880 likes | 1.03k Views
Internet Security and Your Computer. Welcome to Boot Camp. OR How to surf the web safely. Without becoming paranoid. Subjects We’ll cover. viruses, worms, trojan horses, spyware virus scanners, firewalls, spyware blockers E-mail protection, browser protection
E N D
Internet Security and Your Computer Welcome to Boot Camp
OR How to surf the web safely Without becoming paranoid
Subjects We’ll cover • viruses, worms, trojan horses, spyware • virus scanners, firewalls, spyware blockers • E-mail protection, browser protection • home network security, wireless security • keeping kids safe in “chat rooms”
Welcome to Internet Boot Camp Listen up recruits Internet security basic training is about to start!
Your computer is like your house Are you connected to the Internet without using a virus scanner a firewall and a spy-ware blocker? You might as well leave your front door open 24/7
Virus scanner Police officer Your computer is like your house
Virus scanner Firewall Police officer Door guard Your computer is like your house
Virus scanner Firewall Spy-ware blocker Police officer Door guard Security guard Your computer is like your house
Virus scanner Firewall Spy-ware blocker Browser settings Police officer Door guard Security guard Another guard Your computer is like your house
Virus scanner Firewall Spy-ware blocker Browser settings Virus/Worm/Trojan Police officer Door guard Security guard Another guard Criminals Your computer is like your house
Virus scanner Firewall Spy-ware blocker Browser settings Virus/Worm/Trojan Spy-ware Police officer Door guard Security guard Another guard Criminals Thief Your computer is like your house
Virus scanner Firewall Spy-ware blocker Browser settings Virus/Worm/Trojan Spy-ware Spam Police officer Door guard Security guard Another guard Criminals Thief Junk mail Your computer is like your house
Meet The Enemy • virus
Meet The Enemy • virus • worm
Meet The Enemy • virus • worm • trojan horse
Meet The Enemy • virus • worm • trojan horse • spam
Meet The Enemy • virus • worm • trojan horse • spam • spy-ware
Meet the Allies • Virus scanning software
Meet the Allies • Virus scanning software • Firewall hardware/software
Meet the Allies • Virus scanning software • Firewall hardware/software • E-mail scanning software virus/spam
Meet the Allies • Virus scanning software • Firewall hardware/software • E-mail scanning software virus/spam • Spy-ware blocking software
Meet the Allies • Virus scanning software • Firewall hardware/software • E-mail scanning software virus/spam • Spy-ware blocking software • Pop-up blocking software
Meet the Allies • Virus scanning software • Firewall hardware/software • E-mail scanning software virus/spam • Spy-ware blocking software • Pop-up blocking software • Operating system updates
Meet the Allies • Virus scanning software • Firewall hardware/software • E-mail scanning software virus/spam • Spy-ware blocking software • Pop-up blocking software • Operating system updates • Browser security settings
E-Mail friend or foe? Don’t let the enemy use your E-mail to launch their attacks
Securing E-mail • Use an E-mail virus scanner
Securing E-mail • Use an E-mail virus scanner • Block images in HTML messages
Securing E-mail • Use an E-mail virus scanner • Block images in HTML messages • View messages in plain text / block HTML
Securing E-mail • Use an E-mail virus scanner • Block images in HTML messages • View messages in plain text / block HTML • Use spam blocking software or ISP blocking
Securing E-mail • Use an E-mail virus scanner • Block images in HTML messages • View messages in plain text / block HTML • Use spam blocking software or ISP blocking • Set up spoof E-mail account(s)
Securing E-mail • Use an E-mail virus scanner • Block images in HTML messages • View messages in plain text / block HTML • Use spam blocking software or ISP blocking • Set up spoof E-mail account(s) • Update E-mail software regularly
Securing E-mail • Never open attachments from “?” sender
Securing E-mail • Never open attachments from “?” sender • Never “unsubscribe” from spam
Securing E-mail • Never open attachments from “?” sender • Never “unsubscribe” from spam • Never click on links in spam / junk mail
Securing E-mail • Never open attachments from “?” sender • Never “unsubscribe” from spam • Never click on links in spam / junk mail • Never give information reply to “?” mail
Securing E-mail • Never open attachments from “?” sender • Never “unsubscribe” from spam • Never click on links in spam / junk mail • Never give information reply to “?” mail • Never give real E-mail address to websites
Securing E-mail • Never open attachments from “?” sender • Never “unsubscribe” from spam • Never click on links in spam / junk mail • Never give information reply to “?” mail • Never give real E-mail address to websites • Beware of “phishing”
Eliminating Spy-ware The enemy has spies everywhere “All spies will be shot on sight”
Eliminating Spy-ware • Download and install AD-AWARE
Eliminating Spy-ware • Download and install AD-AWARE • Download and install Spybot Search & Destroy
Eliminating Spy-ware • Download and install AD-AWARE • Download and install Spybot Search & Destroy • Always use a firewall that monitors incoming and outgoing internet traffic