only protects from external threats • Does not protect against invasion from within network itself • Does not protect against threats hidden inside legitimate data
Hardware Firewall • Monitors network data transfers • LANs • Internet • Blocks unauthorized traffic while allowing legitimate traffic • May also perform additional security functions
Hardware Firewall (cont.) • Any computer connected to Internet needs a firewall • Broadband connections are more vulnerable • Even dial-up users can be attacked from outside
Hardware Firewall (cont.) • Makes your computer “invisible” from outside the local network • Often found as part of network routing device • Invaders “see” the router, not computers behind it
Hardware Firewall (cont.) • Install between computers and modem in a local network Internet Connection Modem Router Computer Computer Computer
Hardware Firewall (cont.) • Setup and configuration depends on specific device • Follow directions given by manufacturer
Hardware Firewall (cont.) • Solution for the truly paranoid, or the truly geeky • Bare-bones machine running Linux instead of Windows, combined with switch to connect machines
Hardware Firewall (cont.) • Most hacking attacks target Windows features • Using Linux machine instead of router prevents these attacks • For information and instructions: • Router Design Project, http://www.routerdesign.com • Coyote Linux Project, http://www.coyotelinux.com
Software Solutions • Software firewalls • Anti-virus software • Anti-malware software • Alternatives to common programs • Fixes for common programs
Software Firewalls • Not a replacement for hardware firewalls • Protect individual computers within a network • Hardware firewall protects entire network • Protect portable machines which may not always use a hardware firewall
Software Firewalls (cont.) • Analyze incoming data from network • Block undesirable data • Better programs block undesirable outgoing data as well
Software Firewalls (cont.) • Windows XP Internet Connection Firewall (ICF) • Monitors/blocks incoming traffic only • Will NOT block hijack attempts • Better than nothing but not an optimal solution
Software Firewalls (cont.) • ZoneAlarm – top choice • Monitors traffic in both directions • Helps prevent hijacking of your computer • Basic free version is adequate for most users
Software Firewalls (cont.) • Download from http://www.zonealarm.com/ • Install via wizard • Configuration • Done through normal computer usage • Does take time
Anti-Virus/Anti-Spyware Software • Viruses and spyware are two different problems • Both technologies can cause problems • Require two different solutions
Anti-Virus Software • Virus -- n : a software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer; "a true virus cannot spread to another computer without human assistance" -- dictionary.com
Anti-Virus Software (cont.) • AVG AntiVirus • Free for personal use • May not provide quality of protection of a commercial program
Anti-Virus Software (cont.) • Trend MicroSystems PC-Cillin • Top-rated choice • Very effective • Norton Anti-Virus • Not my favorite – I’ve had problems • McAfee Anti-Virus
Anti-Virus Software (cont.) • Wizards handle installation seamlessly • Configure automatic email/file attachment scans • Need to upgrade virus signature subscription yearly if you don’t upgrade program
Anti-Malware Software • Malware is catchall term for spyware and adware-type programs • Adware • Software that, without your consent, tracks and reports your web usage to another entity without reporting personally identifying information
Anti-Malware Software (cont.) • Spyware • Software whose purpose is to collect personally identifying demographic and usage information from your computer, usually for advertising purposes • Software that 'sneaks' onto the system or performs other activities hidden to the user.--http://cexx.org
Anti-Malware Software • No one program today catches all spyware – multiple programs needed • SpyBot Search and Destroy • http://www.safer-networking.org • AdAware • http://www.lavasoft.com • Trend MicroSystems Anti-Spyware • Web-based scan • http://www.trendmicro.com
Software Alternatives • Microsoft products are favorite targets of crackers • Widespread use (80%+ of PCs use these) • Easily exploitable security holes • Particularly vulnerable • Internet Explorer – web browser • Outlook – email client
Software Alternatives (cont.) • Web Browsers • Mozilla Firefox • Opera • Email Clients • Mozilla Thunderbird • Eudora • Office Software • OpenOffice
Alternatives to Internet Explorer • Mozilla Firefox • Tutorial: http://opensourcearticles.com/articles/firefox_15/english/part_01 • Opera
Alternatives to Outlook • Email is most vulnerable feature of Outlook • Most alternatives only deal with email • Scheduling, memo, other features not provided
Eudora • Download from http://www.eudora.com • Available in free, ad-supported, or paid versions • Supports multiple email accounts, folders, junk email filtering
Mozilla Thunderbird • Imports existing email and contact information • Similar look & feel to Outlook • Handles multiple email accounts • Provides adaptive junk email filtering • Automatically blocks scripts • Deters spread of viruses
Mozilla Thunderbird (cont.) • Download from http://www.mozilla.com/ • Excellent tutorial: http://opensourcearticles.com/articles/thunderbird_15/english/part_01
Mozilla Thunderbird (cont.) • Installation • Wizard handles all work • Configuration • Set up account(s) • Import existing email/contact info • Set up spam filtering
Office Software • Open Office • Alternative to Microsoft Office • Mostly, but not fully, compatible • Available from http://www.openoffice.org/
Other Software • Windows Media Player • Potential for privacy invasion through “supercookie” • Disable with following step: • Tools->Options->Player • Uncheck box beside “Allow Internet sites to uniquely identify your Player.”
Other Software (cont.) • Windows Messenger • Allows pop-ups without an active browser • Not to be confused with MSN Messenger! • To stop, disable the service • Start->Run, type services.msc & click OK • Double-click the Messenger entry • Choose Stop • Choose Disabled from the StartUpType list
Using Your Computer Securely • Monitor your computer’s behavior • Schedule maintenance tasks • Use hard-to-break passwords • Protect your data files • Take precautions with Internet data • Be extra careful with wireless networks
Monitor Your Computer • Watch for unusual activity • Signs of problems: • Excessive hard disk access • Slow operation • Pop-up windows
Schedule Maintenance Tasks • Running tasks automatically ensures they are actually run! • Many programs let you schedule them from the program itself • Other programs can be scheduled from Control Panel • Start->Settings->Control Panel-> Scheduled Tasks