Digital Self Defense 102B: Firewall - PowerPoint PPT Presentation

1 / 18
About This Presentation
Title:

Digital Self Defense 102B: Firewall

Description:

Describe what a firewall is and what it does. Describe firewall choices for home or RIT use ... Common search terms ('screensaver') Trojans ... – PowerPoint PPT presentation

Number of Views:33
Avg rating:3.0/5.0
Slides: 19
Provided by: natha51
Category:

less

Transcript and Presenter's Notes

Title: Digital Self Defense 102B: Firewall


1
Digital Self Defense 102BFirewall Anti-Spyware
2
Objectives
  • Firewall
  • Describe what a firewall is and what it does
  • Describe firewall choices for home or RIT use
  • Describe the types of alerts
  • Describe how to manage alerts
  • Anti-Spyware
  • Describe what spyware and adware are
  • Describe why spyware removal is important
  • Describe the use of Spyware removal tools

3
The Desktop Standard
  • Requirements for computer use to safeguard
    personal and RIT information.
  • Standard Practices
  • Anti-Virus DSD 102A
  • Patching/Updates DSD 102A
  • Buffer Overflow Protection DSD 102A
  • Firewall DSD 102B
  • Anti-Spyware DSD 102A
  • Compliance Date June 1, 2005
  • http//security.rit.edu

4
Firewall
5
What is a Firewall?
  • A firewall monitors and protects your network
    connections to prevent unauthorized connections
    from being made such as
  • Worms
  • Unauthorized Access (Hackers)
  • Unknown transmissions to or from your computer

6
What firewalls should I use?
  • Windows Firewall
  • Built into WindowsXP (after SP2)
  • Easy to manage, simply turn it on
  • No warnings, not very configurable
  • ZoneAlarm
  • Free for download from www.zonelabs.com
  • Easy to install and manage
  • Provides alerts when you are getting attacked
  • Very configurable
  • Router (Hardware)

7
ZoneAlarm Alerts
  • New Program
  • A program is trying to access the internet. If it
    is a trusted program you can allow it, otherwise
    deny it.
  • Protected
  • ZoneAlarm has protected your computer from an
    unauthorized internet connection.
  • Server Program
  • A program is trying to start a server on your
    computer and allow other computers to connect to
    it.

8
Managing AlertsHow to know if programs are safe?
  • Search engines and databases
  • Google
  • http//www.google.com
  • McAfee Virus Information Library
  • http//vil.nai.com
  • Know your computer
  • Have you installed something new?

9
Demonstration Simulation
10
Anti-Spyware
11
What is Spyware and Adware?
  • Spyware
  • Tracking software deployed without adequate
    notice, consent or control for the user.
  • Adware
  • Software that delivers advertising content in a
    manner unexpected and unwanted by users.

Anti-Spyware Coalition (2005)
12
How Do You Get Spyware?
  • Browser Vulnerabilities
  • Instant messenger links to exploit sites
  • Enticing web pages/common terms
  • Links in spam mail
  • File Sharing Networks
  • Bundled with Clients
  • Common search terms (screensaver)
  • Trojans
  • Disguised as anti-spyware programs or other
    popular software

13
Protecting Against Spyware
  • Patching/Automatic Updates
  • Many spyware programs exploit software
    vulnerabilities to install themselves
  • Spybot Search Destroy
  • Immunization from over 1000 spyware threats
  • Blocks known exploit web addresses
  • Can remove some of the more stubborn spyware
    problems
  • Microsoft AntiSpyware (BETA)
  • Automatic Scanning by default
  • Actively scans processes for spyware
  • Use BOTH programs!

14
http//mozilla.org
15
Spybot Search Destroy
16
Microsoft AntiSpyware (BETA)
17
Demonstration Simulation
18
Conclusion
  • Always have a firewall running and configured
    properly.
  • Run more than one anti-spyware product, with at
    least one active component.
  • Schedule spyware scans regularly!
  • infosec_at_rit.edu
  • 475-4123
Write a Comment
User Comments (0)
About PowerShow.com