protecting your computer system innovative teaching center
DESCRIPTION
TRANSCRIPT
![Page 1: Protecting Your Computer System Innovative Teaching Center](https://reader036.vdocuments.site/reader036/viewer/2022081413/5462872caf7959f84e8b4edd/html5/thumbnails/1.jpg)
Protecting Your Computer System
Innovative Teaching Center
![Page 2: Protecting Your Computer System Innovative Teaching Center](https://reader036.vdocuments.site/reader036/viewer/2022081413/5462872caf7959f84e8b4edd/html5/thumbnails/2.jpg)
Objectives
After completing this workshop, you will be able to:
• Identify software utilities for protecting computer systems against computer viruses, adware, spyware, and pop-up windows. • Describe how viruses, adware and spyware can take over a computer and how to prevent these attacks.
• Identify firewall software and why a personal firewall is important.
• Describe the two different methods of preventing unwanted pop-up windows from appearing when browsing on the web.
• List different methods in which a computer user can prevent viruses, adware, spyware, and pop-up windows from infecting a computer.
• Identify common problems created by viruses, adware, and spyware.
![Page 3: Protecting Your Computer System Innovative Teaching Center](https://reader036.vdocuments.site/reader036/viewer/2022081413/5462872caf7959f84e8b4edd/html5/thumbnails/3.jpg)
Workshop Outline
Introduction
Spyware & Adware
Viruses
Firewalls
Pop-up Blockers
Top 10 Ways to Protect Your Computer
![Page 4: Protecting Your Computer System Innovative Teaching Center](https://reader036.vdocuments.site/reader036/viewer/2022081413/5462872caf7959f84e8b4edd/html5/thumbnails/4.jpg)
Introduction
![Page 5: Protecting Your Computer System Innovative Teaching Center](https://reader036.vdocuments.site/reader036/viewer/2022081413/5462872caf7959f84e8b4edd/html5/thumbnails/5.jpg)
Before you Connect
According to researchers, an unpatched Windows PC connected to the Internet will last only 20
minutes before it’s compromised by Spyware & Adware, Viruses, and worms
![Page 6: Protecting Your Computer System Innovative Teaching Center](https://reader036.vdocuments.site/reader036/viewer/2022081413/5462872caf7959f84e8b4edd/html5/thumbnails/6.jpg)
Adware
Source: PC Magazine, March 2, 2004
Adware is any software application in which advertising
banners are displayed while the program is running.
0
200
400
600
800
1000
1200
1400
1998 1999 2000 2001 2002 2003
Number of new Adware applications
![Page 7: Protecting Your Computer System Innovative Teaching Center](https://reader036.vdocuments.site/reader036/viewer/2022081413/5462872caf7959f84e8b4edd/html5/thumbnails/7.jpg)
Signs of Problems
Your browser always comes up to a search engine(IncrediFind)
A new item appears in your Favorites list
Your system runs noticeably slower
A search tool bar appears in your browser
Pop-ups…pop-ups…even when your not browsing
Homepage changed to a different page – hijacked (Casino Palazzo)
![Page 8: Protecting Your Computer System Innovative Teaching Center](https://reader036.vdocuments.site/reader036/viewer/2022081413/5462872caf7959f84e8b4edd/html5/thumbnails/8.jpg)
Windows Task Manager
• Used to quickly determine if you have a problem
• Bring up Windows Task Manager
(hit Ctrl-Shift-Esc)
• Check process and performance
IncrediFind Search Engine will be tipb.exe
![Page 9: Protecting Your Computer System Innovative Teaching Center](https://reader036.vdocuments.site/reader036/viewer/2022081413/5462872caf7959f84e8b4edd/html5/thumbnails/9.jpg)
The Five Critical Ingredients of PC Security
1. Operating System Updates
2. Adware & Spyware Removal Utilities
3. Antivirus Removal Utility
4. Personal Firewall
5. User Caution
![Page 10: Protecting Your Computer System Innovative Teaching Center](https://reader036.vdocuments.site/reader036/viewer/2022081413/5462872caf7959f84e8b4edd/html5/thumbnails/10.jpg)
Spyware & Adware
![Page 11: Protecting Your Computer System Innovative Teaching Center](https://reader036.vdocuments.site/reader036/viewer/2022081413/5462872caf7959f84e8b4edd/html5/thumbnails/11.jpg)
Adware
• Any software application in which advertising banners are displayed while the program is running.
• Collects information about the user in order to display advertisements based on user's browsing patterns.
![Page 12: Protecting Your Computer System Innovative Teaching Center](https://reader036.vdocuments.site/reader036/viewer/2022081413/5462872caf7959f84e8b4edd/html5/thumbnails/12.jpg)
Spyware
• Any software that covertly gathers user information through the user's Internet connection without his or her knowledge.
• Typically bundled as a hidden component of freeware or shareware programs.
• Monitors user activity on the Internet and transmits that information in the background to someone else.
![Page 13: Protecting Your Computer System Innovative Teaching Center](https://reader036.vdocuments.site/reader036/viewer/2022081413/5462872caf7959f84e8b4edd/html5/thumbnails/13.jpg)
Spyware
– Can collect sensitive data like credit card or social security numbers
– Or capture all your keystrokes
– Scan your hard drive
– Review your Internet cookies
– Change your homepage for your browser
![Page 14: Protecting Your Computer System Innovative Teaching Center](https://reader036.vdocuments.site/reader036/viewer/2022081413/5462872caf7959f84e8b4edd/html5/thumbnails/14.jpg)
Differences from viruses/worms
• Spyware is not aimed at doing malicious things your computer
• Spyware can significantly reduce the performance of your computer--usually manifested by slowing it down
• Written by companies (often outside the U.S.), not individuals
![Page 15: Protecting Your Computer System Innovative Teaching Center](https://reader036.vdocuments.site/reader036/viewer/2022081413/5462872caf7959f84e8b4edd/html5/thumbnails/15.jpg)
What to do?
• Use reputable programs to protect your computer– Spybot or AdAware
• AdAware (www.lavasoftusa.com)• Spybot (www.spybot.info)
• These programs reviewed often at cnet.com and pcworld.com
• Use a software firewall like Zonealarmhttp://www.pcworld.com/howto/article/0,aid,114738,00.asp
![Page 16: Protecting Your Computer System Innovative Teaching Center](https://reader036.vdocuments.site/reader036/viewer/2022081413/5462872caf7959f84e8b4edd/html5/thumbnails/16.jpg)
Spybot Download
• Search your hard disk for spyware or adware.
• Removes them
• Homepage:http://spybot.safer-networking.de/
![Page 17: Protecting Your Computer System Innovative Teaching Center](https://reader036.vdocuments.site/reader036/viewer/2022081413/5462872caf7959f84e8b4edd/html5/thumbnails/17.jpg)
Download, install, configure
![Page 18: Protecting Your Computer System Innovative Teaching Center](https://reader036.vdocuments.site/reader036/viewer/2022081413/5462872caf7959f84e8b4edd/html5/thumbnails/18.jpg)
Online-Check for updates
![Page 19: Protecting Your Computer System Innovative Teaching Center](https://reader036.vdocuments.site/reader036/viewer/2022081413/5462872caf7959f84e8b4edd/html5/thumbnails/19.jpg)
Check results
![Page 20: Protecting Your Computer System Innovative Teaching Center](https://reader036.vdocuments.site/reader036/viewer/2022081413/5462872caf7959f84e8b4edd/html5/thumbnails/20.jpg)
Immunize
![Page 21: Protecting Your Computer System Innovative Teaching Center](https://reader036.vdocuments.site/reader036/viewer/2022081413/5462872caf7959f84e8b4edd/html5/thumbnails/21.jpg)
Don’t underestimate…
…this growing threat
Take action to defend your
computer and yourself
![Page 22: Protecting Your Computer System Innovative Teaching Center](https://reader036.vdocuments.site/reader036/viewer/2022081413/5462872caf7959f84e8b4edd/html5/thumbnails/22.jpg)
Viruses
![Page 23: Protecting Your Computer System Innovative Teaching Center](https://reader036.vdocuments.site/reader036/viewer/2022081413/5462872caf7959f84e8b4edd/html5/thumbnails/23.jpg)
What is a Virus?
Social diseases of computers
Malicious code written by malicious people
![Page 24: Protecting Your Computer System Innovative Teaching Center](https://reader036.vdocuments.site/reader036/viewer/2022081413/5462872caf7959f84e8b4edd/html5/thumbnails/24.jpg)
Types of Malicious Code
Virus A computer virus attaches itself to a program or file so it can spread from one computer to another, leaving infections as it travels.
Can cause mildly annoying effects while others can damage your HW/SW, or files. Almost all viruses are attached to an executable file.
Trojan HorseAt first glance will appear to
be useful software but will do damage once installed.
Changing your desktop, adding silly active desktop
icons or deleting files.
Worm Spread from computer to computer, but unlike a virus, travels without any help from a person.
Consumes system memory causing Web servers, network servers, and individual computers to stop responding.
Viruses, worms, and Trojan Horses are all
malicious programs that can cause damage to your computer
![Page 25: Protecting Your Computer System Innovative Teaching Center](https://reader036.vdocuments.site/reader036/viewer/2022081413/5462872caf7959f84e8b4edd/html5/thumbnails/25.jpg)
How Does Your Computer Can Catch a Virus?
• Has to be introduced to your system
• Medium in which a virus can be introduced
– Floppy– Modem– Network– E-mail– File sharing programs
![Page 26: Protecting Your Computer System Innovative Teaching Center](https://reader036.vdocuments.site/reader036/viewer/2022081413/5462872caf7959f84e8b4edd/html5/thumbnails/26.jpg)
How Do You Avoid a Virus Problem?
• Backup important files
• Limit trading floppy disks
• File sharing programs
• Avoid .exe, .scr, .Ink, .bat, .abs, .dll, .bin, anmd .cmd.
• Install an Antivirus utility
• Online Scanners
![Page 27: Protecting Your Computer System Innovative Teaching Center](https://reader036.vdocuments.site/reader036/viewer/2022081413/5462872caf7959f84e8b4edd/html5/thumbnails/27.jpg)
Antivirus Utilities
See Handout
See Handout forMore Information
![Page 28: Protecting Your Computer System Innovative Teaching Center](https://reader036.vdocuments.site/reader036/viewer/2022081413/5462872caf7959f84e8b4edd/html5/thumbnails/28.jpg)
Words of Advice
• Don't run program files from unknown or unreliable sources
• Keep you operating system and antivirus software up-to-date
(use automatic updates)
AntiVirus detection should be handled both server side and client side. Even in WebCT, our server
should refuse to save that file or allow the next person to Access it if the file is "possessed." …And make lots of backups.
WebCT Users
![Page 29: Protecting Your Computer System Innovative Teaching Center](https://reader036.vdocuments.site/reader036/viewer/2022081413/5462872caf7959f84e8b4edd/html5/thumbnails/29.jpg)
Firewalls
![Page 30: Protecting Your Computer System Innovative Teaching Center](https://reader036.vdocuments.site/reader036/viewer/2022081413/5462872caf7959f84e8b4edd/html5/thumbnails/30.jpg)
What is a Firewall?
A firewall isolates your computer from the Internet using a wall to block out unwanted visitors.
A firewall will protect you against things that try to break into your computer, not the things you let in.
![Page 31: Protecting Your Computer System Innovative Teaching Center](https://reader036.vdocuments.site/reader036/viewer/2022081413/5462872caf7959f84e8b4edd/html5/thumbnails/31.jpg)
Two Types of Firewalls
• Hardware firewall (typically on Routers)
• Software firewall (sometimes referred to personal firewall)
![Page 32: Protecting Your Computer System Innovative Teaching Center](https://reader036.vdocuments.site/reader036/viewer/2022081413/5462872caf7959f84e8b4edd/html5/thumbnails/32.jpg)
How Do They Work?
• Castle gates
• Option to enable or disable
![Page 33: Protecting Your Computer System Innovative Teaching Center](https://reader036.vdocuments.site/reader036/viewer/2022081413/5462872caf7959f84e8b4edd/html5/thumbnails/33.jpg)
Where do I need a Firewall
• Do have a firewall on each machine at home to communicate with each other
• One on the router (WiFi)– Set to block all non-legitimate traffic
Don’t run multiple firewalls on one computer
![Page 34: Protecting Your Computer System Innovative Teaching Center](https://reader036.vdocuments.site/reader036/viewer/2022081413/5462872caf7959f84e8b4edd/html5/thumbnails/34.jpg)
Which One is the Best One to Buy?
See Handout
See Handout forMore Information
![Page 35: Protecting Your Computer System Innovative Teaching Center](https://reader036.vdocuments.site/reader036/viewer/2022081413/5462872caf7959f84e8b4edd/html5/thumbnails/35.jpg)
Pop-up Blockers
![Page 36: Protecting Your Computer System Innovative Teaching Center](https://reader036.vdocuments.site/reader036/viewer/2022081413/5462872caf7959f84e8b4edd/html5/thumbnails/36.jpg)
Those Annoying Ads
Beware, these programs often block useful javascripts, like in WebCT.
Idea: Make your WebCT server a “trusted" site to their popup-blockers, rather than telling users to turn off the popup-blockers.
WebCT Users
Websites use pop-up windows to make money, however these ads can be very annoying.
![Page 37: Protecting Your Computer System Innovative Teaching Center](https://reader036.vdocuments.site/reader036/viewer/2022081413/5462872caf7959f84e8b4edd/html5/thumbnails/37.jpg)
Three Methods to Stop Pop-ups
• Opt-out with advertiser
• Software solutions: Pop-up stopper utilities
See HandoutFor
List of Opt-outAdvertisers
AndSoftwareSolutions
![Page 38: Protecting Your Computer System Innovative Teaching Center](https://reader036.vdocuments.site/reader036/viewer/2022081413/5462872caf7959f84e8b4edd/html5/thumbnails/38.jpg)
Three Methods to Stop Pop-ups
Windows XP Service Pack 2 (SP2) Internet Explorer allows you to prevent most pop-up windows
![Page 39: Protecting Your Computer System Innovative Teaching Center](https://reader036.vdocuments.site/reader036/viewer/2022081413/5462872caf7959f84e8b4edd/html5/thumbnails/39.jpg)
Top 10 Ways to Protect YourComputer
![Page 40: Protecting Your Computer System Innovative Teaching Center](https://reader036.vdocuments.site/reader036/viewer/2022081413/5462872caf7959f84e8b4edd/html5/thumbnails/40.jpg)
Top 10 Ways to Protect YourComputer
1. Get an antivirus tool
2. Get a personal firewall
3. Run antispyware applications
4. Update your operating systems and browser version (http://www.microsoft.com/security/bulletins/default.mspx)
5. Use a different browser program (Firefox www.mozilla.org)
6. Don’t install something unless you know what it is, and read the fine print before loading programs.
7. Update Antivirus applications every time you go online.
8. Beware of peer-to-peer file sharing (Kazaa and Grokster.)
9. Don’t open unsolicited e-mail
10 Talk to your family about file sharing
![Page 41: Protecting Your Computer System Innovative Teaching Center](https://reader036.vdocuments.site/reader036/viewer/2022081413/5462872caf7959f84e8b4edd/html5/thumbnails/41.jpg)
The End