computer security cpes for cpas program georgia perimeter college december 9, 2005

68
Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Upload: ilene-charlotte-bennett

Post on 23-Dec-2015

220 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Computer Security

CPEs for CPAs Program

Georgia Perimeter College

December 9, 2005

Page 2: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Today’s Topics

The Need for Computer Security

Setting Up a Secure Computer System

Using Your Computer Securely

Special Concerns for Wireless Networks

Page 3: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Today’s Topics

Focus onQuality and effectivenessFree or low-cost solutionsEase of use

Page 4: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

The Need for Computer Security

Computers face a wide variety of threats IntrusionsPrivacy invasionsHijackingsData corruptionVirusesAnd more

Page 5: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

The Need for Computer Security (cont.)

Threats come from many sourcesPhysical accessNetwork accessUse of removable mediaUse of common programs

http://media.trendmicro.com/product/general/malware.html

Page 6: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

How to Keep a System Perfectly Secure

Don’t connect it to any type of networkDon’t use emailDon’t have Internet accessDon’t shop onlineDon’t bank onlineDon’t share files with other users

Page 7: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

How to Keep a System Perfectly Secure (cont.)

Don’t use any removable mediaFloppy disksCDs/DVDsFlash Drives/USB devices

Exception: New, unused CDs for backup of data

Page 8: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

How to Keep a System Perfectly Secure (cont.)

Don’t let anyone but yourself ever use the computer

Permanently secure it to the building structure

Page 9: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Okay, this may not be feasible!

So what do we do?

Page 10: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

What about security for the REST of us?

Page 11: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Setting Up a Secure System

Three Critical StepsAccess Control / Password ProtectionHardware SolutionsSoftware Solutions

Page 12: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Access Control

Simple solution to some problems

No cost involved

Only handles some problems

Page 13: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Password Protection

Set up login password on ALL computersHandled in operating systemDo not allow a “guest” account on

computersWith Windows, accounts can be bypassedNever allow automatic login

Page 14: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Password Protection (cont.)

Extra protection desirable for laptopsSet up BIOS password

Power onHit designated key when prompt appears (must

do quickly)Locate password option on BIOS screen

Caution: if you forget this password, NO ONE can get into your computer

Page 15: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Hardware Solutions

Acts as “first line of defense” by controlling network access

Only protects from external threats

Does not protect against invasion from within network itself

Does not protect against threats hidden inside legitimate data

Page 16: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Hardware Firewall

Monitors network data transfersLANs Internet

Blocks unauthorized traffic while allowing legitimate traffic

May also perform additional security functions

Page 17: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Hardware Firewall (cont.)

Any computer connected to Internet needs a firewallBroadband connections are more

vulnerableEven dial-up users can be attacked from

outside

Page 18: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Hardware Firewall (cont.)

Makes your computer “invisible” from outside the local network

Often found as part of network routing device

Invaders “see” the router, not computers behind it

Page 19: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Hardware Firewall (cont.)

Install between computers and modem in a local network

Internet Connection

RouterModem

Computer Computer Computer

Page 20: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Hardware Firewall (cont.)

Setup and configuration depends on specific device

Follow directions given by manufacturer

Page 21: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Hardware Firewall (cont.)

Solution for the truly paranoid, or the truly geeky

Bare-bones machine running Linux instead of Windows, combined with switch to connect machines

Page 22: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Hardware Firewall (cont.)

Most hacking attacks target Windows features

Using Linux machine instead of router prevents these attacks

For information and instructions: Router Design Project,

http://www.routerdesign.com Coyote Linux Project,

http://www.coyotelinux.com

Page 23: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Software Solutions

Software firewalls

Anti-virus software

Anti-malware software

Alternatives to common programs

Fixes for common programs

Page 24: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Software Firewalls

Not a replacement for hardware firewalls

Protect individual computers within a networkHardware firewall protects entire network

Protect portable machines which may not always use a hardware firewall

Page 25: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Software Firewalls (cont.)

Analyze incoming data from network

Block undesirable data

Better programs block undesirable outgoing data as well

Page 26: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Software Firewalls (cont.)

Windows XP Internet Connection Firewall (ICF)Monitors/blocks incoming traffic onlyWill NOT block hijack attemptsBetter than nothing but not an optimal

solution

Page 27: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Software Firewalls (cont.)

ZoneAlarm – top choiceMonitors traffic in both directionsHelps prevent hijacking of your computerBasic free version is adequate for most

users

Page 28: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Software Firewalls (cont.)

Download from http://www.zonealarm.com/

Install via wizard

ConfigurationDone through normal computer usageDoes take time

Page 29: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Anti-Virus/Anti-Spyware Software

Viruses and spyware are two different problemsBoth technologies can cause problemsRequire two different solutions

Page 30: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Anti-Virus Software

Virus -- n : a software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer; "a true virus cannot spread to another computer without human assistance"

-- dictionary.com

Page 31: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Anti-Virus Software (cont.)

AVG AntiVirusFree for personal useMay not provide quality of protection of a

commercial program

Page 32: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Anti-Virus Software (cont.)

Trend MicroSystems PC-CillinTop-rated choiceVery effective

Norton Anti-VirusNot my favorite – I’ve had problems

McAfee Anti-Virus

Page 33: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Anti-Virus Software (cont.)

Wizards handle installation seamlessly

Configure automatic email/file attachment scans

Need to upgrade virus signature subscription yearly if you don’t upgrade program

Page 34: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Anti-Malware Software

Malware is catchall term for spyware and adware-type programs

AdwareSoftware that, without your consent, tracks

and reports your web usage to another entity without reporting personally identifying information

Page 35: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Anti-Malware Software (cont.)

SpywareSoftware whose purpose is to collect

personally identifying demographic and usage information from your computer, usually for advertising purposes

Software that 'sneaks' onto the system or performs other activities hidden to the user.

--http://cexx.org

Page 36: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Anti-Malware Software

No one program today catches all spyware – multiple programs neededSpyBot Search and Destroy

http://www.safer-networking.orgAdAware

http://www.lavasoft.comTrend MicroSystems Anti-Spyware

Web-based scanhttp://www.trendmicro.com

Page 37: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Software Alternatives

Microsoft products are favorite targets of crackersWidespread use (80%+ of PCs use these)Easily exploitable security holesParticularly vulnerable

Internet Explorer – web browserOutlook – email client

Page 38: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Software Alternatives (cont.)

Web BrowsersMozilla FirefoxOpera

Email ClientsMozilla ThunderbirdEudora

Office SoftwareOpenOffice

Page 39: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Alternatives to Internet Explorer

Mozilla Firefox

Tutorial: http://opensourcearticles.com/articles/firefox_15/english/part_01

Opera

Page 40: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Alternatives to Outlook

Email is most vulnerable feature of Outlook

Most alternatives only deal with emailScheduling, memo, other features not

provided

Page 41: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Eudora

Download from http://www.eudora.com

Available in free, ad-supported, or paid versions

Supports multiple email accounts, folders, junk email filtering

Page 42: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Mozilla Thunderbird

Imports existing email and contact information

Similar look & feel to Outlook

Handles multiple email accounts

Provides adaptive junk email filtering

Automatically blocks scriptsDeters spread of viruses

Page 43: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Mozilla Thunderbird (cont.)

Download from http://www.mozilla.com/

Excellent tutorial: http://opensourcearticles.com/articles/thunderbird_15/english/part_01

Page 44: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Mozilla Thunderbird (cont.)

InstallationWizard handles all work

ConfigurationSet up account(s) Import existing email/contact infoSet up spam filtering

Page 45: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Office Software

Open OfficeAlternative to Microsoft OfficeMostly, but not fully, compatible

Available from http://www.openoffice.org/

Page 46: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Other Software

Windows Media PlayerPotential for privacy invasion through

“supercookie”Disable with following step:

Tools->Options->PlayerUncheck box beside “Allow Internet sites to

uniquely identify your Player.”

Page 47: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Other Software (cont.)

Windows MessengerAllows pop-ups without an active browserNot to be confused with MSN Messenger!To stop, disable the service

Start->Run, type services.msc & click OKDouble-click the Messenger entryChoose StopChoose Disabled from the StartUpType list

Page 48: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Using Your Computer Securely

Monitor your computer’s behavior

Schedule maintenance tasks

Use hard-to-break passwords

Protect your data files

Take precautions with Internet data

Be extra careful with wireless networks

Page 49: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Monitor Your Computer

Watch for unusual activity

Signs of problems:Excessive hard disk accessSlow operationPop-up windows

Page 50: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Schedule Maintenance Tasks

Running tasks automatically ensures they are actually run!Many programs let you schedule them from the program itselfOther programs can be scheduled from Control PanelStart->Settings->Control Panel->

Scheduled Tasks

Page 51: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Schedule Maintenance Tasks

Recommendations:Full virus scan weeklyFull spyware scan with Spybot weeklyFull spyware scan with Ad-Aware weeklyAutomatic updates for softwareAutomatic updates of signature files weekly

for all programs using them

Page 52: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Password Choices

Choose passwords that areCombinations of letters, numbers, and

symbolsDo not contain any identifying data

Birth datesFamily members’ names/variations

Are at least eight to ten characters long

Page 53: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Password Security

Do not write down passwords or PINsEspecially don’t keep written passwords or

PINs with the item using them!

Do NOT give ANYONE your password or PIN

Page 54: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Changing Passwords

Do not use the same password for everything

Change your passwords regularly

However, it’s better to use a “good” password badly than to use “bad” passwords well

Page 55: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Data File Protection

Do not make sensitive files accessible through networkDisable file sharing If files must be shared, password-protect

them

Page 56: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Data File Protection (cont.)

Simply deleting a file is not enough!Files remain in the Recycle/Trash bin after

deletionRecovery from here is simpleMust either specifically delete files from

Recycle Bin or empty Recycle Bin

Page 57: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Precautions with Internet Data

Use secure browsers and sites

Clear your data after use, especially from public computers

Page 58: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Browser Security

Make sure you are using Secure Socket technology if sending personal information to a web site Indicated by

Lock icon at bottom of browser windowhttps:// prefix on site URL (not http://)

Page 59: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Smart Use of Cookies

Most users will need to use cookiesMany legitimate Internet uses require them

Browsers should be set toReject third-party cookiesRestrict first-party cookies

Page 60: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Smart Use of Cookies

Internet ExplorerTools->Internet Options->Privacy

Select Advanced ButtonCheck Override Automatic Cookie HandlingSelect Block Third-Party cookies

Mozilla FirefoxTools->Options->Privacy->Cookies

Allow only originating site to set cookies

Page 61: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Browser History

Internet ExplorerHistory button on ToolbarSelect all items in window and delete

Mozilla FirefoxTools->Options->Privacy

Click on Clear button beside history

Page 62: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Removing Temp Files

Make hidden files visibleStart -> Programs -> Accessories ->

Windows Explorer.Tools -> Folder Options-> View -> Show

Hidden Files and Folders, Apply

Navigate in the left-hand pane to C:\Documents and Settings\%your username%\Local Settings.

Page 63: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Removing Temp Files (cont.)

Delete all contents in the following folders:TempTemporary Internet Files Content.IE5 (subfolder to Temporary

Internet Files) Note: Windows will warn you that you are trying to delete system files. This is okay, so click Yes.

Page 64: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Wireless Networking Concerns

Wireless network connections are inherently insecure

Broadcast, not point to pointAnyone within range can intercept signalOnce signal is intercepted, anyone can

view dataMany tools exist to do this

Page 65: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Wireless Networking Concerns (cont.)

Even encrypted transmissions are vulnerableAny currently used encryption scheme can

be brokenMost common scheme can be broken by a

middle-schooler in about 15 minutes!

Page 66: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Wireless Networking Concerns (cont.)

Don’t enable file sharing on computers using wireless network connections

Don’t transmit sensitive data OF ANY TYPE over a wireless networkDon’t shopDon’t bank online

Page 67: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

In Closing

Suggestions and recommendations are for the normal user

The truly paranoid do need additional precautionsBut these require much more knowledge

Once your security is set up, maintenance will not be much effort

Page 68: Computer Security CPEs for CPAs Program Georgia Perimeter College December 9, 2005

Thank you for attending!

This presentation is available online athttp://www.gpc.edu/~jbenson/presentations/security.ppt

Contact information: Julia Benson-Slaughter

Associate Professor of Computer ScienceDepartment of Business/Computer ScienceGeorgia Perimeter College2101 Womack RoadDunwoody, GA 30338