KEEPING YOUR COMPUTER RUNNING AND SAFE BUAD 6800 – SPRING 2011 MEAGAN FRANCES AYERS.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin PERSONAL PRODUCTIVITY USING IT TECHNOLOGY PLUG-IN T1.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
1 of 2 By observing the guidelines below and performing regular maintenance on your computer, you can help keep your computer safe and maintain optimum.
Ways to keep your PC running smoothly  Reboot at least once a week  Make sure fan is free of dust and debris  Defragment your PC once a month  Run.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
How to avoid Viruses and Malware on your Computer Use a firewall Using a firewall is like locking the front door to your house—it helps keep intruders.
Computer Viruses.
Explanations Of Software Utilities By Tim Wong.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
What is spyware? Supervisor dr. lo’ay tawalbeh Search By Mahmoud al-ashram Soufyan al-qblawe.
Utility Programs and their Functions. Antivirus Software (Virus Checker) Keep the Computer software healthy and free of virus’ that can harm the function.
Format Scandisk Defragmentation Antivirus Compression Software
 Lesson 05: Computer Maintenance. Keep Software Up-To-Date Patches Security Holes Improves Software Stability Improves Software Performance Adds.
1 Computer Security: Protect your PC and Protect Yourself.
Alisha horsfield.  Computer virus is something that copies itself to computer software.  Virus can delete the hosts important documents which includes.
Threats to I.T Internet security By Cameron Mundy.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.
Computer Basics.  Be sure to check with your school’s Network Administrator and/or Handbook before you make changes to your school computer.
Staying Safe Online Keep your Information Secure.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
PC Maintenance How to keep your computer healthy.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Agenda Last class: Internet Literacy Lab Today: Internet Safety.
Year 9 Autumn Assessment Computer system/Information security-Planning, Communicating, Information. By Louis Smith-Lassey 9k 9Y1.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Safer Online Shopping and Practices Presenter: Brian Moats Students Active In Leadership.
Stay Safe Online. Use strong passwords Using the same password for all your accounts makes it easy to remember. However, it also means a hacker needs.
INTERNET SAFETY FOR KIDS
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Basic Computer Maintenance Clean and Cool Deleting Temporary Files Scandisk Backup Your Data How to run scandisk? Click on Start-Programs-Accessories-
Internet Safety Internet Safety LPM
Matthew Glenn AP2 Techno for Tanzania This presentation will cover the different utilities on a computer.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
COMPUTER SYSTEM TOOLS. SCANDISK MICROSOFT UTILITY PURCHASED FROM NORTON, WHICH IS NOW SYMANTEC; INCLUDED WITH MS-DOS 6.2 AND ON AS WELL AS ALL VERSIONS.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Computer Security & Backups LO: Understanding the need for computer security and typical ways to ensure that a system is secure. Learning Outcome : Define.
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Computer Security Keeping you and your computer safe in the digital world.
Internet Safety.
Windows Tutorial 5 Protecting Your Computer
Unit 4 IT Security.
Plug-In T1: Personal Productivity Using IT
HOW DO I KEEP MY COMPUTER SAFE?
Presentation transcript:

KEEPING YOUR COMPUTER RUNNING AND SAFE BUAD 6800 – SPRING 2011 MEAGAN FRANCES AYERS

OVERVIEW ―Passwords ―Creating Strong Passwords ―File Management ―Backup and Recovery Strategies ―Spam, Phishing, and Spyware ―Viruses/Anti-Viruses ―Firewall

PASSWORDS Without a good password, people can steal your information, much like identity theft.  This can be costly You should never:  Give your passwords to friends  Write your passwords down You should:  Change your password every few months  Keep a couple different passwords for different purposes: banking, social networking, etc…

CREATING A PASSWORD Never:  Use sequential numbers or letters such as “ ” or “defghijk”  Use adjacent letters on the keyboard such as “qwerty”  Use personal names or numbers such as a pet’s name or your birthday  Use words that are in the dictionary What you should do to create a strong password:  Use at least 8 characters using letters, numbers, and symbols  Make sure it is easy for you to remember so you don’t have to write it down  Use a passphrase (a sentence you can remember). For example: ―I absolutely love cheese, my favorite is provolone  **Having good passwords does not guarantee protection, if someone gets a hold of your information, notify authorities ASAP**

FILE MANAGEMENT Even if you spend roughly 5 minutes searching for files, this can add to significant time loss over a period of time!!!  Example: 5min./day * 5days/week * 52weeks = 1,300hours/year Good file management can save time and headaches.

BACKUP AND RECOVERY STRATEGIES Why is it important to backup your information? Scenario: ―You go to bed after finishing a 30 page paper, finally. You have been working on it for weeks now. You wake up to go to class and rush to print your paper in time. But unfortunately, your computer mysteriously crashed overnight and everything is gone without warning. So what happens next? You probably have a nervous breakdown, cry a little, maybe think about dropping the class…. Who knows? But, this could have been prevented! How? ―If you had only backed up your information.

BACKUP STRATEGIES You should backup anything that cannot be easily replaced, including: ― s, school projects, finances, letters, pictures, music purchased, software purchased from the internet (no software in which you have the CDs for such as Windows or Microsoft products), etc… How to backup files ―Copy and paste (or drag and drop) to Zip Drives, External had drives, CDs, DVDs, flash drives, or Internet-based file storage. **Whichever is the cheapest and most convenient for you** How to backup Microsoft ―Go to Start, All Programs, Accessories, System Tools, and then Backup ―This should only be performed by advanced users

DISK CLEANUP AND DEFRAGMENTATION Disk fragmentation slows your computer down. Defragmenting your computer consolidates files and folders to keep your computer running quickly. What can you do? ―Defrag you computer monthly or when you add a large number of files to your computer, your disk space is near 15%, or when you install new programs or update Windows ―Go to Start, All Programs, Accessories, System Tools, Disk Defragmenter, then Analyze Disk Cleanup frees space on your computer, empties the recycling bin, removes temporary internet files, removes installed programs no longer being used, speeds up your computers access to data, and detects and repairs disk errors. ―Start, All Programs, Accessories, System Tools, Disk Cleanup, Check to appropriate boxes, click OK, then confirm by clicking Yes

SPAM Spam – Unsolicited s ―80% of all s sent to date are considered spam! What can you do? ―Use your junk mail filter provided by your service provider ―Be careful not to just give out you information to anyone or any website ―Delete junk mail without opening ―Do not forward s ―Do not buy anything through spam messages How do they get your information? ―They steal, swap or buy lists of valid addresses ―They use a software that creates random addresses ―They harvest addresses from web sites offering free items ―White pages, job postings, newsgroups, message boards, cha rooms, or personal web pages

PHISHING Phishing – To send s or instant messages with spam that meticulously imitates messages from reputable companies to trick you into allowing them to steal your identity. Please remember that reputable companies do not send s or messages asking for your passwords or sensitive information. If you see this type of or message, report it right away. What can you do? ―Report suspicious s ―Be wary to click on links in s ―Use the security certificate to determine if the site is secure or not ―Do not enter personal information into pop-up windows

SPYWARE Spyware – Software that performs certain behaviors such as advertising, collecting personal data, or changing the configuration of your computer, generally without appropriately obtaining your consent. Not all spyware is bad or malicious. However, you should carefully read all disclosures and agreements when downloading something onto your computer. Otherwise, you may be consenting to spyware and not even know it. Spyware can: ―Slow down your computer ―Add random toolbars to your browser ―Change your browser settings without your knowledge ―Cause computer crashes

SPYWARE CONTINUED What you can do ―Keep systems up to date ―Install anti-virus and anti-spyware programs ―Install and configure firewalls ―Use pop-up blockers ―Ensure setting are configured to prompt you whenever a website tries to install a program or Active X control The only way to remove spyware is to download a spyware removal tool, run the tool, review the files, and then remove all suspicious files.

ANTI-VIRUS Virus – A malicious computer program that can modify, delete, or steal data and even gain control over your computer. ―Boot sector viruses ―Macro viruses (75% of viruses) ―File infecting viruses Anti-Virus – A single program or a collection of programs that protect a computer system from viruses. ―Scans your computer for viruses and if found, they remove the threats ―If you think you have a virus, send to the manufacturer of your anti-virus software ―Only purchase anti-virus programs from an established company to ensure full protection (McAfee or Norton)

FIREWALL Firewall – A barrier to keep destructive forces away from your property. Without a Firewall: ―All computers linked at a company can be directly accessed from anyone via the internet ―One employee mistake can lead to hackers finding a hole into the businesses personal files A firewall should be placed at every connection to the internet To turn on Windows Firewall: ―Go to Start, Control Panel, then go to Windows Firewall and turn on

Any Questions?