Internet Safety How to protect your computer, yourself, and your children in cyberspace.

34
Internet Safety How to protect your computer, yourself, and your children in cyberspace

Transcript of Internet Safety How to protect your computer, yourself, and your children in cyberspace.

Page 1: Internet Safety How to protect your computer, yourself, and your children in cyberspace.

Internet Safety

How to protect your computer, yourself, and your children in

cyberspace

Page 2: Internet Safety How to protect your computer, yourself, and your children in cyberspace.

Internet Safety

Page 3: Internet Safety How to protect your computer, yourself, and your children in cyberspace.

The Internet – Should I be worried?

Updates SPAM Malware Viruses Badware Blogging Filtering Instant Messaging

Spyware Root Kits Firewalls Email Phishing Pharming Internet

Communications Newsgroups

Page 4: Internet Safety How to protect your computer, yourself, and your children in cyberspace.

Update, update, update

Operating systems should be updated on a regularly scheduled basis Windows update services should be scheduled to

run on your home computers weekly (minimum) To schedule these services go to start, settings,

control panel, security center, click on automatic updates (you must be logged in as an administrative user)

Page 5: Internet Safety How to protect your computer, yourself, and your children in cyberspace.

Updates continued

Page 6: Internet Safety How to protect your computer, yourself, and your children in cyberspace.

Updates continued

Page 7: Internet Safety How to protect your computer, yourself, and your children in cyberspace.

SPAM and Email

What is SPAM? Unsolicited junk email

Why do I get so much SPAM? Easily guessed email addresses Signing up for newsletters, internet information,

and using your email address online

Page 8: Internet Safety How to protect your computer, yourself, and your children in cyberspace.

How can I stop SPAM?

ANTI-SPAM Software www.mailwasher.net - free software that can help

eliminate SPAM Common sense ideas

Use 1 email address for all newsletters, specials, promotions, etc

Use a different email address for your friends and family

Use BCC when sending email to multiple users

Page 9: Internet Safety How to protect your computer, yourself, and your children in cyberspace.

Phishing and Pharming

Phishing is social engineering which attempts to steal user id’s, passwords, and account numbers via email or electronic instant messaging

Pharming is an exploitation of the domain naming system which allows an attacker to acquire a domain name and forward traffic destined for a legitimate site to another location

Page 10: Internet Safety How to protect your computer, yourself, and your children in cyberspace.

Phishing and Pharming

Subscribe to an alert system which will notify you of potential phishing attacks www.websensesecuritylabs.com Use filtering, anti-spam and anti-virus software to help

prevent phishing attacks Never click on email link connecting to a bank or other

online institution – open browser and key URL in manually

Pharming attacks are very infrequent and are extremely difficult to detect Be aware of website designs and be cautious when

providing any personal information online

Page 11: Internet Safety How to protect your computer, yourself, and your children in cyberspace.

Malware vs Badware

What is it? Malware is software or hardware intentionally

installed for a harmful purpose Identity logging, keylogging, etc

Badware is software that is installed with unintended results Webshots – great pictures but it contains adware,

spyware and user tracking Smileycentral – cool emoticons but it also contains

adware, spyware and user tracking

Page 12: Internet Safety How to protect your computer, yourself, and your children in cyberspace.

Malware and Badware

What can you do? Be cautious with downloads Search google and yahoo for information related

to the file you are downloading Read the fine print when installing software that

you download from the internet

Page 13: Internet Safety How to protect your computer, yourself, and your children in cyberspace.

Viruses, Trojans and Worms

Viruses are self replicating applications that infect computers via user interaction

Trojans are application programs that claim to do something for the user but in reality they do something else once installed

Worms are viruses that use networks and security holes to self replicate and infect additional computers

Page 14: Internet Safety How to protect your computer, yourself, and your children in cyberspace.

Viruses, Trojans and Worms

What can you do? Always run anti-virus software

Free.grisoft.com – free antivirus software for anyone Stinger - http://vil.nai.com/vil/stinger/ removes a

number of common viruses Symantec Antivirus – www.symantec.com McAfee Antivirus – www.mcafee.com/usa Sophos Antivirus – www.sophos.com Kapersky – usa.kapersky.com Be sure your antivirus software is up to date with

the latest signatures

Page 15: Internet Safety How to protect your computer, yourself, and your children in cyberspace.

Firewalls

What is a firewall? Software and/or hardware that blocks incoming or

outgoing network traffic Why do you need it?

Many exploits use network ports other than port 80 (www) to send and receive information

Firewalls can effectively block some exploits by blocking the ports they use to transmit information

Page 16: Internet Safety How to protect your computer, yourself, and your children in cyberspace.

Firewalls

Examples Microsoft Firewall Zone labs zonealarm Linksys internet routers (hardware)

Page 17: Internet Safety How to protect your computer, yourself, and your children in cyberspace.

Rootkits

What is a rootkit? Software that installs itself on a computer with no

user intervention What does it do?

Rootkits effectively give administrative control of the computer to the software

How do I block rootkits? It is difficult to block rootkits; however, most ant-

virus software blocks known rootkits

Page 18: Internet Safety How to protect your computer, yourself, and your children in cyberspace.

Blogging

What is Blogging? Blogging is a written log written in chronological

order posted to a website Should I be concerned with blogging?

Maybe? When used appropriately and with adult supervision a

blog can be an effective communications tool When personal information is provided in a blog it is

available to everyone with computer access

Page 19: Internet Safety How to protect your computer, yourself, and your children in cyberspace.

Blogging

Should my child be blogging? Children must understand that they should never

post any personal information on a blog site. They should never include last names, identification numbers, addresses, ages, or physical descriptions of themselves or their friends.

Remember that once the information is posted it is available to EVERYONE – friends, family, and online predators

Page 20: Internet Safety How to protect your computer, yourself, and your children in cyberspace.

Blogging

Kids favorite blogging sites www.myspace.com www.facebook.com www.xanga.com www.blogger.com 360.yahoo.com www.feedster.com (search blog sites)

Page 21: Internet Safety How to protect your computer, yourself, and your children in cyberspace.

Spyware

Spyware is malicious software that intercepts information and takes partial control of a computers operation without the owners consent for the benefit of a third party company. In 2005 Spyware was the primary cause for most personal computer problems.

Causes for concern: Pop-up ads Keylogging

Page 22: Internet Safety How to protect your computer, yourself, and your children in cyberspace.

Spyware

Causes for concern continued Surreptitious data monitoring

Includes financial data monitoring Account number monitoring Personal information monitoring

Computer hijacking Uses computer as a bot for malicious purposes

Page 23: Internet Safety How to protect your computer, yourself, and your children in cyberspace.

Spyware

Elimination and prevention Ad aware – www.lavasoftusa.com (free) Spybot search and destroy - www.safer-networking.org

(free) Webroot spysweeper – www.webroot.com (rated #1) Microsoft Defender – www.microsoft.com/spyware

(free)

Page 24: Internet Safety How to protect your computer, yourself, and your children in cyberspace.

Instant Messaging

Provides instant communications with other individuals (chat) Common programs

AIM (AOL) Yahoo Messenger ICQ (AOL) IRC (Internet Relay Chat) MSN Messenger Trillian (connects to multiple accounts simultaneously)

Page 25: Internet Safety How to protect your computer, yourself, and your children in cyberspace.

Instant Messaging

Concerns Who is the person on the other end? Viruses and worms Personal information sharing

Recommendations Be sure you know the person you or your children

are chatting with. Block unknown or anonymous users via chat

options.

Page 26: Internet Safety How to protect your computer, yourself, and your children in cyberspace.

Instant Messaging

Recommendations continued Never give out any personal information Monitor activity via filtering software

(reviewed later)

Page 27: Internet Safety How to protect your computer, yourself, and your children in cyberspace.

Internet Communications

Internet communications include VOIP (voice over IP) and live video

Common programs Skype – www.skype.com (free VOIP calls) Video enabled MSN, Yahoo, and AOL

Concerns Application exploits – be sure all applications are

up to date Profiles are seen by ALL users

Page 28: Internet Safety How to protect your computer, yourself, and your children in cyberspace.

Internet Communications

Concerns continued Set privacy options in application software to

avoid anonymous connections Call interception

Page 29: Internet Safety How to protect your computer, yourself, and your children in cyberspace.

Newsgroups

A usenet discussion group related to a single topic

Be aware that many newsgroups are used to harvest email addresses for spammers

Many newsgroups have VERY inappropriate material including graphic pictures, video, music and suggestive text

Page 30: Internet Safety How to protect your computer, yourself, and your children in cyberspace.

Filtering

Software designed to help eliminate unwanted websites, spam, chat, pop-ups, newsgroups and more. This software can also set time limits on websites and online chatting. Many filtering applications also include chat and internet logging.

Page 31: Internet Safety How to protect your computer, yourself, and your children in cyberspace.

Filtering recommendations

http://internet-filter-review.toptenreviews.com/ Review site for filtering software

Information Use your judgement when purchasing filtering

software Some software OVERBLOCKS websites Most teens know how to circumvent filtering

software

Page 32: Internet Safety How to protect your computer, yourself, and your children in cyberspace.

Recommendation Review

Update computer regularly (weekly or more frequently)

Run some form of antivirus software Run anti-spyware software Enable pop-blocker Beware of phishing email Be wary of email with external links or

applications that are attached

Page 33: Internet Safety How to protect your computer, yourself, and your children in cyberspace.

Recommendation Review

Talk to your children about safe computing – never give personal information online

Remember that once information has been posted it cannot be “taken back” and it is available to MILLIONS

Utilize online education sites for help www.isafe.org www.wiredsafety.org

Don’t be afraid to say NO

Page 34: Internet Safety How to protect your computer, yourself, and your children in cyberspace.

Q&A