Title: Internet Safety 101
1Internet Safety 101
Your basic guide to computer self defense
2Malware
- (How to Protect Yourself from Viruses, Trojans,
Adware, Spyware, Etc.)
3What is Malware?
- Malware (short for malicious software) are
programs designed to infiltrate or damage a
computer system, without the owner's consent. - Common types of malware include
4Viruses
- There are many types of viruses
- Trojans
- Must be downloaded
- Cant spread to other drives on its own
- Hide in files (images, movie files, programs,
attachments, etc.) - Worms
- Can spread through emails, files, or networks
- Often spread to other drives in the
computer/network - Often times much more difficult to remove than
trojans
5Spyware/Adware
- Adware
- Legal software used for marketing, etc.
- Generally not malicious
- Can cause slowdowns, hog bandwidth and resources,
etc. - Spyware
- Illegal software used by programmers and hackers
- Generally used to steal identity or passwords
- Used to take partial control of a computers
operation without the consent of the owner
6Tools
- Anti-Virus
- Norton (39.99-69.99)
- www.symantec.com
- McAfee (39.99-69.99)
- www.mcafee.com
- Panda (49.95-79.95)
- www.pandasoftware.com
- AVG (Free)
- www.grisoft.com
- Avast! (Free)
- www.avast.com
- Anti-Spyware/Adware
- Ad-Aware (Personal)
- http//www.lavasoft.com/
- Spybot SD 1.4
- http//spybot.safer-networking.de/en/
- HijackThis! (use with care! Can cause system
crashes!) - www.download.com
- Microsoft Defender
- www.microsoft.com
- Google Toolbar
- www.google.com
7How to recognize an Infection
- Symptoms
- System is running slow
- Commonly used programs dont work
- Lots of popups
- Your Home Page has changed without youre
approval - Internet is not working/acts strangely
- Other aspects of the computer is acting strangely
8So Youre Infected
- Step 1 Update Anti-Virus/Anti-Spyware Programs
- Open each program and select search for updates
- Step 2 Start Computer in Safe Mode (Windows)
- Restart computer
- Before Windows starts, begin hitting F8 key
- Select Safe Mode from list
- Step 3 Scan for Viruses
- Use Anti-Virus scanner to remove viruses
- If virus cant be removed, search for tools at
www.symantec.com) - Step 4 Scan for Adware/Spyware
- Use both Ad-aware and Spybot
- Step 5 Restart Computer/Check for Malware
- Step 6 If Malware is Still Present, Seek Help!
9Prevention is the Best Medicine
- Keep Antivirus/Anti-Spyware scanners up-to-date
- Set up AntiVirus to run in background
- Set up scheduled scans
- Run Ad-aware/Spybot at least once a month
- Scan all downloads and email attachments
- Dont click on popups
- When in doubt, DONT OPEN IT!
10Phishing
- In computing, phishing is a form of criminal
activity using social engineering techniques,
characterized by attempts to fraudulently acquire
sensitive information, such as passwords and
credit card details, by masquerading as a
trustworthy person or business in an apparently
official electronic communication, such as an
email or an instant message. The term phishing
arises from the use of increasingly sophisticated
lures to "fish" for users' financial information
and passwords. -Wikepedia
11- Some common phishing scams purport to be from
- Ebay
- PayPal
- National and Local Banks
12Information from Legitimate Businesses
- More tips for spotting fraudulent emails
- Urgent appeals claim that your account may be
closed if you fail to confirm, verify, or
authenticate your personal information
immediately. Bank of America and most other
financial institutions will not ask you to verify
information in this way. - Requests for security information claim that
the bank has lost important security information
and needs to update it online. Bank of America
and most other financial institutions will not
ask you to verify information in this way. - Typos and other errors are often the mark of
fraudulent emails or websites. Be on the lookout
for typographical or grammatical errors
awkward, stilted, or inappropriate writing and
poor visual or design quality. - Too-good-to-be-true offers are often just that.
Don't get mixed up in fraudulent activity by
believing emails or web advertisements that offer
to help you earn money by transferring cash. - -Bank of America
13If you click on a link included in an email
you're not sure is from PayPal, make sure the
address at the top of the browser window you're
brought to reads exactly www.paypal.com.
PayPal emails will address you by first name,
last name, or business name, and NOT by Dear
PayPal User or Dear PayPal Member.
-PayPal
- We Always Respect Your Privacy.
- We will never contact you by e-mail, mail, or
phone asking for information. We will - never ask for your
- Social Security Number
- ATM or Debit PIN
- Credit Card Number
- Account Number
- Name
- Address
- Birthday
- -Mountain America Credit Union
14- Fake emails will often
- Link to counterfeit Web sites. Fake emails may
direct you to counterfeit Web sites carefully
designed to look real, but which actually collect
personal information for illegal use. - Link to real Web sites. In addition to links to
counterfeit Web sites, some fake emails also
include links to legitimate Web sites. The
fraudsters do this in an attempt to make a fake
email appear real. - Contain fraudulent phone numbers. Fake emails
often contain telephone numbers that are tied to
the fraudsters. Never call a number featured on
an email you suspect is fraudulent, and be sure
to double- check any numbers you do call. - Contain real phone numbers. Some of the
telephone numbers listed in fake emails may be
legitimate, connecting to actual companies. Just
like with links, fraudsters include the real
phone numbers in an effort to make the email
appear to be legitimate. - -Wells Fargo
15Things to Remember
- Most banks will never send an email requesting
personal information. - If someone had in fact attempted to hack into
your account, the company would not provide you
with that persons IP address. - Typos, bad grammar, and misspelled words are
often signs of a fraudulent email. - Make sure you actually have an account with the
company in question and that they use the email
address where you are being contacted. If you do
not have an account or your account uses a
different email address, the email in question is
definitely a fake.
16(No Transcript)
17(No Transcript)
18(No Transcript)
19(No Transcript)
20(No Transcript)
21Fake Mountain America site
22Login Information input at this fake site will
not go to Mountain America.
23Summary
Be careful when dealing with any email that
requests personal information. Follow the tips
discussed above, and if you suspect an email is
fraudulent, forward it to the proper authorities.
For example, if the email claims to be from
PayPal, send it to spoof_at_paypal.com. Different
companies have different methods for dealing with
phishing details can be found on their
respective websites.
24Privacy and Security awareness while using the
Internet at SUU
25How private is the Internet at SUU?
- Its not, the information that is transferred on
SUU networks is unencrypted and in plain view to
anyone with knowledge of intercepting it. - What does this mean? It means that you should
expect zero privacy when using the internet at
SUU. - Thats right, those MSN and AIM conversations
arent as private as you think.
26Not concerned yet?
- How about that online banking or taxes you do
using SUUs internet? Thats right, in some
instances, its possible for others to intercept
information and passwords of personal information
that is transmitted across SUU. - Remember SUU is a public network.
27Still dont believe me?
28More Proof!
29What can you do to secure your privacy?
- As a rule of thumb, dont use publicly shared
networks to view or transfer private information. - If you must use a public network
- Ensure your browser is using encryption when you
are viewing personal or important information
(https//) (i.e. your bank). - Be conscious of the personal information you pass
across that network, believe me, theyre watching
you...
30Please feel free to contact me with questions you
may have
- Name Dustin S.
- Email nicolasschultz_at_suumail.net