DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. WHAT IS SPAM? Spam in unsolicited e-mail message NTM 17002 Microsoft Apple.

Slides:



Advertisements
Similar presentations
®® Microsoft Windows 7 for Power Users Tutorial 7 Enhancing Your Computers Security.
Advertisements

Computer Tech. What is an unsolicited message sent to many recipients Adware Spam Spyware Phishing here here Want to know how spam really.
Internet Browser History Presented by K. SURESH sureshsrikalahasti.weebly.com
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Chapter 11 – Section 4-5.  Techniques use to Access the network  War Driving or access point mapping ▪ Individuals attempt to detect wireless network.
Configuring Windows Internet Explorer 7 Security Lesson 5.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Aim: What strategies can we use to keep our financial information safe online? Do Now: What do you do to protect your information online?
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Nasca Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
THE WONDERFUL HISTORY OF COMPUTERS FROM THE BEGINNING HARDWARE, SOFTWARE,SAFTEY, AND COMPUTER ETHICS.
How It Applies In A Virtual World
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Discovering Computers 2008 Chapter 11 Computer Security, Ethics and Privacy.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Networks and Security Monday, 10 th Week. Types of Attacks/Security Issues  Viruses  Worms  Macro Virus  Virus  Trojan Horse  Phishing 
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Course ILT Internet transactions and security Unit objectives Learn how to purchase goods online by using credit cards and Web-based forms Describe the.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Draft-qi-i2nsf-access-network- usecase-00 Author: Minpeng Qi, Xiaojun Zhuang.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
Protecting Students on the School Computer Network Enfield High School.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
Internet safety By Suman Nazir
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
Discovering Computers 2008 Chapter 11 Computer Security, Ethics and Privacy.
DATA ACCURACY- one of the issues of computer ethics. Providing inaccurate data input results in erroneous information & decision making. Information on.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 11 Manage Computing Securely, Safely and Ethically.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Any criminal action perpetrated primarily through the use of a computer.
Return to the PC Security web page Lesson 4: Increasing Web Browser Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Security Issues & Ethics in Education By Maud Mushayamunda.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
Computer Security  Computer Security:  Password Strength  Windows Screen Saver  Deleting browser cache  Deleting browser cookies  Securing MS Office.
How to fix Netflix Signing In Issues? For More Details Visit Our Website
Windows Tutorial 5 Protecting Your Computer
Managing Windows Security
3.1 Types of Servers.
Learn how to protect yourself against common attacks
3.1 Types of Servers.
Internet and security.
Fix Bigpond Error Code 550 Call for Help
Fix Gmail Error Code Call for Help
Fix Gmail Temporary Error 500 Call Gmail Helpline.
Fix AOL Mail Blank Screen Error? If you get a blank screen while trying to sign in to AOL Mail then there may be some reason. do not worry! You just need.
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Unit 4 IT Security Kerris Davies.
How to Fix Gmail Error Code 76997?. Call us Fix Gmail Error Code Gmail considers as the best platform for services across the.
Presentation transcript:

DEVICE MANAGEMENT AND SECURITY NTM 1700/1702

WHAT IS SPAM? Spam in unsolicited message NTM Microsoft Apple

WHAT IS PHISHING/PHARMING? PHISHING:PHISHING: SCAM IN WHICH A PERPETRATOR SENDS AN OFFICIAL MESSAGE ( ) THAT ATTEMPTS TO OBTAIN YOUR PERSONAL AND FINANCIAL INFORMATION PHARMING:PHARMING: USER IS TRICKED INTO KEYING IN PERSONAL INFORMATION AT A PHONY WEBSITE NTM 17003

WHAT IS A COOKIE? USER PREFERENCES SMALL FILE ON YOUR COMPUTER CONTAINING DATA ABOUT YOU (1 ST PARTY) SOME WEB SITES SELL OR TRADE STORED IN YOUR COOKIES (3 RD PARTY) SET BROWSER TO ACCEPT COOKIES, PROMPT YOU TO ACCEPT COOKIES, OR DISABLE COOKIES HOW REGULARLY YOU VISIT WEB SITES INTERESTS AND BROWSING HABITS TEMPORARY INTERNET FILES/BROWSER CACHE NTM 17004

WHAT IS A FIREWALL? SECURITY SYSTEM CONSISTING OF HARDWARE AND/OR SOFTWARE THAT PREVENTS UNAUTHORIZED INTRUSION. NTM 17005

WHAT MORE CAN YOU DO? LIMIT THE AMOUNT OF INFORMATION YOU PROVIDE SET UP AN EXTRA ACCOUNT JUST FOR ADS/MEMBERSHIPS MERCHANT FORMS CLEAR YOUR HISTORY FILE WHEN FINISHED BROWSING DO NOT REPLY TO SPAM FOR ANY REASON SIGN UP FOR FILTERING THROUGH YOUR INTERNET SERVICE PROVIDER OR USE ANTISPAM PROGRAM USE ENCRYPTION RUN PROGRAMS LIKE CCLEANERCCLEANER TURN ON THE FIREWALL KEEP OPERATING SYSTEM SOFTWARE UP-DO-DATE NTM 17006