Defensive Computing avoiding dangerous computing practices
description
Transcript of Defensive Computing avoiding dangerous computing practices
-
Wichita Public LibraryRex Cornelius Electronic ResourcesWebliography online at:http://www.wichita.lib.ks.us/Researchers/DefensiveComputing.htm
-
Programs designed to infect other computers.
-
software designed to infiltrate or damage a computer system without the owner's informed consent.
Computer viruses, Worms, Trojan horses,Rootkits, Spyware, Hijackers, dishonest Adware, Crimeware.
-
Back DoorsRootkitsallow other people to access and control your computer
-
Being an intermediary for an attack on another computer.
-
Some Trojans function as a mail forwarder, and allow the attacker to transmit spam through the infected system.
-
A remote administrator can use your computer to store illegal materials.
-
Capture and record user keystrokes to obtain passwords or encryption keys
-
Adware - Software that supports itself or another program by displaying ads.
Spyware - Software that gathers and transmits information without your knowledge.
Hijacking software - Advertising software programs that change the settings of your browser without your knowledge.
-
Currently the biggest threat to personal computing.Virus-like symptoms.Earthlink: 29 million spyware-related files on the 1 million computers Microsoft: 50% of computer crashesGoogle: 450,000 sites that install malicious code
-
You
-
Keep all applications patched to the most recent levelOperating systemInternet BrowsersEmail programsWord ProcessorsSpreadsheets
All Microsoft Products!
-
Use anti-virus software on all Internet-connected computers. Be sure to keep your anti-virus software up-to-date. Use automatic updates of virus definitions when available.
-
can be exploited by intruders
-
Dont run a program unless you know its from a trusted source. Never run programs of unknown originNever transfer programs of unknown origin
-
Scan with a removal tool often.Ad AwareSpybotMS Malicious Software Removal Tool
-
Network deviceLinksys, Netgear, etc.
Personal firewall software ZoneAlarmOutpost Firewall ProWindows Firewall
-
techniques used to manipulate people into performing actions or divulging confidential information.
-
An e-mail message can appear to come from one source when it was sent from another.
-
Never open unknown e-mail attachments. Know the source.Before opening any e-mail attachments, be sure your virus definitions are up-to-dateYou can save the file to your disk and scan the file using your antivirus software
-
Messages designed to gather confidential information.
-
Never send confidential information by e-mail:Credit card numbers PasswordsNever trust links sent by e-mail.Service Providers will never ask for your username or password.
-
Disguise malicious programs
LOVE-LETTER-FOR-YOU.TXT.vbsAnnaKournikova.jpg.pif
-
Using a domain name with bad faith intent to profit from the goodwill of a trademark belonging to someone else.A form of cybersquatting which relies on mistakes such as typographical errors made by Internet users when inputting a website address into a web browser.
-
Download of spyware, a computer virus or any kind of malware that happens without knowledge of the user. Drive-by downloads may happen by visiting a website, viewing an e-mail message or by clicking on a deceptive popup window.
-
securitycartoon.com
-
Windows FirewallMalicious Software Removal ToolGoogle Warnings (StopBadware.org)McAfee SiteAdvisor - Free plug-in
-
Warnings at Googlefrom StopBadware.org
-
McAfee Site Advisor
-
ShopSafe is a free service that allows you to create a temporary card number each time you make an online purchase. This number links directly to your credit card account number but keeps your card number private and protected.
-
Choose another Web BrowserFirefox, OperaChoose another e-Mail programEudora, ThunderbirdUse a Web Mail servicegmail.com, mail.com, everyone.net
-
Disconnect from any network when its not in use
-
Make regular backups of critical data
Flash Drive, Floppy DiskExternal Hard DriveAnother Hard Drive or PartitionCD-R / CD-RWAnother PC on a network
-
Create an emergency boot disk. Remember, before you have a security event.
Save all program media.
-
The Internet is still a wonderful information resource.
Take precautions, but use and enjoy Internet access!Links are online at: http://www.wichita.lib.ks.us/Researchers/DefensiveComputing.htm
***************