Internet Safety How to protect your computer, yourself, and your children in cyberspace.

Post on 18-Dec-2015

216 views 0 download

Tags:

Transcript of Internet Safety How to protect your computer, yourself, and your children in cyberspace.

Internet Safety

How to protect your computer, yourself, and your children in

cyberspace

Internet Safety

The Internet – Should I be worried?

Updates SPAM Malware Viruses Badware Blogging Filtering Instant Messaging

Spyware Root Kits Firewalls Email Phishing Pharming Internet

Communications Newsgroups

Update, update, update

Operating systems should be updated on a regularly scheduled basis Windows update services should be scheduled to

run on your home computers weekly (minimum) To schedule these services go to start, settings,

control panel, security center, click on automatic updates (you must be logged in as an administrative user)

Updates continued

Updates continued

SPAM and Email

What is SPAM? Unsolicited junk email

Why do I get so much SPAM? Easily guessed email addresses Signing up for newsletters, internet information,

and using your email address online

How can I stop SPAM?

ANTI-SPAM Software www.mailwasher.net - free software that can help

eliminate SPAM Common sense ideas

Use 1 email address for all newsletters, specials, promotions, etc

Use a different email address for your friends and family

Use BCC when sending email to multiple users

Phishing and Pharming

Phishing is social engineering which attempts to steal user id’s, passwords, and account numbers via email or electronic instant messaging

Pharming is an exploitation of the domain naming system which allows an attacker to acquire a domain name and forward traffic destined for a legitimate site to another location

Phishing and Pharming

Subscribe to an alert system which will notify you of potential phishing attacks www.websensesecuritylabs.com Use filtering, anti-spam and anti-virus software to help

prevent phishing attacks Never click on email link connecting to a bank or other

online institution – open browser and key URL in manually

Pharming attacks are very infrequent and are extremely difficult to detect Be aware of website designs and be cautious when

providing any personal information online

Malware vs Badware

What is it? Malware is software or hardware intentionally

installed for a harmful purpose Identity logging, keylogging, etc

Badware is software that is installed with unintended results Webshots – great pictures but it contains adware,

spyware and user tracking Smileycentral – cool emoticons but it also contains

adware, spyware and user tracking

Malware and Badware

What can you do? Be cautious with downloads Search google and yahoo for information related

to the file you are downloading Read the fine print when installing software that

you download from the internet

Viruses, Trojans and Worms

Viruses are self replicating applications that infect computers via user interaction

Trojans are application programs that claim to do something for the user but in reality they do something else once installed

Worms are viruses that use networks and security holes to self replicate and infect additional computers

Viruses, Trojans and Worms

What can you do? Always run anti-virus software

Free.grisoft.com – free antivirus software for anyone Stinger - http://vil.nai.com/vil/stinger/ removes a

number of common viruses Symantec Antivirus – www.symantec.com McAfee Antivirus – www.mcafee.com/usa Sophos Antivirus – www.sophos.com Kapersky – usa.kapersky.com Be sure your antivirus software is up to date with

the latest signatures

Firewalls

What is a firewall? Software and/or hardware that blocks incoming or

outgoing network traffic Why do you need it?

Many exploits use network ports other than port 80 (www) to send and receive information

Firewalls can effectively block some exploits by blocking the ports they use to transmit information

Firewalls

Examples Microsoft Firewall Zone labs zonealarm Linksys internet routers (hardware)

Rootkits

What is a rootkit? Software that installs itself on a computer with no

user intervention What does it do?

Rootkits effectively give administrative control of the computer to the software

How do I block rootkits? It is difficult to block rootkits; however, most ant-

virus software blocks known rootkits

Blogging

What is Blogging? Blogging is a written log written in chronological

order posted to a website Should I be concerned with blogging?

Maybe? When used appropriately and with adult supervision a

blog can be an effective communications tool When personal information is provided in a blog it is

available to everyone with computer access

Blogging

Should my child be blogging? Children must understand that they should never

post any personal information on a blog site. They should never include last names, identification numbers, addresses, ages, or physical descriptions of themselves or their friends.

Remember that once the information is posted it is available to EVERYONE – friends, family, and online predators

Blogging

Kids favorite blogging sites www.myspace.com www.facebook.com www.xanga.com www.blogger.com 360.yahoo.com www.feedster.com (search blog sites)

Spyware

Spyware is malicious software that intercepts information and takes partial control of a computers operation without the owners consent for the benefit of a third party company. In 2005 Spyware was the primary cause for most personal computer problems.

Causes for concern: Pop-up ads Keylogging

Spyware

Causes for concern continued Surreptitious data monitoring

Includes financial data monitoring Account number monitoring Personal information monitoring

Computer hijacking Uses computer as a bot for malicious purposes

Spyware

Elimination and prevention Ad aware – www.lavasoftusa.com (free) Spybot search and destroy - www.safer-networking.org

(free) Webroot spysweeper – www.webroot.com (rated #1) Microsoft Defender – www.microsoft.com/spyware

(free)

Instant Messaging

Provides instant communications with other individuals (chat) Common programs

AIM (AOL) Yahoo Messenger ICQ (AOL) IRC (Internet Relay Chat) MSN Messenger Trillian (connects to multiple accounts simultaneously)

Instant Messaging

Concerns Who is the person on the other end? Viruses and worms Personal information sharing

Recommendations Be sure you know the person you or your children

are chatting with. Block unknown or anonymous users via chat

options.

Instant Messaging

Recommendations continued Never give out any personal information Monitor activity via filtering software

(reviewed later)

Internet Communications

Internet communications include VOIP (voice over IP) and live video

Common programs Skype – www.skype.com (free VOIP calls) Video enabled MSN, Yahoo, and AOL

Concerns Application exploits – be sure all applications are

up to date Profiles are seen by ALL users

Internet Communications

Concerns continued Set privacy options in application software to

avoid anonymous connections Call interception

Newsgroups

A usenet discussion group related to a single topic

Be aware that many newsgroups are used to harvest email addresses for spammers

Many newsgroups have VERY inappropriate material including graphic pictures, video, music and suggestive text

Filtering

Software designed to help eliminate unwanted websites, spam, chat, pop-ups, newsgroups and more. This software can also set time limits on websites and online chatting. Many filtering applications also include chat and internet logging.

Filtering recommendations

http://internet-filter-review.toptenreviews.com/ Review site for filtering software

Information Use your judgement when purchasing filtering

software Some software OVERBLOCKS websites Most teens know how to circumvent filtering

software

Recommendation Review

Update computer regularly (weekly or more frequently)

Run some form of antivirus software Run anti-spyware software Enable pop-blocker Beware of phishing email Be wary of email with external links or

applications that are attached

Recommendation Review

Talk to your children about safe computing – never give personal information online

Remember that once information has been posted it cannot be “taken back” and it is available to MILLIONS

Utilize online education sites for help www.isafe.org www.wiredsafety.org

Don’t be afraid to say NO

Q&A