4 The good, the bad and the ugly 5 The Ugly 6 Welcome to Internet Boot Camp Listen up recruits Internet security basic training is about to start! 7 Your computer is like your house
Are you connected to the Internet without using a virus scanner a firewall and a spy-ware blocker?
You might as well leave your front door open 24/7
8 Your computer is like your house
Virus scanner
Police officer
9 Your computer is like your house
Virus scanner
Firewall
Police officer
Door guard
10 Your computer is like your house
Virus scanner
Firewall
Spy-ware blocker
Police officer
Door guard
Security guard
11 Your computer is like your house
Virus scanner
Firewall
Spy-ware blocker
Browser settings
Police officer
Door guard
Security guard
Another guard
12 Your computer is like your house
Virus scanner
Firewall
Spy-ware blocker
Browser settings
Virus/Worm/Trojan
Police officer
Door guard
Security guard
Another guard
Criminals
13 Your computer is like your house
Virus scanner
Firewall
Spy-ware blocker
Browser settings
Virus/Worm/Trojan
Spy-ware
Police officer
Door guard
Security guard
Another guard
Criminals
Thief
14 Your computer is like your house
Virus scanner
Firewall
Spy-ware blocker
Browser settings
Virus/Worm/Trojan
Spy-ware
Spam
Police officer
Door guard
Security guard
Another guard
Criminals
Thief
Junk mail
15 Meet The Enemy
virus
16 Meet The Enemy
virus
worm
17 Meet The Enemy
virus
worm
trojan horse
18 Meet The Enemy
virus
worm
trojan horse
spam
19 Meet The Enemy
virus
worm
trojan horse
spam
spy-ware
20 Meet the Allies
Virus scanning software
21 Meet the Allies
Virus scanning software
Firewall hardware/software
22 Meet the Allies
Virus scanning software
Firewall hardware/software
E-mail scanning software virus/spam
23 Meet the Allies
Virus scanning software
Firewall hardware/software
E-mail scanning software virus/spam
Spy-ware blocking software
24 Meet the Allies
Virus scanning software
Firewall hardware/software
E-mail scanning software virus/spam
Spy-ware blocking software
Pop-up blocking software
25 Meet the Allies
Virus scanning software
Firewall hardware/software
E-mail scanning software virus/spam
Spy-ware blocking software
Pop-up blocking software
Operating system updates
26 Meet the Allies
Virus scanning software
Firewall hardware/software
E-mail scanning software virus/spam
Spy-ware blocking software
Pop-up blocking software
Operating system updates
Browser security settings
27 E-Mail friend or foe?
Dont let the enemy use your E-mail to launch their attacks
28 Securing E-mail 29 Securing E-mail
Use an E-mail virus scanner
30 (No Transcript) 31 (No Transcript) 32 Securing E-mail
Use an E-mail virus scanner
Block images in HTML messages
33 (No Transcript) 34 Securing E-mail
Use an E-mail virus scanner
Block images in HTML messages
View messages in plain text / block HTML
35 (No Transcript) 36 Securing E-mail
Use an E-mail virus scanner
Block images in HTML messages
View messages in plain text / block HTML
Use spam blocking software or ISP blocking
37 Securing E-mail
Use an E-mail virus scanner
Block images in HTML messages
View messages in plain text / block HTML
Use spam blocking software or ISP blocking
Set up spoof E-mail account(s)
38 Securing E-mail
Use an E-mail virus scanner
Block images in HTML messages
View messages in plain text / block HTML
Use spam blocking software or ISP blocking
Set up spoof E-mail account(s)
Update E-mail software regularly
39 Securing E-mail
Never open attachments from ? sender
40 Securing E-mail
Never open attachments from ? sender
Never unsubscribe from spam
41 Securing E-mail
Never open attachments from ? sender
Never unsubscribe from spam
Never click on links in spam / junk mail
42 Securing E-mail
Never open attachments from ? sender
Never unsubscribe from spam
Never click on links in spam / junk mail
Never give information reply to ? mail
43 Securing E-mail
Never open attachments from ? sender
Never unsubscribe from spam
Never click on links in spam / junk mail
Never give information reply to ? mail
Never give real E-mail address to websites
44 Securing E-mail
Never open attachments from ? sender
Never unsubscribe from spam
Never click on links in spam / junk mail
Never give information reply to ? mail
Never give real E-mail address to websites
Beware of phishing
45 Eliminating Spy-ware
The enemy has spies everywhere
All spies will be shot on sight
46 Eliminating Spy-ware
Download and install AD-AWARE
47 (No Transcript) 48 Eliminating Spy-ware
Download and install AD-AWARE
Download and install Spybot Search Destroy
49 (No Transcript) 50 Eliminating Spy-ware
Download and install AD-AWARE
Download and install Spybot Search Destroy
Always use a firewall that monitors incoming and outgoing internet traffic
51 (No Transcript) 52 (No Transcript) 53 (No Transcript) 54 (No Transcript) 55 (No Transcript) 56 Web Browser whos in control
The web browser. Your gateway to the internet and a hackers gateway to your computer
Secure that browser soldier!
57 Securing the browser
Always use a firewall incoming/outgoing
58
BROSDBAND DSL/CABLE
59 Securing the browser
Always use a firewall incoming/outgoing
XP must be on SP2
60 (No Transcript) 61 Securing the browser
Always use a firewall incoming/outgoing
XP must be on SP2
Security settings as high as you can tolerate
62 (No Transcript) 63 (No Transcript) 64 (No Transcript) 65 Securing the browser
Always use a firewall incoming/outgoing
XP must be on SP2
Security settings as high as you can tolerate
IE must be latest version / updated regularly (windows update)
66 (No Transcript) 67 Securing the browser
Always use a firewall incoming/outgoing
XP must be on SP2
Security settings as high as you can tolerate
IE must be latest version / updated regularly
Disable Active-X controls
68 Never enable activeX to download a file. You dont need it to download files. This is a trick to get you to enable activeX 69 Home network security
Lets not be sharing information with the enemy
70 Securing a home network
Always use a firewall
71 Securing a home network
Always use a firewall
Never share the OS hard drive
72 Securing a home network
Always use a firewall
Never share the OS hard drive
Dont share drives / share folders
73 shared 74 Securing a home network
Always use a firewall
Never share the OS hard drive
Dont share drives / share folders
Enable encryption on wireless (WEP)
75 Securing a home network
Always use a firewall
Never share the OS hard drive
Dont share drives / share folders
Enable encryption on wireless (WEP)
Hide SSID on wireless
76 Securing a home network
Always use a firewall
Never share the OS hard drive
Dont share drives / share folders
Enable encryption on wireless (WEP)
Hide SSID on wireless
Change passwords on routers and modems
77 The 10 security commandments
Thou shalt use and regularly update an anti-virus program
Thou shalt use a firewall program
Thou shalt run Windows Update regularly
Thou shalt not open E-mail attachments
Thou shalt not share hard drives
78 The 10 security commandments
Thou shalt not give out personal information to non-trusted sites
PowerShow.com is a leading presentation sharing website. It has millions of presentations already uploaded and available with 1,000s more being uploaded by its users every day. Whatever your area of interest, here you’ll be able to find and view presentations you’ll love and possibly download. And, best of all, it is completely free and easy to use.
You might even have a presentation you’d like to share with others. If so, just upload it to PowerShow.com. We’ll convert it to an HTML5 slideshow that includes all the media types you’ve already added: audio, video, music, pictures, animations and transition effects. Then you can share it with your target audience as well as PowerShow.com’s millions of monthly visitors. And, again, it’s all free.
About the Developers
PowerShow.com is brought to you by CrystalGraphics, the award-winning developer and market-leading publisher of rich-media enhancement products for presentations. Our product offerings include millions of PowerPoint templates, diagrams, animated 3D characters and more.