1 / 27

CSC101 Computer Security

CSC101 Computer Security. Security Issues Spam Virus Spyware Phishing Identity Theft Cryptography Reviews and Downloads Dr. Peters Recommends Microsoft Antispyware Backup Working with CD-R s. Security Issues. Spam Viruses Spyware Phishing Identity Theft

ima-hurst
Download Presentation

CSC101 Computer Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CSC101 Computer Security Security Issues Spam Virus Spyware Phishing Identity Theft Cryptography Reviews and Downloads Dr. Peters Recommends Microsoft Antispyware Backup Working with CD-R s

  2. Security Issues • Spam • Viruses • Spyware • Phishing • Identity Theft Reference – Consumer Reports, September 2004

  3. Spam Deterrence • Do not respond to spam ads • Do not preview • Use several e-mail addresses – yahoo, hotmail, GMail • Use your Internet Service Providers filters. If you use mySCSU use SpamAssassin • If you post your e-mail address try to disguise the address. Example: • workman at southernct dot edu • Antispam software – Mailfrontier , Aladdin also check http://www.microsoft.com/athome/security/protect/windowsxp/Default.mspx

  4. Virus Deterrence • Do not open any unexpected e-mail attachments • Use updated antivirus software • Use a firewall if you have a broadband connection • Keep you operating system software updated • Backup data • Use passwords that contain numbers and special characters • Do not forward e-mail warning about a new virus. Check for hoaxes at http://www.vmyths.com • Download free McAfee Anti-Virus from mySCSU • Also checkout – Trend Micro - Norton

  5. Spyware Deterrence • Download Spyware only from trusted sources. • Close popup ads by closing the entire window • Read license agreements with regard to privacy • Keep browser security at medium or higher Tools>Internet Options>Security • Use updated antispyware software • Links – Lavasoft (free) – Spybot (free)

  6. Phishing • Phishing is a high-tech scam that uses spam or pop-up messages to deceive you into disclosing your credit card numbers, bank account information, Social Security number, passwords, or other sensitive information. From - How Not to Get Hooked by a ‘Phishing’ Scam • Links – • Antiphishing.org • Definition From the Webopedia

  7. Spam Examples – from Outlook Junk Mail • Canadian Dis-count Ph.arma.cy. 80% off US retail prices. All approved by government, safe, & n o questions. • You can r e finance your mortga g e with 4.15 % ra t e • Application is pre approved - Stina Ford [stinford@maarchert.nl] • I am Mr. Uyere Pascal. A Bank Manager of STANDARD TRUST BANK PLC, VICTORIA ISLAND BRANCH, LAGOS, R.O.N. I have urgent and very confidential business proposition for you.

  8. Identity Theft • Identity theft occurs when someone uses your personal information such as your name, Social Security number, credit card number or other identifying information, without your permission to commit fraud or other crimes. • Federal Trade Commission - Your National Resource for ID Theft • Identity Theft Resources

  9. Assignment • Check your home computer for: • Spyware • Virus • Report • Spyware and Virus Results • What are you doing to reduce spam and identity theft? • If you can install cryle encrypt a file and send an encrypted email Report your results • Check the latest comments about Microsoft’s antispyware. What are the pros and cons? • Save and add link on your CSC101 web • CD management – Format a CD – Backup your CSC101 homepage, other CSC101 work, and anything else that may be important

  10. Definitions • Spyware - What is spyware? - A Word Definition From the Webopedia Computer Dictionary • Virus - What is virus? - A Word Definition From the Webopedia Computer Dictionary

  11. Reviews • PC Magazine - Advanced Search – Spyware • PC Magazine - Advanced Search – Virus

  12. Software Downloads and Reviews • TuCows - http://www.tucows.com • Search Results for " "virus" “ • Search Results for " "spyware" “ • Search Results for " "backup" “ • Tucows Downloads - Download freeware and shareware software

  13. Recommended by Dr. Peters • Anti Spyware - SpyBotSD • Virus Test Files - eicar - European Institute for Computer Anti-Virus Research • Encryption – Cryle

  14. Microsoft – Protect Your PC

  15. Google - microsoft spyware sucks • 78,900 hits • Google Search: microsoft spyware sucks

  16. Microsoft Antispyware • What you can do about Spyware and other unwanted software • Video: Protecting your computer from spyware • Signs of spyware • How to get rid of spyware • Security Software: Downloads and Trials • Dr Peters recommends – SpyBotSD • Consumer Reports recommends - Lavasoft (free) – Spybot (free)

  17. Antispyware Downloads • Security Software: Downloads and Trials • Dr Peters recommends – SpyBotSD • Consumer Reports recommends - Lavasoft (free) – Spybot (free) • But remember – Dr Peters, Professor Workman or Southern are not responsible for the quality, performance, or reliability of third-party tools.

  18. Encrypting Data Cryle.exe Download and description

  19. Cryptainer Volume Details

  20. Cryptainer Volume Has Been Created

  21. DESCRIPTION OF THE ALGORITHM • Cryptainer LE Free Encryption Software - Technical Specifications • Blowfish Paper • DESCRIPTION OF THE ALGORITHM • Blowfish is a variable-length key, 64-bit block cipher. The algorithm consists of two parts: a key-expansion part and a data- encryption part. Key expansion converts a key of at most 448 bits into several subkey arrays totaling 4168 bytes. • Data encryption occurs via a 16-round Feistel network. Each round consists of a key-dependent permutation, and a key- and data-dependent substitution. All operations are XORs and additions on 32-bit words. The only additional operations are four indexed array data lookups per round.

  22. Backup Start>All Programs> Accessories > System Tools > Backup

  23. System Restore • A tool that tracks changes to your computer and creates a restore point when it detects the beginning of a change. You can use the System Restore Wizard to select a restore point to restore your computer to an earlier state when your computer was functioning the way you like.

  24. Repair Overview – Windows Help

  25. Recovering from a Hard-Drive Disaster • National Public Radio • Recovering from a Hard-Drive Disaster http://www.npr.org/templates/story/story.php?storyId=4841886 • Erasing Computer Evidence • http://www.npr.org/templates/story/story.php?storyId=4724741

  26. Working With CDs • Format the CD – Drag files to CD

  27. Microsoft - Don’t Get Burned in a Hotspot • Tips for Working Securely from Hotspots • Choose a Connection Option • Stay Secure When Using Your Mobile PC in Public Hotspots • Windows • Turn on Windows Firewall • Allow only preferred network connections

More Related