Lecture-16(B) Taking Protective Measures

Slides:



Advertisements
Similar presentations
Keep Your PC Safe (Windows 7, Vista or XP) Nora Lucke 02/05/2012 Documents - security.
Advertisements

SECURE YOUR COMPUTER or Lose It 1. Activate Anti-virus Software. 2. Firewall it. 3. Windows Service Pack 2 4. Fight Spyware 5. Update it, automate updates.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
Utility Programs and their Functions. Antivirus Software (Virus Checker) Keep the Computer software healthy and free of virus’ that can harm the function.
Security. Physical security Protection from fire/water Protection from dust and extremes of temperature.
THE WONDERFUL HISTORY OF COMPUTERS FROM THE BEGINNING HARDWARE, SOFTWARE,SAFTEY, AND COMPUTER ETHICS.
Utility Programs  A type of system software that is used to solve a particular problem is called utility program. Many operating system provides different.
Newport Photography Club Ryan Erwin PC MAINTENANCE & SECURITY.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Learning In A Techno World How Safe is Your Cyberspace?
1 Spyware, Adware, and Browser Hijacking. ECE Agenda What is Spyware? What is Adware? What is Browser Hijacking? Security concerns and risks Prevention,
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
COMPUTER CARE & MAINTENANCE. Protecting Your Computer From Damage Like any kind of equipment, your computer requires care and maintenance to run smoothly.
Securing Your Home Computer Securing Your Home Computer Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
PC Maintenance How to keep your computer healthy.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Safer Online Shopping and Practices Presenter: Brian Moats Students Active In Leadership.
INTERNET SAFETY FOR KIDS
Internet Security and Your Computer Welcome to Boot Camp.
Keeping Your Computer Safe and Running Efficiently.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Protecting Your Computing Devices Antivirus, Anti-Spyware, Ad blocking, Antitheft and OS Maintenance.
Internet safety By Suman Nazir
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Onguardonline.gov By Austin Kellogg. Main ideas  Protect your personal information  Know who your dealing with  Use security software that updates.
Return to the PC Security web page Lesson 4: Increasing Web Browser Security.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
NETWORK SECURITY LAB 1170 REHAB ALFALLAJ CT1406. Introduction There are a number of technologies that exist for the sole purpose of ensuring that the.
Computer Security Keeping you and your computer safe in the digital world.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
ITS220 – How To Prevent Your PC From Infected by Virus presented by Desmond Ho.
Internet Safety.
Chapter 3: SYSTEM SOFTWARE
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Computer Literacy BASICS
Joseph J. Malone Security for Seniors Joseph J. Malone
Three steps to prevent Malware infection
Malware and Computer Maintenance
Chapter 3 Installing and Learning Software
Chapter 6 Application Hardening
Name Job Title Library Name
Computer Security Std XI– Chapter 8.
Antivirus Support Phone Number + 1-(844) One Step IT Solutions December 6, 2017
Home Computer Security
Computer virus Topic: Prepared For Salmeen Rahman Prepared By
Steps to Setup and Install McAfee Antivirus
Understanding the Need for Security Measures
McGraw-Hill Technology Education
Objectives Overview Define system software and identify the two types of system software Describe the functions of an operating system Summarize the features.
Kaspersky Total Security for Mac Kaspersky Total Security for Mac,
Trend Micro Antivirus + Security To Buy Visit : Or Contact : (855)
Operating System Basics
LO2: Understand Computer Software
Utility Programs.
Information Security Session October 24, 2005
You have Flash installed on your computer.
Part 3.
King Saud University- College OF Applied Studies
Minimizing Online Risks
Unit 4 IT Security Kerris Davies.
What is Information Security?
You have Flash installed on your computer.
King Saud University- College OF Applied Studies
Computer Literacy BASICS
1.00 Examine the role of hardware and software.
G061 - Network Security.
Presentation transcript:

Lecture-16(B) Taking Protective Measures

Avoiding Identity Theft secured your papers cut up unneeded papers Pick up you mail quickly Check statements immediately Keep records for 3 years Teaching tip Start the lecture reminding students that they should not use pirated software in general. However, using pirated security software is especially dumb. It is equivalent to letting a burglar install the new locks on your house.

Avoiding Identity Theft secured your personal information Be wary giving out information Avoid giving account numbers Never give personal information in e-mail Teaching tip Secure online shopping is covered in chapter 10.

Managing Cookies and Spyware Dealing with cookies Browsers provide settings to block cookies No cookies to all cookies allowed Without cookies some sites crash Cookies can be deleted Browsers Spyware programs

Deleting Cookies

Managing Cookies and Spyware Removing web bugs and spyware Install a spyware removal program None are 100% effective, use two Install a pop-up blocker Are extremely effective Teaching tip In 2004 PC World ranked Patrick Kolla’s Spybot and LavaSoft’s AdAware as the best spyware programs available. Both are free downloads. Google, Msn and Yahoo all offer excellent free popup blockers. Additionally the new Mozilla browser FireFox includes a popup blocker. Finally, Windows XP Service Pack 2 installs a popup blocker.

Protection From Malware Viruses and worms Purchase a good anti-virus product Keep the product updated Keep your OS up to date Teaching tip The Computing Keynote feature at the end of chapter 14B provides a thorough examination of virus removal. PC World routinely picks either Norton AntiVirus or McAfee AntiVirus as best buys. A decent free product is AntiVir personal edition available for download at www.mailwasher.net/.

Protecting Your System Limit physical access Easiest way to damage data Build an account for each user Require a password for access Software and hardware password Teaching tip Remind students that passwords should be easy to remember but hard to guess.

Protecting Your System Use a firewall Protects from unauthorized remote use Makes your computer invisible Teaching tip The built in firewall in XP is not very strong. Many ports remain open. Disable Windows’ Firewall and install a free firewall from Zone Labs instead.

Protecting Your System Backup often Backup is a copy of a file Restore replaces a file on disk Organizations backup at least daily Home users should backup weekly Teaching tip All versions of Windows since 95 have included a good backup utility. Other products include Norton Ghost and EVault InfoStage.

Handling Storage Media Store media in the proper container Floppy disks in a hard case CD should be in a cover Thumb disks should be closed

Handling Storage Media Avoid magnetism Magnets erase the contents of disks Magnets found in Speakers Televisions and CRT monitors Radios

Handling Storage Media Moisture Do not use wet media Floppy disks must dry for days

Handling Storage Media Dust, dirt, and fingerprints Dirty or scratched media will fail Handle media by the edge Clean CDs with gentle strokes

Storing Computer Equipment Never store near large electronics Store in dry, climate controlled rooms Plan for natural disasters Stack equipment safely

Keeping Your Computer Clean Avoid eating or smoking at computer Clean the dust from inside the system