270 likes | 421 Views
CSC101 Computer Security. Security Issues Spam Virus Spyware Phishing Identity Theft Cryptography Reviews and Downloads Dr. Peters Recommends Microsoft Antispyware Backup Working with CD-R s. Security Issues. Spam Viruses Spyware Phishing Identity Theft
E N D
CSC101 Computer Security Security Issues Spam Virus Spyware Phishing Identity Theft Cryptography Reviews and Downloads Dr. Peters Recommends Microsoft Antispyware Backup Working with CD-R s
Security Issues • Spam • Viruses • Spyware • Phishing • Identity Theft Reference – Consumer Reports, September 2004
Spam Deterrence • Do not respond to spam ads • Do not preview • Use several e-mail addresses – yahoo, hotmail, GMail • Use your Internet Service Providers filters. If you use mySCSU use SpamAssassin • If you post your e-mail address try to disguise the address. Example: • workman at southernct dot edu • Antispam software – Mailfrontier , Aladdin also check http://www.microsoft.com/athome/security/protect/windowsxp/Default.mspx
Virus Deterrence • Do not open any unexpected e-mail attachments • Use updated antivirus software • Use a firewall if you have a broadband connection • Keep you operating system software updated • Backup data • Use passwords that contain numbers and special characters • Do not forward e-mail warning about a new virus. Check for hoaxes at http://www.vmyths.com • Download free McAfee Anti-Virus from mySCSU • Also checkout – Trend Micro - Norton
Spyware Deterrence • Download Spyware only from trusted sources. • Close popup ads by closing the entire window • Read license agreements with regard to privacy • Keep browser security at medium or higher Tools>Internet Options>Security • Use updated antispyware software • Links – Lavasoft (free) – Spybot (free)
Phishing • Phishing is a high-tech scam that uses spam or pop-up messages to deceive you into disclosing your credit card numbers, bank account information, Social Security number, passwords, or other sensitive information. From - How Not to Get Hooked by a ‘Phishing’ Scam • Links – • Antiphishing.org • Definition From the Webopedia
Spam Examples – from Outlook Junk Mail • Canadian Dis-count Ph.arma.cy. 80% off US retail prices. All approved by government, safe, & n o questions. • You can r e finance your mortga g e with 4.15 % ra t e • Application is pre approved - Stina Ford [stinford@maarchert.nl] • I am Mr. Uyere Pascal. A Bank Manager of STANDARD TRUST BANK PLC, VICTORIA ISLAND BRANCH, LAGOS, R.O.N. I have urgent and very confidential business proposition for you.
Identity Theft • Identity theft occurs when someone uses your personal information such as your name, Social Security number, credit card number or other identifying information, without your permission to commit fraud or other crimes. • Federal Trade Commission - Your National Resource for ID Theft • Identity Theft Resources
Assignment • Check your home computer for: • Spyware • Virus • Report • Spyware and Virus Results • What are you doing to reduce spam and identity theft? • If you can install cryle encrypt a file and send an encrypted email Report your results • Check the latest comments about Microsoft’s antispyware. What are the pros and cons? • Save and add link on your CSC101 web • CD management – Format a CD – Backup your CSC101 homepage, other CSC101 work, and anything else that may be important
Definitions • Spyware - What is spyware? - A Word Definition From the Webopedia Computer Dictionary • Virus - What is virus? - A Word Definition From the Webopedia Computer Dictionary
Reviews • PC Magazine - Advanced Search – Spyware • PC Magazine - Advanced Search – Virus
Software Downloads and Reviews • TuCows - http://www.tucows.com • Search Results for " "virus" “ • Search Results for " "spyware" “ • Search Results for " "backup" “ • Tucows Downloads - Download freeware and shareware software
Recommended by Dr. Peters • Anti Spyware - SpyBotSD • Virus Test Files - eicar - European Institute for Computer Anti-Virus Research • Encryption – Cryle
Google - microsoft spyware sucks • 78,900 hits • Google Search: microsoft spyware sucks
Microsoft Antispyware • What you can do about Spyware and other unwanted software • Video: Protecting your computer from spyware • Signs of spyware • How to get rid of spyware • Security Software: Downloads and Trials • Dr Peters recommends – SpyBotSD • Consumer Reports recommends - Lavasoft (free) – Spybot (free)
Antispyware Downloads • Security Software: Downloads and Trials • Dr Peters recommends – SpyBotSD • Consumer Reports recommends - Lavasoft (free) – Spybot (free) • But remember – Dr Peters, Professor Workman or Southern are not responsible for the quality, performance, or reliability of third-party tools.
Encrypting Data Cryle.exe Download and description
DESCRIPTION OF THE ALGORITHM • Cryptainer LE Free Encryption Software - Technical Specifications • Blowfish Paper • DESCRIPTION OF THE ALGORITHM • Blowfish is a variable-length key, 64-bit block cipher. The algorithm consists of two parts: a key-expansion part and a data- encryption part. Key expansion converts a key of at most 448 bits into several subkey arrays totaling 4168 bytes. • Data encryption occurs via a 16-round Feistel network. Each round consists of a key-dependent permutation, and a key- and data-dependent substitution. All operations are XORs and additions on 32-bit words. The only additional operations are four indexed array data lookups per round.
Backup Start>All Programs> Accessories > System Tools > Backup
System Restore • A tool that tracks changes to your computer and creates a restore point when it detects the beginning of a change. You can use the System Restore Wizard to select a restore point to restore your computer to an earlier state when your computer was functioning the way you like.
Recovering from a Hard-Drive Disaster • National Public Radio • Recovering from a Hard-Drive Disaster http://www.npr.org/templates/story/story.php?storyId=4841886 • Erasing Computer Evidence • http://www.npr.org/templates/story/story.php?storyId=4724741
Working With CDs • Format the CD – Drag files to CD
Microsoft - Don’t Get Burned in a Hotspot • Tips for Working Securely from Hotspots • Choose a Connection Option • Stay Secure When Using Your Mobile PC in Public Hotspots • Windows • Turn on Windows Firewall • Allow only preferred network connections