280 likes | 483 Views
Computer Security @ Home. Texas Christian University Technology Resources. Overview. Critical Patches Anti-Virus Software Anti-Spyware Software Internet Firewall Email Security Backup Your Computer Use Strong Passwords Wireless Security Etcetera. Critical Patches.
E N D
Computer Security @ Home Texas Christian University Technology Resources
Overview • Critical Patches • Anti-Virus Software • Anti-Spyware Software • Internet Firewall • Email Security • Backup Your Computer • Use Strong Passwords • Wireless Security • Etcetera TCU Information Security Services
Critical Patches • It is critical to keep your software up-to-date • Operating system • Anti-virus and anti-spyware • Applications including browsers, Adobe Acrobat, Java, Flash • Newest versions contain fixes for discovered vulnerabilities • Enable automatic update features in OS and application software • Windows – Control Panel • Mac OSX – System Preferences TCU Information Security Services
Anti-virus Software • Anti-virus software is “used to identify and remove computer viruses, as well as many other types of harmful computer software, collectively referred to as malware” Wikipedia • Anti-virus software offers ongoing protection, daily scans, daily updates. • To be effective virus definitions must be updated routinely. • Norton, Trend Micro, McAfee, AVG, Sophos, Eeye, also included in internet security packages. TCU Information Security Services
Anti-Spyware Software • Protects your computer from malicious spyware. • Spyware may monitor your online activities and collect personal information while you surf the web. • Periodically scans your computer for spyware. • Must also be kept up-to-date • Ad-Adware, Spybot, also included in internet security packages TCU Information Security Services
Internet Firewall • Anti-virus and anti-spyware products inspect files on your computer, in incoming and outgoing email, and on removable media. • Firewall software and/or hardware monitors the communications between your computer and the outside world (the Internet). • Firewalls prevent unauthorized access to or from a private “network” (i.e., your home computer). TCU Information Security Services
Internet Firewall (continued) • You can implement a firewall in either hardware or software form, or a combination of both. • Hardware Firewall • Router (wired or wireless), i.e., Linksys • DSL Modem, Gateway • Software Firewall • Built-in Windows Firewall • Only stops inbound traffic, does not check outbound • Mac OSX 10.2 and later also has an built-in firewall • Part of an internet security package TCU Information Security Services
Internet Security Packages • Some commercial internet security packages include anti-virus, anti-software and firewall software. • Norton, Trend Micro, McAfee, Sophos, EEye, ESET, AVG TCU Information Security Services
Email Security • Phishing • Spam • Attachments TCU Information Security Services
Phishing • Phishing is an illegal activity that uses social engineering techniques to manipulate people into giving out personal information. • A highly targeted version of a phishing scam is “spear phishing.” TCU Information Security Services
Phishing (continued) • Characteristics of phishing emails • Unsolicited request for personal information • Username, userid, email id, email identity • Password • Social security number • Birthdate • Generic greetings • Contains an ultimatum • Grammatical errors • Content appears genuine TCU Information Security Services
Phishing techniques • Link manipulation • Technical deception designed to make a link in an email and the spoofed website it leads to, appear to belong to the spoofed organization. • Spoofed website • Looks almost exactly like the real thing • Website forgery • A spoofed website that uses JavaScript to alter the address bar to appear legitimate. • Filter evasion • Misspelled words and images instead of text are used to evade anti-phishing filters. TCU Information Security Services
A Recent TCU Phishing Email Link manipulation
Fake Website • http://www.1025.ru/js/mail.tcu.edu No https Look between first double // and first single / - that’s NOT TCU
Real Website • https://mobile.tcu.edu/owa/auth/logon.aspx Secure That is TCU
Avoid being Phished! • Watch out for links in emails. • Do not click on them • Type the link directly into web browser • Learn to spot non-legitimate web sites • Look at the address between the // and the first / - it should end with the company you expect • Fake: http://www.1025.ru/js/mail.tcu.edu • Real: https://mobile.tcu.edu/owa/auth/logon.aspx… • Is it secure? • https in the address • Yellow lock icon
Avoid being Phished (continued) • Greet email or phone calls seeking personal information with skepticism. • If you think it may be legitimate, call customer service number provided when account was opened. • Be leery of alarming statements that urge you to respond immediately. • Do NOT reply to phishing emails. • OnGuard Online Phishy Home Video • http://www.onguardonline.gov/videos/phishy-home.aspx TCU Information Security Services
Avoid being Phished (continued) • TCU Technology Resources, including the computer help desk and information security services will NEVER ask you for your password via email, the phone or in person. • When TCU upgrades its computer or email systems we will NEVER send a link inside an email which will go to a website requesting that you login or enter your username and password. TCU Information Security Services
Spam • Spam is anonymous, unsolicited junk email sent indiscriminately to huge numbers of recipients. • Do not open email that is obviously Spam. • If you do open spam, do not click on any links. TCU Information Security Services
Email Attachments • Computer viruses and other malicious software are often spread through email attachments. • If a file attached to an email contains a virus, it is often launched when you open (or double-click) the attachment. • Don’t open unexpected email attachments. TCU Information Security Services
Backup Your Computer • Be prepared for the worst by backing up critical data and keeping backups in a separate, secure location. • Use supplemental hard drives, CDs/DVDs or flash drives • Backup data, files, pictures TCU Information Security Services
Use Strong Passwords • Strong passwords • At least one alphabetic, one numeric and one special character • At least 7 characters long • Mixed case • Not similar to other passwords or your name • Not found in the dictionary • Let’s test some passwords: http://www.passwordmeter.com/ TCU Information Security Services
Wireless Security • Change the administrator username and password on your wireless hardware. • Use WPA2 encryption to secure communication between your computer and your wireless access point. • Change the Default SSID (default name of the your wireless network – i.e., Linksys devices are normally “linksys”) • Run setup wizard that comes with wireless router. • Restrict which computers can access your network. TCU Information Security Services
Wireless Security continued • OnGuard Online Wireless Video • http://www.onguardonline.gov/videos/wireless-secuirty-yul-kwon.aspx TCU Information Security Services
Etcetera • Supervise Children • Teach computer security • Use monitoring software • Turn off computer when not using it • Warning – if off for weeks it won’t get updates. Force updates when you turn it back on. • Use FireFox instead of Internet Explorer • Turn on Master Password • Beware of freeware or shareware – it may be spyware TCU Information Security Services
Etcetera (continued) • If you need to access the TCU network from home, use VPN with Remote Desktop (Windows) or Screensharing (Mac) • When getting rid of an old computer, even if the hard drive is broken, drill holes through it. • Beware of public computer access • Wireless hotspots – not secure, don’t require encryption. • You may want to use TCU VPN. • Kiosks or public computers – not secure, key logging software may be installed. TCU Information Security Services
Recap • Critical Patches – keep everything up-to-date! • Anti-virus, anti-spyware, firewall • Recommendation – all inclusive internet security package • Email security • Watch for links in emails and learn to spot non-legitimate web sites • Use strong passwords • Wireless security TCU Information Security Services
Resources • TCU Computer Help Desk • 817-257-6855 • Help@tcu.edu • http://Help.tcu.edu • Location: Mary Couts Burnett Library, first floor • Information Security Services • https://Security.tcu.edu • Security@tcu.edu TCU Information Security Services