Protecting Yourself ONLINE Presented By: Dan Barker TNT Consulting Group

advertisement
Protecting Yourself
ONLINE
Presented By: Dan Barker
TNT Consulting Group
www.tntgroup.com
Overview
This session is designed to:
 Put Your Mind At Ease
 Inform and Educate
 Arm You With The Tools
 Make Your Internet Experience Pleasant
Protecting Yourself Online
Issues Covered
 Keeping Your Information Private
 Online Shopping
 Passwords
 Virus Protection & Firewalls
 Keeping Systems Up To Date
Protecting Yourself Online
Government Is Getting Involved
President Bush directed the development of
a National Strategy to Secure Cyberspace
to ensure that America has a clear road
map to protect a part of its infrastructure
so essential to our way of life.
Protecting Yourself Online
The Issues
The goal is to empower the home user and small
business person to protect their cyberspace by:
• raising cybersecurity awareness of the home user and
small business, including children and students;
• making it easier for home users and small businesses
to keep current with anti-virus software, software
patches, and firewalls;
• encouraging and helping facilitate the installation
and use of firewalls on all broadband Internet
connections, such as cable modems, DSL, satellite
and wireless;
Protecting Yourself Online
The Issues
Why Does The Government Care?
The home user and small business can be damaged
severely and, in some cases, can be used to severely
damage others.
Protecting Yourself Online
The Issues
 Hard Drive Crashing
 Identity Theft
 Credit Theft
 Tunneling
 Extortion
 Zombies/Trojans
 Compromise of Private Information
Protecting Yourself Online
Your Online Privacy
Why is my information so important to
someone?
Businesses want to gain new customers and
keep the customers they have. To do this,
they need information.
The more information a business has about a
prospect or a customer, the more likely it
can meet that customer’s needs or shape its
promotions to appeal to those needs.
This is called a “profile.”
Protecting Yourself Online
Your Online Privacy
Online Methods Of Getting Your Data
 Online Forms & Registrations
 Websites (Traffic and Web Logs)
 Newsgroups
 Spyware/Adware
Protecting Yourself Online
Your Online Privacy
What They Do With Your Information
 Market additional products to you.
 Sell it to a third-party company for a fee or a
commission on the products it sells to you.
 Trade it as barter for the use of another
company's customer database.
This leads to unwanted email offers, more
junk mail, and targeted web sites.
Protecting Yourself Online
Your Online Privacy
How To Deal With This…
 Don’t give out SS # or other personal
information.
 Don’t respond to surveys or polls unless sure of
source – and then only give generic information
 Weigh the importance of someone having your
information
 Be careful about posting any personal
information online and what you sign up for.
 Instruct family/employees regarding which
information is ok to release online
Protecting Yourself Online
INVASION OF SPAM
Protecting Yourself Online
Your Online Privacy
How To Deal With This…
Never Respond to Spam
Use A Throw Away Address
Use SpamCop – spamcop.net
Don’t Forward Mail With Everyone’s Address
When Filling Out Online Forms – Use Throw Away
Address or Bogus Address
Use screen name not email address for Ebay, Chat
Rooms, etc.
Protecting Yourself Online
Online Shopping
Protecting Yourself Online
Online Shopping
To good to be true?
 Herbal Viagra
 Internet Investigator
 Pump and Dump Stock Scams
 Credit Scams
 Nigerian Fee Scam
 Counterfeit Items
Protecting Yourself Online
Online Shopping
Do business with reputable firms online.
Use a credit card.
Watch for “great deals” without anyway to contact
them offline.
When feasible verify by phone.
Check your statements
www.bbb.org
www.scambusters.org
Protecting Yourself Online
Password Defenses
Protecting Yourself Online
Passwords
 Use a combination of characters, numbers and, if possible,
symbols. Alternate the capitalization, interchanging upper case
with lower case.
 Don't use words that can be found in dictionaries of any
language.
 Don't use proper names, names of spouses or friends.
 Don't use words spelled backwards.
 Don't use the same password for everything.
 Never give out your password to strangers.
 Change passwords periodically.
Protecting Yourself Online
Viruses/Trojans
Protecting Yourself Online
VIRUS PROTECTION
Computer viruses are the "common cold" of
modern technology.
E-mail viruses are now twice as prevalent as they
were in 2001, with one e-mail in every 200
containing a virus.
Virus-scanning company MessageLabs said it
stopped 9.3 million viruses in 2 billion e-mails this
year, which equated to one virus in every 215 emails.
Protecting Yourself Online
VIRUS PROTECTION
 Viruses enter your system via e-mail,
downloads, infected floppy disks, or (occasionally)
hacking.
 By definition, a virus must be able to selfreplicate (make copies of itself) to spread.
 Virus behavior can range from annoying to
destructive.
 Antivirus software can detect nearly all types of
known viruses, but it must be updated regularly to
maintain effectiveness.
Protecting Yourself Online
VIRUS PROTECTION
 Install Antivirus Software and Keep It Up To
Date.
 Activate full-time protection.
 Make sure “All Files” are scanned.
 Turn On Automatic Updating
 Use a personal firewall – (Hardware/Software)
 Keep regular backups of important data.
 Keep your operating system up to date.
 Be cautious of email attachments even if you
know the sender.
Protecting Yourself Online
VIRUS PROTECTION
Protecting Yourself Online
VIRUS PROTECTION
PestPatrol defeats the threat
by detecting and removing:
Spyware/Adware
Remote Access Trojans
Keystroke Loggers
Protecting Yourself Online
VIRUS PROTECTION
FIREWALLS
An Internet Router, which is installed between your
Internet connection and the rest of your network, protects
your network by making your individual computers virtually
invisible to the outside world
Protecting Yourself Online
System Updates
Protecting Yourself Online
KEEPING SYSTEMS HEALTHY
Windows Security Certificates Vulnerable to Attack
Microsoft Warns of Windows Vulnerability—Again
Protecting Yourself Online
Safety Checklist
Protecting Yourself Online
Safety Checklist
 Use anti-virus software that will scan
incoming mail messages and files on-access
automatically.
 Update anti-virus software definitions
weekly, if not more often (ideally, the AV
software should update the virus definitions
automatically.)
 Learn how to identify virus hoaxes from real
threats.
 Install a firewall,
Protecting Yourself Online
Safety Checklist
 Do not open attachments unless absolutely
necessary.
 Do not open EXE, BAT, VBS, and SCR type
attachments ever, since they are common
vectors for virus/malware infections.
Avoid the use of insecure network programs
such as ICQ, AIM or IRC for discussing private
information.
Perform system manufacturer security patch
updates on a regular basis.
Protecting Yourself Online
Safety Checklist
 Backup your files regularly on ZIP disk or
CD-ROM.
 Ensure that effective passwords are used.
Passwords should also be changed on a
regular basis.
Set up company or family rules of use to
ensure everyone has a safe experience.
Protecting Yourself Online
Sources
Government’s Initiative on Cyber Safety
www.whitehouse.gov/pcipb
Protecting Your Information
Privacy Net – Check Your Machine
www.privacy.net/analyze
Federal Trade Commission on Privacy
www.ftc.gov/privacy
Tracking Spyware on Your System
www.grc.com
Protecting Yourself Online
Sources
Federal Trade Commission’s Safe Harbor
www.ftc.gov/privacy
Consumer Reports On Identity Theft
www.consumer.gov/idtheft
Federal Trade Commission
When Bad Things Happen To Your Good Name
www.ftc.gov/bcp/conline/pubs/credit/idtheft.pdf
Identity Theft Assistance
www.VictimsAssistanceofAmerica.org
Run A Credit Report
https://www.econsumer.equifax.com
Protecting Yourself Online
Sources
SPAM
Coalition Against Unsolicited Commercial Email
www.cauce.org
Network Abuse Clearinghouse
www.abuse.net
SpamCop - punish spammers
www.spamcop.net
SpamCon Foundation
www.spamcon.org
SpamTrail – Email Filtering Service
www.spamtrail.com
Protecting Yourself Online
Online Shopping
Sources
Better Business Bureau
search.bbb.org/search.html
ScamBusters
www.scambusters.org/Scambusters48.html
FTC’s Guide to Buying and Selling on the Net
www.ftc.gov/bcp/conline/pubs/online/auctions.htm
Fighting Online Fraud
www.fraud.org
Card Cops – Check Your Credit Card For Theft
www.cardcops.com
Consumer Sentinel
www.consumer.gov/sentinel
Protecting Yourself Online
Virus Protection & Firewalls
Sources
Antionline - Fight Back Against Hackers
www.antionline.com/fight-back
Pest Patrol – Solutions for Spyware/Adware
www.pestpatrol.com
Gibson Research – Check your firewalls
www.grc.com
McAfee Antivirus
www.mcafee.com
F-Secure
www.f-secure.com
Norton Anti-Virus
www.norton.com
Trend Micro – PC-Cillian
www.trendmicro.com
Vmyths – Virus Myths & Hoaxes
www.vmyths.com
Protecting Yourself Online
Sources
Keeping Your Systems Up To Date
Microsoft’s Update Tool
windowsupdate.microsoft.com
Insecure.Org - Check system Security Holes
www.insecure.org/
Protecting Yourself Online
Questions?
www.tntgroup.com
Download