1 / 8

Home Computer Security Some things we know: Threats are real – viruses, worms, hackers System must be vulnerable – the

Home Computer Security Some things we know: Threats are real – viruses, worms, hackers System must be vulnerable – they all are (so are you) An exploit is required – e.g., open an attachment Your system must be targeted (often the best news) The path to your machine carries the exploit:

jennelle
Download Presentation

Home Computer Security Some things we know: Threats are real – viruses, worms, hackers System must be vulnerable – the

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Home Computer Security Some things we know: Threats are real – viruses, worms, hackers System must be vulnerable – they all are (so are you) An exploit is required – e.g., open an attachment Your system must be targeted (often the best news) The path to your machine carries the exploit: Media (CD, floppy, Zip disk, etc.) Dial-up Modem Cable Modem Digital Subscriber Line (DSL) Wireless (land-based or satellite) Home Computer Security

  2. Risks If you are on-line you are at risk; Action required on your part: Virus arrives by e-mail – open attachment Download freeware – embedded Trojan horse Visit a malicious web site – hostile java aplet No action required on your part: Worm arrives Targeted by a hacker attack Home Computer Security

  3. How it Happens Your machine is identified by an IP address – a unique string of numbers that are assigned by your ISP. New each time you log in if a dial-up connection Persistent (days, weeks) if you have an always-on connection Your machine associates each network application with a logical port Port 80 is http (web); these ports can send and receive. Hackers: Scan the Internet looking for live IP addresses. Scan for open ports and identify OS, version, & appl. If an exploit is available – try it! OOPS! Home Computer Security

  4. Safe Surfing Use anti-virus software ($50), update it often. Install and use a firewall: XP has one built in Zonealarm is free (www.zonelabs.com) Linksys hardware ($80) (Bestbuy, Circuit City) Practice safe e-mail and web surfing habits Get and install security patches (XP does auto notify) Create and use passwords wisely (don’t let s/w remember) Make them complex – not readily guessable Don’t store them unencrypted on your system Home Computer Security

  5. More Good Things To Do Backup your system Make an emergency disk (Microsoft) Backup Copy the files you can’t afford to lose: Partition existing drive Buy a 2nd hard drive Zip drive Backup to CDRW (e.g., Norton Ghost) Turn off features/services you don’t need like file and print sharing. (this can get complicated fast). Install an adware/spyware like Ad-Aware – it is free at www.lavasoft.com Home Computer Security

  6. Still More Good Things To Do Avoid inherently unsafe software and services. Freeware (embedded Trojans, especially in games) Peer-to-peer (KaZaa, Morpheus, Limewire, etc.) Instant messaging (MSN, AOL) IRC Chat Encrypt critical information on your system or don’t store it at all. (ssn, credit card numbers, passwords). Password safe is a great tool – www.counterpane.com, search on password safe – it is free (some freeware is good)! Home Computer Security

  7. Even More Good Things To Do For wireless home capability – implement WEP - even better, some newer devices offer stronger features (like fast key changes). Good idea to really read some of the license agreements – you may be agreeing to let the supplier download and install additional software. If on DSL or a cable modem – shut down your system or shut down the modem – cable modems have a disable button. Home Computer Security

  8. For More Information & Help General home security – www.cert.org/tech_tips/home_networks.html Cable Modem/DSL Security – cable-dsl.home.att.net/#security Steve Gibson’s free scanner – software you can invoke to scan your home system for vulnerabilities – www.grc.com - lots of tools and in some place tech-heavy Home Computer Security

More Related