Practical Approach to Protecting Yourself Online - PowerPoint PPT Presentation

1 / 13
About This Presentation
Title:

Practical Approach to Protecting Yourself Online

Description:

Firewalls help prevent malicious traffic from coming into or out of ... Voice and Text Chats (Teamspeak, Ventrilo) Office products (Word, Open Office, Etc. ... – PowerPoint PPT presentation

Number of Views:26
Avg rating:3.0/5.0
Slides: 14
Provided by: jamesed
Category:

less

Transcript and Presenter's Notes

Title: Practical Approach to Protecting Yourself Online


1
Practical Approach to Protecting Yourself Online
http//www.jedmondson.net/downloads/practicalprote
ction.ppt
  • By James Edmondson
  • Computer Science, MTSU

2
Table of Contents
  • Firewalls3
  • Hackers Do Exist! ..5
  • Microsoft Efforts .....6
  • Windows Firewalls .7
  • Other Practical Measures for Windows ..9
  • Practical Measures for Everyone.10
  • Checklist for Windows12
  • Conclusion...13

3
Why are Firewalls Necessary?
  • Firewalls help prevent malicious traffic from
    coming into or out of your computer.
  • Most hacker exploits of user machines are through
    legitimate software installed on the machine.
  • Popular exploited packages
  • Web Browsers (IE, Firefox, Mozilla, etc.)
  • Instant Messengers (Yahoo, MSN, etc.)
  • Voice and Text Chats (Teamspeak, Ventrilo)
  • Office products (Word, Open Office, Etc.)

4
Why are Firewalls Necessary? part 2
  • Hackers are real and online
  • Sometimes hackers are provoked, but if they come
    across the right tools, any machine can be
    targeted.
  • Hackers are extremely easy to provoke, especially
    in video games and chat rooms. Many times, they
    are looking for targets to test new tools on.
  • NO PLATFORM IS PERFECTLY PROTECTED AGAINST
    HACKERS!
  • The most recent root exploit of Linux is through
    a Firefox buffer overflow (9/18/2005).

5
Hackers Do Exist!
  • http//www.SecurityFocus.org/ keeps track of much
    of the exploits currently out there. Used by
    white / grey hats.
  • http//www.Milw0rm.com/ keeps repositories of
    exploit code and tools. Includes over 420 remote
    exploits. Used by black / grey hats.

6
Microsoft Efforts
  • Millions of dollars have been thrown into
    security development and upgrading
  • New Security Center (Repository)
  • http//www.microsoft.com/security/default.mspx
  • Microsoft Anti-Spyware (Tool)
  • http//www.microsoft.com/athome/security/spyware/s
    oftware/default.mspx
  • Malicious Software Removal Tool
  • http//www.microsoft.com/security/malwareremove/de
    fault.mspx

7
Windows Firewalls
  • The default Windows firewall trusts most
    programs and services and is thus untrustworthy.
  • A popular Firewall for Windows PCs is Zone Alarm
    from Zone Labs.
  • Zone Alarm is FREE for personal use.
    http//www.zonelabs.com/
  • Zone Alarm is easy to use.
  • Zone Alarm is configurable.

8
Configuring the Zone Alarm Firewall
  • Allow Internet Access but prompt for Server
    activity.
  • This is done by going to
  • ProgramControl -gtPrograms, and changing the blue
    question marks under the Access column to green
    check marks.
  • Leave the column under Server alone. These
    should have blue question marks.
  • These settings will make Zone Alarm prompt you
    only for suspicious activity, like your web
    browser wanting to serve as a server or something
    changing the executable during runtime.

9
Practical Measures for Windows
  • Make sure System Restore is On.
  • Do not trust your virus scanner
  • Scan your computer with an online virus scanner
    once a month. http//housecall.trendmicro.com
  • Use a web based email client like Gmail.
  • System Services
  • Disable Messenger (spam advertisements)
  • Disable SSDP Discovery Service (UPnP)
  • Set Remote Registry to Manual or Disabled.

10
Practical Measures for Everyone
  • Understand your software.
  • Read the Manual.
  • Use only what you need or will use.
  • Just because its free doesnt mean its good.
  • Check SecurityFocus.org for vulnerabilities.
  • Update your software
  • Debian Apt-get update / Apt-get upgrade
  • Windows WindowsUpdate, Automatic Updates, etc.

11
Practical Measures for Everyone part 2
  • Create logical directory structures for backups
    and important files.
  • Make backups from time to time.
  • Reinstall a system every two years or less. This
    keeps you in practice and starts a machine fresh.
  • Shy away from wireless activity if possible.
  • Shy away from unknown file types.
  • Do not give away personal information online.

12
Checklist for Windows
  • Install Zone Alarm (protection)
  • Install minimal pop-up, adaware, and antivirus
    programs (system stability).
  • Scan your computer online for virus every once in
    a while.
  • Keep backups.
  • Turn on System Restore.
  • Reinstall your system from time to time to keep
    in practice.

13
Conclusion
  • The internet provides functionality, access, and
    opportunities unparalleled in human history.
  • This same openness and connectivity breeds
    malicious activities and online predators.
  • Protecting yourself from online predators can be
    beneficial, practical and effective.
Write a Comment
User Comments (0)
About PowerShow.com