Top Banner
39

Steve Riley Sr. Security Strategist Microsoft Trustworthy Computing Group [email protected] SEC303.

Dec 21, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Steve Riley Sr. Security Strategist Microsoft Trustworthy Computing Group steve.riley@microsoft.com  SEC303.
Page 2: Steve Riley Sr. Security Strategist Microsoft Trustworthy Computing Group steve.riley@microsoft.com  SEC303.

Protect Your PC, Yourself and Your FamilySteve RileySr. Security StrategistMicrosoft Trustworthy Computing [email protected]://blogs.technet.com/steriley

SEC303

Page 3: Steve Riley Sr. Security Strategist Microsoft Trustworthy Computing Group steve.riley@microsoft.com  SEC303.
Page 4: Steve Riley Sr. Security Strategist Microsoft Trustworthy Computing Group steve.riley@microsoft.com  SEC303.

www.microsoft.com/protect/

The Internet = A World of Opportunities

Look what’s at your fingertips

A way to communicate with friends, family, colleagues

Access to information and entertainment

A means to learn, meet people, and explore

Page 5: Steve Riley Sr. Security Strategist Microsoft Trustworthy Computing Group steve.riley@microsoft.com  SEC303.

www.microsoft.com/protect/

Leading Internet Risks and Threats

To Children PredatorsCyberbullies File-sharing abusesInvasion of privacyDisturbing content

To Personal SafetySpam Online fraud and phishingHoaxes Identity theft

To ComputersViruses Worms TrojansSpyware

Page 6: Steve Riley Sr. Security Strategist Microsoft Trustworthy Computing Group steve.riley@microsoft.com  SEC303.

www.microsoft.com/protect/

Online Security Versus Online Safety

Security: We must secure our computers with technology in the same way that we secure the doors to our homes.

Safety: We must act in ways that protect us against the risks and threats that come with Internet use.

Page 7: Steve Riley Sr. Security Strategist Microsoft Trustworthy Computing Group steve.riley@microsoft.com  SEC303.

www.microsoft.com/protect/

PredatorsThese people use the Internet to trick children into meeting with them in person.

File-share AbuseExchanging music, video, and other files may be illegal, and can give strangers access to your computer or download viruses or worms.

Cyber-bullies Both children and adults may use the Internet to harass or intimidate other people.

Invasion of PrivacyIf kids fill out online forms, they may share information you don’t want strangers to have about them or your family.

Disturbing ContentIf kids explore unsupervised, they could stumble upon images or information you may not want them exposed to.

Leading Online Risks for Children

Page 8: Steve Riley Sr. Security Strategist Microsoft Trustworthy Computing Group steve.riley@microsoft.com  SEC303.

www.microsoft.com/protect/

SpamUnwanted e-mail, instant messages, e-cards, and other online communication

PhishingE-mail sent by online criminals to trick you into revealing personal information Identity Theft

A crime where con artists get your personal information and access your cash and/or credit

HoaxesE-mail sent by online criminals to trick you into giving them money

Leading Threats to Personal Online Safety

Page 9: Steve Riley Sr. Security Strategist Microsoft Trustworthy Computing Group steve.riley@microsoft.com  SEC303.

www.microsoft.com/protect/

Viruses/WormsSoftware programs designed to invade your computer, and copy, damage or delete your data

TrojansViruses that pretend to be programs that help you while destroying your data and damaging your computer

SpywareSoftware that secretly watches and records your online activities or sends you endless pop-up ads

Leading Threats to Computer Security

Page 10: Steve Riley Sr. Security Strategist Microsoft Trustworthy Computing Group steve.riley@microsoft.com  SEC303.

www.microsoft.com/protect/

Steps You Can Take

Your computer1. Turn on Windows

Internet firewall.2. Use Microsoft Update

to keep Windows up-to-date automatically.

3. Install and maintain antivirus software.

4. Install and maintain Microsoft Windows Defender.

Yourself1. Practice Internet

behavior that lowers your risk.

2. Manage your personal information carefully.

3. Use anti-phishing and anti-spam technology built into Windows Vista, Windows XP SP2, Internet Explorer 7, Windows Live, and Microsoft Outlook.

Your family1. Talk with your kids

about what they do online.

2. Keep personal information private.

3. Set clear rules for Internet use.

4. Use Microsoft’s Family Safety Settings.

Page 11: Steve Riley Sr. Security Strategist Microsoft Trustworthy Computing Group steve.riley@microsoft.com  SEC303.

www.microsoft.com/protect/

Take Steps to Help Protect Your Family

Talk with your kids about what they do online

Keep personal information private

Set clear rules for Internet use

Use family safety software

Page 12: Steve Riley Sr. Security Strategist Microsoft Trustworthy Computing Group steve.riley@microsoft.com  SEC303.

www.microsoft.com/protect/

Talk with Your Kids about Online Risks

Talk frankly with your kids about Internet risks, including

Sexual predatorsInappropriate contentInvasion of privacy

Empower them by teaching them how their own behavior can reduce those risks and help to keep them safe when they are online.

Helpful online resourceswww.staysafe.orgwww.getnetwise.orgwww.microsoft.com/protect

Page 13: Steve Riley Sr. Security Strategist Microsoft Trustworthy Computing Group steve.riley@microsoft.com  SEC303.

www.microsoft.com/protect/

Pay Attention to What Your Kids Do Online

Keep the computer in a central areaGet to know how your kids use the InternetLet your kids be the teacherTeach kids to trust their instincts Encourage them to report any problems

Page 14: Steve Riley Sr. Security Strategist Microsoft Trustworthy Computing Group steve.riley@microsoft.com  SEC303.

www.microsoft.com/protect/

Keep Personal Information Private

Teach children never to share personal information online without permissionMonitor your children’s online activitiesTeach your children to report suspicious activityHelp children choose appropriate screen names and e-mail addresses

Page 15: Steve Riley Sr. Security Strategist Microsoft Trustworthy Computing Group steve.riley@microsoft.com  SEC303.

www.microsoft.com/protect/

Set Clear Rules for Internet Use

Never go alone to meet an Internet “friend” in person Do not share files or open attachments Do not click links from strangersTreat others the way you want to be treated Stand up for yourselfRespect other people’s property

Page 16: Steve Riley Sr. Security Strategist Microsoft Trustworthy Computing Group steve.riley@microsoft.com  SEC303.

www.microsoft.com/protect/

Use Family Safety Software

Available in Windows Vista, Windows Live OneCare, Xbox 360Helps parents control and monitor the content their children view, what they do, and who they communicate with online

Page 17: Steve Riley Sr. Security Strategist Microsoft Trustworthy Computing Group steve.riley@microsoft.com  SEC303.

www.microsoft.com/protect/

How to Handle Problems

Make it safe for your children to tell you when they feel uncomfortable onlineContact police to report any threat immediatelyReport incidents to:

CyberTipline800-843-5678www.cybertipline.com

Page 18: Steve Riley Sr. Security Strategist Microsoft Trustworthy Computing Group steve.riley@microsoft.com  SEC303.

www.microsoft.com/protect/

Take Steps to Help Protect Yourself

Practice Internet behavior that lowers your risk

Manage your personal information carefully

Use technology to reduce nuisances, and raise the alarm when appropriate

Page 19: Steve Riley Sr. Security Strategist Microsoft Trustworthy Computing Group steve.riley@microsoft.com  SEC303.

www.microsoft.com/protect/

Delete Spam without Opening It

Never reply to spamTechnology can help you identify spam so you can delete itMany Internet providers delete it for you

Page 20: Steve Riley Sr. Security Strategist Microsoft Trustworthy Computing Group steve.riley@microsoft.com  SEC303.

www.microsoft.com/protect/

Be on the Lookout for Scams!

Many signs can alert you to e-mail scams:

Alarming messages and threats of account closures Promises of big bucks for little effortDeals that sound too good to be true Misspellings and grammatical errors

Page 21: Steve Riley Sr. Security Strategist Microsoft Trustworthy Computing Group steve.riley@microsoft.com  SEC303.

www.microsoft.com/protect/

Use Strong Passwords

Create passwords that are hard tocrack. Use at least eight characters, and combine letters, numbers, and symbols.Never share your passwords with friends or give them away over e-mail.

Page 22: Steve Riley Sr. Security Strategist Microsoft Trustworthy Computing Group steve.riley@microsoft.com  SEC303.

www.microsoft.com/protect/

Manage Personal Information Carefully

Delete e-mails that request personal informationDo not use e-mail or instant messages to share personal information

Page 23: Steve Riley Sr. Security Strategist Microsoft Trustworthy Computing Group steve.riley@microsoft.com  SEC303.

www.microsoft.com/protect/

Use Anti-Phishing and Anti-Spam Technology

Microsoft Outlook: helps protect you by recognizing and filtering most spamInternet Explorer 7: Phishing Filter blocks known scam sites and warns about suspicious sites

Page 24: Steve Riley Sr. Security Strategist Microsoft Trustworthy Computing Group steve.riley@microsoft.com  SEC303.

www.microsoft.com/protect/

Get a copy of your credit report and ensure your account is marked “fraud alert” and “victim’s statement”

If Your Identity is Stolen

Report itFollow up in writingChange all passwordsPlace fraud alert on credit reports

Page 25: Steve Riley Sr. Security Strategist Microsoft Trustworthy Computing Group steve.riley@microsoft.com  SEC303.

www.microsoft.com/protect/

Turn on Windows Internet firewall

Four Steps to Protect Your Computer

Use Microsoft Update to keep Windows up-to-date automatically

Install and maintain Microsoft Windows Defender

Install and maintain antivirus software

Page 26: Steve Riley Sr. Security Strategist Microsoft Trustworthy Computing Group steve.riley@microsoft.com  SEC303.

www.microsoft.com/protect/

Turn on Windows Internet Firewall

An Internet firewall is like a moat around a castle, creating a barrier between your computer and the Internet

Page 27: Steve Riley Sr. Security Strategist Microsoft Trustworthy Computing Group steve.riley@microsoft.com  SEC303.

www.microsoft.com/protect/

Use Microsoft Update to Keep Windows Up-to-date Automatically

Install all security updates as soon as they are availableAutomatic updates provide the best protection

Page 28: Steve Riley Sr. Security Strategist Microsoft Trustworthy Computing Group steve.riley@microsoft.com  SEC303.

www.microsoft.com/protect/

Install Antivirus Software

Antivirus software helps to detect and destroy computer viruses before they can cause damage.Just like flu shots, for antivirus software to be effective, you must keep it up-to-date.Don’t let it expire

Page 29: Steve Riley Sr. Security Strategist Microsoft Trustworthy Computing Group steve.riley@microsoft.com  SEC303.

www.microsoft.com/protect/

Install and Maintain Microsoft Windows Defender

Use antispyware software so unknown people cannot lurk on your computer and potentially steal your information.

Page 30: Steve Riley Sr. Security Strategist Microsoft Trustworthy Computing Group steve.riley@microsoft.com  SEC303.

www.microsoft.com/protect/

Other Ways to Protect Your Computer

Back up your files regularly

Think before you click

Read Web site privacy statements

Close pop-ups using red “X”

Page 31: Steve Riley Sr. Security Strategist Microsoft Trustworthy Computing Group steve.riley@microsoft.com  SEC303.

www.microsoft.com/protect/

Back up Your Files

Save to CD or DVDUse a Web-based backup service

Page 32: Steve Riley Sr. Security Strategist Microsoft Trustworthy Computing Group steve.riley@microsoft.com  SEC303.

www.microsoft.com/protect/

Think Before You Click

Don’t open e-mail attachments unless you know what they contain and who sent themOnly download files from Web sites you trust

Page 33: Steve Riley Sr. Security Strategist Microsoft Trustworthy Computing Group steve.riley@microsoft.com  SEC303.

www.microsoft.com/protect/

Read Privacy Statements

Understand what you are getting before you agree to download or share your personal information

Page 34: Steve Riley Sr. Security Strategist Microsoft Trustworthy Computing Group steve.riley@microsoft.com  SEC303.

www.microsoft.com/protect/

Close Pop-ups Using Red “X”

Always use the red “X” in the corner of a pop-up screen.Never click “yes,” “accept” or even “cancel,” because it could be a trick that installs software on your computer.

Page 35: Steve Riley Sr. Security Strategist Microsoft Trustworthy Computing Group steve.riley@microsoft.com  SEC303.

www.microsoft.com/protect/

How Does Microsoft Help Improve Security and Safety?

By developing software products and tools that increase security and safety, helping people minimize their risk online and make informed choices

By partnering with non-governmental organizations, other technology companies, and governments worldwide to help keep children safe

By providing useful guidance that helps people understand risks and what actions they can take

Partnership Technology Guidance

Page 36: Steve Riley Sr. Security Strategist Microsoft Trustworthy Computing Group steve.riley@microsoft.com  SEC303.

www.microsoft.com/protect/

For More Information

www.microsoft.com/protect

www.staysafe.org

www.getnetwise.org

Page 37: Steve Riley Sr. Security Strategist Microsoft Trustworthy Computing Group steve.riley@microsoft.com  SEC303.

Questions?

Page 38: Steve Riley Sr. Security Strategist Microsoft Trustworthy Computing Group steve.riley@microsoft.com  SEC303.

Evaluation Forms

Page 39: Steve Riley Sr. Security Strategist Microsoft Trustworthy Computing Group steve.riley@microsoft.com  SEC303.

© 2007 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.

The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after

the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.