1 / 26

CS 6 Lecture 10 – Defense Against the Dark Arts

CS 6 Lecture 10 – Defense Against the Dark Arts. Spring 2014. Notes!. Quiz this Thursday (May 8) Tables <table>, < tr >, <td>, < th > Should you use the border attribute? Table borders with CSS CSS Cascading Style Sheets Inline vs. Internal vs. External Good & Bad of the Internet

wilda
Download Presentation

CS 6 Lecture 10 – Defense Against the Dark Arts

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CS 6 Lecture 10– Defense Against the Dark Arts Spring 2014

  2. Notes! • Quiz this Thursday (May 8) • Tables • <table>, <tr>, <td>, <th> • Should you use the border attribute? • Table borders with CSS • CSS • Cascading Style Sheets • Inline vs. Internal vs. External • Good & Bad of the Internet • Internet Fundamentals • Difference between cache and history? • TCP/IP • DSL vs. Cable vs. FIOS vs. Satellite • Problem with current IP address system? • Search • Joe Friday Question vs. Voyager Question vs. Deep Thought Question

  3. First, Backup If you hear nothing else this quarter, BACK UP YOUR DATA!!

  4. Backing up on Windows • Start All Programs Accessories System Tools Backup • Run backup on your ‘My Documents’ folder and your settings. • Burn a disk! Place it away from your computer. For important stuff, take it to your mom’s!

  5. Backing up on OSX • Buy an external HDD • Same size or larger than your current machine • Make sure it is formatted correctly • MS-DOS (FAT) so that it can also be used on a PC • Run Time Machine • Select Disk (your external HDD) • All files back up to your HDD • Every time your computer is turned on • Or on a schedule

  6. Backup Drives • HDD Prices have dropped considerably • 2004: ~$1 per GB ($100 for 100GB) • 2014: ~$1.20 per 30 GB ($120 for 3TB) • Big HDD names • Maxtor • Western Digital • Seagate • SSD (Solid State Drive) • More stable flash memory • 2014: ~$1 per GB

  7. The Cloud • Google • Amazon E3 • Dropbox • Etc.

  8. Because you never know • Virus • Failed software install • Power spike • Disk crash • Accidental Deletion • Water/Tea/Soda spills

  9. Vocabulary • Virus: come as files, in email, that you download, etc. Hurt your computer. • Worms: Self-propagating over networks, usually hurt networks. • Trojans: come hidden inside of other, apparently desirable software. • Spyware: collects personal information about users without their consent.

  10. Zombies!! • Zombie Computers: • When your computer is operated remotely, without your knowledge, to do bad things.

  11. What do I need to do? Ok, don’t throw away your computer…

  12. What do I need? • Virusesneed antivirus software. • AVG • Free edition available • Very good • NOD 32 • Not Free • Light weight • Very verygood • McAfee • ehh • Norton • Double ehhhh

  13. Antivirus Software • Antivirusis only as good as it’s latest virus definitions. If you don’t want to pay, switch to AVG. • ONLY RUN ONE ANTIVIRUS AT A TIME! For example, uninstall Norton, then install AVG. • Backup before you uninstall a big antivirus suite! They have been known to eat computers as revenge.

  14. What do I need? • Worms need a firewall/router

  15. Firewalls • A firewall is a barrier that watches any attempts to enter or exit your computer. Usually, these attempts are blocked, unless you give permission. • Windows now comes with a firewall installed • only one-way – only stops incoming connections. • Zone Alarm • free version • blocks both incoming and outgoing connections

  16. Routers • Routers: the network hub and the gateway to the outside internet. • Routers by themselves absorb many attacks that are meant for real computers.

  17. What do I need? • Trojans need firewall / spyware checker • Spyware anti-spyware

  18. Anti-Spyware • Popular ones • SpybotSearch and Destroy • Adaware • Both are available for free. Good to use. • Also – Don’t download from obscure websites, be sure the website is authentic, and scan any file you download before install! • Don’t open files in email unless you were expecting them! Even from friends!

  19. Automation is Policy • Things that should happen automatically: • Retrieving and installing program updates. • Scanning any current downloads. • Scheduled computer scans nightly. • Scheduled backups nightly.

  20. Obscurity is Your Friend • ~70% of the world uses Windows • Most Windows users use Outlook or Outlook Express for their email client • Now ~53% of the world uses Chrome • If you were going to hack a computer system, which one would you target?

  21. Passwords • Have levels of passwords: • ‘Throwaway’ password for sites of no security value. • More complex passwords for important sites. • A VERY secure password for a very FEW financial and ultra-important sites.

  22. Don’t Share Your Password • There is NEVER any reason to share your account, password, or pin • Administrators or Security Experts got it! • Don’t be “Socially Engineered” • Information is valuable & dangerous • Don’t let a sweet-talker get you to say more than you should

  23. Securing Your Home Network • If you have a router not provided by you service provider • Google your router name, find instructions • Log into your router. (e.g. http://192.168.0.1) • Change default password on admin account and any user accounts • Update your firmware (if available) • Good routers are not expensive - upgrade!

  24. Securing Your Home Network • Turn on the encryption! • WPA (WPA-PSK) • WEP IS EASILY CRACKED!  • Allows you to set a password for your wireless network. • Your network password should be strong! Remember wardriving (stealing open WiFi)

  25. Securing Your Home Network • The SSID is the network name your router broadcasts. • Disable broadcast? Maybe. • Vague, non-default name? Yes! • RenRen (my fish’s name) • Snoopy (Peanut’s dog’s name) • Riverside Police Network (not really….) • NOT your last name • NOT your address

  26. Securing Your Home Network • Extra steps (advanced users only!) • MAC address filtering - enabling only the computers you allow on the router. • Start -> run -> cmd -> ipconfig -all • Turning off DHCP • Dynamic Host Configuration Protocol • DHCP automatically assigns your computers their internal IP addresses. Instead, hard-code them yourself.

More Related