SlideShare una empresa de Scribd logo
1 de 85
Internet Security Dave Palmer Instructional Media Agent South Central Extension District
Who This is For… ,[object Object],[object Object],This presentation is intended for Extension faculty and staff who… It is  not  intended for faculty and staff who… ,[object Object],[object Object]
Part 1 – The Threats Virus Worms Scams Trojans Backdoor Bots Malware Hackers Phishing Rootkit Spyware
The threats most people  are not  aware of. The threats many of us are aware of.
The Global Scope of the Problem Estonia, a tiny but highly wired  country  on the Baltic Sea, was essentially  shut down  for 3 weeks during April and May of 2007 by organized cyber attacks.
The Global Scope of the Problem 2 dozen South Korean & U.S. Government agencies  & others were attacked in July 2009. Targets included the DoD, FAA, Homeland Security, NYSE, NASDAQ, etc.
The National Scope of the Problem Database breach by hackers personal information on 160,00 current and former students and alumni stolen. 530,000 medical records stolen including social security numbers. Sensitive information on 65,000 current and former employees stolen. A few  of the many major security breaches that became public in the 2 nd  Quarter of 2009.
The Personal Scope of the Problem ,[object Object],[object Object],[object Object],[object Object]
Malware Headlines You  Might Have Missed ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Malware Headlines You  Might Have Missed ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Malware – malicious software Intent is to damage, disrupt, steal, or otherwise inflict problems on data, hosts, or networks.
The Scope of the Problem The number of NEW malware threats is increasing New malicious code signatures - Symantec 2007 2008
What are the Threats? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Not malware ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Malware
Tracking Cookies ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Flash Cookies ,[object Object],[object Object],[object Object],[object Object],[object Object],Adobe  Flash  logo
Flash Cookies Widely used… … including in Extension
Adware ,[object Object],[object Object],[object Object],[object Object]
Social Engineering Means: Manipulating people to do things or to divulge confidential information
Phishing ,[object Object],[object Object],[object Object]
Phishing ,[object Object],[object Object],[object Object],[object Object],[object Object]
Pharming Intent is to redirect a legitimate website's traffic to another, nearly identical but bogus website for the purpose of stealing sensitive information.
Scams ,[object Object],[object Object],[object Object],[object Object]
Scams ,[object Object],[object Object],[object Object],[object Object]
Scams ,[object Object],[object Object],[object Object]
Scam Targets ,[object Object],[object Object],[object Object]
Scams ,[object Object],[object Object],[object Object],Estimated  annual  losses
Trojans ,[object Object],[object Object],[object Object]
Trojans ,[object Object],[object Object],[object Object]
Virus ,[object Object],[object Object],[object Object],[object Object],[object Object]
Worms ,[object Object],[object Object],[object Object],[object Object],[object Object]
Backdoor ,[object Object],[object Object]
Spyware ,[object Object],[object Object],[object Object]
Rootkit ,[object Object],[object Object],[object Object],[object Object]
Bots or Zombies ,[object Object],[object Object],[object Object]
Bots or Zombies ,[object Object],[object Object],[object Object]
Bot Network
Intermission  When we return… how do we protect our  computers and our data?
Part 2 – The Protection We’ve covered the threats, but how do we protect ourselves?
Use Best Practices Data Router w/ hardware firewall ZoneAlarm software firewall Spybot w/ tea timer Super Anti Spyware Anti virus software Backup  Data
Best Practices ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Best Practices ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Physical Computer Security ,[object Object],[object Object]
Physical Computer Security ,[object Object],[object Object]
Legal Agreements ,[object Object],[object Object],[object Object]
Read the Fine Print ,[object Object],[object Object],[object Object]
Use  Good  Passwords ,[object Object]
Keep Passwords Safe ,[object Object],[object Object],[object Object],KeePass RoboForm
Password Management Software ,[object Object],[object Object],[object Object],[object Object]
USB Malware ,[object Object],[object Object]
USB Flash Drive w/ Read-Only ,[object Object],[object Object],[object Object]
Upgrade vs Update ,[object Object],[object Object]
Update Your Operating System ,[object Object],[object Object]
Update Your Operating System ,[object Object]
Update/ Upgrade Your Applications ,[object Object],[object Object],[object Object]
Update Your Applications ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Update Your Applications
Data Router w/ hardware firewall ZoneAlarm software firewall Spybot w/ tea timer Super Anti Spyware Anti virus software Use Best Practices Backup  Data
Hardware Router w/Firewall ,[object Object],[object Object],[object Object],[object Object],[object Object]
Software Firewall ,[object Object],[object Object],Outbound Communication
Software Firewall ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],Software Firewall
Data Wireless Router w/ hardware firewall ZoneAlarm software firewall Spybot w/ tea timer Super Anti Spyware Anti virus software Use Best Practices Backup  Data
Spybot Search & Destroy ,[object Object],- Free - Real-time protection
Spybot Search & Destroy ,[object Object],[object Object],[object Object]
Spybot Search and Destroy ,[object Object],[object Object]
Super AntiSpyware ,[object Object],- Free - Real-time protection - Can be scheduled
MalwareBytes ,[object Object],[object Object]
Antivirus Software ,[object Object],[object Object],[object Object]
Data Wireless Router w/ hardware firewall ZoneAlarm software firewall Spybot w/ tea timer Super Anti Spyware Anti virus software Use Best Practices Backup  Data
How to Use These  Tools Effectively ,[object Object],[object Object],[object Object],[object Object],[object Object]
Backup Your Data ,[object Object],[object Object],[object Object],[object Object]
Backup Your Data ,[object Object],[object Object],[object Object]
Data-Only Backup ,[object Object],[object Object],[object Object],[object Object],Back2Zip free software
Whole-System Backup ,[object Object],[object Object],[object Object]
Online Backup Service ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Local External Backup ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],External  Hard Drive
FireFox with Security Plugins ,[object Object],[object Object],[object Object]
Virtual PC Products ,[object Object],[object Object],[object Object],[object Object],[object Object]
Virtual PC Software ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],Sandboxie
You Commercial Repair Local PC Users Groups Friends & family CompUSA Geek Squad Local repair shop Etc. When you need help…
When You Need Help ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],PC Users Groups
Disclaimers ,[object Object],[object Object],[object Object],[object Object],[object Object]
Thanks to… ,[object Object],[object Object],[object Object]

Más contenido relacionado

La actualidad más candente

Computer security
Computer securityComputer security
Computer securityfiza1975
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measuresDnyaneshwar Beedkar
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentationKudzai Rerayi
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security riskshazirma
 
Computer security risks
Computer security risksComputer security risks
Computer security risksAasim Mushtaq
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESShyam Kumar Singh
 
Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer SecurityDamian T. Gordon
 
Web Security
Web SecurityWeb Security
Web SecurityTripad M
 
Threats and Security Tips of Computer System
Threats and Security Tips of Computer SystemThreats and Security Tips of Computer System
Threats and Security Tips of Computer SystemFaruk_Hossen
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information SecurityAna Meskovska
 
Internet security
Internet securityInternet security
Internet securityrfukunaga
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer securityArzath Areeff
 

La actualidad más candente (20)

Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Computer security
Computer securityComputer security
Computer security
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Computer security
Computer securityComputer security
Computer security
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
 
Computer security risks
Computer security risksComputer security risks
Computer security risks
 
cyber_security
cyber_securitycyber_security
cyber_security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
Computer security
Computer securityComputer security
Computer security
 
Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer Security
 
Web Security
Web SecurityWeb Security
Web Security
 
Security threats
Security threatsSecurity threats
Security threats
 
Threats and Security Tips of Computer System
Threats and Security Tips of Computer SystemThreats and Security Tips of Computer System
Threats and Security Tips of Computer System
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security
 
Internet security
Internet securityInternet security
Internet security
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
 

Destacado

IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5Eslam Abdou
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer ProtocolRajan Pandey
 
FTP - File Transfer Protocol
FTP - File Transfer ProtocolFTP - File Transfer Protocol
FTP - File Transfer ProtocolPeter R. Egli
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocolguest029bcd
 
What is IEEE and why?
What is IEEE and why?What is IEEE and why?
What is IEEE and why?Ankita Tiwari
 

Destacado (8)

WLAN AND IEEE STANDARDS
WLAN AND IEEE STANDARDSWLAN AND IEEE STANDARDS
WLAN AND IEEE STANDARDS
 
IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5
 
Ieee standards
Ieee standardsIeee standards
Ieee standards
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
 
Smtp
SmtpSmtp
Smtp
 
FTP - File Transfer Protocol
FTP - File Transfer ProtocolFTP - File Transfer Protocol
FTP - File Transfer Protocol
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
 
What is IEEE and why?
What is IEEE and why?What is IEEE and why?
What is IEEE and why?
 

Similar a 091005 Internet Security

100812 internet security2.0
100812 internet security2.0100812 internet security2.0
100812 internet security2.0dkp205
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System ThreatsDrishti Bhalla
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.pptAsif Raza
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays worldSibghatullah Khattak
 
Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeComputer Explorers
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006Ben Rothke
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptxUmaraZahidLecturer
 
IT Security Seminar Cougar CPS
IT  Security  Seminar  Cougar  CPSIT  Security  Seminar  Cougar  CPS
IT Security Seminar Cougar CPScougarcps
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Security Basics Webinar
Security Basics WebinarSecurity Basics Webinar
Security Basics WebinarTechSoup
 
Information security for health practitioners
Information security for health practitionersInformation security for health practitioners
Information security for health practitionersDanny Doobay
 
Cyber security 101
Cyber security 101Cyber security 101
Cyber security 101Travis Good
 

Similar a 091005 Internet Security (20)

100812 internet security2.0
100812 internet security2.0100812 internet security2.0
100812 internet security2.0
 
Presented to Compass
Presented to CompassPresented to Compass
Presented to Compass
 
What is malware
What is malwareWhat is malware
What is malware
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Information security
Information securityInformation security
Information security
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 
C3
C3C3
C3
 
Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safe
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
 
IT Security Seminar Cougar CPS
IT  Security  Seminar  Cougar  CPSIT  Security  Seminar  Cougar  CPS
IT Security Seminar Cougar CPS
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Security Basics Webinar
Security Basics WebinarSecurity Basics Webinar
Security Basics Webinar
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Information security for health practitioners
Information security for health practitionersInformation security for health practitioners
Information security for health practitioners
 
Cyber security 101
Cyber security 101Cyber security 101
Cyber security 101
 

Último

Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 

091005 Internet Security

  • 1. Internet Security Dave Palmer Instructional Media Agent South Central Extension District
  • 2.
  • 3. Part 1 – The Threats Virus Worms Scams Trojans Backdoor Bots Malware Hackers Phishing Rootkit Spyware
  • 4. The threats most people are not aware of. The threats many of us are aware of.
  • 5. The Global Scope of the Problem Estonia, a tiny but highly wired country on the Baltic Sea, was essentially shut down for 3 weeks during April and May of 2007 by organized cyber attacks.
  • 6. The Global Scope of the Problem 2 dozen South Korean & U.S. Government agencies & others were attacked in July 2009. Targets included the DoD, FAA, Homeland Security, NYSE, NASDAQ, etc.
  • 7. The National Scope of the Problem Database breach by hackers personal information on 160,00 current and former students and alumni stolen. 530,000 medical records stolen including social security numbers. Sensitive information on 65,000 current and former employees stolen. A few of the many major security breaches that became public in the 2 nd Quarter of 2009.
  • 8.
  • 9.
  • 10.
  • 11. Malware – malicious software Intent is to damage, disrupt, steal, or otherwise inflict problems on data, hosts, or networks.
  • 12. The Scope of the Problem The number of NEW malware threats is increasing New malicious code signatures - Symantec 2007 2008
  • 13.
  • 14.
  • 15.
  • 16. Flash Cookies Widely used… … including in Extension
  • 17.
  • 18. Social Engineering Means: Manipulating people to do things or to divulge confidential information
  • 19.
  • 20.
  • 21. Pharming Intent is to redirect a legitimate website's traffic to another, nearly identical but bogus website for the purpose of stealing sensitive information.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 37. Intermission When we return… how do we protect our computers and our data?
  • 38. Part 2 – The Protection We’ve covered the threats, but how do we protect ourselves?
  • 39. Use Best Practices Data Router w/ hardware firewall ZoneAlarm software firewall Spybot w/ tea timer Super Anti Spyware Anti virus software Backup Data
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 57. Data Router w/ hardware firewall ZoneAlarm software firewall Spybot w/ tea timer Super Anti Spyware Anti virus software Use Best Practices Backup Data
  • 58.
  • 59.
  • 60.
  • 61.
  • 62. Data Wireless Router w/ hardware firewall ZoneAlarm software firewall Spybot w/ tea timer Super Anti Spyware Anti virus software Use Best Practices Backup Data
  • 63.
  • 64.
  • 65.
  • 66.
  • 67.
  • 68.
  • 69. Data Wireless Router w/ hardware firewall ZoneAlarm software firewall Spybot w/ tea timer Super Anti Spyware Anti virus software Use Best Practices Backup Data
  • 70.
  • 71.
  • 72.
  • 73.
  • 74.
  • 75.
  • 76.
  • 77.
  • 78.
  • 79.
  • 80.
  • 81. You Commercial Repair Local PC Users Groups Friends & family CompUSA Geek Squad Local repair shop Etc. When you need help…
  • 82.
  • 83.
  • 84.
  • 85.