1 / 0

Safe Computing at Home

Information Security Awareness Day 2009. Safe Computing at Home. John Desha Utah Education Network. October 29, 2009. Why Secure Your Home Computer?. Prevent theft of information Identity theft, credit card, personal information Protect against loss of data

ziven
Télécharger la présentation

Safe Computing at Home

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Information Security Awareness Day 2009

    Safe Computing at Home

    John Desha Utah Education Network October 29, 2009
  2. Why Secure Your Home Computer? Prevent theft of information Identity theft, credit card, personal information Protect against loss of data An incident can be time consuming An incident can be embarrassing May be required by employer Private/sensitive University data covered by Policy 4-004 Constantly under attack
  3. Security Incident Trends 2008 CSI Computer Crime and Security Survey http://www.gocsi.com
  4. Security is a Balance There is an inherent risk to using the Internet Determine your risk averseness Identify and mitigate the risks Too locked down could make the computer unusable or frustrate users
  5. Security and Users “Part of the problem is that people hang on to outdated operating systems and browsers, even though newer ones have better security controls, because they don't want to learn how to operate the new software” http://www.infoworld.com/d/security-central/spyware-forum-computer-users-cause-major-problems-022
  6. Types of Threats to Your Computer Viruses – programs that infect other programs Worms – spread from computer to computer Spyware – collects information on you Trojans – Disguised as normal software Physical theft Users (You, family, guests)
  7. What to Do? An Overview Use security software Keep all software up to date Install vendor provided patches and updates Use secure settings Backup data Use safe practices Teach others at home safe practices Be aware
  8. Anti-Virus Anti-Virus software detects and removes malware (viruses, worms, trojans)
  9. Anti-Virus Obtain from reputable source Some “anti-virus” programs today may contain viruses or spyware Keep it up to date Configure to download updates daily Monitor it periodically to make sure it is working Check status and update log file Discounted (or free) software available from U http://software.utah.edu
  10. Personal Firewall Firewall blocks unauthorized network access Built-in firewall in some operating systems Comes with some anti-virus packages Get from reputable source
  11. Software Updates Keep the operating system up to date! Updates are released often Use automatic updates for ease of use Windows Update http://www.microsoft.com/security/updates/mu.aspx Can update both Windows and Office software Mac OS updates http://support.apple.com/kb/HT1338
  12. Software Updates Update other software too! Firefox (it is not part of OS updates) Adobe Reader Flash Player Java Instant Messaging Anti-Virus What software do you run?
  13. Software Updates
  14. Use Secure Settings
  15. Backup Data Why backup data? Hard drives can fail System/data can become corrupted Theft or physical damage How? Copy important files to second or remote drive Use a backup solution Email most important files to self (report, presentation, etc.)
  16. Backup Data
  17. Safe Computing Practices Web Browsing Be mindful ofwhere you click Some sites contain harmful content Will attempt to infect computer just by viewing page Be cautious of software available from questionable websites How many advertisements? Lists of “free” software? Scan any downloaded software with AV
  18. Safe Computing Practices Purchasing Online Check for SSL or HTTPS Don’t ignore browser warnings Reputable business?
  19. Safe Computing Practices Email Be mindful of attachments, even from friends Sometimes they didn’t really send it Use caution with links in emails Disable rich-html display Opt for “simple html” or “original html” Use SSL when available Gmail has option for full-SSL
  20. Safe Computing Practices Example Accessing email over an insecure wireless network (such as a hotspot or café) is visible to anyone else on the network. They could see your email, and take over your session. Use SSL if available Log Out when done!
  21. Safe Computing Practices Use strong passwords Do not use your username Avoid dictionary words Do not use the same password everywhere Change passwords periodically
  22. Safe Computing Practices Secure your home wireless network Check out the home wireless presentation and table here today Disable file sharing if not needed If using file sharing, require passwords
  23. Mobile Devices Cell phones are more like computers now What data is on your cell phone? Do you back it up?
  24. Teach Others Teach the other users in your house about good security practices Kids can be the most damaging (usually unintentional too)
  25. Be Aware Know who is using your computer Use a password protected account Know what software you and others are installing on your computer. Make sure it is trusted.
  26. Learn More Check out http://secureIT.utah.edu
More Related