1 / 22

Don’t Lose Your Identity – Protect Yourself from Spyware

Don’t Lose Your Identity – Protect Yourself from Spyware. Dan Frommer Sherry Minton. Agenda. What is spyware? What does it do? How do you get it? What happens to your computer? How do you get rid of it? How to protect? Phishing Identity theft Resources. How do you use Internet?.

feinberg
Télécharger la présentation

Don’t Lose Your Identity – Protect Yourself from Spyware

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Don’t Lose Your Identity – Protect Yourself from Spyware Dan Frommer Sherry Minton

  2. Agenda • What is spyware? • What does it do? • How do you get it? • What happens to your computer? • How do you get rid of it? • How to protect? • Phishing • Identity theft • Resources

  3. How do you use Internet? • Email • Web browsing • Finance • Games • Each of these involve your identity being compromised

  4. Spyware • Spyware is computer software that gathers and reports information about a computer user without the user's knowledge or consent.

  5. Adware • Adware- • Kazaa • Pop-up ads - online advertising where certain websites open a new web browser window

  6. Controlling the pop-ups • Windows XP Service Pack 2 (SP2) Internet Explorer • Prevents most pop-up windows • Pop-up Blocker that is set to the medium setting, blocking most automatic pop-ups. • Pop-up Blocker will also play a sound and show the Information Bar when a pop-up is blocked.

  7. Pop-up Blocker with IE and Firefox

  8. Cookies • Information sent by a server to a browser and then sent back to the server each time it accesses that server. • Enable websites to be customized for individual users once browsing patterns have been established. • Potential security problems • credit card details might be collected  

  9. Cookies - Purpose • Typically this is used to authenticate or identify a registered user of a web site as part of their first login process or initial site registration without requiring them to sign in again every time they access that site. • Other uses are maintaining a "shopping basket" of goods selected for purchase during a session at a site, site personalization (presenting different pages to different users), and tracking a particular user's access to a site.

  10. Cookies - Permission • A browser may or may not allow the use of cookies. • The user can usually choose a setting. • Microsoft Internet Explorer • Tools > Internet Options > Privacy Tab • Use slider to set options, or use advanced options

  11. Malware • Remote access trojans (RATs) • Keystroke loggers • Ddenial-of-service (DoS) attack agents • Probe tools • Other backdoor network threats (including most popular remote access tools).

  12. What does Spyware do? • Steal your information (Identity Theft) • Pop up ads • Unsolicited emails in your mailbox • Slows down your computer • Crash your computer • Or worse….they can take over • Most people don’t know until after it happens

  13. Getting rid of Spyware • Spybot Search and Destroy

  14. Unsolicited E-mail • Unwanted commercial advertisements • Offenders obtain e-mail addresses • Web pages • guessing common names at known domains • Spoofing e-mail addresses - modifies the e-mail message so it looks like it is coming from another e-mail address. • Tricks - intentionally misspell common filter trigger words, ie. "viagra" might become "vaigra", or by inserting other symbols within the word, i.e. "v/i/a/g./r/a". • Some even ask you for personal information, posing as legitimate, known as phishing.

  15. Phishing Scams • E-mail • Phone calls • Verification

  16. Identity Theft • What thieves can do with your info • Open new credit card, bank accounts, utilities • Contact creditors and change your address • File bankruptcy under your name • File fraudulent tax returns • Obtain a new Drivers License or other fake id • Buy house or car in your name • Sell business info to competitors

  17. Identity theft • Vulnerable • Go on the offensive - don’t wait for it happen • Use your instincts

  18. Consequences of Identity Theft • More than just money. • Denied credit • Higher interest rates • Receive credit card bills you never ordered • Insurance premiums increase • Inability to find a job • Affects usually stay with you for 10 years.

  19. Red Flags • E-mail asking for personal info or information that you’ve already given • Website or email with different domain • Non-secure input form – look for security padlock in lower right corner or check for https:www. • No authentication requirement • Phone calls

  20. Safe-computing • Don’t respond to e-mails with personal information. • Never use a public computer for secure computing. • Never give out SSN online – unless sure of source. • Never give out your bank or credit card number – unless it is for online banking. • Be careful of sensitive information in online resumes. • Look for misspellings or bad grammar on website or in email. • Opt out of websites that offer public information on you. • How free is freeware, really?

  21. What NU is doing to protect you

  22. Resources – Get Control • Anti Virus • Security Updates • Secure Passwords • Anti-spyware applications • Firewall

More Related