1 / 18

Computer Security

Computer Security Library Lunch and Learn Wednesday, January 21, 2004 Bill Vilberg Agenda Introduction (short) Security Concepts (a few) Demonstrations Internet Connection Firewall Windows Update Office update Symantec Anti-Virus Spybox Search & Destroy Who is Bill Vilberg?

jacob
Télécharger la présentation

Computer Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Computer Security Library Lunch and Learn Wednesday, January 21, 2004 Bill Vilberg

  2. Agenda • Introduction (short) • Security Concepts (a few) • Demonstrations • Internet Connection Firewall • Windows Update • Office update • Symantec Anti-Virus • Spybox Search & Destroy

  3. Who is Bill Vilberg? • Instructional Advancement Center • Mission: Encourage and support the faculty in appropriate uses of technology to enhance instruction. • bill.vilberg@miami.edu • 305-284-3949 (work) • 786-218-3052 (cell); 305-255-9138 (home) • (iac.help@miami.edu)

  4. Session Details • Restrooms • Cell phones • Early departures • Second helpings • Web site: www.snurl.com/LibLNL2003 • Slides • Handout • Recorded Presentation

  5. Disclaimer • I am not a lawyer • I am not a doctor • I am not trained on computer security • I read • I try • I keep learning

  6. Security Concepts What are we talking about?

  7. What is the problem? • Nasty programs running on your computer • Erase/alter files on your computer • Attack (DoS) other computers • Infect other computers • Send your files back to someone • Send e-mail from your computer • Capture your keystrokes and send them back

  8. How to they get there? • Sharing disks • Boot track • Opening infected documents • E-mail • Viewing infected HTML • Opening Trojan horses • Opening infected documents • Internet • Direct attacks

  9. What can you do? • Be careful • Lock down your system/applications • Apply security patches • Run special software • Antivirus • Anti-spy-ware • Anti-SPAM • Firewall

  10. My suggestions www.snurl.com/mysecurity

  11. Questions Any questions before the demos?

  12. Demonstrations

  13. Internet Connection Firewall (Windows XP Pro) Turn it on: Control Panel > Network Connections > Local Area Connection > Advanced tab >

  14. Windows Update Manually apply critical updates from IE > Tools > Windows Update or http://windowsupdate.microsoft.com/ Automate in XP from Control Panel > System > Automated Updates

  15. Office Update Apply critical updates from http://office.microsoft.com/officeupdate/

  16. Symantec Antivirus www.miami.edu/download Site licensed at UM for personal (non-UM computer) use Automate updates with File > Schedule Updates

  17. Spybot Search & Destroy www.safer-networking.org (Free) and/or ad-aware from www.ad-aware.com

  18. Computer Security Bill Vilberg bill.vilberg@miami.edu www.snurl.com/liblnl2003

More Related