220 likes | 330 Views
PC Security. By Steven Bertke. Contents. Physical protection and Simple measures Passwords Firewalls Anti-Virus, Spyware and Malware Web browsers Email Patches Wireless Encryption Software. Physical Protection. Laptops: Multi-Purpose Hard-Shell Backpack Tracking software
E N D
PC Security By Steven Bertke
Contents • Physical protection and Simple measures • Passwords • Firewalls • Anti-Virus, Spyware and Malware • Web browsers • Email • Patches • Wireless • Encryption Software
Physical Protection • Laptops: • Multi-Purpose Hard-Shell Backpack • Tracking software • STOP Security plate • Desktops: • Lock your computer, i.e. ctrl+alt+del -> lock • Lock the door • Password protect everything • Password protected screensaver
Passwords • Things not to do: • Don’t choose a simple password like your pets name 123 • Don’t include your name or anyone in your families name • Don’t include your birthday • Don’t use common words • Don’t keep the same password for a long period of time • Don’t use the same password for every single thing that requires one.
Passwords • Over 7 characters • Upper/Lowercase + Digits e.g. AhJtKthr207 • Anny helped John take Kate to her recital • Add a date or number on the end e.g. 20th of the 7th • Make up words e.g. BloopShmear2000 or JuckNanYuck160 • Different language
Passwords • The SUPR tests • The Strong test: Is the password as strong (meaning length and content) as the rules allow? • The Unique test: Is the password unique and unrelated to any of your other passwords? • The Practical test: Can you remember it without having to write it down? • The Recent test: Have you changed it recently? • Keep them guessing!
Firewalls • What is a firewall? • Hardware = Router • Software = Windows XP ect • Differences • Up to you to decide!
Anti-Virus ect • What is a virus? • What is spyware? • What is malware?
Anti-Virus ect • Crucial for securing your PC! • Why?
Anti-Virus ect • Anti-Virus examples: • AVG • Norton • Kapersky • BitDefender • Avast!
Anti-Virus ect • Anti-Spyware examples: • Spybot Search and Destroy • SUPERAntiSpyware • Spy Sweeper • Ad-Aware Pro • Macafee Virus Scan and Anti Spyware • ..and many more. • Choose which ever you prefer • Update your AV(Anti-Virus) and Anti-Spyware!
Web Browsers • Major weakness in computers defences • Choose a safe and reliable browser • Stay away from Internet Explorer! • Mozilla Firefox • Firefox add-ons • No-Script • WOT(Web of Trust) • ... and many more! • Google “Firefox add-ons”
Email • Email Clients • Google Mail • Mozilla Thunderbird
Email • KRESV tests; • The Know test: Is the email from someone that you know? • The Received test: Have you received email from this sender before? • The Expect test: Were you expecting email with an attachment from this sender? • The Sense test: Does the email from the sender make sense. Does the subject line and attachment add up? • The Virus test: Does this email contain a virus? Scan the email for a virus
Patches • What is a patch? • Importance of fixing vulnerabilities • Update your OS • Web browsers • Anti-virus ect • Any internet dependant application • Do it regularly !
Wireless • Protect your wireless network • Drive by hackers • Change your networks name • Wi-Fi network encryption • WEP = NO! • WPA2 ect = YES!! • Hide your SSID
Wireless • Honeypots: • Probably to good to be true • If you must use them: • Don’t sign into your financial accounts! • Type as little private information as possible
Encryption Software • What is it? • Examples of software • Windows Bitlocker/Bitlocker to go • Truecrypt • How can it help? • Windows Bitlocker; Good for USB storage devices • Truecrypt; Good for hidden volumes
Encryption Software • Hidden volumes = hidden locked container • Create a file • Choose how big you want the “container” to be • Name the file • Give it a password • Put it where you want • Mount it with Truecrypt • Now becomes like an extra hard drive • Put stuff in it • Unmount it
Conclusion Keep it safe!