PC Security 101 Keeping your data and your computer safe Security is a real concern Identity theft is a hot topic in the news. Data.

Download Report

Transcript PC Security 101 Keeping your data and your computer safe Security is a real concern Identity theft is a hot topic in the news. Data.

Slide 1

PC Security 101
Keeping your data and your
computer safe

Security is a real concern
Identity theft is a hot topic in the news.
Data theft is a very real and serious issue.
Malicious programs allow users to capture
logins, passwords, credit card information,
personal, and business data.
We have found some of these programs in
home directories in our schools.

How does it all work?
Users install malicious programs from
floppy disks, CDs or thumb drives to avoid
detection on the network.
Programs install quickly and easily when
logged in as an administrator.
Local administrator passwords are easy to
crack with software found on the Internet.
Novell passwords are not easy to crack.

How does it all work?
Once installed, these programs begin to
capture data. The data can be stored on
the machine, or even emailed to another
user.
Keystrokes can be captured, gathering
your logins and passwords to websites,
what you type in a document or email, as
well as any information you enter on a
form.

How does it all work?
Screenshots can be captured, showing
what you are seeing on the screen.
Malicious users can use what they have
captured to login as you and have access
to all of your programs, files and data.

What can you do?
Do not allow students to use your computer, if
possible. **This is especially important in high
schools and middle schools**
Be sure to logout when you leave your
computer, even for a brief time.
Logout and turn off computers at the end of each
day.
Do not allow others to use your computer when
you are logged in.
Be aware of where you are saving documents.
Do not save sensitive information to a shared
folder.

What can you do?
Change your password frequently.
Do not allow other colleagues to login with your
password. This is against board policy, as well
as a really bad idea!
Select hard to guess passwords with letters,
numbers and other characters.
Be aware of what students are doing on the
computers.
Enforce policies regarding misuse of computers.
Report any suspicious activities to your
supervisor and your technology support staff.

The Law
State and Federal laws prohibit unauthorized
access, additions, deletions, or changes to a
network, password disclosure and numerous other
activities.
Violations of state and federal codes may result in
fines and imprisonment.
Copyright is a very serious issue. Violations may
result in very large fines.
Students should be educated on laws and ethics.
Be sure to read the Douglas County Acceptable Use
Policy on our staff home page:
http://web.douglas.k12.ga.us/web/intranet/startstaff.
htm

The Law
Georgia Code: http://www.ganet.org/cgibin/pub/ocode/ocgsearch?docname=OCo
de/G/16/9/93
Federal Code:
http://www.usdoj.gov/criminal/cybercri
me/1030NEW.htm

More troubling news…
Spyware/Adware slows down our
computer and compromises security.
Phishing scams look so real that we are
tempted to fall for them.
New worms and viruses surface every
day.

What about my home computer?
The first line of defense is to monitor your
inbox!
– Do not open email from unknown/unexpected
addresses, particularly with attachments.
– Opening spam email verifies that your
account is a live account.
– If you have a “report as spam” option with
your ISP, use it.
– Enable email filtering, if your ISP provides it.
(Junk/Spam folders)

What about my home computer?
– Use your work email for work and have a
personal email account for personal email.
– Create an extra account that you will use
when asked to provide an email address on a
website. This account will fill up with junk and
should only be used for this purpose.
– If you feel compelled to forward emails to a
large group, use the BCC feature to hide
addresses. Encourage your friends to do the
same.

What about my home computer?
Use anti-spyware programs on your home
computers to detect and delete malicious
programs.
– Update definitions and scan your PC once a week or
at the very least, monthly.
– AdAware, SpywareBlaster, and Spybot Search and
Destroy are free for personal use and quite effective!

Use anti-virus software on your home
computers to protect against viruses,
worms, and trojans.
– Many ISPs now offer free anti-virus software.
Comcast and AOL offer McAfee. Check with your ISP
for further details.

What about my home computer?
Use a firewall if you have high-speed internet
service (broadband or DSL)
– A router/gateway is a hardware firewall that will
provide protection.
– Software firewalls include: Windows firewall, built into
Windows XP and ZoneAlarm, free products.
– McAfee may be provided by your ISP.
– Norton Internet Security is another product that works
well.
** A word of caution: Be careful configuring software
firewalls! You may completely block your internet
connection! **

Home Networks
If you’re like many high-speed internet
users, you may have a wireless router
installed at home. Here are a few security
tips for wireless networks:
– Turn on WEP encryption. If you’re unsure
how to do this, check the manufacturer’s
website.
– Use MAC filtering to allow only certain PCs to
access your network.
– Turn off your router when not in use for
extended periods.

We use locks to protect our homes, cars,
and other valuables.
Protect your personal and school data by
taking steps to keep it secure.

Resources
http://www.microsoft.com/athome/security/videos/default.
mspx Numerous videos on various security topics may
be found here.
http://www.lavasoftusa.com/support/download/ AdAware
free download
http://www.safer-networking.org/en/download/index.html
Spybot Search and Destroy free download
http://www.javacoolsoftware.com/spywareblaster.html
SpywareBlaster free download
http://free.grisoft.com/freeweb.php/doc/2/ AVG Anti-virus
free download
http://www.microsoft.com/windowsxp/using/networking/e
xpert/bowman_03july28.mspx Wireless security for
home networks


Slide 2

PC Security 101
Keeping your data and your
computer safe

Security is a real concern
Identity theft is a hot topic in the news.
Data theft is a very real and serious issue.
Malicious programs allow users to capture
logins, passwords, credit card information,
personal, and business data.
We have found some of these programs in
home directories in our schools.

How does it all work?
Users install malicious programs from
floppy disks, CDs or thumb drives to avoid
detection on the network.
Programs install quickly and easily when
logged in as an administrator.
Local administrator passwords are easy to
crack with software found on the Internet.
Novell passwords are not easy to crack.

How does it all work?
Once installed, these programs begin to
capture data. The data can be stored on
the machine, or even emailed to another
user.
Keystrokes can be captured, gathering
your logins and passwords to websites,
what you type in a document or email, as
well as any information you enter on a
form.

How does it all work?
Screenshots can be captured, showing
what you are seeing on the screen.
Malicious users can use what they have
captured to login as you and have access
to all of your programs, files and data.

What can you do?
Do not allow students to use your computer, if
possible. **This is especially important in high
schools and middle schools**
Be sure to logout when you leave your
computer, even for a brief time.
Logout and turn off computers at the end of each
day.
Do not allow others to use your computer when
you are logged in.
Be aware of where you are saving documents.
Do not save sensitive information to a shared
folder.

What can you do?
Change your password frequently.
Do not allow other colleagues to login with your
password. This is against board policy, as well
as a really bad idea!
Select hard to guess passwords with letters,
numbers and other characters.
Be aware of what students are doing on the
computers.
Enforce policies regarding misuse of computers.
Report any suspicious activities to your
supervisor and your technology support staff.

The Law
State and Federal laws prohibit unauthorized
access, additions, deletions, or changes to a
network, password disclosure and numerous other
activities.
Violations of state and federal codes may result in
fines and imprisonment.
Copyright is a very serious issue. Violations may
result in very large fines.
Students should be educated on laws and ethics.
Be sure to read the Douglas County Acceptable Use
Policy on our staff home page:
http://web.douglas.k12.ga.us/web/intranet/startstaff.
htm

The Law
Georgia Code: http://www.ganet.org/cgibin/pub/ocode/ocgsearch?docname=OCo
de/G/16/9/93
Federal Code:
http://www.usdoj.gov/criminal/cybercri
me/1030NEW.htm

More troubling news…
Spyware/Adware slows down our
computer and compromises security.
Phishing scams look so real that we are
tempted to fall for them.
New worms and viruses surface every
day.

What about my home computer?
The first line of defense is to monitor your
inbox!
– Do not open email from unknown/unexpected
addresses, particularly with attachments.
– Opening spam email verifies that your
account is a live account.
– If you have a “report as spam” option with
your ISP, use it.
– Enable email filtering, if your ISP provides it.
(Junk/Spam folders)

What about my home computer?
– Use your work email for work and have a
personal email account for personal email.
– Create an extra account that you will use
when asked to provide an email address on a
website. This account will fill up with junk and
should only be used for this purpose.
– If you feel compelled to forward emails to a
large group, use the BCC feature to hide
addresses. Encourage your friends to do the
same.

What about my home computer?
Use anti-spyware programs on your home
computers to detect and delete malicious
programs.
– Update definitions and scan your PC once a week or
at the very least, monthly.
– AdAware, SpywareBlaster, and Spybot Search and
Destroy are free for personal use and quite effective!

Use anti-virus software on your home
computers to protect against viruses,
worms, and trojans.
– Many ISPs now offer free anti-virus software.
Comcast and AOL offer McAfee. Check with your ISP
for further details.

What about my home computer?
Use a firewall if you have high-speed internet
service (broadband or DSL)
– A router/gateway is a hardware firewall that will
provide protection.
– Software firewalls include: Windows firewall, built into
Windows XP and ZoneAlarm, free products.
– McAfee may be provided by your ISP.
– Norton Internet Security is another product that works
well.
** A word of caution: Be careful configuring software
firewalls! You may completely block your internet
connection! **

Home Networks
If you’re like many high-speed internet
users, you may have a wireless router
installed at home. Here are a few security
tips for wireless networks:
– Turn on WEP encryption. If you’re unsure
how to do this, check the manufacturer’s
website.
– Use MAC filtering to allow only certain PCs to
access your network.
– Turn off your router when not in use for
extended periods.

We use locks to protect our homes, cars,
and other valuables.
Protect your personal and school data by
taking steps to keep it secure.

Resources
http://www.microsoft.com/athome/security/videos/default.
mspx Numerous videos on various security topics may
be found here.
http://www.lavasoftusa.com/support/download/ AdAware
free download
http://www.safer-networking.org/en/download/index.html
Spybot Search and Destroy free download
http://www.javacoolsoftware.com/spywareblaster.html
SpywareBlaster free download
http://free.grisoft.com/freeweb.php/doc/2/ AVG Anti-virus
free download
http://www.microsoft.com/windowsxp/using/networking/e
xpert/bowman_03july28.mspx Wireless security for
home networks


Slide 3

PC Security 101
Keeping your data and your
computer safe

Security is a real concern
Identity theft is a hot topic in the news.
Data theft is a very real and serious issue.
Malicious programs allow users to capture
logins, passwords, credit card information,
personal, and business data.
We have found some of these programs in
home directories in our schools.

How does it all work?
Users install malicious programs from
floppy disks, CDs or thumb drives to avoid
detection on the network.
Programs install quickly and easily when
logged in as an administrator.
Local administrator passwords are easy to
crack with software found on the Internet.
Novell passwords are not easy to crack.

How does it all work?
Once installed, these programs begin to
capture data. The data can be stored on
the machine, or even emailed to another
user.
Keystrokes can be captured, gathering
your logins and passwords to websites,
what you type in a document or email, as
well as any information you enter on a
form.

How does it all work?
Screenshots can be captured, showing
what you are seeing on the screen.
Malicious users can use what they have
captured to login as you and have access
to all of your programs, files and data.

What can you do?
Do not allow students to use your computer, if
possible. **This is especially important in high
schools and middle schools**
Be sure to logout when you leave your
computer, even for a brief time.
Logout and turn off computers at the end of each
day.
Do not allow others to use your computer when
you are logged in.
Be aware of where you are saving documents.
Do not save sensitive information to a shared
folder.

What can you do?
Change your password frequently.
Do not allow other colleagues to login with your
password. This is against board policy, as well
as a really bad idea!
Select hard to guess passwords with letters,
numbers and other characters.
Be aware of what students are doing on the
computers.
Enforce policies regarding misuse of computers.
Report any suspicious activities to your
supervisor and your technology support staff.

The Law
State and Federal laws prohibit unauthorized
access, additions, deletions, or changes to a
network, password disclosure and numerous other
activities.
Violations of state and federal codes may result in
fines and imprisonment.
Copyright is a very serious issue. Violations may
result in very large fines.
Students should be educated on laws and ethics.
Be sure to read the Douglas County Acceptable Use
Policy on our staff home page:
http://web.douglas.k12.ga.us/web/intranet/startstaff.
htm

The Law
Georgia Code: http://www.ganet.org/cgibin/pub/ocode/ocgsearch?docname=OCo
de/G/16/9/93
Federal Code:
http://www.usdoj.gov/criminal/cybercri
me/1030NEW.htm

More troubling news…
Spyware/Adware slows down our
computer and compromises security.
Phishing scams look so real that we are
tempted to fall for them.
New worms and viruses surface every
day.

What about my home computer?
The first line of defense is to monitor your
inbox!
– Do not open email from unknown/unexpected
addresses, particularly with attachments.
– Opening spam email verifies that your
account is a live account.
– If you have a “report as spam” option with
your ISP, use it.
– Enable email filtering, if your ISP provides it.
(Junk/Spam folders)

What about my home computer?
– Use your work email for work and have a
personal email account for personal email.
– Create an extra account that you will use
when asked to provide an email address on a
website. This account will fill up with junk and
should only be used for this purpose.
– If you feel compelled to forward emails to a
large group, use the BCC feature to hide
addresses. Encourage your friends to do the
same.

What about my home computer?
Use anti-spyware programs on your home
computers to detect and delete malicious
programs.
– Update definitions and scan your PC once a week or
at the very least, monthly.
– AdAware, SpywareBlaster, and Spybot Search and
Destroy are free for personal use and quite effective!

Use anti-virus software on your home
computers to protect against viruses,
worms, and trojans.
– Many ISPs now offer free anti-virus software.
Comcast and AOL offer McAfee. Check with your ISP
for further details.

What about my home computer?
Use a firewall if you have high-speed internet
service (broadband or DSL)
– A router/gateway is a hardware firewall that will
provide protection.
– Software firewalls include: Windows firewall, built into
Windows XP and ZoneAlarm, free products.
– McAfee may be provided by your ISP.
– Norton Internet Security is another product that works
well.
** A word of caution: Be careful configuring software
firewalls! You may completely block your internet
connection! **

Home Networks
If you’re like many high-speed internet
users, you may have a wireless router
installed at home. Here are a few security
tips for wireless networks:
– Turn on WEP encryption. If you’re unsure
how to do this, check the manufacturer’s
website.
– Use MAC filtering to allow only certain PCs to
access your network.
– Turn off your router when not in use for
extended periods.

We use locks to protect our homes, cars,
and other valuables.
Protect your personal and school data by
taking steps to keep it secure.

Resources
http://www.microsoft.com/athome/security/videos/default.
mspx Numerous videos on various security topics may
be found here.
http://www.lavasoftusa.com/support/download/ AdAware
free download
http://www.safer-networking.org/en/download/index.html
Spybot Search and Destroy free download
http://www.javacoolsoftware.com/spywareblaster.html
SpywareBlaster free download
http://free.grisoft.com/freeweb.php/doc/2/ AVG Anti-virus
free download
http://www.microsoft.com/windowsxp/using/networking/e
xpert/bowman_03july28.mspx Wireless security for
home networks


Slide 4

PC Security 101
Keeping your data and your
computer safe

Security is a real concern
Identity theft is a hot topic in the news.
Data theft is a very real and serious issue.
Malicious programs allow users to capture
logins, passwords, credit card information,
personal, and business data.
We have found some of these programs in
home directories in our schools.

How does it all work?
Users install malicious programs from
floppy disks, CDs or thumb drives to avoid
detection on the network.
Programs install quickly and easily when
logged in as an administrator.
Local administrator passwords are easy to
crack with software found on the Internet.
Novell passwords are not easy to crack.

How does it all work?
Once installed, these programs begin to
capture data. The data can be stored on
the machine, or even emailed to another
user.
Keystrokes can be captured, gathering
your logins and passwords to websites,
what you type in a document or email, as
well as any information you enter on a
form.

How does it all work?
Screenshots can be captured, showing
what you are seeing on the screen.
Malicious users can use what they have
captured to login as you and have access
to all of your programs, files and data.

What can you do?
Do not allow students to use your computer, if
possible. **This is especially important in high
schools and middle schools**
Be sure to logout when you leave your
computer, even for a brief time.
Logout and turn off computers at the end of each
day.
Do not allow others to use your computer when
you are logged in.
Be aware of where you are saving documents.
Do not save sensitive information to a shared
folder.

What can you do?
Change your password frequently.
Do not allow other colleagues to login with your
password. This is against board policy, as well
as a really bad idea!
Select hard to guess passwords with letters,
numbers and other characters.
Be aware of what students are doing on the
computers.
Enforce policies regarding misuse of computers.
Report any suspicious activities to your
supervisor and your technology support staff.

The Law
State and Federal laws prohibit unauthorized
access, additions, deletions, or changes to a
network, password disclosure and numerous other
activities.
Violations of state and federal codes may result in
fines and imprisonment.
Copyright is a very serious issue. Violations may
result in very large fines.
Students should be educated on laws and ethics.
Be sure to read the Douglas County Acceptable Use
Policy on our staff home page:
http://web.douglas.k12.ga.us/web/intranet/startstaff.
htm

The Law
Georgia Code: http://www.ganet.org/cgibin/pub/ocode/ocgsearch?docname=OCo
de/G/16/9/93
Federal Code:
http://www.usdoj.gov/criminal/cybercri
me/1030NEW.htm

More troubling news…
Spyware/Adware slows down our
computer and compromises security.
Phishing scams look so real that we are
tempted to fall for them.
New worms and viruses surface every
day.

What about my home computer?
The first line of defense is to monitor your
inbox!
– Do not open email from unknown/unexpected
addresses, particularly with attachments.
– Opening spam email verifies that your
account is a live account.
– If you have a “report as spam” option with
your ISP, use it.
– Enable email filtering, if your ISP provides it.
(Junk/Spam folders)

What about my home computer?
– Use your work email for work and have a
personal email account for personal email.
– Create an extra account that you will use
when asked to provide an email address on a
website. This account will fill up with junk and
should only be used for this purpose.
– If you feel compelled to forward emails to a
large group, use the BCC feature to hide
addresses. Encourage your friends to do the
same.

What about my home computer?
Use anti-spyware programs on your home
computers to detect and delete malicious
programs.
– Update definitions and scan your PC once a week or
at the very least, monthly.
– AdAware, SpywareBlaster, and Spybot Search and
Destroy are free for personal use and quite effective!

Use anti-virus software on your home
computers to protect against viruses,
worms, and trojans.
– Many ISPs now offer free anti-virus software.
Comcast and AOL offer McAfee. Check with your ISP
for further details.

What about my home computer?
Use a firewall if you have high-speed internet
service (broadband or DSL)
– A router/gateway is a hardware firewall that will
provide protection.
– Software firewalls include: Windows firewall, built into
Windows XP and ZoneAlarm, free products.
– McAfee may be provided by your ISP.
– Norton Internet Security is another product that works
well.
** A word of caution: Be careful configuring software
firewalls! You may completely block your internet
connection! **

Home Networks
If you’re like many high-speed internet
users, you may have a wireless router
installed at home. Here are a few security
tips for wireless networks:
– Turn on WEP encryption. If you’re unsure
how to do this, check the manufacturer’s
website.
– Use MAC filtering to allow only certain PCs to
access your network.
– Turn off your router when not in use for
extended periods.

We use locks to protect our homes, cars,
and other valuables.
Protect your personal and school data by
taking steps to keep it secure.

Resources
http://www.microsoft.com/athome/security/videos/default.
mspx Numerous videos on various security topics may
be found here.
http://www.lavasoftusa.com/support/download/ AdAware
free download
http://www.safer-networking.org/en/download/index.html
Spybot Search and Destroy free download
http://www.javacoolsoftware.com/spywareblaster.html
SpywareBlaster free download
http://free.grisoft.com/freeweb.php/doc/2/ AVG Anti-virus
free download
http://www.microsoft.com/windowsxp/using/networking/e
xpert/bowman_03july28.mspx Wireless security for
home networks


Slide 5

PC Security 101
Keeping your data and your
computer safe

Security is a real concern
Identity theft is a hot topic in the news.
Data theft is a very real and serious issue.
Malicious programs allow users to capture
logins, passwords, credit card information,
personal, and business data.
We have found some of these programs in
home directories in our schools.

How does it all work?
Users install malicious programs from
floppy disks, CDs or thumb drives to avoid
detection on the network.
Programs install quickly and easily when
logged in as an administrator.
Local administrator passwords are easy to
crack with software found on the Internet.
Novell passwords are not easy to crack.

How does it all work?
Once installed, these programs begin to
capture data. The data can be stored on
the machine, or even emailed to another
user.
Keystrokes can be captured, gathering
your logins and passwords to websites,
what you type in a document or email, as
well as any information you enter on a
form.

How does it all work?
Screenshots can be captured, showing
what you are seeing on the screen.
Malicious users can use what they have
captured to login as you and have access
to all of your programs, files and data.

What can you do?
Do not allow students to use your computer, if
possible. **This is especially important in high
schools and middle schools**
Be sure to logout when you leave your
computer, even for a brief time.
Logout and turn off computers at the end of each
day.
Do not allow others to use your computer when
you are logged in.
Be aware of where you are saving documents.
Do not save sensitive information to a shared
folder.

What can you do?
Change your password frequently.
Do not allow other colleagues to login with your
password. This is against board policy, as well
as a really bad idea!
Select hard to guess passwords with letters,
numbers and other characters.
Be aware of what students are doing on the
computers.
Enforce policies regarding misuse of computers.
Report any suspicious activities to your
supervisor and your technology support staff.

The Law
State and Federal laws prohibit unauthorized
access, additions, deletions, or changes to a
network, password disclosure and numerous other
activities.
Violations of state and federal codes may result in
fines and imprisonment.
Copyright is a very serious issue. Violations may
result in very large fines.
Students should be educated on laws and ethics.
Be sure to read the Douglas County Acceptable Use
Policy on our staff home page:
http://web.douglas.k12.ga.us/web/intranet/startstaff.
htm

The Law
Georgia Code: http://www.ganet.org/cgibin/pub/ocode/ocgsearch?docname=OCo
de/G/16/9/93
Federal Code:
http://www.usdoj.gov/criminal/cybercri
me/1030NEW.htm

More troubling news…
Spyware/Adware slows down our
computer and compromises security.
Phishing scams look so real that we are
tempted to fall for them.
New worms and viruses surface every
day.

What about my home computer?
The first line of defense is to monitor your
inbox!
– Do not open email from unknown/unexpected
addresses, particularly with attachments.
– Opening spam email verifies that your
account is a live account.
– If you have a “report as spam” option with
your ISP, use it.
– Enable email filtering, if your ISP provides it.
(Junk/Spam folders)

What about my home computer?
– Use your work email for work and have a
personal email account for personal email.
– Create an extra account that you will use
when asked to provide an email address on a
website. This account will fill up with junk and
should only be used for this purpose.
– If you feel compelled to forward emails to a
large group, use the BCC feature to hide
addresses. Encourage your friends to do the
same.

What about my home computer?
Use anti-spyware programs on your home
computers to detect and delete malicious
programs.
– Update definitions and scan your PC once a week or
at the very least, monthly.
– AdAware, SpywareBlaster, and Spybot Search and
Destroy are free for personal use and quite effective!

Use anti-virus software on your home
computers to protect against viruses,
worms, and trojans.
– Many ISPs now offer free anti-virus software.
Comcast and AOL offer McAfee. Check with your ISP
for further details.

What about my home computer?
Use a firewall if you have high-speed internet
service (broadband or DSL)
– A router/gateway is a hardware firewall that will
provide protection.
– Software firewalls include: Windows firewall, built into
Windows XP and ZoneAlarm, free products.
– McAfee may be provided by your ISP.
– Norton Internet Security is another product that works
well.
** A word of caution: Be careful configuring software
firewalls! You may completely block your internet
connection! **

Home Networks
If you’re like many high-speed internet
users, you may have a wireless router
installed at home. Here are a few security
tips for wireless networks:
– Turn on WEP encryption. If you’re unsure
how to do this, check the manufacturer’s
website.
– Use MAC filtering to allow only certain PCs to
access your network.
– Turn off your router when not in use for
extended periods.

We use locks to protect our homes, cars,
and other valuables.
Protect your personal and school data by
taking steps to keep it secure.

Resources
http://www.microsoft.com/athome/security/videos/default.
mspx Numerous videos on various security topics may
be found here.
http://www.lavasoftusa.com/support/download/ AdAware
free download
http://www.safer-networking.org/en/download/index.html
Spybot Search and Destroy free download
http://www.javacoolsoftware.com/spywareblaster.html
SpywareBlaster free download
http://free.grisoft.com/freeweb.php/doc/2/ AVG Anti-virus
free download
http://www.microsoft.com/windowsxp/using/networking/e
xpert/bowman_03july28.mspx Wireless security for
home networks


Slide 6

PC Security 101
Keeping your data and your
computer safe

Security is a real concern
Identity theft is a hot topic in the news.
Data theft is a very real and serious issue.
Malicious programs allow users to capture
logins, passwords, credit card information,
personal, and business data.
We have found some of these programs in
home directories in our schools.

How does it all work?
Users install malicious programs from
floppy disks, CDs or thumb drives to avoid
detection on the network.
Programs install quickly and easily when
logged in as an administrator.
Local administrator passwords are easy to
crack with software found on the Internet.
Novell passwords are not easy to crack.

How does it all work?
Once installed, these programs begin to
capture data. The data can be stored on
the machine, or even emailed to another
user.
Keystrokes can be captured, gathering
your logins and passwords to websites,
what you type in a document or email, as
well as any information you enter on a
form.

How does it all work?
Screenshots can be captured, showing
what you are seeing on the screen.
Malicious users can use what they have
captured to login as you and have access
to all of your programs, files and data.

What can you do?
Do not allow students to use your computer, if
possible. **This is especially important in high
schools and middle schools**
Be sure to logout when you leave your
computer, even for a brief time.
Logout and turn off computers at the end of each
day.
Do not allow others to use your computer when
you are logged in.
Be aware of where you are saving documents.
Do not save sensitive information to a shared
folder.

What can you do?
Change your password frequently.
Do not allow other colleagues to login with your
password. This is against board policy, as well
as a really bad idea!
Select hard to guess passwords with letters,
numbers and other characters.
Be aware of what students are doing on the
computers.
Enforce policies regarding misuse of computers.
Report any suspicious activities to your
supervisor and your technology support staff.

The Law
State and Federal laws prohibit unauthorized
access, additions, deletions, or changes to a
network, password disclosure and numerous other
activities.
Violations of state and federal codes may result in
fines and imprisonment.
Copyright is a very serious issue. Violations may
result in very large fines.
Students should be educated on laws and ethics.
Be sure to read the Douglas County Acceptable Use
Policy on our staff home page:
http://web.douglas.k12.ga.us/web/intranet/startstaff.
htm

The Law
Georgia Code: http://www.ganet.org/cgibin/pub/ocode/ocgsearch?docname=OCo
de/G/16/9/93
Federal Code:
http://www.usdoj.gov/criminal/cybercri
me/1030NEW.htm

More troubling news…
Spyware/Adware slows down our
computer and compromises security.
Phishing scams look so real that we are
tempted to fall for them.
New worms and viruses surface every
day.

What about my home computer?
The first line of defense is to monitor your
inbox!
– Do not open email from unknown/unexpected
addresses, particularly with attachments.
– Opening spam email verifies that your
account is a live account.
– If you have a “report as spam” option with
your ISP, use it.
– Enable email filtering, if your ISP provides it.
(Junk/Spam folders)

What about my home computer?
– Use your work email for work and have a
personal email account for personal email.
– Create an extra account that you will use
when asked to provide an email address on a
website. This account will fill up with junk and
should only be used for this purpose.
– If you feel compelled to forward emails to a
large group, use the BCC feature to hide
addresses. Encourage your friends to do the
same.

What about my home computer?
Use anti-spyware programs on your home
computers to detect and delete malicious
programs.
– Update definitions and scan your PC once a week or
at the very least, monthly.
– AdAware, SpywareBlaster, and Spybot Search and
Destroy are free for personal use and quite effective!

Use anti-virus software on your home
computers to protect against viruses,
worms, and trojans.
– Many ISPs now offer free anti-virus software.
Comcast and AOL offer McAfee. Check with your ISP
for further details.

What about my home computer?
Use a firewall if you have high-speed internet
service (broadband or DSL)
– A router/gateway is a hardware firewall that will
provide protection.
– Software firewalls include: Windows firewall, built into
Windows XP and ZoneAlarm, free products.
– McAfee may be provided by your ISP.
– Norton Internet Security is another product that works
well.
** A word of caution: Be careful configuring software
firewalls! You may completely block your internet
connection! **

Home Networks
If you’re like many high-speed internet
users, you may have a wireless router
installed at home. Here are a few security
tips for wireless networks:
– Turn on WEP encryption. If you’re unsure
how to do this, check the manufacturer’s
website.
– Use MAC filtering to allow only certain PCs to
access your network.
– Turn off your router when not in use for
extended periods.

We use locks to protect our homes, cars,
and other valuables.
Protect your personal and school data by
taking steps to keep it secure.

Resources
http://www.microsoft.com/athome/security/videos/default.
mspx Numerous videos on various security topics may
be found here.
http://www.lavasoftusa.com/support/download/ AdAware
free download
http://www.safer-networking.org/en/download/index.html
Spybot Search and Destroy free download
http://www.javacoolsoftware.com/spywareblaster.html
SpywareBlaster free download
http://free.grisoft.com/freeweb.php/doc/2/ AVG Anti-virus
free download
http://www.microsoft.com/windowsxp/using/networking/e
xpert/bowman_03july28.mspx Wireless security for
home networks


Slide 7

PC Security 101
Keeping your data and your
computer safe

Security is a real concern
Identity theft is a hot topic in the news.
Data theft is a very real and serious issue.
Malicious programs allow users to capture
logins, passwords, credit card information,
personal, and business data.
We have found some of these programs in
home directories in our schools.

How does it all work?
Users install malicious programs from
floppy disks, CDs or thumb drives to avoid
detection on the network.
Programs install quickly and easily when
logged in as an administrator.
Local administrator passwords are easy to
crack with software found on the Internet.
Novell passwords are not easy to crack.

How does it all work?
Once installed, these programs begin to
capture data. The data can be stored on
the machine, or even emailed to another
user.
Keystrokes can be captured, gathering
your logins and passwords to websites,
what you type in a document or email, as
well as any information you enter on a
form.

How does it all work?
Screenshots can be captured, showing
what you are seeing on the screen.
Malicious users can use what they have
captured to login as you and have access
to all of your programs, files and data.

What can you do?
Do not allow students to use your computer, if
possible. **This is especially important in high
schools and middle schools**
Be sure to logout when you leave your
computer, even for a brief time.
Logout and turn off computers at the end of each
day.
Do not allow others to use your computer when
you are logged in.
Be aware of where you are saving documents.
Do not save sensitive information to a shared
folder.

What can you do?
Change your password frequently.
Do not allow other colleagues to login with your
password. This is against board policy, as well
as a really bad idea!
Select hard to guess passwords with letters,
numbers and other characters.
Be aware of what students are doing on the
computers.
Enforce policies regarding misuse of computers.
Report any suspicious activities to your
supervisor and your technology support staff.

The Law
State and Federal laws prohibit unauthorized
access, additions, deletions, or changes to a
network, password disclosure and numerous other
activities.
Violations of state and federal codes may result in
fines and imprisonment.
Copyright is a very serious issue. Violations may
result in very large fines.
Students should be educated on laws and ethics.
Be sure to read the Douglas County Acceptable Use
Policy on our staff home page:
http://web.douglas.k12.ga.us/web/intranet/startstaff.
htm

The Law
Georgia Code: http://www.ganet.org/cgibin/pub/ocode/ocgsearch?docname=OCo
de/G/16/9/93
Federal Code:
http://www.usdoj.gov/criminal/cybercri
me/1030NEW.htm

More troubling news…
Spyware/Adware slows down our
computer and compromises security.
Phishing scams look so real that we are
tempted to fall for them.
New worms and viruses surface every
day.

What about my home computer?
The first line of defense is to monitor your
inbox!
– Do not open email from unknown/unexpected
addresses, particularly with attachments.
– Opening spam email verifies that your
account is a live account.
– If you have a “report as spam” option with
your ISP, use it.
– Enable email filtering, if your ISP provides it.
(Junk/Spam folders)

What about my home computer?
– Use your work email for work and have a
personal email account for personal email.
– Create an extra account that you will use
when asked to provide an email address on a
website. This account will fill up with junk and
should only be used for this purpose.
– If you feel compelled to forward emails to a
large group, use the BCC feature to hide
addresses. Encourage your friends to do the
same.

What about my home computer?
Use anti-spyware programs on your home
computers to detect and delete malicious
programs.
– Update definitions and scan your PC once a week or
at the very least, monthly.
– AdAware, SpywareBlaster, and Spybot Search and
Destroy are free for personal use and quite effective!

Use anti-virus software on your home
computers to protect against viruses,
worms, and trojans.
– Many ISPs now offer free anti-virus software.
Comcast and AOL offer McAfee. Check with your ISP
for further details.

What about my home computer?
Use a firewall if you have high-speed internet
service (broadband or DSL)
– A router/gateway is a hardware firewall that will
provide protection.
– Software firewalls include: Windows firewall, built into
Windows XP and ZoneAlarm, free products.
– McAfee may be provided by your ISP.
– Norton Internet Security is another product that works
well.
** A word of caution: Be careful configuring software
firewalls! You may completely block your internet
connection! **

Home Networks
If you’re like many high-speed internet
users, you may have a wireless router
installed at home. Here are a few security
tips for wireless networks:
– Turn on WEP encryption. If you’re unsure
how to do this, check the manufacturer’s
website.
– Use MAC filtering to allow only certain PCs to
access your network.
– Turn off your router when not in use for
extended periods.

We use locks to protect our homes, cars,
and other valuables.
Protect your personal and school data by
taking steps to keep it secure.

Resources
http://www.microsoft.com/athome/security/videos/default.
mspx Numerous videos on various security topics may
be found here.
http://www.lavasoftusa.com/support/download/ AdAware
free download
http://www.safer-networking.org/en/download/index.html
Spybot Search and Destroy free download
http://www.javacoolsoftware.com/spywareblaster.html
SpywareBlaster free download
http://free.grisoft.com/freeweb.php/doc/2/ AVG Anti-virus
free download
http://www.microsoft.com/windowsxp/using/networking/e
xpert/bowman_03july28.mspx Wireless security for
home networks


Slide 8

PC Security 101
Keeping your data and your
computer safe

Security is a real concern
Identity theft is a hot topic in the news.
Data theft is a very real and serious issue.
Malicious programs allow users to capture
logins, passwords, credit card information,
personal, and business data.
We have found some of these programs in
home directories in our schools.

How does it all work?
Users install malicious programs from
floppy disks, CDs or thumb drives to avoid
detection on the network.
Programs install quickly and easily when
logged in as an administrator.
Local administrator passwords are easy to
crack with software found on the Internet.
Novell passwords are not easy to crack.

How does it all work?
Once installed, these programs begin to
capture data. The data can be stored on
the machine, or even emailed to another
user.
Keystrokes can be captured, gathering
your logins and passwords to websites,
what you type in a document or email, as
well as any information you enter on a
form.

How does it all work?
Screenshots can be captured, showing
what you are seeing on the screen.
Malicious users can use what they have
captured to login as you and have access
to all of your programs, files and data.

What can you do?
Do not allow students to use your computer, if
possible. **This is especially important in high
schools and middle schools**
Be sure to logout when you leave your
computer, even for a brief time.
Logout and turn off computers at the end of each
day.
Do not allow others to use your computer when
you are logged in.
Be aware of where you are saving documents.
Do not save sensitive information to a shared
folder.

What can you do?
Change your password frequently.
Do not allow other colleagues to login with your
password. This is against board policy, as well
as a really bad idea!
Select hard to guess passwords with letters,
numbers and other characters.
Be aware of what students are doing on the
computers.
Enforce policies regarding misuse of computers.
Report any suspicious activities to your
supervisor and your technology support staff.

The Law
State and Federal laws prohibit unauthorized
access, additions, deletions, or changes to a
network, password disclosure and numerous other
activities.
Violations of state and federal codes may result in
fines and imprisonment.
Copyright is a very serious issue. Violations may
result in very large fines.
Students should be educated on laws and ethics.
Be sure to read the Douglas County Acceptable Use
Policy on our staff home page:
http://web.douglas.k12.ga.us/web/intranet/startstaff.
htm

The Law
Georgia Code: http://www.ganet.org/cgibin/pub/ocode/ocgsearch?docname=OCo
de/G/16/9/93
Federal Code:
http://www.usdoj.gov/criminal/cybercri
me/1030NEW.htm

More troubling news…
Spyware/Adware slows down our
computer and compromises security.
Phishing scams look so real that we are
tempted to fall for them.
New worms and viruses surface every
day.

What about my home computer?
The first line of defense is to monitor your
inbox!
– Do not open email from unknown/unexpected
addresses, particularly with attachments.
– Opening spam email verifies that your
account is a live account.
– If you have a “report as spam” option with
your ISP, use it.
– Enable email filtering, if your ISP provides it.
(Junk/Spam folders)

What about my home computer?
– Use your work email for work and have a
personal email account for personal email.
– Create an extra account that you will use
when asked to provide an email address on a
website. This account will fill up with junk and
should only be used for this purpose.
– If you feel compelled to forward emails to a
large group, use the BCC feature to hide
addresses. Encourage your friends to do the
same.

What about my home computer?
Use anti-spyware programs on your home
computers to detect and delete malicious
programs.
– Update definitions and scan your PC once a week or
at the very least, monthly.
– AdAware, SpywareBlaster, and Spybot Search and
Destroy are free for personal use and quite effective!

Use anti-virus software on your home
computers to protect against viruses,
worms, and trojans.
– Many ISPs now offer free anti-virus software.
Comcast and AOL offer McAfee. Check with your ISP
for further details.

What about my home computer?
Use a firewall if you have high-speed internet
service (broadband or DSL)
– A router/gateway is a hardware firewall that will
provide protection.
– Software firewalls include: Windows firewall, built into
Windows XP and ZoneAlarm, free products.
– McAfee may be provided by your ISP.
– Norton Internet Security is another product that works
well.
** A word of caution: Be careful configuring software
firewalls! You may completely block your internet
connection! **

Home Networks
If you’re like many high-speed internet
users, you may have a wireless router
installed at home. Here are a few security
tips for wireless networks:
– Turn on WEP encryption. If you’re unsure
how to do this, check the manufacturer’s
website.
– Use MAC filtering to allow only certain PCs to
access your network.
– Turn off your router when not in use for
extended periods.

We use locks to protect our homes, cars,
and other valuables.
Protect your personal and school data by
taking steps to keep it secure.

Resources
http://www.microsoft.com/athome/security/videos/default.
mspx Numerous videos on various security topics may
be found here.
http://www.lavasoftusa.com/support/download/ AdAware
free download
http://www.safer-networking.org/en/download/index.html
Spybot Search and Destroy free download
http://www.javacoolsoftware.com/spywareblaster.html
SpywareBlaster free download
http://free.grisoft.com/freeweb.php/doc/2/ AVG Anti-virus
free download
http://www.microsoft.com/windowsxp/using/networking/e
xpert/bowman_03july28.mspx Wireless security for
home networks


Slide 9

PC Security 101
Keeping your data and your
computer safe

Security is a real concern
Identity theft is a hot topic in the news.
Data theft is a very real and serious issue.
Malicious programs allow users to capture
logins, passwords, credit card information,
personal, and business data.
We have found some of these programs in
home directories in our schools.

How does it all work?
Users install malicious programs from
floppy disks, CDs or thumb drives to avoid
detection on the network.
Programs install quickly and easily when
logged in as an administrator.
Local administrator passwords are easy to
crack with software found on the Internet.
Novell passwords are not easy to crack.

How does it all work?
Once installed, these programs begin to
capture data. The data can be stored on
the machine, or even emailed to another
user.
Keystrokes can be captured, gathering
your logins and passwords to websites,
what you type in a document or email, as
well as any information you enter on a
form.

How does it all work?
Screenshots can be captured, showing
what you are seeing on the screen.
Malicious users can use what they have
captured to login as you and have access
to all of your programs, files and data.

What can you do?
Do not allow students to use your computer, if
possible. **This is especially important in high
schools and middle schools**
Be sure to logout when you leave your
computer, even for a brief time.
Logout and turn off computers at the end of each
day.
Do not allow others to use your computer when
you are logged in.
Be aware of where you are saving documents.
Do not save sensitive information to a shared
folder.

What can you do?
Change your password frequently.
Do not allow other colleagues to login with your
password. This is against board policy, as well
as a really bad idea!
Select hard to guess passwords with letters,
numbers and other characters.
Be aware of what students are doing on the
computers.
Enforce policies regarding misuse of computers.
Report any suspicious activities to your
supervisor and your technology support staff.

The Law
State and Federal laws prohibit unauthorized
access, additions, deletions, or changes to a
network, password disclosure and numerous other
activities.
Violations of state and federal codes may result in
fines and imprisonment.
Copyright is a very serious issue. Violations may
result in very large fines.
Students should be educated on laws and ethics.
Be sure to read the Douglas County Acceptable Use
Policy on our staff home page:
http://web.douglas.k12.ga.us/web/intranet/startstaff.
htm

The Law
Georgia Code: http://www.ganet.org/cgibin/pub/ocode/ocgsearch?docname=OCo
de/G/16/9/93
Federal Code:
http://www.usdoj.gov/criminal/cybercri
me/1030NEW.htm

More troubling news…
Spyware/Adware slows down our
computer and compromises security.
Phishing scams look so real that we are
tempted to fall for them.
New worms and viruses surface every
day.

What about my home computer?
The first line of defense is to monitor your
inbox!
– Do not open email from unknown/unexpected
addresses, particularly with attachments.
– Opening spam email verifies that your
account is a live account.
– If you have a “report as spam” option with
your ISP, use it.
– Enable email filtering, if your ISP provides it.
(Junk/Spam folders)

What about my home computer?
– Use your work email for work and have a
personal email account for personal email.
– Create an extra account that you will use
when asked to provide an email address on a
website. This account will fill up with junk and
should only be used for this purpose.
– If you feel compelled to forward emails to a
large group, use the BCC feature to hide
addresses. Encourage your friends to do the
same.

What about my home computer?
Use anti-spyware programs on your home
computers to detect and delete malicious
programs.
– Update definitions and scan your PC once a week or
at the very least, monthly.
– AdAware, SpywareBlaster, and Spybot Search and
Destroy are free for personal use and quite effective!

Use anti-virus software on your home
computers to protect against viruses,
worms, and trojans.
– Many ISPs now offer free anti-virus software.
Comcast and AOL offer McAfee. Check with your ISP
for further details.

What about my home computer?
Use a firewall if you have high-speed internet
service (broadband or DSL)
– A router/gateway is a hardware firewall that will
provide protection.
– Software firewalls include: Windows firewall, built into
Windows XP and ZoneAlarm, free products.
– McAfee may be provided by your ISP.
– Norton Internet Security is another product that works
well.
** A word of caution: Be careful configuring software
firewalls! You may completely block your internet
connection! **

Home Networks
If you’re like many high-speed internet
users, you may have a wireless router
installed at home. Here are a few security
tips for wireless networks:
– Turn on WEP encryption. If you’re unsure
how to do this, check the manufacturer’s
website.
– Use MAC filtering to allow only certain PCs to
access your network.
– Turn off your router when not in use for
extended periods.

We use locks to protect our homes, cars,
and other valuables.
Protect your personal and school data by
taking steps to keep it secure.

Resources
http://www.microsoft.com/athome/security/videos/default.
mspx Numerous videos on various security topics may
be found here.
http://www.lavasoftusa.com/support/download/ AdAware
free download
http://www.safer-networking.org/en/download/index.html
Spybot Search and Destroy free download
http://www.javacoolsoftware.com/spywareblaster.html
SpywareBlaster free download
http://free.grisoft.com/freeweb.php/doc/2/ AVG Anti-virus
free download
http://www.microsoft.com/windowsxp/using/networking/e
xpert/bowman_03july28.mspx Wireless security for
home networks


Slide 10

PC Security 101
Keeping your data and your
computer safe

Security is a real concern
Identity theft is a hot topic in the news.
Data theft is a very real and serious issue.
Malicious programs allow users to capture
logins, passwords, credit card information,
personal, and business data.
We have found some of these programs in
home directories in our schools.

How does it all work?
Users install malicious programs from
floppy disks, CDs or thumb drives to avoid
detection on the network.
Programs install quickly and easily when
logged in as an administrator.
Local administrator passwords are easy to
crack with software found on the Internet.
Novell passwords are not easy to crack.

How does it all work?
Once installed, these programs begin to
capture data. The data can be stored on
the machine, or even emailed to another
user.
Keystrokes can be captured, gathering
your logins and passwords to websites,
what you type in a document or email, as
well as any information you enter on a
form.

How does it all work?
Screenshots can be captured, showing
what you are seeing on the screen.
Malicious users can use what they have
captured to login as you and have access
to all of your programs, files and data.

What can you do?
Do not allow students to use your computer, if
possible. **This is especially important in high
schools and middle schools**
Be sure to logout when you leave your
computer, even for a brief time.
Logout and turn off computers at the end of each
day.
Do not allow others to use your computer when
you are logged in.
Be aware of where you are saving documents.
Do not save sensitive information to a shared
folder.

What can you do?
Change your password frequently.
Do not allow other colleagues to login with your
password. This is against board policy, as well
as a really bad idea!
Select hard to guess passwords with letters,
numbers and other characters.
Be aware of what students are doing on the
computers.
Enforce policies regarding misuse of computers.
Report any suspicious activities to your
supervisor and your technology support staff.

The Law
State and Federal laws prohibit unauthorized
access, additions, deletions, or changes to a
network, password disclosure and numerous other
activities.
Violations of state and federal codes may result in
fines and imprisonment.
Copyright is a very serious issue. Violations may
result in very large fines.
Students should be educated on laws and ethics.
Be sure to read the Douglas County Acceptable Use
Policy on our staff home page:
http://web.douglas.k12.ga.us/web/intranet/startstaff.
htm

The Law
Georgia Code: http://www.ganet.org/cgibin/pub/ocode/ocgsearch?docname=OCo
de/G/16/9/93
Federal Code:
http://www.usdoj.gov/criminal/cybercri
me/1030NEW.htm

More troubling news…
Spyware/Adware slows down our
computer and compromises security.
Phishing scams look so real that we are
tempted to fall for them.
New worms and viruses surface every
day.

What about my home computer?
The first line of defense is to monitor your
inbox!
– Do not open email from unknown/unexpected
addresses, particularly with attachments.
– Opening spam email verifies that your
account is a live account.
– If you have a “report as spam” option with
your ISP, use it.
– Enable email filtering, if your ISP provides it.
(Junk/Spam folders)

What about my home computer?
– Use your work email for work and have a
personal email account for personal email.
– Create an extra account that you will use
when asked to provide an email address on a
website. This account will fill up with junk and
should only be used for this purpose.
– If you feel compelled to forward emails to a
large group, use the BCC feature to hide
addresses. Encourage your friends to do the
same.

What about my home computer?
Use anti-spyware programs on your home
computers to detect and delete malicious
programs.
– Update definitions and scan your PC once a week or
at the very least, monthly.
– AdAware, SpywareBlaster, and Spybot Search and
Destroy are free for personal use and quite effective!

Use anti-virus software on your home
computers to protect against viruses,
worms, and trojans.
– Many ISPs now offer free anti-virus software.
Comcast and AOL offer McAfee. Check with your ISP
for further details.

What about my home computer?
Use a firewall if you have high-speed internet
service (broadband or DSL)
– A router/gateway is a hardware firewall that will
provide protection.
– Software firewalls include: Windows firewall, built into
Windows XP and ZoneAlarm, free products.
– McAfee may be provided by your ISP.
– Norton Internet Security is another product that works
well.
** A word of caution: Be careful configuring software
firewalls! You may completely block your internet
connection! **

Home Networks
If you’re like many high-speed internet
users, you may have a wireless router
installed at home. Here are a few security
tips for wireless networks:
– Turn on WEP encryption. If you’re unsure
how to do this, check the manufacturer’s
website.
– Use MAC filtering to allow only certain PCs to
access your network.
– Turn off your router when not in use for
extended periods.

We use locks to protect our homes, cars,
and other valuables.
Protect your personal and school data by
taking steps to keep it secure.

Resources
http://www.microsoft.com/athome/security/videos/default.
mspx Numerous videos on various security topics may
be found here.
http://www.lavasoftusa.com/support/download/ AdAware
free download
http://www.safer-networking.org/en/download/index.html
Spybot Search and Destroy free download
http://www.javacoolsoftware.com/spywareblaster.html
SpywareBlaster free download
http://free.grisoft.com/freeweb.php/doc/2/ AVG Anti-virus
free download
http://www.microsoft.com/windowsxp/using/networking/e
xpert/bowman_03july28.mspx Wireless security for
home networks


Slide 11

PC Security 101
Keeping your data and your
computer safe

Security is a real concern
Identity theft is a hot topic in the news.
Data theft is a very real and serious issue.
Malicious programs allow users to capture
logins, passwords, credit card information,
personal, and business data.
We have found some of these programs in
home directories in our schools.

How does it all work?
Users install malicious programs from
floppy disks, CDs or thumb drives to avoid
detection on the network.
Programs install quickly and easily when
logged in as an administrator.
Local administrator passwords are easy to
crack with software found on the Internet.
Novell passwords are not easy to crack.

How does it all work?
Once installed, these programs begin to
capture data. The data can be stored on
the machine, or even emailed to another
user.
Keystrokes can be captured, gathering
your logins and passwords to websites,
what you type in a document or email, as
well as any information you enter on a
form.

How does it all work?
Screenshots can be captured, showing
what you are seeing on the screen.
Malicious users can use what they have
captured to login as you and have access
to all of your programs, files and data.

What can you do?
Do not allow students to use your computer, if
possible. **This is especially important in high
schools and middle schools**
Be sure to logout when you leave your
computer, even for a brief time.
Logout and turn off computers at the end of each
day.
Do not allow others to use your computer when
you are logged in.
Be aware of where you are saving documents.
Do not save sensitive information to a shared
folder.

What can you do?
Change your password frequently.
Do not allow other colleagues to login with your
password. This is against board policy, as well
as a really bad idea!
Select hard to guess passwords with letters,
numbers and other characters.
Be aware of what students are doing on the
computers.
Enforce policies regarding misuse of computers.
Report any suspicious activities to your
supervisor and your technology support staff.

The Law
State and Federal laws prohibit unauthorized
access, additions, deletions, or changes to a
network, password disclosure and numerous other
activities.
Violations of state and federal codes may result in
fines and imprisonment.
Copyright is a very serious issue. Violations may
result in very large fines.
Students should be educated on laws and ethics.
Be sure to read the Douglas County Acceptable Use
Policy on our staff home page:
http://web.douglas.k12.ga.us/web/intranet/startstaff.
htm

The Law
Georgia Code: http://www.ganet.org/cgibin/pub/ocode/ocgsearch?docname=OCo
de/G/16/9/93
Federal Code:
http://www.usdoj.gov/criminal/cybercri
me/1030NEW.htm

More troubling news…
Spyware/Adware slows down our
computer and compromises security.
Phishing scams look so real that we are
tempted to fall for them.
New worms and viruses surface every
day.

What about my home computer?
The first line of defense is to monitor your
inbox!
– Do not open email from unknown/unexpected
addresses, particularly with attachments.
– Opening spam email verifies that your
account is a live account.
– If you have a “report as spam” option with
your ISP, use it.
– Enable email filtering, if your ISP provides it.
(Junk/Spam folders)

What about my home computer?
– Use your work email for work and have a
personal email account for personal email.
– Create an extra account that you will use
when asked to provide an email address on a
website. This account will fill up with junk and
should only be used for this purpose.
– If you feel compelled to forward emails to a
large group, use the BCC feature to hide
addresses. Encourage your friends to do the
same.

What about my home computer?
Use anti-spyware programs on your home
computers to detect and delete malicious
programs.
– Update definitions and scan your PC once a week or
at the very least, monthly.
– AdAware, SpywareBlaster, and Spybot Search and
Destroy are free for personal use and quite effective!

Use anti-virus software on your home
computers to protect against viruses,
worms, and trojans.
– Many ISPs now offer free anti-virus software.
Comcast and AOL offer McAfee. Check with your ISP
for further details.

What about my home computer?
Use a firewall if you have high-speed internet
service (broadband or DSL)
– A router/gateway is a hardware firewall that will
provide protection.
– Software firewalls include: Windows firewall, built into
Windows XP and ZoneAlarm, free products.
– McAfee may be provided by your ISP.
– Norton Internet Security is another product that works
well.
** A word of caution: Be careful configuring software
firewalls! You may completely block your internet
connection! **

Home Networks
If you’re like many high-speed internet
users, you may have a wireless router
installed at home. Here are a few security
tips for wireless networks:
– Turn on WEP encryption. If you’re unsure
how to do this, check the manufacturer’s
website.
– Use MAC filtering to allow only certain PCs to
access your network.
– Turn off your router when not in use for
extended periods.

We use locks to protect our homes, cars,
and other valuables.
Protect your personal and school data by
taking steps to keep it secure.

Resources
http://www.microsoft.com/athome/security/videos/default.
mspx Numerous videos on various security topics may
be found here.
http://www.lavasoftusa.com/support/download/ AdAware
free download
http://www.safer-networking.org/en/download/index.html
Spybot Search and Destroy free download
http://www.javacoolsoftware.com/spywareblaster.html
SpywareBlaster free download
http://free.grisoft.com/freeweb.php/doc/2/ AVG Anti-virus
free download
http://www.microsoft.com/windowsxp/using/networking/e
xpert/bowman_03july28.mspx Wireless security for
home networks


Slide 12

PC Security 101
Keeping your data and your
computer safe

Security is a real concern
Identity theft is a hot topic in the news.
Data theft is a very real and serious issue.
Malicious programs allow users to capture
logins, passwords, credit card information,
personal, and business data.
We have found some of these programs in
home directories in our schools.

How does it all work?
Users install malicious programs from
floppy disks, CDs or thumb drives to avoid
detection on the network.
Programs install quickly and easily when
logged in as an administrator.
Local administrator passwords are easy to
crack with software found on the Internet.
Novell passwords are not easy to crack.

How does it all work?
Once installed, these programs begin to
capture data. The data can be stored on
the machine, or even emailed to another
user.
Keystrokes can be captured, gathering
your logins and passwords to websites,
what you type in a document or email, as
well as any information you enter on a
form.

How does it all work?
Screenshots can be captured, showing
what you are seeing on the screen.
Malicious users can use what they have
captured to login as you and have access
to all of your programs, files and data.

What can you do?
Do not allow students to use your computer, if
possible. **This is especially important in high
schools and middle schools**
Be sure to logout when you leave your
computer, even for a brief time.
Logout and turn off computers at the end of each
day.
Do not allow others to use your computer when
you are logged in.
Be aware of where you are saving documents.
Do not save sensitive information to a shared
folder.

What can you do?
Change your password frequently.
Do not allow other colleagues to login with your
password. This is against board policy, as well
as a really bad idea!
Select hard to guess passwords with letters,
numbers and other characters.
Be aware of what students are doing on the
computers.
Enforce policies regarding misuse of computers.
Report any suspicious activities to your
supervisor and your technology support staff.

The Law
State and Federal laws prohibit unauthorized
access, additions, deletions, or changes to a
network, password disclosure and numerous other
activities.
Violations of state and federal codes may result in
fines and imprisonment.
Copyright is a very serious issue. Violations may
result in very large fines.
Students should be educated on laws and ethics.
Be sure to read the Douglas County Acceptable Use
Policy on our staff home page:
http://web.douglas.k12.ga.us/web/intranet/startstaff.
htm

The Law
Georgia Code: http://www.ganet.org/cgibin/pub/ocode/ocgsearch?docname=OCo
de/G/16/9/93
Federal Code:
http://www.usdoj.gov/criminal/cybercri
me/1030NEW.htm

More troubling news…
Spyware/Adware slows down our
computer and compromises security.
Phishing scams look so real that we are
tempted to fall for them.
New worms and viruses surface every
day.

What about my home computer?
The first line of defense is to monitor your
inbox!
– Do not open email from unknown/unexpected
addresses, particularly with attachments.
– Opening spam email verifies that your
account is a live account.
– If you have a “report as spam” option with
your ISP, use it.
– Enable email filtering, if your ISP provides it.
(Junk/Spam folders)

What about my home computer?
– Use your work email for work and have a
personal email account for personal email.
– Create an extra account that you will use
when asked to provide an email address on a
website. This account will fill up with junk and
should only be used for this purpose.
– If you feel compelled to forward emails to a
large group, use the BCC feature to hide
addresses. Encourage your friends to do the
same.

What about my home computer?
Use anti-spyware programs on your home
computers to detect and delete malicious
programs.
– Update definitions and scan your PC once a week or
at the very least, monthly.
– AdAware, SpywareBlaster, and Spybot Search and
Destroy are free for personal use and quite effective!

Use anti-virus software on your home
computers to protect against viruses,
worms, and trojans.
– Many ISPs now offer free anti-virus software.
Comcast and AOL offer McAfee. Check with your ISP
for further details.

What about my home computer?
Use a firewall if you have high-speed internet
service (broadband or DSL)
– A router/gateway is a hardware firewall that will
provide protection.
– Software firewalls include: Windows firewall, built into
Windows XP and ZoneAlarm, free products.
– McAfee may be provided by your ISP.
– Norton Internet Security is another product that works
well.
** A word of caution: Be careful configuring software
firewalls! You may completely block your internet
connection! **

Home Networks
If you’re like many high-speed internet
users, you may have a wireless router
installed at home. Here are a few security
tips for wireless networks:
– Turn on WEP encryption. If you’re unsure
how to do this, check the manufacturer’s
website.
– Use MAC filtering to allow only certain PCs to
access your network.
– Turn off your router when not in use for
extended periods.

We use locks to protect our homes, cars,
and other valuables.
Protect your personal and school data by
taking steps to keep it secure.

Resources
http://www.microsoft.com/athome/security/videos/default.
mspx Numerous videos on various security topics may
be found here.
http://www.lavasoftusa.com/support/download/ AdAware
free download
http://www.safer-networking.org/en/download/index.html
Spybot Search and Destroy free download
http://www.javacoolsoftware.com/spywareblaster.html
SpywareBlaster free download
http://free.grisoft.com/freeweb.php/doc/2/ AVG Anti-virus
free download
http://www.microsoft.com/windowsxp/using/networking/e
xpert/bowman_03july28.mspx Wireless security for
home networks


Slide 13

PC Security 101
Keeping your data and your
computer safe

Security is a real concern
Identity theft is a hot topic in the news.
Data theft is a very real and serious issue.
Malicious programs allow users to capture
logins, passwords, credit card information,
personal, and business data.
We have found some of these programs in
home directories in our schools.

How does it all work?
Users install malicious programs from
floppy disks, CDs or thumb drives to avoid
detection on the network.
Programs install quickly and easily when
logged in as an administrator.
Local administrator passwords are easy to
crack with software found on the Internet.
Novell passwords are not easy to crack.

How does it all work?
Once installed, these programs begin to
capture data. The data can be stored on
the machine, or even emailed to another
user.
Keystrokes can be captured, gathering
your logins and passwords to websites,
what you type in a document or email, as
well as any information you enter on a
form.

How does it all work?
Screenshots can be captured, showing
what you are seeing on the screen.
Malicious users can use what they have
captured to login as you and have access
to all of your programs, files and data.

What can you do?
Do not allow students to use your computer, if
possible. **This is especially important in high
schools and middle schools**
Be sure to logout when you leave your
computer, even for a brief time.
Logout and turn off computers at the end of each
day.
Do not allow others to use your computer when
you are logged in.
Be aware of where you are saving documents.
Do not save sensitive information to a shared
folder.

What can you do?
Change your password frequently.
Do not allow other colleagues to login with your
password. This is against board policy, as well
as a really bad idea!
Select hard to guess passwords with letters,
numbers and other characters.
Be aware of what students are doing on the
computers.
Enforce policies regarding misuse of computers.
Report any suspicious activities to your
supervisor and your technology support staff.

The Law
State and Federal laws prohibit unauthorized
access, additions, deletions, or changes to a
network, password disclosure and numerous other
activities.
Violations of state and federal codes may result in
fines and imprisonment.
Copyright is a very serious issue. Violations may
result in very large fines.
Students should be educated on laws and ethics.
Be sure to read the Douglas County Acceptable Use
Policy on our staff home page:
http://web.douglas.k12.ga.us/web/intranet/startstaff.
htm

The Law
Georgia Code: http://www.ganet.org/cgibin/pub/ocode/ocgsearch?docname=OCo
de/G/16/9/93
Federal Code:
http://www.usdoj.gov/criminal/cybercri
me/1030NEW.htm

More troubling news…
Spyware/Adware slows down our
computer and compromises security.
Phishing scams look so real that we are
tempted to fall for them.
New worms and viruses surface every
day.

What about my home computer?
The first line of defense is to monitor your
inbox!
– Do not open email from unknown/unexpected
addresses, particularly with attachments.
– Opening spam email verifies that your
account is a live account.
– If you have a “report as spam” option with
your ISP, use it.
– Enable email filtering, if your ISP provides it.
(Junk/Spam folders)

What about my home computer?
– Use your work email for work and have a
personal email account for personal email.
– Create an extra account that you will use
when asked to provide an email address on a
website. This account will fill up with junk and
should only be used for this purpose.
– If you feel compelled to forward emails to a
large group, use the BCC feature to hide
addresses. Encourage your friends to do the
same.

What about my home computer?
Use anti-spyware programs on your home
computers to detect and delete malicious
programs.
– Update definitions and scan your PC once a week or
at the very least, monthly.
– AdAware, SpywareBlaster, and Spybot Search and
Destroy are free for personal use and quite effective!

Use anti-virus software on your home
computers to protect against viruses,
worms, and trojans.
– Many ISPs now offer free anti-virus software.
Comcast and AOL offer McAfee. Check with your ISP
for further details.

What about my home computer?
Use a firewall if you have high-speed internet
service (broadband or DSL)
– A router/gateway is a hardware firewall that will
provide protection.
– Software firewalls include: Windows firewall, built into
Windows XP and ZoneAlarm, free products.
– McAfee may be provided by your ISP.
– Norton Internet Security is another product that works
well.
** A word of caution: Be careful configuring software
firewalls! You may completely block your internet
connection! **

Home Networks
If you’re like many high-speed internet
users, you may have a wireless router
installed at home. Here are a few security
tips for wireless networks:
– Turn on WEP encryption. If you’re unsure
how to do this, check the manufacturer’s
website.
– Use MAC filtering to allow only certain PCs to
access your network.
– Turn off your router when not in use for
extended periods.

We use locks to protect our homes, cars,
and other valuables.
Protect your personal and school data by
taking steps to keep it secure.

Resources
http://www.microsoft.com/athome/security/videos/default.
mspx Numerous videos on various security topics may
be found here.
http://www.lavasoftusa.com/support/download/ AdAware
free download
http://www.safer-networking.org/en/download/index.html
Spybot Search and Destroy free download
http://www.javacoolsoftware.com/spywareblaster.html
SpywareBlaster free download
http://free.grisoft.com/freeweb.php/doc/2/ AVG Anti-virus
free download
http://www.microsoft.com/windowsxp/using/networking/e
xpert/bowman_03july28.mspx Wireless security for
home networks


Slide 14

PC Security 101
Keeping your data and your
computer safe

Security is a real concern
Identity theft is a hot topic in the news.
Data theft is a very real and serious issue.
Malicious programs allow users to capture
logins, passwords, credit card information,
personal, and business data.
We have found some of these programs in
home directories in our schools.

How does it all work?
Users install malicious programs from
floppy disks, CDs or thumb drives to avoid
detection on the network.
Programs install quickly and easily when
logged in as an administrator.
Local administrator passwords are easy to
crack with software found on the Internet.
Novell passwords are not easy to crack.

How does it all work?
Once installed, these programs begin to
capture data. The data can be stored on
the machine, or even emailed to another
user.
Keystrokes can be captured, gathering
your logins and passwords to websites,
what you type in a document or email, as
well as any information you enter on a
form.

How does it all work?
Screenshots can be captured, showing
what you are seeing on the screen.
Malicious users can use what they have
captured to login as you and have access
to all of your programs, files and data.

What can you do?
Do not allow students to use your computer, if
possible. **This is especially important in high
schools and middle schools**
Be sure to logout when you leave your
computer, even for a brief time.
Logout and turn off computers at the end of each
day.
Do not allow others to use your computer when
you are logged in.
Be aware of where you are saving documents.
Do not save sensitive information to a shared
folder.

What can you do?
Change your password frequently.
Do not allow other colleagues to login with your
password. This is against board policy, as well
as a really bad idea!
Select hard to guess passwords with letters,
numbers and other characters.
Be aware of what students are doing on the
computers.
Enforce policies regarding misuse of computers.
Report any suspicious activities to your
supervisor and your technology support staff.

The Law
State and Federal laws prohibit unauthorized
access, additions, deletions, or changes to a
network, password disclosure and numerous other
activities.
Violations of state and federal codes may result in
fines and imprisonment.
Copyright is a very serious issue. Violations may
result in very large fines.
Students should be educated on laws and ethics.
Be sure to read the Douglas County Acceptable Use
Policy on our staff home page:
http://web.douglas.k12.ga.us/web/intranet/startstaff.
htm

The Law
Georgia Code: http://www.ganet.org/cgibin/pub/ocode/ocgsearch?docname=OCo
de/G/16/9/93
Federal Code:
http://www.usdoj.gov/criminal/cybercri
me/1030NEW.htm

More troubling news…
Spyware/Adware slows down our
computer and compromises security.
Phishing scams look so real that we are
tempted to fall for them.
New worms and viruses surface every
day.

What about my home computer?
The first line of defense is to monitor your
inbox!
– Do not open email from unknown/unexpected
addresses, particularly with attachments.
– Opening spam email verifies that your
account is a live account.
– If you have a “report as spam” option with
your ISP, use it.
– Enable email filtering, if your ISP provides it.
(Junk/Spam folders)

What about my home computer?
– Use your work email for work and have a
personal email account for personal email.
– Create an extra account that you will use
when asked to provide an email address on a
website. This account will fill up with junk and
should only be used for this purpose.
– If you feel compelled to forward emails to a
large group, use the BCC feature to hide
addresses. Encourage your friends to do the
same.

What about my home computer?
Use anti-spyware programs on your home
computers to detect and delete malicious
programs.
– Update definitions and scan your PC once a week or
at the very least, monthly.
– AdAware, SpywareBlaster, and Spybot Search and
Destroy are free for personal use and quite effective!

Use anti-virus software on your home
computers to protect against viruses,
worms, and trojans.
– Many ISPs now offer free anti-virus software.
Comcast and AOL offer McAfee. Check with your ISP
for further details.

What about my home computer?
Use a firewall if you have high-speed internet
service (broadband or DSL)
– A router/gateway is a hardware firewall that will
provide protection.
– Software firewalls include: Windows firewall, built into
Windows XP and ZoneAlarm, free products.
– McAfee may be provided by your ISP.
– Norton Internet Security is another product that works
well.
** A word of caution: Be careful configuring software
firewalls! You may completely block your internet
connection! **

Home Networks
If you’re like many high-speed internet
users, you may have a wireless router
installed at home. Here are a few security
tips for wireless networks:
– Turn on WEP encryption. If you’re unsure
how to do this, check the manufacturer’s
website.
– Use MAC filtering to allow only certain PCs to
access your network.
– Turn off your router when not in use for
extended periods.

We use locks to protect our homes, cars,
and other valuables.
Protect your personal and school data by
taking steps to keep it secure.

Resources
http://www.microsoft.com/athome/security/videos/default.
mspx Numerous videos on various security topics may
be found here.
http://www.lavasoftusa.com/support/download/ AdAware
free download
http://www.safer-networking.org/en/download/index.html
Spybot Search and Destroy free download
http://www.javacoolsoftware.com/spywareblaster.html
SpywareBlaster free download
http://free.grisoft.com/freeweb.php/doc/2/ AVG Anti-virus
free download
http://www.microsoft.com/windowsxp/using/networking/e
xpert/bowman_03july28.mspx Wireless security for
home networks


Slide 15

PC Security 101
Keeping your data and your
computer safe

Security is a real concern
Identity theft is a hot topic in the news.
Data theft is a very real and serious issue.
Malicious programs allow users to capture
logins, passwords, credit card information,
personal, and business data.
We have found some of these programs in
home directories in our schools.

How does it all work?
Users install malicious programs from
floppy disks, CDs or thumb drives to avoid
detection on the network.
Programs install quickly and easily when
logged in as an administrator.
Local administrator passwords are easy to
crack with software found on the Internet.
Novell passwords are not easy to crack.

How does it all work?
Once installed, these programs begin to
capture data. The data can be stored on
the machine, or even emailed to another
user.
Keystrokes can be captured, gathering
your logins and passwords to websites,
what you type in a document or email, as
well as any information you enter on a
form.

How does it all work?
Screenshots can be captured, showing
what you are seeing on the screen.
Malicious users can use what they have
captured to login as you and have access
to all of your programs, files and data.

What can you do?
Do not allow students to use your computer, if
possible. **This is especially important in high
schools and middle schools**
Be sure to logout when you leave your
computer, even for a brief time.
Logout and turn off computers at the end of each
day.
Do not allow others to use your computer when
you are logged in.
Be aware of where you are saving documents.
Do not save sensitive information to a shared
folder.

What can you do?
Change your password frequently.
Do not allow other colleagues to login with your
password. This is against board policy, as well
as a really bad idea!
Select hard to guess passwords with letters,
numbers and other characters.
Be aware of what students are doing on the
computers.
Enforce policies regarding misuse of computers.
Report any suspicious activities to your
supervisor and your technology support staff.

The Law
State and Federal laws prohibit unauthorized
access, additions, deletions, or changes to a
network, password disclosure and numerous other
activities.
Violations of state and federal codes may result in
fines and imprisonment.
Copyright is a very serious issue. Violations may
result in very large fines.
Students should be educated on laws and ethics.
Be sure to read the Douglas County Acceptable Use
Policy on our staff home page:
http://web.douglas.k12.ga.us/web/intranet/startstaff.
htm

The Law
Georgia Code: http://www.ganet.org/cgibin/pub/ocode/ocgsearch?docname=OCo
de/G/16/9/93
Federal Code:
http://www.usdoj.gov/criminal/cybercri
me/1030NEW.htm

More troubling news…
Spyware/Adware slows down our
computer and compromises security.
Phishing scams look so real that we are
tempted to fall for them.
New worms and viruses surface every
day.

What about my home computer?
The first line of defense is to monitor your
inbox!
– Do not open email from unknown/unexpected
addresses, particularly with attachments.
– Opening spam email verifies that your
account is a live account.
– If you have a “report as spam” option with
your ISP, use it.
– Enable email filtering, if your ISP provides it.
(Junk/Spam folders)

What about my home computer?
– Use your work email for work and have a
personal email account for personal email.
– Create an extra account that you will use
when asked to provide an email address on a
website. This account will fill up with junk and
should only be used for this purpose.
– If you feel compelled to forward emails to a
large group, use the BCC feature to hide
addresses. Encourage your friends to do the
same.

What about my home computer?
Use anti-spyware programs on your home
computers to detect and delete malicious
programs.
– Update definitions and scan your PC once a week or
at the very least, monthly.
– AdAware, SpywareBlaster, and Spybot Search and
Destroy are free for personal use and quite effective!

Use anti-virus software on your home
computers to protect against viruses,
worms, and trojans.
– Many ISPs now offer free anti-virus software.
Comcast and AOL offer McAfee. Check with your ISP
for further details.

What about my home computer?
Use a firewall if you have high-speed internet
service (broadband or DSL)
– A router/gateway is a hardware firewall that will
provide protection.
– Software firewalls include: Windows firewall, built into
Windows XP and ZoneAlarm, free products.
– McAfee may be provided by your ISP.
– Norton Internet Security is another product that works
well.
** A word of caution: Be careful configuring software
firewalls! You may completely block your internet
connection! **

Home Networks
If you’re like many high-speed internet
users, you may have a wireless router
installed at home. Here are a few security
tips for wireless networks:
– Turn on WEP encryption. If you’re unsure
how to do this, check the manufacturer’s
website.
– Use MAC filtering to allow only certain PCs to
access your network.
– Turn off your router when not in use for
extended periods.

We use locks to protect our homes, cars,
and other valuables.
Protect your personal and school data by
taking steps to keep it secure.

Resources
http://www.microsoft.com/athome/security/videos/default.
mspx Numerous videos on various security topics may
be found here.
http://www.lavasoftusa.com/support/download/ AdAware
free download
http://www.safer-networking.org/en/download/index.html
Spybot Search and Destroy free download
http://www.javacoolsoftware.com/spywareblaster.html
SpywareBlaster free download
http://free.grisoft.com/freeweb.php/doc/2/ AVG Anti-virus
free download
http://www.microsoft.com/windowsxp/using/networking/e
xpert/bowman_03july28.mspx Wireless security for
home networks


Slide 16

PC Security 101
Keeping your data and your
computer safe

Security is a real concern
Identity theft is a hot topic in the news.
Data theft is a very real and serious issue.
Malicious programs allow users to capture
logins, passwords, credit card information,
personal, and business data.
We have found some of these programs in
home directories in our schools.

How does it all work?
Users install malicious programs from
floppy disks, CDs or thumb drives to avoid
detection on the network.
Programs install quickly and easily when
logged in as an administrator.
Local administrator passwords are easy to
crack with software found on the Internet.
Novell passwords are not easy to crack.

How does it all work?
Once installed, these programs begin to
capture data. The data can be stored on
the machine, or even emailed to another
user.
Keystrokes can be captured, gathering
your logins and passwords to websites,
what you type in a document or email, as
well as any information you enter on a
form.

How does it all work?
Screenshots can be captured, showing
what you are seeing on the screen.
Malicious users can use what they have
captured to login as you and have access
to all of your programs, files and data.

What can you do?
Do not allow students to use your computer, if
possible. **This is especially important in high
schools and middle schools**
Be sure to logout when you leave your
computer, even for a brief time.
Logout and turn off computers at the end of each
day.
Do not allow others to use your computer when
you are logged in.
Be aware of where you are saving documents.
Do not save sensitive information to a shared
folder.

What can you do?
Change your password frequently.
Do not allow other colleagues to login with your
password. This is against board policy, as well
as a really bad idea!
Select hard to guess passwords with letters,
numbers and other characters.
Be aware of what students are doing on the
computers.
Enforce policies regarding misuse of computers.
Report any suspicious activities to your
supervisor and your technology support staff.

The Law
State and Federal laws prohibit unauthorized
access, additions, deletions, or changes to a
network, password disclosure and numerous other
activities.
Violations of state and federal codes may result in
fines and imprisonment.
Copyright is a very serious issue. Violations may
result in very large fines.
Students should be educated on laws and ethics.
Be sure to read the Douglas County Acceptable Use
Policy on our staff home page:
http://web.douglas.k12.ga.us/web/intranet/startstaff.
htm

The Law
Georgia Code: http://www.ganet.org/cgibin/pub/ocode/ocgsearch?docname=OCo
de/G/16/9/93
Federal Code:
http://www.usdoj.gov/criminal/cybercri
me/1030NEW.htm

More troubling news…
Spyware/Adware slows down our
computer and compromises security.
Phishing scams look so real that we are
tempted to fall for them.
New worms and viruses surface every
day.

What about my home computer?
The first line of defense is to monitor your
inbox!
– Do not open email from unknown/unexpected
addresses, particularly with attachments.
– Opening spam email verifies that your
account is a live account.
– If you have a “report as spam” option with
your ISP, use it.
– Enable email filtering, if your ISP provides it.
(Junk/Spam folders)

What about my home computer?
– Use your work email for work and have a
personal email account for personal email.
– Create an extra account that you will use
when asked to provide an email address on a
website. This account will fill up with junk and
should only be used for this purpose.
– If you feel compelled to forward emails to a
large group, use the BCC feature to hide
addresses. Encourage your friends to do the
same.

What about my home computer?
Use anti-spyware programs on your home
computers to detect and delete malicious
programs.
– Update definitions and scan your PC once a week or
at the very least, monthly.
– AdAware, SpywareBlaster, and Spybot Search and
Destroy are free for personal use and quite effective!

Use anti-virus software on your home
computers to protect against viruses,
worms, and trojans.
– Many ISPs now offer free anti-virus software.
Comcast and AOL offer McAfee. Check with your ISP
for further details.

What about my home computer?
Use a firewall if you have high-speed internet
service (broadband or DSL)
– A router/gateway is a hardware firewall that will
provide protection.
– Software firewalls include: Windows firewall, built into
Windows XP and ZoneAlarm, free products.
– McAfee may be provided by your ISP.
– Norton Internet Security is another product that works
well.
** A word of caution: Be careful configuring software
firewalls! You may completely block your internet
connection! **

Home Networks
If you’re like many high-speed internet
users, you may have a wireless router
installed at home. Here are a few security
tips for wireless networks:
– Turn on WEP encryption. If you’re unsure
how to do this, check the manufacturer’s
website.
– Use MAC filtering to allow only certain PCs to
access your network.
– Turn off your router when not in use for
extended periods.

We use locks to protect our homes, cars,
and other valuables.
Protect your personal and school data by
taking steps to keep it secure.

Resources
http://www.microsoft.com/athome/security/videos/default.
mspx Numerous videos on various security topics may
be found here.
http://www.lavasoftusa.com/support/download/ AdAware
free download
http://www.safer-networking.org/en/download/index.html
Spybot Search and Destroy free download
http://www.javacoolsoftware.com/spywareblaster.html
SpywareBlaster free download
http://free.grisoft.com/freeweb.php/doc/2/ AVG Anti-virus
free download
http://www.microsoft.com/windowsxp/using/networking/e
xpert/bowman_03july28.mspx Wireless security for
home networks


Slide 17

PC Security 101
Keeping your data and your
computer safe

Security is a real concern
Identity theft is a hot topic in the news.
Data theft is a very real and serious issue.
Malicious programs allow users to capture
logins, passwords, credit card information,
personal, and business data.
We have found some of these programs in
home directories in our schools.

How does it all work?
Users install malicious programs from
floppy disks, CDs or thumb drives to avoid
detection on the network.
Programs install quickly and easily when
logged in as an administrator.
Local administrator passwords are easy to
crack with software found on the Internet.
Novell passwords are not easy to crack.

How does it all work?
Once installed, these programs begin to
capture data. The data can be stored on
the machine, or even emailed to another
user.
Keystrokes can be captured, gathering
your logins and passwords to websites,
what you type in a document or email, as
well as any information you enter on a
form.

How does it all work?
Screenshots can be captured, showing
what you are seeing on the screen.
Malicious users can use what they have
captured to login as you and have access
to all of your programs, files and data.

What can you do?
Do not allow students to use your computer, if
possible. **This is especially important in high
schools and middle schools**
Be sure to logout when you leave your
computer, even for a brief time.
Logout and turn off computers at the end of each
day.
Do not allow others to use your computer when
you are logged in.
Be aware of where you are saving documents.
Do not save sensitive information to a shared
folder.

What can you do?
Change your password frequently.
Do not allow other colleagues to login with your
password. This is against board policy, as well
as a really bad idea!
Select hard to guess passwords with letters,
numbers and other characters.
Be aware of what students are doing on the
computers.
Enforce policies regarding misuse of computers.
Report any suspicious activities to your
supervisor and your technology support staff.

The Law
State and Federal laws prohibit unauthorized
access, additions, deletions, or changes to a
network, password disclosure and numerous other
activities.
Violations of state and federal codes may result in
fines and imprisonment.
Copyright is a very serious issue. Violations may
result in very large fines.
Students should be educated on laws and ethics.
Be sure to read the Douglas County Acceptable Use
Policy on our staff home page:
http://web.douglas.k12.ga.us/web/intranet/startstaff.
htm

The Law
Georgia Code: http://www.ganet.org/cgibin/pub/ocode/ocgsearch?docname=OCo
de/G/16/9/93
Federal Code:
http://www.usdoj.gov/criminal/cybercri
me/1030NEW.htm

More troubling news…
Spyware/Adware slows down our
computer and compromises security.
Phishing scams look so real that we are
tempted to fall for them.
New worms and viruses surface every
day.

What about my home computer?
The first line of defense is to monitor your
inbox!
– Do not open email from unknown/unexpected
addresses, particularly with attachments.
– Opening spam email verifies that your
account is a live account.
– If you have a “report as spam” option with
your ISP, use it.
– Enable email filtering, if your ISP provides it.
(Junk/Spam folders)

What about my home computer?
– Use your work email for work and have a
personal email account for personal email.
– Create an extra account that you will use
when asked to provide an email address on a
website. This account will fill up with junk and
should only be used for this purpose.
– If you feel compelled to forward emails to a
large group, use the BCC feature to hide
addresses. Encourage your friends to do the
same.

What about my home computer?
Use anti-spyware programs on your home
computers to detect and delete malicious
programs.
– Update definitions and scan your PC once a week or
at the very least, monthly.
– AdAware, SpywareBlaster, and Spybot Search and
Destroy are free for personal use and quite effective!

Use anti-virus software on your home
computers to protect against viruses,
worms, and trojans.
– Many ISPs now offer free anti-virus software.
Comcast and AOL offer McAfee. Check with your ISP
for further details.

What about my home computer?
Use a firewall if you have high-speed internet
service (broadband or DSL)
– A router/gateway is a hardware firewall that will
provide protection.
– Software firewalls include: Windows firewall, built into
Windows XP and ZoneAlarm, free products.
– McAfee may be provided by your ISP.
– Norton Internet Security is another product that works
well.
** A word of caution: Be careful configuring software
firewalls! You may completely block your internet
connection! **

Home Networks
If you’re like many high-speed internet
users, you may have a wireless router
installed at home. Here are a few security
tips for wireless networks:
– Turn on WEP encryption. If you’re unsure
how to do this, check the manufacturer’s
website.
– Use MAC filtering to allow only certain PCs to
access your network.
– Turn off your router when not in use for
extended periods.

We use locks to protect our homes, cars,
and other valuables.
Protect your personal and school data by
taking steps to keep it secure.

Resources
http://www.microsoft.com/athome/security/videos/default.
mspx Numerous videos on various security topics may
be found here.
http://www.lavasoftusa.com/support/download/ AdAware
free download
http://www.safer-networking.org/en/download/index.html
Spybot Search and Destroy free download
http://www.javacoolsoftware.com/spywareblaster.html
SpywareBlaster free download
http://free.grisoft.com/freeweb.php/doc/2/ AVG Anti-virus
free download
http://www.microsoft.com/windowsxp/using/networking/e
xpert/bowman_03july28.mspx Wireless security for
home networks