Security for the Home Computer User
Download
Report
Transcript Security for the Home Computer User
Home PC Security & Internet
Browser Tips
Todd W. Jorns
Senior Director for Educational Technology
Illinois Community College Board
Topics
User Accounts
Passwords
Windows Updates
Anti-Virus Software
Anti-Spyware Software
Email
Browsers
Logging On to Windows
Do not run Windows as an Administrator
Increases vulnerabilities
Trojan Horse: a program that does something
else than it appears to do
May reformat your hard drive, delete files, create
another user with administrative control
Instead:
Create a User Account
Creating a User
Passwords
Pick a good password for all accounts—
it’s your first and sometimes only
defense
Password dangers:
Cracking
Social Engineering
Passwords: Good Characteristics
Length
Number of characters
Longer is better and harder to guess
Width
Types of characters
Should include at least three of
Uppercase letters
Lowercase letters
Numbers
Special characters (e.g. ? ! @ #)
Depth
Challenging meaning
Phonetic: Imukat2 for I’m a cat, too
Mnemonic: FM2tM for Fly Me to the Moon
Update Windows: Early & Often
Updates close known vulnerabilities that
are targeted by hackers
Options for updates:
Automatically download and install
Manually download and install
To configure:
Control Panel | System | Automatic Updates
Check Office Updates
MS makes updates available on its web
page
Users should check here at least once
per month:
http://office.microsoft.com/en-us/officeupdate/default.aspx
Anti-Virus Software
A virus is:
Program or programming code that replicates;
Transmitted as attachments to an e-mail note or in
a downloaded file, or may be present on a diskette,
CD, or thumb drive.
A virus might:
Immediately affect you or lie dormant;
Be benign and playful or devastatingly harmful.
Anti-Virus Software: Key issues
Most AV software can be configured to
automatically update itself
Scan your computer automatically
Daily is best if possible
After expiration, no updates will occur
Why? New viruses every day!
Configure the software to run at a time when no one
will be on the computer
At least once a week
If you use IM, try to find software that
scans for IM viruses
Anti-Virus: Free software
Online:
Housecall - http://housecall.trendmicro.com/
Panda ActiveScan http://www.pandasoftware.com/activescan/
Downloadable:
AVG Free - http://free.grisoft.com/doc/2/lng/us/tpl/v5
avast! Home Edition http://www.avast.com/eng/down_home.html
Spyware: What is it?
Strictly defined, spyware consists of
computer software that gathers and
reports information about a computer
user without the user's knowledge or
consent.
From Wikipedia, the free encyclopedia
Spyware: Problems
Installs without user’s informed consent
Invades privacy and steals bandwidth
Often causes system instability
Crashes
Hanging
Slowing
May modify shared files
Causing other applications to fail
Making spyware difficult to remove
Interrupting Internet connectivity
Spyware: Remedies
Numerous Anti-spyware programs and
removal tools
Spybot Search and Destroy:
Adaware:
http://www.lavasoftusa.com/software/adaware/
MS Anti-Spyware:
http://www.safer-networking.org/en/index.html
http://www.microsoft.com/athome/security/spyware/software/default.mspx
Various Anti-Virus programs
Spyware: Prevention
Spyblaster:
http://www.javacoolsoftware.com/spywareblaster.html
Disabling Active-X
Using only reputable sources for software
Updating Software to fix known
vulnerabilities
Windows operating systems
Browser software
E-mail
Most frequently used tool
One of the most vulnerable tools “out of
the box”
Issues
HTML
Attachments
E-mail: Attachments
Never open any unsolicited attachments
Do not trust attachments from known
parties
Scan all attachments
Executable code
Macros
Never open attachments that are programs
(.bat, .chm, .cmd, .com, .exe, .hta, .ocx, .pif,
.scr, .shs, .vbe, .vbs, or .wsf).
How to see file extensions
In ME, 2000, and XP:
Open My Computer
Choose Tools | Folder Options
Choose the View Tab
Uncheck: Hide file extensions for known file
types
Click OK
Email: Spam
Never respond to spam
Signals a “live” e-mail address
May be added to list and sold
Consequence: MORE spam!
E-mail: Phishing
The act of sending an e-mail to a user falsely
claiming to be an established legitimate
enterprise in an attempt to scam the user into
surrendering private information that will be
used for identify theft
Microsoft, your bank, AOL, PayPal will never
send you announcements about updates---and
neither will most businesses. If unsure, use
the telephone!
Web: The World Wide Web
World Wide Web brought color, pictures,
and motion to the Internet
Browser: Software application used to
access the World Wide Web
Internet Explorer
Firefox
Opera
Popularity of WWW means that it’s a
favorite for malicious activities
Web: Making it safer
Consider disabling AutoComplete
anyone at your computer will be able to easily see
where you've been on the Web
worse yet, anyone at your computer will be able to
easily impersonate you at Web sites that require
you to input information
In IE
Select Tools and choose "Internet Options ..."
Click the "Advanced" tab.
Scroll down and uncheck the box next to "Use
inline AutoComplete for Web addresses".
Web: Signals of secure site
Look for a site that uses a secure
channel for transmission of credit card
information
Key clues:
https
Locked padlock
Test Browser Security
Jason’s Toolbox:
Online test of browser security
Leads you through each step
http://www.jasonstoolbox.com/BrowserSecurity/
The Internet: A huge network
When you connect to the Internet, your
computer is connected to all the other
computers---and the good and bad users
behind them
Understanding a little about that
communication will help you to understand
the need for something called a Firewall
IP Addresses
IP or Internet addresses are like addresses
for buildings
If you know the address of a building, you can
locate it and send it information
If you know the address for a computer, you can
send it information
Fortunately, we don’t have to remember the
numbers because of an Internet service
called Domain Name System which
translates for us!
Firewalls: Filters for packets
A firewall is a piece of software or
hardware, which stands between two
networks or computers and controls access
between them
Controls the traffic flow in and out of
networks or computers based on IP
Addresses and Port numbers
Router (Hardware )
Hides your computer from the Internet
Internet address is given to your router
Computer receives a private Internet address
The harder you are to find, the harder it will be for
someone—or something—to hurt you!
A must for broadband (cable/dsl) Internet
connections
Key: Change the default password!
Personal Firewalls (software)
Watches information going in and out of the
computer – but you decide
Will allow you to monitor programs
Allow only programs of which you are sure
Watch for outgoing programs (e.g.,spyware)
Know how to shutdown Internet
connectivity
Personal Firewalls - Software
Zone Alarm
http://www.zonelabs.com/store/content/company/pr
oducts/znalm/freeDownload.jsp
Sygate Personal Firewall
http://smb.sygate.com/products/spf_standard.htm
Test Your System
HackerWacker:
http://hackerwhacker.com:4000/freetools.php
ShieldsUp:
http://www.grc.com/default.htm
Online Resource
www.iccb.org/pchelp
Questions
Todd W. Jorns
(217) 785-0144
[email protected]