Joseph J. Malone jomalone1934@verizon.net Security for Seniors Joseph J. Malone jomalone1934@verizon.net.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

®® Microsoft Windows 7 for Power Users Tutorial 7 Enhancing Your Computers Security.
Primary Threats to Computer Security
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Protect your PC virus, worm, Trojan horse, phishing, spam, botnet and zombies, spoofing, social engineering, identity theft, spyware, rootkits Click.
Mountain Lion Security Mac OS X Strong Passwords Every Mac needs a login name and password Every user on every Mac should have their own account.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Use computer and internet safely Dave Dai Computer security Malware Virus: a program that copies itself and infect a computer without permission.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
Security. Physical security Protection from fire/water Protection from dust and extremes of temperature.
 Lesson 05: Computer Maintenance. Keep Software Up-To-Date Patches Security Holes Improves Software Stability Improves Software Performance Adds.
KEEP YOUR COMPUTE SAFE AND HOW TO FIX IT 1. OBJECTIVE Keep your computer safe. -Not about spam, phishing or browser hijacks Designed for the non-geek.
MS System Setup Securing A System. Use Automatic Updates For a workstation or server, schedule the updates to occur regularly. –Control panel click on.
Windows Tutorial 9 Maintaining Hardware and Software
Chapter Nine Maintaining a Computer Part III: Malware.
Internet safety By Lydia Snowden.
eScan Total Security Suite with Cloud Security
With Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation to Accompany GO! with Microsoft ® Windows 7.
Security for Seniors SeniorNet Help Desk
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Operating Systems Concepts 1/e Ruth Watson Chapter 4 Chapter 4 Windows Utilities Ruth Watson.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
 We all know we need to stay safe while using the Internet, but we may not know just how to do that. In the past, Internet safety was mostly about.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
IT security By Tilly Gerlack.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
PC Maintenance How to keep your computer healthy.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Computer Security! By Bailey Hoover. Opening: “Computer viruses are an urban legend.” -Peter Norton Actually: Virus: software reproduces itself; causes.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Internet Security and Your Computer Welcome to Boot Camp.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Sniper Corporation. Sniper Corporation is an IT security solution company that has introduced security products for the comprehensive protection related.
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
ITS220 – How To Prevent Your PC From Infected by Virus presented by Desmond Ho.
Trend Micro Support for Installing the Latest Version Security 2016.
Windows Tutorial 5 Protecting Your Computer
“How to Protect Yourself”
Managing Windows Security
Three steps to prevent Malware infection
How to Install Norton Antivirus in your Computer
Hotspot Shield Protect Your Online Identity
Chapter 6 Application Hardening
A+ Guide to Managing and Maintaining Your PC, 7e
Unit 4 IT Security.
Computer Security Std XI– Chapter 8.
Norton Antivirus Password Not Working Norton technical support phone number
Norton Antivirus Technical Support Number Norton toll free number
How to Fix Trojan.Poweliks Using Norton Antivirus?
Protect Your Computer Against Harmful Attacks!
How to Install and Setup Quick Heal Antivirus Call
Steps to Setup and Install McAfee Antivirus
Fix Windows 10 Activation Error 0x80072ee2
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Information Security Session November 11, 2004
How to allow USB Flash Drive Scan in Avast Antivirus.
Unable To Complete The Norton Download. Norton protects a device from all sorts of security danger. With the great use of internet, the chances of viruses.
Article Source:
Contact QuickBooks File Doctor
Click Here. Webroot Antivirus Technical Support UK Fix and support for all technical problems related computer security. Remove all online harmful threats.
Norton technical support Norton.com/Setup | Norton Setup and Install with Product Key Norton Antvirus Activation For protection against.
Information Security Session October 24, 2005
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Presentation transcript:

Joseph J. Malone jomalone1934@verizon.net Security for Seniors Joseph J. Malone jomalone1934@verizon.net

Malware Viruses Worms Trojan Horse Rootkits Needs a host Does not need a host Trojan Horse Botnets Rootkits

A Virus in Action

Malware Countermeasures (I) Antivirus programs: Commercial: Symantec [Norton], McAff Free: AVG, Microsoft’s Security Essentials, Windows Defender (with Windows 8) Antivirus programs sponsored by your ISP Firewalls Service patches and updates

Malware Countermeasures (II) Password protection Setup different accounts Administrative permission to make changes Parental control software

Security Checklist Keep Windows up to date Check start-up processes [msconfig] Keep all security programs up to date Back up regularly Surf safely Be wary of attachments Don’t swallow the spam Set up your IM and Facebook accounts properly Keep an eye on the notification bar

Installing Microsoft’s Security Essentials Address: www.microsoft.com/en-us/security_essentials/default.aspx Download Location: Start button\Computer\C :\Users\ (name of computer)\Downloads\

Using Microsoft’s Antivirus Program to Scan a USB Insert the USB into the Computer Open the Computer folder Right click on the USB Select “Scan with Microsoft’s Security Essentials” from the drop-down menu Click “Custom Click “Scan now” Check the box next to the name of the USB Click OK

Backing up your Libraries Insert a USB into the Computer Right click on the Start button Click “Open Windows Explorer” Right click on any of the Libraries in the window, and select “Send To” from the drop-down menu Select the USB Repeat to back up the other Libraries

Backing up your Computer Automatic Backups You need a external hard drive The System Restore Utility You should create a manual restore point before adding new hardware or software Creating a System Image You also should create a system repair disk

Internet Dangers and Problems Identity theft Internet Scams [http://netforbeginners.about.com/od/scamsandidentitytheft/ss/top10inetscams.htm] Phishing Charitable collections Unexpected attachments Hacking Denial of Service Attacks Spam [junk mail]

Cookies Small text files Placed in the computer by the Web sites you visit The Cookie folder is hidden. Use the following steps to unhide and see the Cookie folder: Start menu\Control Panel\Folder Options\uncheck the box next to “Hide Protected Operating system files Click Yes, Apply, and then OK C:\Users\computer name\ AppData\Roaming\Microsoft\Windows\Cookies

Controlling Cookies Open Internet Explorer Click Tools on the Menu bar Click Internet Options on the drop-down menu Click the Privacy tab Move the dial to the level that you are comfortable with Click Apply, then OK