Computer Security  Computer Security:  Password Strength  Windows Screen Saver  Deleting browser cache  Deleting browser cookies  Securing MS Office.

Slides:



Advertisements
Similar presentations
®® Microsoft Windows 7 for Power Users Tutorial 7 Enhancing Your Computers Security.
Advertisements

Helping our customers keep their computers safe.  Using your pet’s, business, family, friend’s names  Using number or letter sequences (0123, abcd)
1 of 2 By observing the guidelines below and performing regular maintenance on your computer, you can help keep your computer safe and maintain optimum.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
Operating System Customization
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Aim: What strategies can we use to keep our financial information safe online? Do Now: What do you do to protect your information online?
Data Security Issues in IR Eileen Driscoll Institutional Planning and Research Cornell University
IT Security Essentials Ian Lazerwitz, Information Security Officer.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
Securing Your Home Computer Presenter: Donnie Green Date: February 11, 2009 National Aeronautics and Space Administration
Threats to I.T Internet security By Cameron Mundy.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
With Internet Explorer 9 Getting Started© 2013 Pearson Education, Inc. Publishing as Prentice Hall1 Exploring the World Wide Web with Internet Explorer.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Staying Safe Online Keep your Information Secure.
Computer Security By: MacKenzie Olson. To be safer and more secure online, make these seven practices part of your online routine.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Malicious Attack Corporate Awareness and Walk through Date 29 September 2011.
Agenda Last class: Internet Literacy Lab Today: Internet Safety.
Computer Security By Joey Pawoll. Introduction to computer security Have you been wondering how to be safe online? Well look no further! This powerpoint.
Incident Security & Confidentiality Integrity Availability.
Incident Security & Confidentiality Integrity Availability.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
Cybersecurity Test Review Introduction to Digital Technology.
Any criminal action perpetrated primarily through the use of a computer.
Return to the PC Security web page Lesson 4: Increasing Web Browser Security.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Technological Awareness for Teens and Young Adults.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Security on Peer-to-Peer Networks.
Protection of Data 31 Protection of Data 31. Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers.
Labs. Session 1 Lab: Installing and Configuring Windows 7 Exercise 1: Migrating Settings by Using Windows Easy Transfer Exercise 2: Configuring a Reference.
Information Technology Security Office of the Vice President for Information Technology New Employee Orientation II.
Internet Basics 10/23/2012. What is the Internet? It’s a world-wide network of computer networks. It grows hourly and involves national governments, communities,
Identity Finder Client
Managing Windows Security
DATA SECURITY FOR MEDICAL RESEARCH
Information Systems Desktop Support
OWASP CONSUMER TOP TEN SAFE WEB HABITS
Steps to Setup and Install McAfee Antivirus
Downloading the LAUSD Emergency Plan App from In Case of Crisis
Ways to Secure CMS Websites. The most widely used Content Management Systems are Wordpress, Joomla and Drupal as per statistics. The highest CMS platforms.
Fix AOL Mail Blank Screen Error? If you get a blank screen while trying to sign in to AOL Mail then there may be some reason. do not worry! You just need.
Internet Basics.
Digital $$ Quiz Test your knowledge.
Start at our website at In the upper right hand corner is a link for “Office 365”
Dos and Don’ts.
Unit 4 IT Security Kerris Davies.
E-commerce Infrastructure Web Servers / Web Clients / Web Browsers
Module 3 Using Linux.
Data Recovery: Why Secure Deletion is so Important.
Windows 10 An Operating System
Presentation transcript:

Computer Security  Computer Security:  Password Strength  Windows Screen Saver  Deleting browser cache  Deleting browser cookies  Securing MS Office documents  Steps to Secure Computer & Self

Password Strength  Strong passwords are required to ensure data security  Weak passwords can be hacked and sensitive data compromised  Computer security experts recommend the following criteria when creating or changing a password:  Password should be at least 10 characters long (the longer the more secure)  Password should include at least one uppercase and one lowercase letters  Password should include at least one number (i.e. 1, 2, 3, etc.)  Password should include at least one symbol – where permissible (i.e. #, etc.)  Password should NOT include names (easier to hack)  Password should NOT include dictionary words (easier to hack)

Windows Screen Saver  What is a Screen Saver?  It’s a moving picture or pattern that appears on a computer screen after the computer has been inactive for a configured period of time  Historically, Screen Saver was developed to save older screens from image burn-in (newer monitors don’t that that problem)  Today, the Screen Saver feature is primarily used to secure a computer by locking it after it’s been inactive for a configured period of time:  For example, if the Screen Saver is configured to lock a computer after it’s been inactive for 5 minutes and the computer user rushes to a meeting, the Screen Saver will kick-in after 5 minutes and lock the computer. Otherwise, the computer will be unlocked for the entire time the user is away, which is a security risk.  Demo to class

Delete Browser Cache  While using a browser to surf and browse the Internet, temporary Internet files are downloaded to your computer  Over and above using valuable computer disk space, some of these files may contain sensitive information  I recommend clearing the browser cache on regular basis  Demo to class

Delete Browser Cookies  Some website (i.e. Amazon.com, ebay.com, and many others) may place a cookie file on your computer  Cookie files may include sensitive information, such as:  Account name  Account password  Address  Credit card information  Browsing history  I recommend deleting all cookies, or at least cookies for specific websites, on regular basis  Demo to class

Securing MS Office Documents  MS Office apps (i.e. MS Word or MS Excel) enable the user to secure the content of a file with a password  The MS Office Encrypt with Password feature could be used for two primary reasons:  To secure MS Office files on one’s computer (additional layer of security)  To transfer MS Office files securely over the Internet (communicate the file password to the receiving party in a second , over the phone, etc.)  Demo to class

Steps to Secure Computer & Self 1)Use a strong password 2)Enable Screen Saver with password 3)Install a reputable anti-malware/anti-virus software and keep up-to-date (i.e. MS Defender) 4)Keep the Operating System and Applications up-to-date (Windows Update) 5)Enable firewall and block all incoming traffic 6)Practice safe Internet computing