1 / 28

Computer Security @ Home

Computer Security @ Home. Texas Christian University Technology Resources. Overview. Critical Patches Anti-Virus Software Anti-Spyware Software Internet Firewall Email Security Backup Your Computer Use Strong Passwords Wireless Security Etcetera. Critical Patches.

tamatha
Download Presentation

Computer Security @ Home

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Computer Security @ Home Texas Christian University Technology Resources

  2. Overview • Critical Patches • Anti-Virus Software • Anti-Spyware Software • Internet Firewall • Email Security • Backup Your Computer • Use Strong Passwords • Wireless Security • Etcetera TCU Information Security Services

  3. Critical Patches • It is critical to keep your software up-to-date • Operating system • Anti-virus and anti-spyware • Applications including browsers, Adobe Acrobat, Java, Flash • Newest versions contain fixes for discovered vulnerabilities • Enable automatic update features in OS and application software • Windows – Control Panel • Mac OSX – System Preferences TCU Information Security Services

  4. Anti-virus Software • Anti-virus software is “used to identify and remove computer viruses, as well as many other types of harmful computer software, collectively referred to as malware” Wikipedia • Anti-virus software offers ongoing protection, daily scans, daily updates. • To be effective virus definitions must be updated routinely. • Norton, Trend Micro, McAfee, AVG, Sophos, Eeye, also included in internet security packages. TCU Information Security Services

  5. Anti-Spyware Software • Protects your computer from malicious spyware. • Spyware may monitor your online activities and collect personal information while you surf the web. • Periodically scans your computer for spyware. • Must also be kept up-to-date • Ad-Adware, Spybot, also included in internet security packages TCU Information Security Services

  6. Internet Firewall • Anti-virus and anti-spyware products inspect files on your computer, in incoming and outgoing email, and on removable media.  • Firewall software and/or hardware monitors the communications between your computer and the outside world (the Internet). • Firewalls prevent unauthorized access to or from a private “network” (i.e., your home computer). TCU Information Security Services

  7. Internet Firewall (continued) • You can implement a firewall in either hardware or software form, or a combination of both. • Hardware Firewall • Router (wired or wireless), i.e., Linksys • DSL Modem, Gateway • Software Firewall • Built-in Windows Firewall • Only stops inbound traffic, does not check outbound • Mac OSX 10.2 and later also has an built-in firewall • Part of an internet security package TCU Information Security Services

  8. Internet Security Packages • Some commercial internet security packages include anti-virus, anti-software and firewall software. • Norton, Trend Micro, McAfee, Sophos, EEye, ESET, AVG TCU Information Security Services

  9. Email Security • Phishing • Spam • Attachments TCU Information Security Services

  10. Phishing • Phishing is an illegal activity that uses social engineering techniques to manipulate people into giving out personal information. • A highly targeted version of a phishing scam is “spear phishing.” TCU Information Security Services

  11. Phishing (continued) • Characteristics of phishing emails • Unsolicited request for personal information • Username, userid, email id, email identity • Password • Social security number • Birthdate • Generic greetings • Contains an ultimatum • Grammatical errors • Content appears genuine TCU Information Security Services

  12. Phishing techniques • Link manipulation • Technical deception designed to make a link in an email and the spoofed website it leads to, appear to belong to the spoofed organization. • Spoofed website • Looks almost exactly like the real thing • Website forgery • A spoofed website that uses JavaScript to alter the address bar to appear legitimate. • Filter evasion • Misspelled words and images instead of text are used to evade anti-phishing filters. TCU Information Security Services

  13. A Recent TCU Phishing Email Link manipulation

  14. Fake Website • http://www.1025.ru/js/mail.tcu.edu No https Look between first double // and first single / - that’s NOT TCU

  15. Real Website • https://mobile.tcu.edu/owa/auth/logon.aspx Secure That is TCU

  16. Avoid being Phished! • Watch out for links in emails. • Do not click on them • Type the link directly into web browser • Learn to spot non-legitimate web sites • Look at the address between the // and the first / - it should end with the company you expect • Fake: http://www.1025.ru/js/mail.tcu.edu • Real: https://mobile.tcu.edu/owa/auth/logon.aspx… • Is it secure? • https in the address • Yellow lock icon

  17. Avoid being Phished (continued) • Greet email or phone calls seeking personal information with skepticism. • If you think it may be legitimate, call customer service number provided when account was opened. • Be leery of alarming statements that urge you to respond immediately. • Do NOT reply to phishing emails. • OnGuard Online Phishy Home Video • http://www.onguardonline.gov/videos/phishy-home.aspx TCU Information Security Services

  18. Avoid being Phished (continued) • TCU Technology Resources, including the computer help desk and information security services will NEVER ask you for your password via email, the phone or in person. • When TCU upgrades its computer or email systems we will NEVER send a link inside an email which will go to a website requesting that you login or enter your username and password. TCU Information Security Services

  19. Spam • Spam is anonymous, unsolicited junk email sent indiscriminately to huge numbers of recipients. • Do not open email that is obviously Spam. • If you do open spam, do not click on any links. TCU Information Security Services

  20. Email Attachments • Computer viruses and other malicious software are often spread through email attachments. • If a file attached to an email contains a virus, it is often launched when you open (or double-click) the attachment. • Don’t open unexpected email attachments. TCU Information Security Services

  21. Backup Your Computer • Be prepared for the worst by backing up critical data and keeping backups in a separate, secure location. • Use supplemental hard drives, CDs/DVDs or flash drives • Backup data, files, pictures TCU Information Security Services

  22. Use Strong Passwords • Strong passwords • At least one alphabetic, one numeric and one special character • At least 7 characters long • Mixed case • Not similar to other passwords or your name • Not found in the dictionary • Let’s test some passwords: http://www.passwordmeter.com/ TCU Information Security Services

  23. Wireless Security • Change the administrator username and password on your wireless hardware. • Use WPA2 encryption to secure communication between your computer and your wireless access point. • Change the Default SSID (default name of the your wireless network – i.e., Linksys devices are normally “linksys”) • Run setup wizard that comes with wireless router. • Restrict which computers can access your network. TCU Information Security Services

  24. Wireless Security continued • OnGuard Online Wireless Video • http://www.onguardonline.gov/videos/wireless-secuirty-yul-kwon.aspx TCU Information Security Services

  25. Etcetera • Supervise Children • Teach computer security • Use monitoring software • Turn off computer when not using it • Warning – if off for weeks it won’t get updates. Force updates when you turn it back on. • Use FireFox instead of Internet Explorer • Turn on Master Password • Beware of freeware or shareware – it may be spyware TCU Information Security Services

  26. Etcetera (continued) • If you need to access the TCU network from home, use VPN with Remote Desktop (Windows) or Screensharing (Mac) • When getting rid of an old computer, even if the hard drive is broken, drill holes through it. • Beware of public computer access • Wireless hotspots – not secure, don’t require encryption. • You may want to use TCU VPN. • Kiosks or public computers – not secure, key logging software may be installed. TCU Information Security Services

  27. Recap • Critical Patches – keep everything up-to-date! • Anti-virus, anti-spyware, firewall • Recommendation – all inclusive internet security package • Email security • Watch for links in emails and learn to spot non-legitimate web sites • Use strong passwords • Wireless security TCU Information Security Services

  28. Resources • TCU Computer Help Desk • 817-257-6855 • Help@tcu.edu • http://Help.tcu.edu • Location: Mary Couts Burnett Library, first floor • Information Security Services • https://Security.tcu.edu • Security@tcu.edu TCU Information Security Services

More Related