Вы находитесь на странице: 1из 39

Computer / Internet Security

West Haven Public Library


www.westhavenlibrary.org

Computer / Internet Security


Use of internet services are unavoidable
Job applications, school applications, taxes, credit,
banking, DMV forms, personal communication
(email), social networking (facebook), shopping,
research, entertainment

All parts of your life potentially have an online


counterpart

Computer / Internet Security


Everything you do online
Every account you make
Every purchase
Every job application

Creates data about you

Computer / Internet Security


Not always a bad thing BUT
Danger in losing control of your data (accounts)
Danger in over sharing
Danger in important data being destroyed
(photos, records, documents)

Good News
Its easy to stay safe and protect yourself

Computer / Internet Security


Goals
Secure your data
Keep whats private
PRIVATE
Prevent attack/ intrusion
Prepare for the worst,
prevent loss

Computer / Internet Security


Goals

Action

Secure your data


Keep whats private PRIVATE

Use better password practices

Prevent attack/ intrusion

Be aware of what/how you


share

Prepare for the worst, prevent


loss

Be proactive- use protective


software- be vigilant
BACKUP, BACKUP, BACKUP

Data?
Your data is anything on your computer or
information stored in online accounts

Documents, files, photos


Online shopping sites
Banking, credit card
Social networking profiles

Data that you own/control


Private (banking info)
Public (online profiles)

Why bother?
Whether public (online profiles) or private
(financial info) you need to stay in control
Ensure that only authorized people can access
your data, accounts, files
Web-based accounts and services are increasingly
important

Dangers
Breaches can come from
Leaked/ stolen data
Leaked by a company or organization
Stolen via virus on a computer you use

Targeted attacks
Automated attacks- cracks

Dangers
Virus, Malware, Spyware, Adware, Trojans
Software created to steal information, change
settings, destroy files, take control of your system
Most commonly contracted online unbeknownst
to the user
Email attachments, malicious websites, software
downloads, toolbars

Secure Your Data


Biggest step is use better password
practices
more difficult to guess
Harder to crack (longer in length)
Make it easier to deal with if username/passwords
are leaked

Better Passwords
Don't use passwords that are based on personal
information that can be easily accessed or
guessed.
It may be easier than you think to guess your pets
name, birthday, childs name, favorite color,
mothers maiden name, etc.
password love are extremely common and
easily guessed

25 Worst Passwords of 2011


1. password
2. 123456
3.12345678
4. qwerty
5. abc123
6. monkey
7. 1234567
8. letmein
9. trustno1
10. dragon
11. baseball
12. 111111
13. iloveyou

14. master
15. sunshine
16. ashley
17. bailey
18. passw0rd
19. shadow
20. 123123
21. 654321
22. superman
23. qazwsx
24. michael
25. football

http://mashable.com/2011/11/17/worst-internetpasswords/

Better Passwords
Don't use words that can be found in any
dictionary of any language.
A single word, spelled correctly, is easy to check
against a dictionary
Single words are also short, easy to break using
random guesses.

Stronger Passwords
Use both lowercase and capital letters.
Use a combination of letters, numbers, and
special characters.
Maine96knees@MtSnow

Develop a mnemonic for remembering complex


passwords.

Stronger Passwords
Use passphrases when you can.
Longer in length- harder to guess/ crack
Easier to remember

puppytograndmasforsummervacation

Stronger Passwords
Use different passwords on different systems
If you use the same password at one site that is
broken into- then attackers can access your data at
other sites using that same username/password.

Use different
passwords on
different systems

Keep whats private PRIVATE


Be aware of what you share
When creating an account consider who you are
giving your data to
Any site asking for banking, social security, or
login information for a different site should be
closely examined.

Keep whats private PRIVATE


When creating accounts consider what you are
entering and how it will be used
You decide your comfort level with what you
share

Email
Email is more like a postcard than a letter
Chances are no one other than the recipient will
see it BUT it is possible for others see its content
along the way (just like a postcard)
Do not email: credit card #, logins/passwords

Web Addresses- URL

URL (Uniform Resource Locator)


The address that connects you with a website.
Parts of the URL
http://www.google.com
http://
= protocol [Hypertext Transfer Protocol]
www.
= World Wide Web
google = domain name
.com = domain type
Domain Types
.com = commercial
.org = generally nonprofit organizations
.edu = higher education
.gov = U.S. government agency

Browsing the Web- Secure Sites


Any site asking for sensitive info should be
encrypted (Banks, Insurance, etc.)
Encrypted site addresses begin with
https://www.google.com- ENCRYPTED
http://www.google.com- NOT encrypted

Browsing the Web- Secure Sites

Browsing the Web


As you browse the web- websites collect info
about you
Your web browser keeps a history and collects
cookies from websites
Use your browser settings to:
Clear your browser cache/history/cookies
Limit 3rd party cookies

Keep whats private PRIVATE


If you have WiFi at home, set a password
Keep your neighbors off your network (unless you
want them there)
Refer to the directions that came with your
Router/Modem/Wifi

Prevent attack/ intrusion


A Virus will get in through an open door or you
unwillingly open the door yourself

Anti-Virus
A program that scans your files and actively
monitors to prevent infection
Once installed, anti-virus monitors for virus
activity, quarantines, and deletes
Be sure to frequently run the virus scan
Be sure that definitions are updated

Anti-Virus
Free
AVG
Avast
Microsoft Security Essentials
www.windows.microsoft.com/mse

Commercial
McAffee
Symantec Norton
Bit Defender

Prevent attack/ intrusion


Be vigilant
Dont download email attachments that you
dont trust
If something from someone you trust looks
suspicious check with them before opening

Prevent attack/ intrusion


Scareware
Virus/Malware that looks like an anti-virus
program
Popup while browsing the web

Know what Anti-virus you have and how to use it

Fake Anti-Virus Warning

Prepare for the worst


Backup your important files
Keep duplicate copies

Worst case scenario: you will still have whats


important to you
Keep your backup current

Prepare for the worst


Backup files locally
Copy to cdr
Flash drive
external hard drive

Paper copies
tax returns
Important photos

Prepare for the worst


Cloud storage- files copied to a secure site over
the internet
Be sure that service is reputable, safe, stable
Backup regularly

Resources
http://www.us-cert.gov/cas/tips/
http://www.ftc.gov/bcp/edu/microsites/onguard/

westhavenlibrary.org

David Cirella- dcirella@westhavenlibrary.org, 2012-03-01

Вам также может понравиться