ºÝºÝߣ

ºÝºÝߣShare a Scribd company logo
Windows Security
Larry MacPhee
e-Learning@NAU
Why Security Matters
? Public nuisance
? Loss of productivity
¨C The cost of spam!
? Loss of data
? Identity theft
? Credit card fraud
? Erosion of trust
Focus on Prevention
? Prevention is easy
¨C 6 steps
? Cure is hard
1. Use an Anti-Virus tool
50,000+ Windows Viruses
New viruses up 400% from last year
Download Sophos Anti-Virus from ITS
a. Keep your
virus definitions
up to date
b. Scan while
you sleep
c. Automate
the process
2. Guard Against Spyware
NAU recommends Spybot
Find and remove
3. Filter Spam
Manage your NAU e-mail
Customize your filters
No more Viagra!
4. Beware the phish hook
Something phishy?
? Urgent e-mail requires your immediate action
? Plays on fear of compromised security
? Usually doesn¡¯t refer to you by name
? Asks you to confirm your identity
? Asks you to enter your password
? Message may contain typos
? May use a suspicious URL
More reading
5. Apply Security Updates
a. Start/Windows Update
b. Choose Express Install
c. Install Priority Updates
Note: NAU pushes out
security updates to
campus machines
Express Install
Bypass non-critical updates
Automatic Updates
a. Start/Control Panel
b. System
c. System Properties
d. Automatic Updates
6. Browse Securely
? Look for the lock symbol and https://
? Use the VPN for wireless transactions
? Use hard to guess passwords
? Change passwords frequently
? Read your credit card statements
? Don¡¯t approve save of credit card info
Why so vulnerable?
? 90% of computers run Windows
? Many dislike Microsoft and Bill Gates
? Windows is not very secure
? MS is slow to patch security holes
? Hard to regulate and enforce
? Lots of novices online
Is my computer compromised?
? Slower than normal performance
? System crashes
? Pop-up ads
? Home page has changed
? Browser crashes
? Possibly no symptoms!
Be afraid!
? You might be a zombie!
? You might have a keystroke logger
? You might be a DDOS pawn
? You might be a notorious spammer!
Remedies
? Disconnect from the network (temporarily)
? Boot up from a System Restore CD
? Run anti-virus software
? Run anti-spyware software
? Run disk, hardware check utilities
? Wipe the drive and reinstall everything!
? Get a Mac? Learn Linux?
Coming Soon!
? Microsoft Free Computing Environments (MFCE)
? Costs and Benefits
? The Open Source Movement
Macintosh
Linux
Open Office
Acknowledgements
? Stephanie McCarthy - Graphics
? ¡°Big Dave¡± Dennehey - Technical Consulting

More Related Content

Similar to security.ppt (20)

eSecurity! Keeping your Business and Customers Safe
eSecurity! Keeping your Business and Customers SafeeSecurity! Keeping your Business and Customers Safe
eSecurity! Keeping your Business and Customers Safe
AVG Technologies AU
?
CYB 102 ¨C Fundamentals of Cyber Security 3.pdf
CYB 102 ¨C Fundamentals of Cyber Security 3.pdfCYB 102 ¨C Fundamentals of Cyber Security 3.pdf
CYB 102 ¨C Fundamentals of Cyber Security 3.pdf
Abolarinwa
?
CYB 102 ¨C Fundamentals of Cyber Security 3.pdf
CYB 102 ¨C Fundamentals of Cyber Security 3.pdfCYB 102 ¨C Fundamentals of Cyber Security 3.pdf
CYB 102 ¨C Fundamentals of Cyber Security 3.pdf
Abolarinwa
?
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcare
Nicholas Davis
?
Secure Yourself, Practice what we preach - BSides Austin 2015
Secure Yourself, Practice what we preach - BSides Austin 2015Secure Yourself, Practice what we preach - BSides Austin 2015
Secure Yourself, Practice what we preach - BSides Austin 2015
Michael Gough
?
Enterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entitiesEnterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entities
Quick Heal Technologies Ltd.
?
Virus Precautions
Virus PrecautionsVirus Precautions
Virus Precautions
Bilal Arif
?
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
Mohsin Riaz
?
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
Ronald Soh
?
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
Brian Pichman
?
Simplitfy - Guarding your Data
Simplitfy - Guarding your DataSimplitfy - Guarding your Data
Simplitfy - Guarding your Data
Erick Solms
?
COMP 424 Computer System Security Fall 2016
COMP 424 Computer System Security Fall 2016COMP 424 Computer System Security Fall 2016
COMP 424 Computer System Security Fall 2016
SamGuy7
?
Staying safe on the internet
Staying safe on the internetStaying safe on the internet
Staying safe on the internet
Arthur Landry
?
Keeping Secrets on the Internet of Things - Mobile Web Application Security
Keeping Secrets on the Internet of Things - Mobile Web Application SecurityKeeping Secrets on the Internet of Things - Mobile Web Application Security
Keeping Secrets on the Internet of Things - Mobile Web Application Security
Kelly Robertson
?
Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos De Pedro
?
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
CharithraaAR
?
Real Business Threats!
Real Business Threats!Real Business Threats!
Real Business Threats!
Rochester Security Summit
?
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
OoXair
?
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
MansoorAhmed57263
?
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
Abzetdin Adamov
?
eSecurity! Keeping your Business and Customers Safe
eSecurity! Keeping your Business and Customers SafeeSecurity! Keeping your Business and Customers Safe
eSecurity! Keeping your Business and Customers Safe
AVG Technologies AU
?
CYB 102 ¨C Fundamentals of Cyber Security 3.pdf
CYB 102 ¨C Fundamentals of Cyber Security 3.pdfCYB 102 ¨C Fundamentals of Cyber Security 3.pdf
CYB 102 ¨C Fundamentals of Cyber Security 3.pdf
Abolarinwa
?
CYB 102 ¨C Fundamentals of Cyber Security 3.pdf
CYB 102 ¨C Fundamentals of Cyber Security 3.pdfCYB 102 ¨C Fundamentals of Cyber Security 3.pdf
CYB 102 ¨C Fundamentals of Cyber Security 3.pdf
Abolarinwa
?
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcare
Nicholas Davis
?
Secure Yourself, Practice what we preach - BSides Austin 2015
Secure Yourself, Practice what we preach - BSides Austin 2015Secure Yourself, Practice what we preach - BSides Austin 2015
Secure Yourself, Practice what we preach - BSides Austin 2015
Michael Gough
?
Enterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entitiesEnterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entities
Quick Heal Technologies Ltd.
?
Virus Precautions
Virus PrecautionsVirus Precautions
Virus Precautions
Bilal Arif
?
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
Mohsin Riaz
?
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
Ronald Soh
?
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
Brian Pichman
?
Simplitfy - Guarding your Data
Simplitfy - Guarding your DataSimplitfy - Guarding your Data
Simplitfy - Guarding your Data
Erick Solms
?
COMP 424 Computer System Security Fall 2016
COMP 424 Computer System Security Fall 2016COMP 424 Computer System Security Fall 2016
COMP 424 Computer System Security Fall 2016
SamGuy7
?
Staying safe on the internet
Staying safe on the internetStaying safe on the internet
Staying safe on the internet
Arthur Landry
?
Keeping Secrets on the Internet of Things - Mobile Web Application Security
Keeping Secrets on the Internet of Things - Mobile Web Application SecurityKeeping Secrets on the Internet of Things - Mobile Web Application Security
Keeping Secrets on the Internet of Things - Mobile Web Application Security
Kelly Robertson
?
Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos De Pedro
?
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
CharithraaAR
?
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
OoXair
?
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
MansoorAhmed57263
?
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
Abzetdin Adamov
?

More from Bernad Bear (20)

197dddddddddddddddddddddddddddddddddddddddddd6425.ppt
197dddddddddddddddddddddddddddddddddddddddddd6425.ppt197dddddddddddddddddddddddddddddddddddddddddd6425.ppt
197dddddddddddddddddddddddddddddddddddddddddd6425.ppt
Bernad Bear
?
272403sdgdsggggggggggggdgsggggfgfffffffg6.ppt
272403sdgdsggggggggggggdgsggggfgfffffffg6.ppt272403sdgdsggggggggggggdgsggggfgfffffffg6.ppt
272403sdgdsggggggggggggdgsggggfgfffffffg6.ppt
Bernad Bear
?
ºÝºÝߣ-ACT110-ACT110-ACT110-ACT110-ºÝºÝߣ-01.pptx
ºÝºÝߣ-ACT110-ACT110-ACT110-ACT110-ºÝºÝߣ-01.pptxºÝºÝߣ-ACT110-ACT110-ACT110-ACT110-ºÝºÝߣ-01.pptx
ºÝºÝߣ-ACT110-ACT110-ACT110-ACT110-ºÝºÝߣ-01.pptx
Bernad Bear
?
2. Pengantar Keamanan Sistem Informasi 2024.pptx
2. Pengantar Keamanan Sistem Informasi 2024.pptx2. Pengantar Keamanan Sistem Informasi 2024.pptx
2. Pengantar Keamanan Sistem Informasi 2024.pptx
Bernad Bear
?
1759293ggggggggggggggggggggggggggggggggggggggg3.ppt
1759293ggggggggggggggggggggggggggggggggggggggg3.ppt1759293ggggggggggggggggggggggggggggggggggggggg3.ppt
1759293ggggggggggggggggggggggggggggggggggggggg3.ppt
Bernad Bear
?
586000765-Backward-Chaining-PPT-FIX.pptx
586000765-Backward-Chaining-PPT-FIX.pptx586000765-Backward-Chaining-PPT-FIX.pptx
586000765-Backward-Chaining-PPT-FIX.pptx
Bernad Bear
?
si-3-komponen-sistem-informasikomponen.ppt
si-3-komponen-sistem-informasikomponen.pptsi-3-komponen-sistem-informasikomponen.ppt
si-3-komponen-sistem-informasikomponen.ppt
Bernad Bear
?
PERTEMUAN KE IIIsistem informasi konsep dasar.ppt
PERTEMUAN KE IIIsistem informasi konsep dasar.pptPERTEMUAN KE IIIsistem informasi konsep dasar.ppt
PERTEMUAN KE IIIsistem informasi konsep dasar.ppt
Bernad Bear
?
nitcse1a30-1701dddddddd15074319-2-12.pdf
nitcse1a30-1701dddddddd15074319-2-12.pdfnitcse1a30-1701dddddddd15074319-2-12.pdf
nitcse1a30-1701dddddddd15074319-2-12.pdf
Bernad Bear
?
kecerdasanbuatandampak-230601045041-af3f18c2-3-24.pdf
kecerdasanbuatandampak-230601045041-af3f18c2-3-24.pdfkecerdasanbuatandampak-230601045041-af3f18c2-3-24.pdf
kecerdasanbuatandampak-230601045041-af3f18c2-3-24.pdf
Bernad Bear
?
pengantar logika fuzzy dan contohnya.ppt
pengantar logika fuzzy dan contohnya.pptpengantar logika fuzzy dan contohnya.ppt
pengantar logika fuzzy dan contohnya.ppt
Bernad Bear
?
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptx
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptxMateri Keamanan Siber Prinsip Keamanan Jaringan.pptx
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptx
Bernad Bear
?
Lesson 13 - Visualisasi dan Informasi.ppt
Lesson 13 - Visualisasi dan Informasi.pptLesson 13 - Visualisasi dan Informasi.ppt
Lesson 13 - Visualisasi dan Informasi.ppt
Bernad Bear
?
Pertemuan-7-Proses_Desain interaksi manusia dan komputer.ppt
Pertemuan-7-Proses_Desain interaksi manusia dan komputer.pptPertemuan-7-Proses_Desain interaksi manusia dan komputer.ppt
Pertemuan-7-Proses_Desain interaksi manusia dan komputer.ppt
Bernad Bear
?
Relasi.ppt
Relasi.pptRelasi.ppt
Relasi.ppt
Bernad Bear
?
Pengenalan Teknik Komputer.pptx
Pengenalan Teknik Komputer.pptxPengenalan Teknik Komputer.pptx
Pengenalan Teknik Komputer.pptx
Bernad Bear
?
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
Bernad Bear
?
Persentasi SMU9.pptx
Persentasi SMU9.pptxPersentasi SMU9.pptx
Persentasi SMU9.pptx
Bernad Bear
?
_KONSEP DASAR SISTEM INFORMASI.ppt
_KONSEP DASAR SISTEM INFORMASI.ppt_KONSEP DASAR SISTEM INFORMASI.ppt
_KONSEP DASAR SISTEM INFORMASI.ppt
Bernad Bear
?
12017098.ppt
12017098.ppt12017098.ppt
12017098.ppt
Bernad Bear
?
197dddddddddddddddddddddddddddddddddddddddddd6425.ppt
197dddddddddddddddddddddddddddddddddddddddddd6425.ppt197dddddddddddddddddddddddddddddddddddddddddd6425.ppt
197dddddddddddddddddddddddddddddddddddddddddd6425.ppt
Bernad Bear
?
272403sdgdsggggggggggggdgsggggfgfffffffg6.ppt
272403sdgdsggggggggggggdgsggggfgfffffffg6.ppt272403sdgdsggggggggggggdgsggggfgfffffffg6.ppt
272403sdgdsggggggggggggdgsggggfgfffffffg6.ppt
Bernad Bear
?
ºÝºÝߣ-ACT110-ACT110-ACT110-ACT110-ºÝºÝߣ-01.pptx
ºÝºÝߣ-ACT110-ACT110-ACT110-ACT110-ºÝºÝߣ-01.pptxºÝºÝߣ-ACT110-ACT110-ACT110-ACT110-ºÝºÝߣ-01.pptx
ºÝºÝߣ-ACT110-ACT110-ACT110-ACT110-ºÝºÝߣ-01.pptx
Bernad Bear
?
2. Pengantar Keamanan Sistem Informasi 2024.pptx
2. Pengantar Keamanan Sistem Informasi 2024.pptx2. Pengantar Keamanan Sistem Informasi 2024.pptx
2. Pengantar Keamanan Sistem Informasi 2024.pptx
Bernad Bear
?
1759293ggggggggggggggggggggggggggggggggggggggg3.ppt
1759293ggggggggggggggggggggggggggggggggggggggg3.ppt1759293ggggggggggggggggggggggggggggggggggggggg3.ppt
1759293ggggggggggggggggggggggggggggggggggggggg3.ppt
Bernad Bear
?
586000765-Backward-Chaining-PPT-FIX.pptx
586000765-Backward-Chaining-PPT-FIX.pptx586000765-Backward-Chaining-PPT-FIX.pptx
586000765-Backward-Chaining-PPT-FIX.pptx
Bernad Bear
?
si-3-komponen-sistem-informasikomponen.ppt
si-3-komponen-sistem-informasikomponen.pptsi-3-komponen-sistem-informasikomponen.ppt
si-3-komponen-sistem-informasikomponen.ppt
Bernad Bear
?
PERTEMUAN KE IIIsistem informasi konsep dasar.ppt
PERTEMUAN KE IIIsistem informasi konsep dasar.pptPERTEMUAN KE IIIsistem informasi konsep dasar.ppt
PERTEMUAN KE IIIsistem informasi konsep dasar.ppt
Bernad Bear
?
nitcse1a30-1701dddddddd15074319-2-12.pdf
nitcse1a30-1701dddddddd15074319-2-12.pdfnitcse1a30-1701dddddddd15074319-2-12.pdf
nitcse1a30-1701dddddddd15074319-2-12.pdf
Bernad Bear
?
kecerdasanbuatandampak-230601045041-af3f18c2-3-24.pdf
kecerdasanbuatandampak-230601045041-af3f18c2-3-24.pdfkecerdasanbuatandampak-230601045041-af3f18c2-3-24.pdf
kecerdasanbuatandampak-230601045041-af3f18c2-3-24.pdf
Bernad Bear
?
pengantar logika fuzzy dan contohnya.ppt
pengantar logika fuzzy dan contohnya.pptpengantar logika fuzzy dan contohnya.ppt
pengantar logika fuzzy dan contohnya.ppt
Bernad Bear
?
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptx
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptxMateri Keamanan Siber Prinsip Keamanan Jaringan.pptx
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptx
Bernad Bear
?
Lesson 13 - Visualisasi dan Informasi.ppt
Lesson 13 - Visualisasi dan Informasi.pptLesson 13 - Visualisasi dan Informasi.ppt
Lesson 13 - Visualisasi dan Informasi.ppt
Bernad Bear
?
Pertemuan-7-Proses_Desain interaksi manusia dan komputer.ppt
Pertemuan-7-Proses_Desain interaksi manusia dan komputer.pptPertemuan-7-Proses_Desain interaksi manusia dan komputer.ppt
Pertemuan-7-Proses_Desain interaksi manusia dan komputer.ppt
Bernad Bear
?
Pengenalan Teknik Komputer.pptx
Pengenalan Teknik Komputer.pptxPengenalan Teknik Komputer.pptx
Pengenalan Teknik Komputer.pptx
Bernad Bear
?
Persentasi SMU9.pptx
Persentasi SMU9.pptxPersentasi SMU9.pptx
Persentasi SMU9.pptx
Bernad Bear
?
_KONSEP DASAR SISTEM INFORMASI.ppt
_KONSEP DASAR SISTEM INFORMASI.ppt_KONSEP DASAR SISTEM INFORMASI.ppt
_KONSEP DASAR SISTEM INFORMASI.ppt
Bernad Bear
?

Recently uploaded (20)

Technology use over time and its impact on consumers and businesses.pptx
Technology use over time and its impact on consumers and businesses.pptxTechnology use over time and its impact on consumers and businesses.pptx
Technology use over time and its impact on consumers and businesses.pptx
kaylagaze
?
UiPath Automation Developer Associate Training Series 2025 - Session 1
UiPath Automation Developer Associate Training Series 2025 - Session 1UiPath Automation Developer Associate Training Series 2025 - Session 1
UiPath Automation Developer Associate Training Series 2025 - Session 1
DianaGray10
?
Revolutionizing-Government-Communication-The-OSWAN-Success-Story
Revolutionizing-Government-Communication-The-OSWAN-Success-StoryRevolutionizing-Government-Communication-The-OSWAN-Success-Story
Revolutionizing-Government-Communication-The-OSWAN-Success-Story
ssuser52ad5e
?
Q4 2024 Earnings and Investor Presentation
Q4 2024 Earnings and Investor PresentationQ4 2024 Earnings and Investor Presentation
Q4 2024 Earnings and Investor Presentation
Dropbox
?
EaseUS Partition Master Crack 2025 + Serial Key
EaseUS Partition Master Crack 2025 + Serial KeyEaseUS Partition Master Crack 2025 + Serial Key
EaseUS Partition Master Crack 2025 + Serial Key
kherorpacca127
?
30B Images and Counting: Scaling Canva's Content-Understanding Pipelines by K...
30B Images and Counting: Scaling Canva's Content-Understanding Pipelines by K...30B Images and Counting: Scaling Canva's Content-Understanding Pipelines by K...
30B Images and Counting: Scaling Canva's Content-Understanding Pipelines by K...
ScyllaDB
?
World Information Architecture Day 2025 - UX at a Crossroads
World Information Architecture Day 2025 - UX at a CrossroadsWorld Information Architecture Day 2025 - UX at a Crossroads
World Information Architecture Day 2025 - UX at a Crossroads
Joshua Randall
?
DealBook of Ukraine: 2025 edition | AVentures Capital
DealBook of Ukraine: 2025 edition | AVentures CapitalDealBook of Ukraine: 2025 edition | AVentures Capital
DealBook of Ukraine: 2025 edition | AVentures Capital
Yevgen Sysoyev
?
Fl studio crack version 12.9 Free Download
Fl studio crack version 12.9 Free DownloadFl studio crack version 12.9 Free Download
Fl studio crack version 12.9 Free Download
kherorpacca127
?
UiPath Agentic Automation Capabilities and Opportunities
UiPath Agentic Automation Capabilities and OpportunitiesUiPath Agentic Automation Capabilities and Opportunities
UiPath Agentic Automation Capabilities and Opportunities
DianaGray10
?
Both Feet on the Ground - Generative Artificial Intelligence
Both Feet on the Ground - Generative Artificial IntelligenceBoth Feet on the Ground - Generative Artificial Intelligence
Both Feet on the Ground - Generative Artificial Intelligence
Pete Nieminen
?
Transform Your Future with Front-End Development Training
Transform Your Future with Front-End Development TrainingTransform Your Future with Front-End Development Training
Transform Your Future with Front-End Development Training
Vtechlabs
?
Inside Freshworks' Migration from Cassandra to ScyllaDB by Premkumar Patturaj
Inside Freshworks' Migration from Cassandra to ScyllaDB by Premkumar PatturajInside Freshworks' Migration from Cassandra to ScyllaDB by Premkumar Patturaj
Inside Freshworks' Migration from Cassandra to ScyllaDB by Premkumar Patturaj
ScyllaDB
?
SMART SENTRY CYBER THREAT INTELLIGENCE IN IIOT
SMART SENTRY CYBER THREAT INTELLIGENCE IN IIOTSMART SENTRY CYBER THREAT INTELLIGENCE IN IIOT
SMART SENTRY CYBER THREAT INTELLIGENCE IN IIOT
TanmaiArni
?
Brave Browser Crack 1.45.133 Activated 2025
Brave Browser Crack 1.45.133 Activated 2025Brave Browser Crack 1.45.133 Activated 2025
Brave Browser Crack 1.45.133 Activated 2025
kherorpacca00126
?
UiPath Automation Developer Associate Training Series 2025 - Session 2
UiPath Automation Developer Associate Training Series 2025 - Session 2UiPath Automation Developer Associate Training Series 2025 - Session 2
UiPath Automation Developer Associate Training Series 2025 - Session 2
DianaGray10
?
Build with AI on Google Cloud Session #4
Build with AI on Google Cloud Session #4Build with AI on Google Cloud Session #4
Build with AI on Google Cloud Session #4
Margaret Maynard-Reid
?
DAO UTokyo 2025 DLT mass adoption case studies IBM Tsuyoshi Hirayama (ƽɽÒã)
DAO UTokyo 2025 DLT mass adoption case studies IBM Tsuyoshi Hirayama (ƽɽÒã)DAO UTokyo 2025 DLT mass adoption case studies IBM Tsuyoshi Hirayama (ƽɽÒã)
DAO UTokyo 2025 DLT mass adoption case studies IBM Tsuyoshi Hirayama (ƽɽÒã)
Tsuyoshi Hirayama
?
BoxLang JVM Language : The Future is Dynamic
BoxLang JVM Language : The Future is DynamicBoxLang JVM Language : The Future is Dynamic
BoxLang JVM Language : The Future is Dynamic
Ortus Solutions, Corp
?
Gojek Clone Multi-Service Super App.pptx
Gojek Clone Multi-Service Super App.pptxGojek Clone Multi-Service Super App.pptx
Gojek Clone Multi-Service Super App.pptx
V3cube
?
Technology use over time and its impact on consumers and businesses.pptx
Technology use over time and its impact on consumers and businesses.pptxTechnology use over time and its impact on consumers and businesses.pptx
Technology use over time and its impact on consumers and businesses.pptx
kaylagaze
?
UiPath Automation Developer Associate Training Series 2025 - Session 1
UiPath Automation Developer Associate Training Series 2025 - Session 1UiPath Automation Developer Associate Training Series 2025 - Session 1
UiPath Automation Developer Associate Training Series 2025 - Session 1
DianaGray10
?
Revolutionizing-Government-Communication-The-OSWAN-Success-Story
Revolutionizing-Government-Communication-The-OSWAN-Success-StoryRevolutionizing-Government-Communication-The-OSWAN-Success-Story
Revolutionizing-Government-Communication-The-OSWAN-Success-Story
ssuser52ad5e
?
Q4 2024 Earnings and Investor Presentation
Q4 2024 Earnings and Investor PresentationQ4 2024 Earnings and Investor Presentation
Q4 2024 Earnings and Investor Presentation
Dropbox
?
EaseUS Partition Master Crack 2025 + Serial Key
EaseUS Partition Master Crack 2025 + Serial KeyEaseUS Partition Master Crack 2025 + Serial Key
EaseUS Partition Master Crack 2025 + Serial Key
kherorpacca127
?
30B Images and Counting: Scaling Canva's Content-Understanding Pipelines by K...
30B Images and Counting: Scaling Canva's Content-Understanding Pipelines by K...30B Images and Counting: Scaling Canva's Content-Understanding Pipelines by K...
30B Images and Counting: Scaling Canva's Content-Understanding Pipelines by K...
ScyllaDB
?
World Information Architecture Day 2025 - UX at a Crossroads
World Information Architecture Day 2025 - UX at a CrossroadsWorld Information Architecture Day 2025 - UX at a Crossroads
World Information Architecture Day 2025 - UX at a Crossroads
Joshua Randall
?
DealBook of Ukraine: 2025 edition | AVentures Capital
DealBook of Ukraine: 2025 edition | AVentures CapitalDealBook of Ukraine: 2025 edition | AVentures Capital
DealBook of Ukraine: 2025 edition | AVentures Capital
Yevgen Sysoyev
?
Fl studio crack version 12.9 Free Download
Fl studio crack version 12.9 Free DownloadFl studio crack version 12.9 Free Download
Fl studio crack version 12.9 Free Download
kherorpacca127
?
UiPath Agentic Automation Capabilities and Opportunities
UiPath Agentic Automation Capabilities and OpportunitiesUiPath Agentic Automation Capabilities and Opportunities
UiPath Agentic Automation Capabilities and Opportunities
DianaGray10
?
Both Feet on the Ground - Generative Artificial Intelligence
Both Feet on the Ground - Generative Artificial IntelligenceBoth Feet on the Ground - Generative Artificial Intelligence
Both Feet on the Ground - Generative Artificial Intelligence
Pete Nieminen
?
Transform Your Future with Front-End Development Training
Transform Your Future with Front-End Development TrainingTransform Your Future with Front-End Development Training
Transform Your Future with Front-End Development Training
Vtechlabs
?
Inside Freshworks' Migration from Cassandra to ScyllaDB by Premkumar Patturaj
Inside Freshworks' Migration from Cassandra to ScyllaDB by Premkumar PatturajInside Freshworks' Migration from Cassandra to ScyllaDB by Premkumar Patturaj
Inside Freshworks' Migration from Cassandra to ScyllaDB by Premkumar Patturaj
ScyllaDB
?
SMART SENTRY CYBER THREAT INTELLIGENCE IN IIOT
SMART SENTRY CYBER THREAT INTELLIGENCE IN IIOTSMART SENTRY CYBER THREAT INTELLIGENCE IN IIOT
SMART SENTRY CYBER THREAT INTELLIGENCE IN IIOT
TanmaiArni
?
Brave Browser Crack 1.45.133 Activated 2025
Brave Browser Crack 1.45.133 Activated 2025Brave Browser Crack 1.45.133 Activated 2025
Brave Browser Crack 1.45.133 Activated 2025
kherorpacca00126
?
UiPath Automation Developer Associate Training Series 2025 - Session 2
UiPath Automation Developer Associate Training Series 2025 - Session 2UiPath Automation Developer Associate Training Series 2025 - Session 2
UiPath Automation Developer Associate Training Series 2025 - Session 2
DianaGray10
?
Build with AI on Google Cloud Session #4
Build with AI on Google Cloud Session #4Build with AI on Google Cloud Session #4
Build with AI on Google Cloud Session #4
Margaret Maynard-Reid
?
DAO UTokyo 2025 DLT mass adoption case studies IBM Tsuyoshi Hirayama (ƽɽÒã)
DAO UTokyo 2025 DLT mass adoption case studies IBM Tsuyoshi Hirayama (ƽɽÒã)DAO UTokyo 2025 DLT mass adoption case studies IBM Tsuyoshi Hirayama (ƽɽÒã)
DAO UTokyo 2025 DLT mass adoption case studies IBM Tsuyoshi Hirayama (ƽɽÒã)
Tsuyoshi Hirayama
?
BoxLang JVM Language : The Future is Dynamic
BoxLang JVM Language : The Future is DynamicBoxLang JVM Language : The Future is Dynamic
BoxLang JVM Language : The Future is Dynamic
Ortus Solutions, Corp
?
Gojek Clone Multi-Service Super App.pptx
Gojek Clone Multi-Service Super App.pptxGojek Clone Multi-Service Super App.pptx
Gojek Clone Multi-Service Super App.pptx
V3cube
?

security.ppt

  • 2. Why Security Matters ? Public nuisance ? Loss of productivity ¨C The cost of spam! ? Loss of data ? Identity theft ? Credit card fraud ? Erosion of trust
  • 3. Focus on Prevention ? Prevention is easy ¨C 6 steps ? Cure is hard
  • 4. 1. Use an Anti-Virus tool 50,000+ Windows Viruses New viruses up 400% from last year Download Sophos Anti-Virus from ITS
  • 5. a. Keep your virus definitions up to date b. Scan while you sleep c. Automate the process
  • 6. 2. Guard Against Spyware NAU recommends Spybot
  • 8. 3. Filter Spam Manage your NAU e-mail
  • 10. 4. Beware the phish hook
  • 11. Something phishy? ? Urgent e-mail requires your immediate action ? Plays on fear of compromised security ? Usually doesn¡¯t refer to you by name ? Asks you to confirm your identity ? Asks you to enter your password ? Message may contain typos ? May use a suspicious URL More reading
  • 12. 5. Apply Security Updates a. Start/Windows Update b. Choose Express Install c. Install Priority Updates Note: NAU pushes out security updates to campus machines
  • 14. Automatic Updates a. Start/Control Panel b. System c. System Properties d. Automatic Updates
  • 15. 6. Browse Securely ? Look for the lock symbol and https:// ? Use the VPN for wireless transactions ? Use hard to guess passwords ? Change passwords frequently ? Read your credit card statements ? Don¡¯t approve save of credit card info
  • 16. Why so vulnerable? ? 90% of computers run Windows ? Many dislike Microsoft and Bill Gates ? Windows is not very secure ? MS is slow to patch security holes ? Hard to regulate and enforce ? Lots of novices online
  • 17. Is my computer compromised? ? Slower than normal performance ? System crashes ? Pop-up ads ? Home page has changed ? Browser crashes ? Possibly no symptoms!
  • 18. Be afraid! ? You might be a zombie! ? You might have a keystroke logger ? You might be a DDOS pawn ? You might be a notorious spammer!
  • 19. Remedies ? Disconnect from the network (temporarily) ? Boot up from a System Restore CD ? Run anti-virus software ? Run anti-spyware software ? Run disk, hardware check utilities ? Wipe the drive and reinstall everything! ? Get a Mac? Learn Linux?
  • 20. Coming Soon! ? Microsoft Free Computing Environments (MFCE) ? Costs and Benefits ? The Open Source Movement Macintosh Linux Open Office
  • 21. Acknowledgements ? Stephanie McCarthy - Graphics ? ¡°Big Dave¡± Dennehey - Technical Consulting