protecting your computer system innovative teaching center

41
Protecting Your Computer System Innovative Teaching Center

Upload: sandra4211

Post on 10-Nov-2014

1.610 views

Category:

Documents


1 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Protecting Your Computer System Innovative Teaching Center

Protecting Your Computer System

Innovative Teaching Center

Page 2: Protecting Your Computer System Innovative Teaching Center

Objectives

After completing this workshop, you will be able to:

• Identify software utilities for protecting computer systems against computer viruses, adware, spyware, and pop-up windows. • Describe how viruses, adware and spyware can take over a computer and how to prevent these attacks.

• Identify firewall software and why a personal firewall is important.

• Describe the two different methods of preventing unwanted pop-up windows from appearing when browsing on the web.

• List different methods in which a computer user can prevent viruses, adware, spyware, and pop-up windows from infecting a computer.

• Identify common problems created by viruses, adware, and spyware.

Page 3: Protecting Your Computer System Innovative Teaching Center

Workshop Outline

Introduction

Spyware & Adware

Viruses

Firewalls

Pop-up Blockers

Top 10 Ways to Protect Your Computer

Page 4: Protecting Your Computer System Innovative Teaching Center

Introduction

Page 5: Protecting Your Computer System Innovative Teaching Center

Before you Connect

According to researchers, an unpatched Windows PC connected to the Internet will last only 20

minutes before it’s compromised by Spyware & Adware, Viruses, and worms

Page 6: Protecting Your Computer System Innovative Teaching Center

Adware

Source: PC Magazine, March 2, 2004

Adware is any software application in which advertising

banners are displayed while the program is running.

0

200

400

600

800

1000

1200

1400

1998 1999 2000 2001 2002 2003

Number of new Adware applications

Page 7: Protecting Your Computer System Innovative Teaching Center

Signs of Problems

Your browser always comes up to a search engine(IncrediFind)

A new item appears in your Favorites list

Your system runs noticeably slower

A search tool bar appears in your browser

Pop-ups…pop-ups…even when your not browsing

Homepage changed to a different page – hijacked (Casino Palazzo)

Page 8: Protecting Your Computer System Innovative Teaching Center

Windows Task Manager

• Used to quickly determine if you have a problem

• Bring up Windows Task Manager

(hit Ctrl-Shift-Esc)

• Check process and performance

IncrediFind Search Engine will be tipb.exe

Page 9: Protecting Your Computer System Innovative Teaching Center

The Five Critical Ingredients of PC Security

1. Operating System Updates

2. Adware & Spyware Removal Utilities

3. Antivirus Removal Utility

4. Personal Firewall

5. User Caution

Page 10: Protecting Your Computer System Innovative Teaching Center

Spyware & Adware

Page 11: Protecting Your Computer System Innovative Teaching Center

Adware

• Any software application in which advertising banners are displayed while the program is running.

• Collects information about the user in order to display advertisements based on user's browsing patterns.

Page 12: Protecting Your Computer System Innovative Teaching Center

Spyware

• Any software that covertly gathers user information through the user's Internet connection without his or her knowledge.

• Typically bundled as a hidden component of freeware or shareware programs.

• Monitors user activity on the Internet and transmits that information in the background to someone else.

Page 13: Protecting Your Computer System Innovative Teaching Center

Spyware

– Can collect sensitive data like credit card or social security numbers

– Or capture all your keystrokes

– Scan your hard drive

– Review your Internet cookies

– Change your homepage for your browser

Page 14: Protecting Your Computer System Innovative Teaching Center

Differences from viruses/worms

• Spyware is not aimed at doing malicious things your computer

• Spyware can significantly reduce the performance of your computer--usually manifested by slowing it down

• Written by companies (often outside the U.S.), not individuals

Page 15: Protecting Your Computer System Innovative Teaching Center

What to do?

• Use reputable programs to protect your computer– Spybot or AdAware

• AdAware (www.lavasoftusa.com)• Spybot (www.spybot.info)

• These programs reviewed often at cnet.com and pcworld.com

• Use a software firewall like Zonealarmhttp://www.pcworld.com/howto/article/0,aid,114738,00.asp

Page 16: Protecting Your Computer System Innovative Teaching Center

Spybot Download

• Search your hard disk for spyware or adware.

• Removes them

• Homepage:http://spybot.safer-networking.de/

Page 17: Protecting Your Computer System Innovative Teaching Center

Download, install, configure

Page 18: Protecting Your Computer System Innovative Teaching Center

Online-Check for updates

Page 19: Protecting Your Computer System Innovative Teaching Center

Check results

Page 20: Protecting Your Computer System Innovative Teaching Center

Immunize

Page 21: Protecting Your Computer System Innovative Teaching Center

Don’t underestimate…

…this growing threat

Take action to defend your

computer and yourself

Page 22: Protecting Your Computer System Innovative Teaching Center

Viruses

Page 23: Protecting Your Computer System Innovative Teaching Center

What is a Virus?

Social diseases of computers

Malicious code written by malicious people

Page 24: Protecting Your Computer System Innovative Teaching Center

Types of Malicious Code

Virus A computer virus attaches itself to a program or file so it can spread from one computer to another, leaving infections as it travels.

Can cause mildly annoying effects while others can damage your HW/SW, or files. Almost all viruses are attached to an executable file.

Trojan HorseAt first glance will appear to

be useful software but will do damage once installed.

Changing your desktop, adding silly active desktop

icons or deleting files.

Worm Spread from computer to computer, but unlike a virus, travels without any help from a person.

Consumes system memory causing Web servers, network servers, and individual computers to stop responding.

Viruses, worms, and Trojan Horses are all

malicious programs that can cause damage to your computer

Page 25: Protecting Your Computer System Innovative Teaching Center

How Does Your Computer Can Catch a Virus?

• Has to be introduced to your system

• Medium in which a virus can be introduced

– Floppy– Modem– Network– E-mail– File sharing programs

Page 26: Protecting Your Computer System Innovative Teaching Center

How Do You Avoid a Virus Problem?

• Backup important files

• Limit trading floppy disks

• File sharing programs

• Avoid .exe, .scr, .Ink, .bat, .abs, .dll, .bin, anmd .cmd.

• Install an Antivirus utility

• Online Scanners

Page 27: Protecting Your Computer System Innovative Teaching Center

Antivirus Utilities

See Handout

See Handout forMore Information

Page 28: Protecting Your Computer System Innovative Teaching Center

Words of Advice

• Don't run program files from unknown or unreliable sources

• Keep you operating system and antivirus software up-to-date

(use automatic updates)

AntiVirus detection should be handled both server side and client side. Even in WebCT, our server

should refuse to save that file or allow the next person to Access it if the file is "possessed." …And make lots of backups.

WebCT Users

Page 29: Protecting Your Computer System Innovative Teaching Center

Firewalls

Page 30: Protecting Your Computer System Innovative Teaching Center

What is a Firewall?

A firewall isolates your computer from the Internet using a wall to block out unwanted visitors.

A firewall will protect you against things that try to break into your computer, not the things you let in.

Page 31: Protecting Your Computer System Innovative Teaching Center

Two Types of Firewalls

• Hardware firewall (typically on Routers)

• Software firewall (sometimes referred to personal firewall)

Page 32: Protecting Your Computer System Innovative Teaching Center

How Do They Work?

• Castle gates

• Option to enable or disable

Page 33: Protecting Your Computer System Innovative Teaching Center

Where do I need a Firewall

• Do have a firewall on each machine at home to communicate with each other

• One on the router (WiFi)– Set to block all non-legitimate traffic

Don’t run multiple firewalls on one computer

Page 34: Protecting Your Computer System Innovative Teaching Center

Which One is the Best One to Buy?

See Handout

See Handout forMore Information

Page 35: Protecting Your Computer System Innovative Teaching Center

Pop-up Blockers

Page 36: Protecting Your Computer System Innovative Teaching Center

Those Annoying Ads

Beware, these programs often block useful javascripts, like in WebCT.

Idea: Make your WebCT server a “trusted" site to their popup-blockers, rather than telling users to turn off the popup-blockers.

WebCT Users

Websites use pop-up windows to make money, however these ads can be very annoying.

Page 37: Protecting Your Computer System Innovative Teaching Center

Three Methods to Stop Pop-ups

• Opt-out with advertiser

• Software solutions: Pop-up stopper utilities

See HandoutFor

List of Opt-outAdvertisers

AndSoftwareSolutions

Page 38: Protecting Your Computer System Innovative Teaching Center

Three Methods to Stop Pop-ups

Windows XP Service Pack 2 (SP2) Internet Explorer allows you to prevent most pop-up windows

Page 39: Protecting Your Computer System Innovative Teaching Center

Top 10 Ways to Protect YourComputer

Page 40: Protecting Your Computer System Innovative Teaching Center

Top 10 Ways to Protect YourComputer

1. Get an antivirus tool

2. Get a personal firewall

3. Run antispyware applications

4. Update your operating systems and browser version (http://www.microsoft.com/security/bulletins/default.mspx)

5. Use a different browser program (Firefox www.mozilla.org)

6. Don’t install something unless you know what it is, and read the fine print before loading programs.

7. Update Antivirus applications every time you go online.

8. Beware of peer-to-peer file sharing (Kazaa and Grokster.)

9. Don’t open unsolicited e-mail

10 Talk to your family about file sharing

Page 41: Protecting Your Computer System Innovative Teaching Center

The End