Return to the PC Security web page Lesson 4: Increasing Web Browser Security.

Slides:



Advertisements
Similar presentations
®® Microsoft Windows 7 for Power Users Tutorial 7 Enhancing Your Computers Security.
Advertisements

Grass Valley Learning Center Surf the Net Safely Roger Thornburn.
Browser Comparisons Internet Explorer 8 & 9, Chrome 11 and Firefox 4 Security, Privacy, Add-ons & Convenience.
Configuring Windows Internet Explorer 7 Security Lesson 5.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
How to avoid Viruses and Malware on your Computer Use a firewall Using a firewall is like locking the front door to your house—it helps keep intruders.
Chapter 9: Configuring Internet Explorer. Internet Explorer Usability Features Reorganized user interface Instant Search box RSS support Tabbed browsing.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
Computer Hardware Software 1.Introduction 2.Internet research and security Basic online protection 3.Use PC safely and efficiently 4.Purchase decisions.
Don’t Lose Your Identity – Protect Yourself from Spyware Dan Frommer Sherry Minton.
Virtual techdays INDIA │ 9-11 February 2011 Safe Browsing Experience for your Home & Office M.S.Anand │ MTC Technology Specialist │ Microsoft Corporation.
Free Software Alternatives: Avast! Anti-virus
Use computer and internet safely Dave Dai Computer security Malware Virus: a program that copies itself and infect a computer without permission.
Internet Explorer Browsing & Windows XP Service Pack 2 What is Service Pack 2? The newest update for Windows XP which aims to make your computer more secure.
Computer Settings and Printing Tips Pennsylvania’s Protection From Abuse Database.
Cyra Richardson Microsoft Corporation Internet Explorer 7.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
PowerPoint Presentation to Accompany GO! with Internet Explorer 9 Getting Started Chapter 3 Exploring the World Wide Web with Internet Explorer 9.
With Internet Explorer 9 Getting Started© 2013 Pearson Education, Inc. Publishing as Prentice Hall1 Exploring the World Wide Web with Internet Explorer.
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
STAY SAFE ONLINE. STAY SAFE ONLINE! PLEASE MAKE SURE YOU LOGIN AT THE CORRECT BANK URL / ADDRESS 1.NEVER LOGIN VIA LINKS 2.NEVER REVEAL YOUR PIN.
Configuring and Troubleshooting Internet Access Chapter 9 powered by dj.
Introducing Quick Heal Endpoint Security 5.2. “Quick Heal Endpoint Security 5.2 is designed to provide simple, intuitive centralized management and control.
Spyware Sue Scott Technology Librarian. What is Spyware Malware – (Malicious Software) A general term to encompass unwanted software on a personal computer.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Staying Safe Online Keep your Information Secure.
Computer Security By: MacKenzie Olson. To be safer and more secure online, make these seven practices part of your online routine.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Internet Explorer 7. Cut through the clutter. Redesigned streamlined interface –Maximizes the area of the screen that displays the webpage.
Chapter 3 (HW02) Exploring the World Wide Web with Internet Explorer 9.
Computer Security By Joey Pawoll. Introduction to computer security Have you been wondering how to be safe online? Well look no further! This powerpoint.
Computer Security! By Bailey Hoover. Opening: “Computer viruses are an urban legend.” -Peter Norton Actually: Virus: software reproduces itself; causes.
Module 5: Configuring Internet Explorer and Supporting Applications.
Small Business Security Keith Slagle April 24, 2007.
Internet Security and Your Computer Welcome to Boot Camp.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.
Internet safety By Suman Nazir
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
Onguardonline.gov By Austin Kellogg. Main ideas  Protect your personal information  Know who your dealing with  Use security software that updates.
1 Trustworthy Browsing Ian Moulster Software + Services Lead Microsoft Ltd.
Internet Explorer 7 Updated Advice for the NHS 04 February 2008 Version 1.3.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
ITMT Windows 7 Configuration Chapter 7 – Working with Applications.
Sniper Corporation. Sniper Corporation is an IT security solution company that has introduced security products for the comprehensive protection related.
Remove [Browser Hijackers] For more information regarding [Browser Hijackers] Please Visit:
Browsing Tips Mozilla Firefox. About Firefox Available at Available at Maintained.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Windows Vista Configuration MCTS : Network Security.
Computer Security  Computer Security:  Password Strength  Windows Screen Saver  Deleting browser cache  Deleting browser cookies  Securing MS Office.
Windows Tutorial 5 Protecting Your Computer
Managing Windows Security
Top 5 Open Source Firewall Software for Linux User
Lesson #8 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Norton technical support Norton.com/Setup | Norton Setup and Install with Product Key Norton Antvirus Activation For protection against.
McAfee Total Protection 2018 Protection for PC, MAC, Smartphones and Tablets.
Install DoD CA Certificate Instructions for IE
Welcome! IE 7 Test Drive Presented by the Office of Information Technology.
Welcome to eScan 11.
Chapter 9: Configuring Internet Explorer

Presentation transcript:

Return to the PC Security web page Lesson 4: Increasing Web Browser Security

Lesson Objectives In this lesson, you will:  Use the Windows Firewall  Download files safely from the Internet  Set various Internet Explorer security features including the Pop-up Blocker, Phishing Filter, and browsing history  Use the Windows Security Center 2

3 Using a Firewall Protects against:  Hackers  Incoming intrusions  Outgoing breaches Windows firewall  Does not protect against outgoing breaches  Third-party firewalls offer more options

4 Downloading Files Can contain malware Know and trust the source Know the download location Internet Explorer 7 Security Warning bar can block downloads

5 Setting IE7's Security Features Pop-up blocker Phishing filter

6 Setting IE7's Security Features Browsing History  Temporary Internet files  Cookies  History  Form data  Passwords

Using Windows Security Center One-stop shop for security settings Monitors the following:  Firewall  Automatic Updates  Virus protection  Internet security settings (Win Vista only)  User Account Control (Win Vista only) 7

Return to the PC Security web page Lesson 4: Increasing Web Browser Security